12.1A |
Artificial intelligence
12.4.3.1 describe spheres where artificial intelligence is applied: industry, education, medicine, gaming industry, society
|
Theory and exercises 2020
"Artificial Intelligence"
|
AI applications
Experiments
Quick, drown!
The Development of Artificial Intelligence (on bbc.co.uk)
AI (glossary)
Artificial Intelligent
Artificial Intelligence Tutorial
Robotics
Intelligent robots (on bbc.co.uk)
Top 10 artificial intelligence (AI) technology trends for 2018
За гранью. Искусственный интеллект (видео)
|
12.1A |
Virtual and augmented reality
12.4.3.2 explain the purpose of virtual and augmented reality
|
Theory and exercises 2020
"Virtual and augmented reality" |
Virtual Reality: another world within sight
What is augmented reality?
Pros vs Cons of Virtuel Reality
|
12.1B |
Declarative and imperative programming languages
12.5.1.1 compare declarative and imperative programming languages
|
Theory and exercises 2020
"Declarative and imperative PL" |
Programming paradigms
Declarative languages
Declarative languages (Teach-ict.com)
Imperative languages (Procedural languages)
Classification of programming languages
|
12.1B |
Expert systems
12.5.1.2 create a simple expert system
|
Theory and exercises 2020
"Expert systems" |
Expert system |
12.1B |
Expert system (Imperative language)
12.5.1.2 create a simple expert system
|
|
|
12.1B |
Expert system (Declarative language)
12.5.1.2 create a simple expert system
|
Theory and exercises 2020
"Expert system (Prolog)" |
|
12.1B |
Stages of compiler design
12.5.1.3 describe program compilation stages: lexical and syntactic analysis, code generation and optimization
|
Theory and exercises 2020
"Stages of compiler design"
|
Compiler Design - Phases of Compiler |
12.1C |
Course work. Stage Testing. Types of test data
12.5.3.2 perform testing using normal data
12.5.3.3 perform testing using extreme data
12.5.3.4 perform testing using erroneous data
|
Theory and exercises 2020
"Testing. Types of test data"
Theory and exercises 2020
"Test plan"
|
|
12.1C |
Types of programming errors
12.5.3.1 describe execution errors at programme startup
12.5.3.5 describe a syntax error in a programme code
12.5.3.6 describe a logic error in a programme code
|
Theory and exercises 2020
"Types of programming errors"
|
|
|
|
|
|
12.2A |
Information security
Data protection measures
12.1.2.1 describe protection measures data and computer systems such as physical risks, firewalls, encryption, biometrics, computer virus
12.1.2.2 use data protection measures such as data backup and disk mirroring
|
Theory & tasks 2020
"Data protection measures"
Theory & tasks 2020
"Physical risks"
Theory & tasks 2020
"Firewalls"
Theory & tasks 2020
"Biometrics"
Theory & tasks 2020
"Encryption"
Theory & tasks 2020
"Backup and Disk mirroring"
|
|
12.2A |
Cracking. Unauthorised access
12.1.3.1 analyse ethical problems arising due to computer system cracking
12.1.2.3 protect data from unauthorised access
|
Theory & tasks 2020
"Passwords" |
|
12.2A |
Malware
12.1.3.2 analyse problems arising due to malware
|
|
|
12.2A |
Privacy policies
12.1.3.3 explain privacy policies
12.1.3.4 analyse problems arising due to disseminating and using information
|
"Privacy policies" 2020 |
|
12.2A |
E-government
12.1.3.7 use E-gov resourses
|
Theory & tasks 2020
"E-government" |
|
12.2B |
Creating documentation
12.2.1.1 use headers and footers when documenting a project
12.2.1.2 use footnotes when documenting a project
12.2.1.3 use tables when documenting a project
|
|
|
12.2B |
Copyright & plagiarism
12.1.3.5 check documents using antiplagiarism resources
12.1.3.6 name copyright protection rules
|
Theory & tasks 2020
"Plagiarism & antiplagiarism resourses"
Theory & tasks 2020
"Copyright"
|
|
12.2C |
Methods of system implementation
12.2.1.7 list system implementation methods
12.2.1.8 compare the advantages and disadvantages of system implementation methods
|
Theory & tasks 2020
"Methods of implementation"
|
|
12.2C |
Project work. Installation. Implementation plan.
12.2.1.9 explain the importance of making a system implementation plan
12.2.1.10 make a system implementation plan
|
Theory & tasks 2020
"New system installation"
|
|
12.2C |
Project work. Documentation |
Theory & tasks 2020
"User manual" |
|
12.2С |
Project work. Evaluation |
Theory & tasks 2020
"Evaluation"
|
|
|
|
|
|
12.3A |
Types of operating system (part II)
12.3.1.1 describe a real-time operating system
12.3.1.2 describe a network operating system
12.3.1.3 describe a batch processing operating system
|
Theory & tasks 2021
"Types of operating system"
"Types of operating system (part I)"
|
|
12.3A |
User interfaces
12.3.1.4 define the advantages and disadvantages of a graphical user interface (GUI)
12.3.1.5 define the advantages and disadvantages of a command line interface (CLI)
12.3.1.6 define the advantages and disadvantages of natural-language and gesture-recognition user interfaces
|
Theory & tasks 2021
"Types of user interfaces" |
wikibooks (User interfaces)
User interfaces (teach-ict.net)
User interfaces (bbc.com)
Interfaces (bbc.com)
|
12.3A |
Fetch-Decode-Execute cycle
12.3.2.5 explain three operations in fetch-execute cycle (fetch /decode /execute)
|
Theory & tasks 2021
"Fetch-Execute cycle"
|
Internal Elements of the CPU (e-book)
Fetch/Execute Cycle (e-book)
Fetch-Execute cycle on teach-ict.com
|
12.3A |
System bus
12.3.2.4 explain how data is transferred between different components of a computer system through the address bus, data bus and control bus
|
Theory & tasks 2021
"System bus"
|
|
12.3A |
Speed clock, word size, bus width
12.3.2.6 explain how the clock speed, word length and bus width affect the performance
|
Theory & tasks 2021
"Computer performance"
|
|
12.3A |
RISC vs CISC
12.3.2.1 describe the RISC architecture
12.3.2.2 describe the CISC architecture
12.3.2.3 compare RISC and CISC
|
Theory & tasks 2021
"RISC & CISC architecture" |
|
12.3A |
Addressable memory
12.3.4.1 explain the principle of memory addressing
12.3.4.2 explain the principle of storing programmes and data
|
Theory & tasks 2021
"Addressing modes"
Presentation for the lesson "Addressable memory"
|
Addressing modes (e-book) |
12.3A |
Memory management. Paging and segmentation.
12.3.4.2 explain principle of memory organization by segment and page
|
Theory & tasks 2021
"Paging and segmentation" |
Paging and segmentation
Paging, segmentation, virtual memory
|
12.3A |
Virtual machine
12.3.4.3 explain the concept of virtual machine
|
Theory & tasks 2021
"Virtual machine"
|
|
12.3A |
Boolean logic
12.3.3.2 build logical structures
12.3.3.4 analyze logical structures
|
Theory and tasks 2020
"Boolean logic. Logic gates. Truth tables"
Build logic curcuit online Logic.ly
|
|
12.3A |
Logic laws
12.3.3.3 simplify logical expressions using the laws of logic
|
Theory and tasks 2020
"Simplification logic expressions"
Presentation for the lesson "Karnaugh cards"
|
|
12.3B |
Represent positive decimal numbers in binary. Binary, hexadecimal numbers
12.1.1.1 convert binary numbers to hexadecimal
12.1.1.2 explain the advantages of using hexadecimal numbers in computer systems
|
Theory and tasks 2021
"Binary, hexadecimal numbers"
|
Why do we use hexadecimal? |
12.3B |
Binary addition and binary multiplication
12.1.1.3 perform the arithmetic operations: addition and multiplication of binary numbers
|
Theory and tasks 2021
"Binary addition and binary multiplication"
Presentation for the lesson
|
Binary addition examples
|
12.3B |
Represent positive and negative numbers in two's complement
12.1.1.4 represent positive and negative numbers in two's complement and specify the range of n bits.
12.1.1.5 perform subtraction using two's complement
|
Theory and tasks 2021
"Represent positive and negative numbers in two's complement" |
Two's compliment binary addition examples |
12.3B |
Fixed point numbers and Floating point numbers
12.1.1.6 use binary numbers with a fixed point to represent fractional numbers with a given number of bits
12.1.1.7 represent positive and negative floating-point decimal numbers in binary.
|
Theory and tasks 2021
"Fix point numbers and Floating point numbers" |
|
12.3B |
Data structures. Queues & Stacks.
12.5.2.1 describe the operation of stack and queue data structures
|
Theory and tasks 2021
"Queue & Stack" |
Visualisation "Queue"
Visualisation "Stack"
|
12.3B |
Data structures. Binary tree.
12.5.2.2 build a binary tree
|
Theory and tasks 2020
"Binary tree"
Trees.pdf
|
|
12.3C |
Internet, WWW, intranet
12.6.2.1 distinguish features of the Internet, the World Wide Web and the Intranet
|
Theory and tasks 2021
"Internet, intranet, WWW" |
|
12.3C |
OSI model
12.6.1.2 describe the functions of the OSI network model levels
|
Theory and tasks 2021
"OSI model"
|
|
12.3C |
Packet switching & circuit switching
12.6.1.1 explain the difference between packet switching and circuit switching
|
Theory and tasks 2021
"Packet switching vs Circuit switching"
|
|
12.3C |
MAC address
12.6.2.2 describe the role of MAC addresses in packet routing
12.6.2.3 identify the MAC address of a computer
|
Theory and tasks 2021
"MAC address"
|
|
|
|
|
|
|
|
|
|
|
URL. Domain names.
Domain Name System.
|
Students' presentation Group III
Students' presentation Group VII
|
wikibooks (URI, URL, URN)
wikibooks (Domain name)
differences between URI, URL, URN
What is domain name?
|
|
Computer and network security.
User accounts, firewalls, authentication, passwords and digital signatures.
|
Presentation "Security mesures" of 7th group
|
Security mesures (firewall, digital signature, viruses)
Check your password online
|
12.3A |
How operating systems manage memory.
Virtual memory
|
Presentation "Memory management. Virtual memory" |
wikibooks (manage memory)
virtual memory on teach-ict.com
Virtual memory (pdf)
Memory managment
Operating system - Memory management
|
12.3B |
IP address and subnet mask |
Research "Subnet mask" 7rd group
Activity "Define class for IP-address"
|
Types of IP address classes |
12.3B
|
MAC addresses |
Presentation "MAC addresses" 3rd group
Presentation "MAC addresses" 7th group
|
wikibooks (IP-addresses)
Формулы расчета сетей
|
12.3B
|
Routers and gateways |
Presentation "Packet switching and curcuit switching" 3rd group
Presentation "Packet switching and curcuit switching" 7th group
|
Network devices
wikibooks (Router)
wikibooks (Routers, Gateways)
Router vs. Gateway
|
12.3B |
Network faults |
|
Error detection |
12.3B |
Data validation, data verification |
|
Data validation
Data verification
|
|
|
Revision |
|
12.4A |
Ethical issues |
Presentation "Ethical issues (Hacking, Cracking, Malware)" (III group)
Presentation "Ethical issues (Hacking, Cracking, Malware)" (VII group)
|
Hacking and malware
Computer Ethics
Law on Copyright and Neighboring Rights (Kazakhstan)
|