12 класс
18.04.2020, 21:33
Grade 12. Материалы для учащихся "Назарбаев Интеллектуальных школ"
Course GCSE ICT ==>
 
Unit

Topic of lesson

Presentation and exercises

Useful materials

12.1A

Artificial intelligence

12.4.3.1 describe spheres where artificial intelligence is applied: industry, education, medicine, gaming industry, society

Theory and exercises 2020
"Artificial Intelligence"

 

AI applications

Experiments

Quick, drown!

The Development of Artificial Intelligence (on bbc.co.uk)

AI (glossary)

Artificial Intelligent

Artificial Intelligence Tutorial

Robotics

Intelligent robots (on bbc.co.uk)

Top 10 artificial intelligence (AI) technology trends for 2018

За гранью. Искусственный интеллект (видео)

12.1A

Virtual and augmented reality 

12.4.3.2 explain the purpose of virtual and augmented reality

Theory and exercises 2020
"Virtual and augmented reality"

Virtual Reality: another world within sight

What is augmented reality?

Pros vs Cons of Virtuel Reality

12.1B

Declarative and imperative programming languages

12.5.1.1  compare declarative and imperative programming languages

Theory and exercises 2020
"Declarative and imperative PL"

Programming paradigms

12.1B

Expert systems

12.5.1.2 create a simple expert system

Theory and exercises 2020
"Expert systems"
Expert system
12.1B

Expert system (Imperative language)

12.5.1.2 create a simple expert system

   
12.1B

Expert system (Declarative language)

12.5.1.2 create a simple expert system

Theory and exercises 2020
"Expert system (Prolog)"
 
12.1B

Stages of compiler design

12.5.1.3 describe program compilation stages: lexical and syntactic analysis, code generation and optimization​

Theory and exercises 2020
"Stages of compiler design"

Compiler Design - Phases of Compiler
12.1C

Course work. Stage Testing. Types of test data 

12.5.3.2 perform testing using normal data 
12.5.3.3 perform testing using extreme data
12.5.3.4 perform testing using erroneous data 

Theory and exercises 2020
"Testing. Types of test data"

Theory and exercises 2020
"Test plan"

 
12.1C

Types of programming errors

12.5.3.1 describe execution errors at programme startup 
12.5.3.5 describe a syntax error in a programme code
12.5.3.6 describe a logic error in a programme code
 

Theory and exercises 2020
"Types of programming errors"

 
       
12.2A

Information security 

Data protection measures

12.1.2.1 describe protection measures data and computer systems  such as physical risks, firewalls, encryption, biometrics, computer virus

12.1.2.2 use data protection measures such as data backup and disk mirroring

Theory & tasks 2020
"Data protection measures"

Theory & tasks 2020
"Physical risks"

Theory & tasks 2020
"Firewalls"

Theory & tasks 2020
"Biometrics"

Theory & tasks 2020
"Encryption"

Theory & tasks 2020
"Backup and Disk mirroring"

 
12.2A

12.1.3.1 analyse ethical problems arising due to computer system cracking

12.1.2.3 protect data from unauthorised access
 

Theory & tasks 2020
"Passwords"
 
12.2A 12.1.3.2 analyse problems arising due to malware    
12.2A

12.1.3.3 explain privacy policies

12.1.3.4  analyse problems arising due to disseminating and using information

"Privacy policies" 2020  
12.2A 12.1.3.7 use E-gov resourses Theory & tasks 2020
"E-government"
 
12.2B

Creating documentation

12.2.1.1 use headers and footers when documenting a project 
12.2.1.2 use footnotes when documenting a project 
12.2.1.3 use tables when documenting a project 

   
12.2B

Copyright & plagiarism

12.1.3.5 check documents using antiplagiarism resources  

12.1.3.6 name copyright protection rules

Theory & tasks 2020
"Plagiarism & antiplagiarism resourses"

Theory & tasks 2020
"Copyright"

 
12.2C

Methods of system implementation

12.2.1.7 list system implementation methods 

12.2.1.8 compare the advantages and disadvantages of system implementation methods

Theory & tasks 2020
"Methods of implementation"

 
12.2C

Project work. Installation. Implementation plan.

12.2.1.9 explain the importance of making a system implementation plan 

12.2.1.10 make a system implementation plan

Theory & tasks 2020
"New system installation"

 

 
12.2C Project work. Documentation Theory & tasks 2020
"User manual"
 
12.2С Project work. Evaluation

Theory & tasks 2020
"Evaluation"

 
       
12.3A

Types of operating system (part II)

12.3.1.1 describe a real-time operating system  

12.3.1.2 describe a network operating system 

12.3.1.3 describe a batch processing operating system 

Theory & tasks 2021
"Types of operating system" 

"Types of operating system (part I)"

 
12.3A

User interfaces

12.3.1.4 define the advantages and disadvantages of a graphical user interface (GUI)

12.3.1.5 define the advantages and disadvantages of a command line interface (CLI)

12.3.1.6 define the advantages and disadvantages of natural-language and gesture-recognition user interfaces 

Theory & tasks 2021
"Types of user interfaces"
 
12.3A

Fetch-Decode-Execute cycle

12.3.2.5 explain three operations in fetch-execute cycle (fetch /decode /execute) 

Theory & tasks 2021
"Fetch-Execute cycle"

Internal Elements of the CPU (e-book)

Fetch/Execute Cycle (e-book)

Fetch-Execute cycle on teach-ict.com

12.3A

System bus

12.3.2.4 explain how data is transferred between different components of a computer system through the address bus, data bus and control bus

Theory & tasks 2021
"System bus"

 
12.3A

Speed clock, word size, bus width

12.3.2.6 explain how the clock speed, word length and bus width affect the performance 

Theory & tasks 2021 
"Computer performance"

 
12.3A

RISC vs CISC

12.3.2.1 describe the RISC architecture 

12.3.2.2 describe the CISC architecture 

12.3.2.3 compare RISC and CISC 

Theory & tasks 2021
"RISC & CISC architecture"
 
12.3A

Addressable memory

12.3.4.1 explain the principle of memory addressing  

12.3.4.2 explain the principle of storing programmes and data

Theory & tasks 2021
"Addressing modes"

Presentation for the lesson "Addressable memory"

Addressing modes (e-book)
12.3A

Memory management. Paging and segmentation.

12.3.4.2 explain principle of memory organization by segment and page 

Theory & tasks 2021
"Paging and segmentation"
 
   

 

 

12.1B Represent positive decimal numbers in binary Presentation for the lesson

Binary addition examples

Two's compliment binary addition examples

12.1B Data structures. Binary tree. Trees.pdf  
12.1B Data structures. Queues & Stacks.  

Visualisation "Queue"

Visualisation "Stack"

       
12.2A Hexadecimal numbers Presentation fo the lesson "Hexadecimal" Why do we use hexadecimal?
12.2B CMS, WYSIWYG and HTML web-editor Presentation for the lesson "CMS, WYSIWIG, HTML editors"

Building a solution

Which of ways to build a website is best for you?

HTML editor vs WYSIWYG

CMS vs HTML

WYSIWYG and CMS vs. Hand Coding

12.2B Algorithm efficiency

Presentation for the lesson "Algorithm efficiency"

Presentation II "Algorithm efficiency. Time and Space"

Task 119 (acmp.ru) 119.pas

Writing

Знай сложность алгоритмов
12.2C Modular design Presentation for the lesson 

What is modular design?

Multimedia design

Modular design on wikibooks

     

 

     

 

 

     

 

12.3A Internet, WWW, intranet.

Presentation for the lesson "The Internet, an intranet and WWW"

Test "Network"

wikibooks (Internet, Intranet and WWW)
12.3A

URL. Domain names.

Domain Name System.

Students' presentation Group III

Students' presentation Group VII

 

wikibooks (URI, URL, URN) 

wikibooks (Domain name)

differences between URI, URL, URN

What is domain name?

12.3A Client-server model

Presentarion for the lesson "Client-server model"

Form "URL, Domain name. DNS."

 

Types of networks

wikibooks (Client-server model)

Video "Client-server model"

12.3A Protocols

Presentation "Protocols" of 7th group

Presentation "Protocols" of 3th group

wikibooks (Protocols)

Common network protocols (youtube)

Network protocols (teach-ict.com)

12.3A

Computer and network security.

User accounts, firewalls, authentication, passwords and digital signatures.

Presentation "Security mesures" of 7th group

Security mesures (firewall, digital signature, viruses)

Check your password online

12.3A Classification software Presentation "Classification software" of 7th group

wikibooks (Classification of software)

wikibooks (System software)

wikibooks (Application sofware)

12.3A

User interfaces

 

Presentation "Types of user interfaces" of 3rd group

Presentation "Types of user interfaces" of 7rd group

Test "Types of user interfaces"

wikibooks (User interfaces)

User interfaces (teach-ict.net)

User interfaces (bbc.com)

Interfaces (bbc.com)

   

 

 

12.3A

How operating systems manage memory.

Virtual  memory

Presentation "Memory management. Virtual memory"

wikibooks (manage memory)

virtual memory on teach-ict.com

Virtual memory (pdf)

Memory managment

Operating system - Memory management

12.3A Paging, segmentation and partitions

Presentation "Paging, segmentation and partitions" of 3rd group

Presentation "Paging, segmentation and partitions" of 7th group

Test "Operating system"

Disc partitioning (teach-ict.com)

Segmentation (teach-ict.com)

Pagng (teach-ict.com)

Paging and segmentation

Paging, segmentation, virtual memory

Disk partition

12.3A Methods of data access: serial, sequential and random access

Presentation "Serial, sequential and random access" of 3rd group

Presentation "Serial, sequential and random access" of 7th group

Methods of data access

Serial and direct methods

Ways in which Data is Stored and Read

Methods of access

12.3A Search engines.

Presentation "Search engine" of 3td group

Presentation "Search engine" of 7th group

 

 

Keyword-based versus Natural-Language Search

How do search engines work?

Natural language interface

How Do Search Engines Work & Why You Should Care

12.3B IP address and subnet mask

Research "Subnet mask" 7rd group

Activity "Define class for IP-address"

Types of IP address classes

12.3B

MAC addresses

Presentation "MAC addresses" 3rd group

Presentation "MAC addresses" 7th group

wikibooks (IP-addresses)

wikibooks (MAC addresses)

Формулы расчета сетей

12.3B

Routers and gateways

Presentation "Packet switching and curcuit switching" 3rd group

Presentation "Packet switching and curcuit switching" 7th group

Network devices

wikibooks (Router)

wikibooks (Routers, Gateways)

Router vs. Gateway

12.3B Packet switching   wikibooks (Packet switching)
12.3B Network faults   Error detection
12.3B Data validation, data verification  

Data validation

Data verification

 

  Revision

 

12.4A

Artificial intelligent  

 

12.4A

Declarative and imperative languages

Presentation "Declarative and imperative languages" (III group)

Presentation "Declarative and imperative languages" (VII group)

Declarative languages

Declarative languages (Teach-ict.com)

Imperative languages (Procedural languages)

Classification of programming languages

12.4A Ethical issues

Presentation "Ethical issues (Hacking, Cracking, Malware)" (III group)

Presentation "Ethical issues (Hacking, Cracking, Malware)" (VII group)

Types of computer misuse

What is the hacker?

Hacking and malware

Computer Ethics

Law on Copyright and Neighboring Rights (Kazakhstan)

Data Protection Act (DPA on bbc.co.uk) 

Data Protection Act (DPA on teach-ict.com)

       
  Project work

Presentation "All stages of the course work" 

Presentation "Testing"

Presentation "Installation new system"

Presentation "User guide"

 
   

Database revision

Network

Computer in society

Binary and data representation

Hardware

Software

Programming

 
Категория: УМК | Добавил: bzfar77 | Теги: algorithms, Programming, grade 12, database, computer science, 12 класс, Security
Просмотров: 1313 | Загрузок: 0 | Рейтинг: 5.0/1
Всего комментариев: 0
avatar