12 класс
18.04.2020, 21:33
Grade 12. Материалы для учащихся "Назарбаев Интеллектуальных школ"
Course GCSE ICT ==>
 
Unit

Topic of lesson

Presentation and exercises

Useful materials

12.1A

Artificial intelligence

12.4.3.1 describe spheres where artificial intelligence is applied: industry, education, medicine, gaming industry, society

Theory and exercises 2020
"Artificial Intelligence"

 

AI applications

Experiments

Quick, drown!

The Development of Artificial Intelligence (on bbc.co.uk)

AI (glossary)

Artificial Intelligent

Artificial Intelligence Tutorial

Robotics

Intelligent robots (on bbc.co.uk)

Top 10 artificial intelligence (AI) technology trends for 2018

За гранью. Искусственный интеллект (видео)

12.1A

Virtual and augmented reality 

12.4.3.2 explain the purpose of virtual and augmented reality

Theory and exercises 2020
"Virtual and augmented reality"

Virtual Reality: another world within sight

What is augmented reality?

Pros vs Cons of Virtuel Reality

12.1B

Declarative and imperative programming languages

12.5.1.1  compare declarative and imperative programming languages

Theory and exercises 2020
"Declarative and imperative PL"

Programming paradigms

Declarative languages

Declarative languages (Teach-ict.com)

Imperative languages (Procedural languages)

Classification of programming languages

12.1B

Expert systems

12.5.1.2 create a simple expert system

Theory and exercises 2020
"Expert systems"
Expert system
12.1B

Expert system (Imperative language)

12.5.1.2 create a simple expert system

   
12.1B

Expert system (Declarative language)

12.5.1.2 create a simple expert system

Theory and exercises 2020
"Expert system (Prolog)"
 
12.1B

Stages of compiler design

12.5.1.3 describe program compilation stages: lexical and syntactic analysis, code generation and optimization​

Theory and exercises 2020
"Stages of compiler design"

Compiler Design - Phases of Compiler
12.1C

Course work. Stage Testing. Types of test data 

12.5.3.2 perform testing using normal data 
12.5.3.3 perform testing using extreme data
12.5.3.4 perform testing using erroneous data 

Theory and exercises 2020
"Testing. Types of test data"

Theory and exercises 2020
"Test plan"

 
12.1C

Types of programming errors

12.5.3.1 describe execution errors at programme startup 
12.5.3.5 describe a syntax error in a programme code
12.5.3.6 describe a logic error in a programme code
 

Theory and exercises 2020
"Types of programming errors"

 
       
12.2A

Information security 

Data protection measures

12.1.2.1 describe protection measures data and computer systems  such as physical risks, firewalls, encryption, biometrics, computer virus

12.1.2.2 use data protection measures such as data backup and disk mirroring

Theory & tasks 2020
"Data protection measures"

Theory & tasks 2020
"Physical risks"

Theory & tasks 2020
"Firewalls"

Theory & tasks 2020
"Biometrics"

Theory & tasks 2020
"Encryption"

Theory & tasks 2020
"Backup and Disk mirroring"

 
12.2A

Cracking. Unauthorised access

12.1.3.1 analyse ethical problems arising due to computer system cracking

12.1.2.3 protect data from unauthorised access
 

Theory & tasks 2020
"Passwords"
 
12.2A

Malware

12.1.3.2 analyse problems arising due to malware

   
12.2A

Privacy policies

12.1.3.3 explain privacy policies

12.1.3.4  analyse problems arising due to disseminating and using information

"Privacy policies" 2020  
12.2A

E-government

12.1.3.7 use E-gov resourses

Theory & tasks 2020
"E-government"
 
12.2B

Creating documentation

12.2.1.1 use headers and footers when documenting a project 
12.2.1.2 use footnotes when documenting a project 
12.2.1.3 use tables when documenting a project 

   
12.2B

Copyright & plagiarism

12.1.3.5 check documents using antiplagiarism resources  

12.1.3.6 name copyright protection rules

Theory & tasks 2020
"Plagiarism & antiplagiarism resourses"

Theory & tasks 2020
"Copyright"

 
12.2C

Methods of system implementation

12.2.1.7 list system implementation methods 

12.2.1.8 compare the advantages and disadvantages of system implementation methods

Theory & tasks 2020
"Methods of implementation"

 
12.2C

Project work. Installation. Implementation plan.

12.2.1.9 explain the importance of making a system implementation plan 

12.2.1.10 make a system implementation plan

Theory & tasks 2020
"New system installation"

 

 
12.2C Project work. Documentation Theory & tasks 2020
"User manual"
 
12.2С Project work. Evaluation

Theory & tasks 2020
"Evaluation"

 
       
12.3A

Types of operating system (part II)

12.3.1.1 describe a real-time operating system  

12.3.1.2 describe a network operating system 

12.3.1.3 describe a batch processing operating system 

Theory & tasks 2021
"Types of operating system" 

"Types of operating system (part I)"

 
12.3A

User interfaces

12.3.1.4 define the advantages and disadvantages of a graphical user interface (GUI)

12.3.1.5 define the advantages and disadvantages of a command line interface (CLI)

12.3.1.6 define the advantages and disadvantages of natural-language and gesture-recognition user interfaces 

Theory & tasks 2021
"Types of user interfaces"

wikibooks (User interfaces)

User interfaces (teach-ict.net)

User interfaces (bbc.com)

Interfaces (bbc.com)

12.3A

Fetch-Decode-Execute cycle

12.3.2.5 explain three operations in fetch-execute cycle (fetch /decode /execute) 

Theory & tasks 2021
"Fetch-Execute cycle"

Internal Elements of the CPU (e-book)

Fetch/Execute Cycle (e-book)

Fetch-Execute cycle on teach-ict.com

12.3A

System bus

12.3.2.4 explain how data is transferred between different components of a computer system through the address bus, data bus and control bus

Theory & tasks 2021
"System bus"

 
12.3A

Speed clock, word size, bus width

12.3.2.6 explain how the clock speed, word length and bus width affect the performance 

Theory & tasks 2021 
"Computer performance"

 
12.3A

RISC vs CISC

12.3.2.1 describe the RISC architecture 

12.3.2.2 describe the CISC architecture 

12.3.2.3 compare RISC and CISC 

Theory & tasks 2021
"RISC & CISC architecture"
 
12.3A

Addressable memory

12.3.4.1 explain the principle of memory addressing  

12.3.4.2 explain the principle of storing programmes and data

Theory & tasks 2021
"Addressing modes"

Presentation for the lesson "Addressable memory"

Addressing modes (e-book)
12.3A

Memory management. Paging and segmentation.

12.3.4.2 explain principle of memory organization by segment and page 

Theory & tasks 2021
"Paging and segmentation"

Paging and segmentation

Paging, segmentation, virtual memory

12.3A

Virtual machine

12.3.4.3 explain the concept of virtual machine 

Theory & tasks 2021
"Virtual machine"

 

12.3A

Boolean logic

12.3.3.2 build logical structures 

12.3.3.4 analyze logical structures

Theory and tasks  2020
"Boolean logic. Logic gates. Truth tables"

Build logic curcuit online Logic.ly

 
12.3A

Logic laws

12.3.3.3 simplify logical expressions using the laws of logic  

Theory and tasks  2020
"Simplification logic expressions"

Presentation for the lesson "Karnaugh cards"

 
12.3B

Represent positive decimal numbers in binary. Binary, hexadecimal numbers

12.1.1.1 convert binary numbers to hexadecimal  

12.1.1.2 explain the advantages of using hexadecimal numbers in computer systems 

Theory and tasks  2021
"Binary, hexadecimal numbers"

Why do we use hexadecimal?
12.3B

Binary addition and binary multiplication

12.1.1.3 perform the arithmetic operations: addition and multiplication of binary numbers

Theory and tasks  2021
"Binary addition and binary multiplication"

Presentation for the lesson

Binary addition examples

12.3B

Represent positive and negative numbers in two's complement

12.1.1.4 represent positive and negative numbers in two's complement and specify the range of n bits.  

12.1.1.5 perform subtraction using two's complement 

Theory and tasks  2021
"Represent positive and negative numbers in two's complement"
Two's compliment binary addition examples
12.3B

Fixed point numbers and Floating point numbers

12.1.1.6 use binary numbers with a fixed point to represent fractional numbers with a given number of bits 

12.1.1.7 represent positive and negative floating-point decimal numbers in binary. 

Theory and tasks  2021
"Fix point numbers and Floating point numbers"
 
12.3B

Data structures. Queues & Stacks.

12.5.2.1 describe the operation of stack and queue data structures

Theory and tasks  2021
"Queue & Stack"

Visualisation "Queue"

Visualisation "Stack"

12.3B

Data structures. Binary tree.

12.5.2.2 build a binary tree 

Theory and tasks  2020
"Binary tree"

Trees.pdf

 
12.3C

Internet, WWW, intranet

12.6.2.1 distinguish features of the Internet, the World Wide Web and the Intranet  

Theory and tasks  2021
"Internet, intranet, WWW"

 

12.3C

OSI model

12.6.1.2 describe the functions of the OSI network model levels 

Theory and tasks  2021
"OSI model"

 

12.3C

Packet switching & circuit switching 

12.6.1.1 explain the difference between packet switching and circuit switching

Theory and tasks  2021
"Packet switching vs Circuit switching"

 
12.3C

MAC address

12.6.2.2 describe the role of MAC addresses in packet routing  

12.6.2.3 identify the MAC address of a computer 

Theory and tasks  2021
"MAC address"

 

   

 

 

   

 

 
 

URL. Domain names.

Domain Name System.

Students' presentation Group III

Students' presentation Group VII

wikibooks (URI, URL, URN) 

wikibooks (Domain name)

differences between URI, URL, URN

What is domain name?

 

Computer and network security.

User accounts, firewalls, authentication, passwords and digital signatures.

Presentation "Security mesures" of 7th group

Security mesures (firewall, digital signature, viruses)

Check your password online

12.3A

How operating systems manage memory.

Virtual  memory

Presentation "Memory management. Virtual memory"

wikibooks (manage memory)

virtual memory on teach-ict.com

Virtual memory (pdf)

Memory managment

Operating system - Memory management

12.3B IP address and subnet mask

Research "Subnet mask" 7rd group

Activity "Define class for IP-address"

Types of IP address classes

12.3B

MAC addresses

Presentation "MAC addresses" 3rd group

Presentation "MAC addresses" 7th group

wikibooks (IP-addresses)

Формулы расчета сетей

12.3B

Routers and gateways

Presentation "Packet switching and curcuit switching" 3rd group

Presentation "Packet switching and curcuit switching" 7th group

Network devices

wikibooks (Router)

wikibooks (Routers, Gateways)

Router vs. Gateway

12.3B Network faults   Error detection
12.3B Data validation, data verification  

Data validation

Data verification

 

  Revision

 

12.4A Ethical issues

Presentation "Ethical issues (Hacking, Cracking, Malware)" (III group)

Presentation "Ethical issues (Hacking, Cracking, Malware)" (VII group)

Hacking and malware

Computer Ethics

Law on Copyright and Neighboring Rights (Kazakhstan)

Категория: УМК | Добавил: bzfar77 | Теги: Packet switching, IP address, MAC Address, algorithms, Security, artifical intelligence, database, Programming, grade 12, Network, 12 класс, Circuit switching, computer science
Просмотров: 2889 | Загрузок: 0 | Рейтинг: 5.0/1
Всего комментариев: 0
avatar