12.1A |
Artificial intelligence
12.4.3.1 describe spheres where artificial intelligence is applied: industry, education, medicine, gaming industry, society
|
Theory and exercises 2020
"Artificial Intelligence"
|
AI applications
Experiments
Quick, drown!
The Development of Artificial Intelligence (on bbc.co.uk)
AI (glossary)
Artificial Intelligent
Artificial Intelligence Tutorial
Robotics
Intelligent robots (on bbc.co.uk)
Top 10 artificial intelligence (AI) technology trends for 2018
За гранью. Искусственный интеллект (видео)
|
12.1A |
Virtual and augmented reality
12.4.3.2 explain the purpose of virtual and augmented reality
|
Theory and exercises 2020
"Virtual and augmented reality" |
Virtual Reality: another world within sight
What is augmented reality?
Pros vs Cons of Virtuel Reality
|
12.1B |
Declarative and imperative programming languages
12.5.1.1 compare declarative and imperative programming languages
|
Theory and exercises 2020
"Declarative and imperative PL" |
Programming paradigms
|
12.1B |
Expert systems
12.5.1.2 create a simple expert system
|
Theory and exercises 2020
"Expert systems" |
Expert system |
12.1B |
Expert system (Imperative language)
12.5.1.2 create a simple expert system
|
|
|
12.1B |
Expert system (Declarative language)
12.5.1.2 create a simple expert system
|
Theory and exercises 2020
"Expert system (Prolog)" |
|
12.1B |
Stages of compiler design
12.5.1.3 describe program compilation stages: lexical and syntactic analysis, code generation and optimization
|
Theory and exercises 2020
"Stages of compiler design"
|
Compiler Design - Phases of Compiler |
12.1C |
Course work. Stage Testing. Types of test data
12.5.3.2 perform testing using normal data
12.5.3.3 perform testing using extreme data
12.5.3.4 perform testing using erroneous data
|
Theory and exercises 2020
"Testing. Types of test data"
Theory and exercises 2020
"Test plan"
|
|
12.1C |
Types of programming errors
12.5.3.1 describe execution errors at programme startup
12.5.3.5 describe a syntax error in a programme code
12.5.3.6 describe a logic error in a programme code
|
Theory and exercises 2020
"Types of programming errors"
|
|
|
|
|
|
12.2A |
Information security
Data protection measures
12.1.2.1 describe protection measures data and computer systems such as physical risks, firewalls, encryption, biometrics, computer virus
12.1.2.2 use data protection measures such as data backup and disk mirroring
|
Theory & tasks 2020
"Data protection measures"
Theory & tasks 2020
"Physical risks"
Theory & tasks 2020
"Firewalls"
Theory & tasks 2020
"Biometrics"
Theory & tasks 2020
"Encryption"
Theory & tasks 2020
"Backup and Disk mirroring"
|
|
12.2A |
12.1.3.1 analyse ethical problems arising due to computer system cracking
12.1.2.3 protect data from unauthorised access
|
Theory & tasks 2020
"Passwords" |
|
12.2A |
12.1.3.2 analyse problems arising due to malware |
|
|
12.2A |
12.1.3.3 explain privacy policies
12.1.3.4 analyse problems arising due to disseminating and using information
|
"Privacy policies" 2020 |
|
12.2A |
12.1.3.7 use E-gov resourses |
Theory & tasks 2020
"E-government" |
|
12.2B |
Creating documentation
12.2.1.1 use headers and footers when documenting a project
12.2.1.2 use footnotes when documenting a project
12.2.1.3 use tables when documenting a project
|
|
|
12.2B |
Copyright & plagiarism
12.1.3.5 check documents using antiplagiarism resources
12.1.3.6 name copyright protection rules
|
Theory & tasks 2020
"Plagiarism & antiplagiarism resourses"
Theory & tasks 2020
"Copyright"
|
|
12.2C |
Methods of system implementation
12.2.1.7 list system implementation methods
12.2.1.8 compare the advantages and disadvantages of system implementation methods
|
Theory & tasks 2020
"Methods of implementation"
|
|
12.2C |
Project work. Installation. Implementation plan.
12.2.1.9 explain the importance of making a system implementation plan
12.2.1.10 make a system implementation plan
|
Theory & tasks 2020
"New system installation"
|
|
12.2C |
Project work. Documentation |
Theory & tasks 2020
"User manual" |
|
12.2С |
Project work. Evaluation |
Theory & tasks 2020
"Evaluation"
|
|
|
|
|
|
12.3A |
Types of operating system (part II)
12.3.1.1 describe a real-time operating system
12.3.1.2 describe a network operating system
12.3.1.3 describe a batch processing operating system
|
Theory & tasks 2021
"Types of operating system"
"Types of operating system (part I)"
|
|
12.3A |
User interfaces
12.3.1.4 define the advantages and disadvantages of a graphical user interface (GUI)
12.3.1.5 define the advantages and disadvantages of a command line interface (CLI)
12.3.1.6 define the advantages and disadvantages of natural-language and gesture-recognition user interfaces
|
Theory & tasks 2021
"Types of user interfaces" |
|
12.3A |
Fetch-Decode-Execute cycle
12.3.2.5 explain three operations in fetch-execute cycle (fetch /decode /execute)
|
Theory & tasks 2021
"Fetch-Execute cycle"
|
Internal Elements of the CPU (e-book)
Fetch/Execute Cycle (e-book)
Fetch-Execute cycle on teach-ict.com
|
12.3A |
System bus
12.3.2.4 explain how data is transferred between different components of a computer system through the address bus, data bus and control bus
|
Theory & tasks 2021
"System bus"
|
|
12.3A |
Speed clock, word size, bus width
12.3.2.6 explain how the clock speed, word length and bus width affect the performance
|
Theory & tasks 2021
"Computer performance"
|
|
12.3A |
RISC vs CISC
12.3.2.1 describe the RISC architecture
12.3.2.2 describe the CISC architecture
12.3.2.3 compare RISC and CISC
|
Theory & tasks 2021
"RISC & CISC architecture" |
|
12.3A |
Addressable memory
12.3.4.1 explain the principle of memory addressing
12.3.4.2 explain the principle of storing programmes and data
|
Theory & tasks 2021
"Addressing modes"
Presentation for the lesson "Addressable memory"
|
Addressing modes (e-book) |
12.3A |
Memory management. Paging and segmentation.
12.3.4.2 explain principle of memory organization by segment and page
|
Theory & tasks 2021
"Paging and segmentation" |
|
|
|
|
|
12.1B |
Represent positive decimal numbers in binary |
Presentation for the lesson |
Binary addition examples
Two's compliment binary addition examples
|
12.1B |
Data structures. Binary tree. |
Trees.pdf |
|
12.1B |
Data structures. Queues & Stacks. |
|
Visualisation "Queue"
Visualisation "Stack"
|
|
|
|
|
12.2A |
Hexadecimal numbers |
Presentation fo the lesson "Hexadecimal" |
Why do we use hexadecimal? |
12.2B |
CMS, WYSIWYG and HTML web-editor |
Presentation for the lesson "CMS, WYSIWIG, HTML editors" |
Building a solution
Which of ways to build a website is best for you?
HTML editor vs WYSIWYG
CMS vs HTML
WYSIWYG and CMS vs. Hand Coding
|
12.2B |
Algorithm efficiency |
Presentation for the lesson "Algorithm efficiency"
Presentation II "Algorithm efficiency. Time and Space"
Task 119 (acmp.ru) 119.pas
Writing
|
Знай сложность алгоритмов |
12.2C |
Modular design |
Presentation for the lesson |
What is modular design?
Multimedia design
Modular design on wikibooks
|
|
|
|
|
|
|
|
|
|
|
|
|
12.3A |
Internet, WWW, intranet. |
Presentation for the lesson "The Internet, an intranet and WWW"
Test "Network"
|
wikibooks (Internet, Intranet and WWW) |
12.3A |
URL. Domain names.
Domain Name System.
|
Students' presentation Group III
Students' presentation Group VII
|
wikibooks (URI, URL, URN)
wikibooks (Domain name)
differences between URI, URL, URN
What is domain name?
|
12.3A |
Client-server model |
Presentarion for the lesson "Client-server model"
Form "URL, Domain name. DNS."
|
Types of networks
wikibooks (Client-server model)
Video "Client-server model"
|
12.3A |
Protocols |
Presentation "Protocols" of 7th group
Presentation "Protocols" of 3th group
|
wikibooks (Protocols)
Common network protocols (youtube)
Network protocols (teach-ict.com)
|
12.3A |
Computer and network security.
User accounts, firewalls, authentication, passwords and digital signatures.
|
Presentation "Security mesures" of 7th group |
Security mesures (firewall, digital signature, viruses)
Check your password online
|
12.3A |
Classification software |
Presentation "Classification software" of 7th group |
wikibooks (Classification of software)
wikibooks (System software)
wikibooks (Application sofware)
|
12.3A |
User interfaces
|
Presentation "Types of user interfaces" of 3rd group
Presentation "Types of user interfaces" of 7rd group
Test "Types of user interfaces"
|
wikibooks (User interfaces)
User interfaces (teach-ict.net)
User interfaces (bbc.com)
Interfaces (bbc.com)
|
|
|
|
|
12.3A |
How operating systems manage memory.
Virtual memory
|
Presentation "Memory management. Virtual memory" |
wikibooks (manage memory)
virtual memory on teach-ict.com
Virtual memory (pdf)
Memory managment
Operating system - Memory management
|
12.3A |
Paging, segmentation and partitions |
Presentation "Paging, segmentation and partitions" of 3rd group
Presentation "Paging, segmentation and partitions" of 7th group
Test "Operating system"
|
Disc partitioning (teach-ict.com)
Segmentation (teach-ict.com)
Pagng (teach-ict.com)
Paging and segmentation
Paging, segmentation, virtual memory
Disk partition
|
12.3A |
Methods of data access: serial, sequential and random access |
Presentation "Serial, sequential and random access" of 3rd group
Presentation "Serial, sequential and random access" of 7th group
Methods of data access
|
Serial and direct methods
Ways in which Data is Stored and Read
Methods of access
|
12.3A |
Search engines. |
Presentation "Search engine" of 3td group
Presentation "Search engine" of 7th group
|
Keyword-based versus Natural-Language Search
How do search engines work?
Natural language interface
How Do Search Engines Work & Why You Should Care
|
12.3B |
IP address and subnet mask |
Research "Subnet mask" 7rd group
Activity "Define class for IP-address"
|
Types of IP address classes |
12.3B
|
MAC addresses |
Presentation "MAC addresses" 3rd group
Presentation "MAC addresses" 7th group
|
wikibooks (IP-addresses)
wikibooks (MAC addresses)
Формулы расчета сетей
|
12.3B
|
Routers and gateways |
Presentation "Packet switching and curcuit switching" 3rd group
Presentation "Packet switching and curcuit switching" 7th group
|
Network devices
wikibooks (Router)
wikibooks (Routers, Gateways)
Router vs. Gateway
|
12.3B |
Packet switching |
|
wikibooks (Packet switching) |
12.3B |
Network faults |
|
Error detection |
12.3B |
Data validation, data verification |
|
Data validation
Data verification
|
|
|
Revision |
|
12.4A
|
Artificial intelligent |
|
|
12.4A
|
Declarative and imperative languages |
Presentation "Declarative and imperative languages" (III group)
Presentation "Declarative and imperative languages" (VII group)
|
Declarative languages
Declarative languages (Teach-ict.com)
Imperative languages (Procedural languages)
Classification of programming languages
|
12.4A |
Ethical issues |
Presentation "Ethical issues (Hacking, Cracking, Malware)" (III group)
Presentation "Ethical issues (Hacking, Cracking, Malware)" (VII group)
|
Types of computer misuse
What is the hacker?
Hacking and malware
Computer Ethics
Law on Copyright and Neighboring Rights (Kazakhstan)
Data Protection Act (DPA on bbc.co.uk)
Data Protection Act (DPA on teach-ict.com)
|
|
|
|
|
|
Project work |
Presentation "All stages of the course work"
Presentation "Testing"
Presentation "Installation new system"
Presentation "User guide"
|
|
|
|
Database revision
Network
Computer in society
Binary and data representation
Hardware
Software
Programming
|
|