Hero image

Meenakshi Kaushal's Shop

"I am an experienced computer science teacher with a passion for inspiring and guiding students to become successful technologists. With a background in software engineering and computer science education, I am skilled in developing engaging curricula that challenge students to think critically and creatively. My goal is to prepare students for the rapidly-evolving technology landscape by teaching them the fundamentals of computer science, programming languages, and problem-solving techniques.

"I am an experienced computer science teacher with a passion for inspiring and guiding students to become successful technologists. With a background in software engineering and computer science education, I am skilled in developing engaging curricula that challenge students to think critically and creatively. My goal is to prepare students for the rapidly-evolving technology landscape by teaching them the fundamentals of computer science, programming languages, and problem-solving techniques.
Topic 3: Networks (9 hours) - HL/SL
meenakshikaushalofficialmeenakshikaushalofficial

Topic 3: Networks (9 hours) - HL/SL

(0)
Network fundamentals Identify different types of networks. Outline the importance of standards in the construction of networks. Describe how communication over networks is broken down into different layers. Identify the technologies required to provide a VPN. Evaluate the use of a VPN. Data transmission 3.1.6 Define the terms: protocol, data packet. 3.1.7 Explain why protocols are necessary. 3.1.8 Explain why the speed of data transmission across a network can vary. 3.1.9 Explain why compression of data is often necessary when transmitting across a network. 3.1.10 Outline the characteristics of different transmission media. 3.1.11 Explain how data is transmitted by packet switching. Wireless networking 3.1.12 Outline the advantages and disadvantages of wireless networks. 3.1.13 Describe the hardware and software components of a wireless network. 3.1.14 Describe the characteristics of wireless networks. 3.1.15 Describe the different methods of network security. 3.1.16 Evaluate the advantages and disadvantages of each method of network security.
Topic-2 Computer Organization
meenakshikaushalofficialmeenakshikaushalofficial

Topic-2 Computer Organization

(0)
Computer Architecture 2.1.1 Outline the architecture of the central processing unit (CPU) and the functions of the arithmetic logic unit (ALU) and the control unit (CU) and the registers within the CPU 2.1.2 Describe primary memory. Distinguish between random access memory (RAM) and read-only memory (ROM), and their use in primary memory 2.1.3 Explain the use of cache memory 2.1.4 Explain the machine instruction cycle Secondary memory 2.1.5 Identify the need for persistent storage Operating systems and application systems 2.1.6 Describe the main functions of an operating system 2.1.7 Outline the use of a range of application software 2.1.8 Identify common features of applications Binary representation 2.1.9 Define the terms: bit, byte, binary, denary/decimal, hexadecimal 2.1.10 Outline the way in which data is represented in the computer Simple logic gates 2.1.11 Define the Boolean operators: AND, OR, NOT, NAND, NOR and XOR 2.1.12 Construct truth tables using the above operators 2.1.13 Construct a logic diagram using AND, OR, NOT, NAND, NOR and XOR gates
Topic-1 Computer Fundamentals
meenakshikaushalofficialmeenakshikaushalofficial

Topic-1 Computer Fundamentals

(0)
1.1 Systems in organizations (10 hours) Planning and system installation 1.1.1 Identify the context for which a new system is planned. 1.1.2 Describe the need for change management 1.1.3 Outline compatibility issues resulting from situations including legacy systems or business mergers. 1.1.4 Compare the implementation of systems using a client’s hardware with hosting systems remotely 1.1.5 Evaluate alternative installation processes 1.1.6 Discuss problems that may arise as a part of data migration 1.1.7 Suggest various types of testing User focus 1.1.8 Describe the importance of user documentation 1.1.9 Evaluate different methods of providing user documentation 1.1.10 Evaluate different methods of delivering user training 1.1.11 Identify a range of causes of data loss 1.1.12 Outline the consequences of data loss in a specified situation 1.1.13 Describe a range of methods that can be used to prevent data loss Software Deployment 1.1.14 Describe strategies for managing releases and updates 1.2 System design basics (10 hours) Components of a computer system 1.2.1 Define the terms: hardware, software, peripheral, network, human resources. 1.2.2 Describe the roles that a computer can take in a networked world. 1.2.3 Discuss the social and ethical issues associated with a networked world. System design and analysis 1.2.4 Identify the relevant stakeholders when planning a new system. 1.2.5 Describe methods of obtaining requirements from stakeholders. 1.2.6 Describe appropriate techniques for gathering the information needed to arrive at a workable solution. 1.2.7 Construct suitable representations to illustrate system requirements. 1.2.8 Describe the purpose of prototypes to demonstrate the proposed system to the client. 1.2.9 Discuss the importance of iteration during the design process. 1.2.10 Explain the possible consequences of failing to involve the end-user in the design process. 1.2.11 Discuss the social and ethical issues associated with the introduction of new IT systems. Human interaction with the system 1.2.12 Define the term usability. 1.2.13 Identify a range of usability problems with commonly used digital devices. 1.2.14 Identify methods that can be used to improve the accessibility of systems. 1.2.15 Identify a range of usability problems that can occur in a system. 1.2.16 Discuss the moral, ethical, social, economic and environmental implications of the interaction between humans and machines.