0% found this document useful (0 votes)
5 views

IT FINAL CONTENT

The document outlines the curriculum content for Grades 10 to 12 in Information Technology, covering topics such as hardware and software systems, networking, data management, and ethical issues. It includes detailed descriptions of computer components, operating systems, data structures, and programming concepts, along with their implications in real-world applications. Additionally, it addresses the societal impacts of technology and the importance of efficient problem-solving and user interface design.

Uploaded by

clarketamryn5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

IT FINAL CONTENT

The document outlines the curriculum content for Grades 10 to 12 in Information Technology, covering topics such as hardware and software systems, networking, data management, and ethical issues. It includes detailed descriptions of computer components, operating systems, data structures, and programming concepts, along with their implications in real-world applications. Additionally, it addresses the societal impacts of technology and the importance of efficient problem-solving and user interface design.

Uploaded by

clarketamryn5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

IT FINAL CONTENT

Grade 10:
System Technologies – Hardware and Software (10.1.x)

10.1.1 - Understanding Hardware and Software:

Differentiates between hardware and software.


Hardware
• Physical parts of a computer/device
o Like the screen and keyboard
• Examples:
o Hard drive
o Monitor
o Printer
Software
• Programs and data that make data work
o Like apps and operating systems
• Examples:
o Windows
o Microsoft Word
Defines an ICT system.
Introduces the Input Processing Output Model (IPO) of a computer.
Discusses advantages and disadvantages of using computers.
Explains the difference between data and information.

10.1.2 - Types of Computers and Software:


Identifies different computer types (e.g., laptops, servers, smartphones).
Classifies computing devices based on portability and processing power.
Introduces various operating systems (e.g., Desktop OS, Mobile OS).
Discusses application software and data transfer between devices.

10.1.3 - Hardware Components:

Motherboard Components
1. CPU – Central Processing Unit:
• Performs calculations
• Executes instructions.
2. Storage
• Hard drives and SSDs used for long term data storage.
3. Input/Output Devices
• These are connected to the motherboard and include peripherals(keyboards, monitors,
printers, network adapters, etc.).
• Allows data to be input into / output from the computer.

Primary Storage
BIOS (Basic Input/Output System):
A firmware that initializes hardware components during startup and loads the operating system.
RAM (Random Access Memory):
• Temporary and high-speed memory
• Stores data that the CPU is currently working with
• Volatile
o Data is lost when the computer is turned off.
ROM (Read-Only Memory):
Stores essential firmware and software that doesn't change, such as the BIOS.

Secondary Storage Options


Hard Drives (HDDs):
• Provides high-capacity, slower storage
• Used for long-term data
o like documents and media
Solid State Drives (SSDs):
• Faster and more durable storage
• Uses flash memory
• Often used for both primary and secondary storage

Input/Output Devices

10.1.5 - Operating System Functions:


Discusses general functions of an operating system.
Highlights its role in user interface, program management, and resource allocation.

10.1.6 - System Software Types:


Differentiates between operating systems, utilities, drivers, and programming tools.
Explains source code vs. executable code.
Introduces open-source software and licensing models.

10.1.7 - Operating System Tools and Utilities:


Discusses the purpose and effectiveness of OS tools and utilities.
Covers data management, file and folder organization, archive, backup, and security features.
Topic 2: Internet and Communication Technologies (10.2.x)

10.2.1 - LAN and Networking Basics:


Overview of a network.
Description of network devices (client, server, switch, router, firewall).
Types of cabling (UTP and fiber) and unbounded media.
Classification of networks (PAN, LAN, WAN, GAN).
Role of ADSL router and server in a network.
User profiles/rights and reasons for using networks.
Advantages and disadvantages of networks.

10.2.3 - Internet and Connectivity:


Description of the Internet as a global network.
Basic Internet services.
Understanding Internet protocol (IP) addresses and connectivity hardware.

Topic 3: Social and Ethical Issues (10.3.x)

10.3.1 - Reasons for and Effects of Using Computers:


Economic reasons for using computers (saving paper, labor, communication costs, efficiency, accuracy,
reliability).
Digital divide (description and reasons).
Ergonomics and health issues (effects of RSI, eye strain, carpal tunnel).
Green computing issues (green use and disposal).

Topic 4 – Data and Information Management and Solution Development


(10.4.x)

10.4.1 - Problem Solving:


Solving simple problems using computational thinking.
Four stages: Decomposition, Pattern recognition, Abstraction, Algorithm.
Efficiency considerations in code and execution.

10.4.2 - Data:
Overview of number systems (Decimal, binary, hexadecimal).
Digital character representation (ASCII/UTF-8, Unicode).

10.4.3 - Data and Data structures:


Simple data types (string, char, integer, floating point, Boolean).
Arithmetic operators, data type ranges, conversion between types.
Acquiring data from users and using methods/objects.
Applies to single table databases.

10.4.4 - Boolean Logic:


Basics of Boolean logic.
Relational and logical operators.
Order of operations and use of brackets.
Boolean expressions and truth tables.
Applies to programming, SQL statements, and search engines.

10.4.5 - Method and OOP:


Basic mathematical functions and object methods.
Instantiating objects and using methods.
Applies to mathematical functions and working with objects.

10.4.6 - Data Transfer:


Transferring data between methods.
Parameters and return types.
Scope and lifetime of variables, fields, and parameters.

10.4.8 - Algorithm:
Planning and implementing selection and simple looping.
Pseudocode and flowcharts.
Implementing selection and loop structures.
Solving general computing problems.
Efficiency considerations in code and loops.

10.4.11 - Database and SQL:


Creating tables and simple queries using a single-table database.
Querying using SQL and altering tables.
SQL statements for database operations.

10.4.12 - Software Creation: User Interface:


Designing and coding simple user interfaces.
Principles of good user interface design.
Comparing Desktop UI to Mobile Application UI.
Grade 11:
Topic 1: System Technologies – Hardware and Software (11.1.x)

11.1.3 - Components Interaction:

Latency
• Time taken for a component to respond

CPU Design
• Has 2 main sections which both contain small storage locations called registers
o Control Unit (CU)
▪ Controls the execution of each instruction
o Arithmetic Logic Unit (ALU)
▪ Calculations and logical comparisons take place in ALU


• Registers
o Stores the current instruction and its data
o Made from static RAM (SRAM)
▪ Fast
• Does not contain capacitors
▪ Expensive
• Single vs Parallel Processing
o Single
▪ 1 instruction at a time
o Parallel
▪ Simultaneously breaking up and running program instructions on multiple
microprocessors
▪ Reduces processing time
• RAM vs Processor
RAM Processor
Measured in: • Size type • Clock speed
• Access speed • Cores
• Cache
Acts as: Storage for information Brain of the system
Function: Handles opened programs Opens programs (Faster
(Good for multitasking) execution of programs)
Cost: Less expensive More expensive
• Cache Memory
o Made from SRAM chips
o Stores blocks of program instructions and data that have been pre-fetched from RAM in
hopes that they will be needed next by the CPU
o ALTERNATIVE DEFINITION: Stores data so that future requests for that data can be
served faster

RAM
• Stores programs that are currently in use and the data associated with them
o Double Data Rate (DDR) SDRAM
▪ Data is transferred twice per clock tick
▪ Commonly used
▪ DRAM (Dynamic RAM)
• Each chip contains a capacitor
▪ SDRAM (Synchronous DRAM)
• Refreshing of RAM chips is synchronised with the CPU
o CPU does not have to wait

System Clock
• A microchip that regulates the timing and speed of all computer functions
o Within chip, a crystal vibrates at a specific frequency when electricity is applied
• Overclocking
o Making computer components run at a faster speeds by manipulating the frequencies
at which the components are set to run
o Can be done in 2 ways:
▪ per component
• Increasing the clock multiplication factor
▪ the whole system
• Increasing the system clock
o Can be cooled by:
▪ Fans
▪ Heat sink
▪ Liquid cooling

Internal Bus / Front Side Bus (FSB)


• Usually connect to CPU and RAM
• Consists of
o Data bus
▪ Transfers the actual instruction/data between CPU and RAM
▪ More signals sent at same time along data bus, more data transmitted
▪ Wider bus enables greater throughput
o Address bus
▪ Transfers physical address of instruction/data between CPU and RAM
▪ Width determines the amount of memory a system can address
o Control bus
▪ Carries commands between CPU and RAM

External Bus
• Primarily connects external devices to a computer
• Composed of electrical circuits that connect and transmit data between the computer and the
external device
• Much slower than internal buses
• Can be serial or parallel
• The size of the bus and the rate at which the connected device can send data to the computer
will strongly affect the processing speed of the computer

11.1.4 - Primary vs. Secondary Storage:

Primary Memory – Volatile (content is erased when power is turned off)


• ROM
• RAM – DRAM
• BIOS
o Resides on ROM
• CMOS
o Needs battery
• UEFI

Secondary Memory – Non-volatile


• Hard Drive Mechanical – HDD
• Solid State Hard Drive – SSD
• Flash Drives
• Optical Drives
• SD cards
• External Hard Drives
• M.2 card on motherboard
• Cloud storage

11.1.5 - Processing Techniques and Memory Management:

Machine Cycle
• Fetch
o Processor retrieves instruction from memory

• Decode
o Processor translates instruction into a series of computer commands

• Execute
o Processor performs the computer commands

• Store
o Processor writes the results back to memory

Multiprocessing
Using 2 or more processors for computer operations

Multiprogramming
Interleaved execution of 2 or more jobs by the same computer

Multitasking
The process of a computer performing multiple tasks simultaneously

Multithreading
To run multiple threads of the same program at the same time
UEFI vs. BIOS
UEFI BIOS
UEFI is a newer firmware interface The traditional firmware interface
Supports 32-bit and 64-bit architectures Supports 16-bit architectures
Faster boot times
Supports larger hard drives
Better security features

Interrupts
Signals sent to the CPU by hardware devices to request attention from the CPU

Virtual memory
Allows computer to use more memory than it physically has by temporarily transferring data from RAM
to disk storage.

11.1.6 - Programming Tools:

Language translators
o Compilers
▪ Convert entire high-level language to machine language at once
o Interpreters
▪ Convert high-level language to machine language line by line
o Assemblers
▪ Convert low-level languages to machine code

11.1.8 - Implications of Latest Technologies:


Discusses the societal impacts of the latest computer technologies considering various factors.

Topic 2: Internet and Communication Technologies (11.2.x)

11.2.1 - LAN Configurations and Devices:

Concepts of LAN configurations and devices


Types of media
• Bounded
• Unbounded
Topology
• Star
• Bus
• Ring
• Hybrid
• Mesh
Networking devices
• NIC
• Switch
• Router
• Bridge
Network addressing
• IPV4 vs. IPV6
• MAC address
• DNS
• DHCP
• ARP
Packet and frame formats
• Ethernet
• IP addressing
Extending a LAN with fiber optic backbone
11.2.2 - WAN and Network Protocols:

WAN Concepts
Gateways
Wi-Fi Router
Transmission methods
Connection technologies
• Cellular
• Fiber
• ADSL
Protocols
• Email
• Internet
• IP
• Web Protocols
• Download Protocols
11.2.3 - Data Transmission and Multimedia:

Overview of multimedia on the Internet


Download vs. Streaming and Bandwidth Effects
VOIP
Video-on-demand
Compression Technology
11.2.5 - Evolution of Internet Service Technologies:
Evolution of the Internet
Web 1.0 to Web 4.0
Client-side and server-side scripting
Cookies
Web-based and mobile Applications
Factors affecting design for mobile technology
11.2.6 - Internet Searching and Efficiency:

Navigating the WWW


Understanding web addresses – URL
Effective use of search engines and Boolean logic in searches
Advanced Search Criteria and Logical Operators
11.2.7 - Identifying Errors and Solutions:
Identifying sources of errors
• Human
• Arithmetic
• Transmission
• Programming
Solutions for errors
• Verification
• Validation
• Input techniques
• Data Checks
• Data Transmission Checks
11.2.8 - Data Integrity and Protection:
Understanding threats
• Hardware failure
• Malware
• Power
• Other
Solutions to protect data
• RAID
• Backups
• Encryption
• Firewalls
11.2.9 - Implications of Communication Technologies:
Analyzing the implications of communication technologies on human interaction, considering benefits
and risks.

Topic 3: Social and Ethical Issues (11.3.x)

11.3.1 - Effects of Computer Use:


Effects on workplace and employment practices
• Acceptable User Policy
• Decentralization
• Automation
Computer crime and its effects
• Social engineering
• Hackers
• Computer crimes
• Theft
• Identity theft

Topic 4 – Data and Information Management and Solution Development


(11.4.x)

11.4.1 - Problem Solving:


Solving more complex problems using computational thinking.
Four stages of problem-solving.
Decomposition, pattern recognition, abstraction, and algorithm.
Efficiency considerations.

11.4.2 - Data:
Representing data in a fixed number of bits.
Reason for representing data in binary.
Representing integers and real numbers.
Combining hexadecimal digits to reduce binary digits.

11.4.3 - Data and Data structures:


More advanced data types.
Using methods and objects.
Acquiring data from various sources.
Applies to single table databases.

11.4.4 - Boolean Logic:


Applying logical conditions effectively.
Complex Boolean expressions.
Codes complex Boolean expressions.
Truth tables for complex conditions.

11.4.5 - Method and OOP:


Designing classes and applying object-oriented principles.
Fields, methods, constructors, encapsulation.
Inheritance, method overloading.
Typed methods/functions and void methods/procedures.

11.4.6 - Data Transfer:


Efficiently transferring complex data between objects.
Using parameters and return values.
Scope and lifetime considerations.

11.4.8 - Algorithm:
Planning and implementing solutions in a programming environment.
Array manipulation, string manipulation.
Identifying patterns and reusable methods.
Efficiency considerations.

11.4.11 - Database and SQL:


Querying single and multi-table databases using SQL.
Creating and altering tables.
Subqueries and joins.
Database operations through programming constructs.

11.4.12 - Software Creation: User Interface:


Implementing good design in user interfaces.
Applying UI design principles.
Error messages, prompts, and components.
Creating uncluttered screens with effective use of color.

11.4.13 - Software Creation:


Debugging and testing programs.
Debugger facilities, trace tables.
Identifying and correcting syntax, runtime, and logical errors.
Testing with standard, extreme, and abnormal data.

11.4.15 - Software Creation:


Identifying the correct use of appropriate help in any application.
Grade 12:
Topic 1: System Technologies – Hardware and Software (12.1.x)

12.1.3 - Factors Affecting Computer Performance:

• Modular Design
o Using interchangeable parts for easier upgrades and repairs
o Makes systems more reliable and scalable

• Co-processors
o Specialised hardware for specific tasks
o Improves speed, power efficiency and reliability

• Caching
o Storing frequently used data for quicker access
o Speeds up performance and reliability

• RAM
o Temporary memory for active data
o Speeds up data access and multitasking

• Other Components
o The following also impact computer performance and reliability:
▪ CPU
▪ Storage
▪ Motherboard
▪ Power supply

12.1.4 - Hardware Recommendations:


Provides recommendations for hardware solutions for specific purposes or problems.
Considers the needs of users and mobile technologies.

12.1.8 - Implications of Latest Technologies:


Continues discussing the societal impacts of the latest computer technologies, considering various
societal factors.

Topic 2: Internet and Communication Technologies (12.2.x)

12.2.1 - Distributed Processing in LAN:

Centralised Processing
All computing resources (processing power, memory, storage, applications) are managed by a single,
centralized computer or server.
Advantages:
• Easier to manage
• Easier to implement security measures and enforce policies across entire system
Disadvantages
• Less fault-tolerant
• Performance bottlenecks
o Central unit becomes overloaded

Distributed Processing
Dividing computer tasks and data management across multiple interconnected computers/nodes.
Advantages:
• More fault-tolerant
• Better scalability
• Faster processing times
Disadvantages
• More complex to manage and maintain

Thin clients
• Used in centralised processing
• Each computer on the network has minimal resources
• Processing takes place on a centralised server
o Needs a fast network

Fat clients
• Used in distributed processing
• Each computer uses its own resources (ie. Processor, RAM) to process
• Does not need a fast network

Smart clients
• Offer flexibility, performance and offline capabilities
• Designed to run full-featured operating systems

12.2.2 - Cloud Computing and IoT:

Cloud Computing
• Allows access to software, storage and computing power remotely over the internet
• Allows users to access and use resources on-demand
• Service models:
o Infrastructure as a Service (IaaS)
▪ Virtualised computing resources
o Platform as a Service (PaaS)
▪ Offers a complete environment for testing, developing and deploying
applications
o Software as a Service (SaaS)
▪ Software applications accessed through web browsers

Concepts:
▪ Peer-to-peer file sharing
o Direct sharing of files between devices on a network without the need for a centralised
server
▪ Remote access
o Ability to connect and control a computer or network from another location
o Host and remote servers need:
▪ Software downloaded on both PC’s
▪ Internet/LAN connection
▪ Secure desktop sharing network
▪ VPN (Virtual Private Network)
o Gives remote access to a LAN in order to remotely access files
o Gives access to a LAN without being wired to a LAN
▪ IoT devices accessible on the Internet
o Internet-connected devices that can be controlled and monitored remotely

12.2.3 - Deep Web and Privacy Tools:

Deep Web
• Refers to all parts of the internet that are not indexed by search engines. Majority of the internet
is in the deep web. Examples of content of on the deep web: government databases, academic
research, etc.
• The deep web is used to protect sensitive information but can also be used for illegal activities.

Anonymous browsing tools


• Accessing deep web requires special software like:
o The Tor browser
▪ Anonymises user traffic by obscuring a user’s IP address (making it nearly
impossible to trace)
▪ Access websites with .onion domain extensions

Legitimate reasons for using the dark web:


• Evading censorship
• Conducting research

12.2.5 - Internet Service Technologies:


(Overview of Internet services technologies )

Location-Based Services
Utilizes information about a user’s geographical location to provide real-time location information.

Cloud Computing
Effects
Reduced dependence on local hardware and infrastructure:
o Cost savings
o Greater flexibility in managing computing resources
o Reduced need for staff that specialise in hardware maintenance and management
Cloud Licensing
Subscription-based cloud licensing mode:
o Flexible and cost-effective
o Users pay a regular fee to access software, applications and other resources
o Access to latest updates and features

12.2.6 - Web Site Reception for Search Engines:

Search Engine Optimisation (SEO)


o Improves a websites visibility in search engine results
o Strategies:
▪ On-page SEO – employed within a website
• Content creation
• Keyword research
• Header tags usage
• Internal linking
▪ Off-page SEO – employed outside of a website to improve online presence and
credibility
• Building a strong backlink profile
o By earning high-quality, relevant backlinks from authoritative
sources
• Social media marketing
• Influencer outreach
• Online reputation management
▪ Technical SEO – Optimising website’s underlying structure and code
• Website speed optimisation
• Mobile-friendliness
• Secure connections (HTTPS)

12.2.8 - Computer Security:

Social Engineering
Use of deception to manipulate people into giving out confidential information

Malware
Any software written with negative intentions

Phishing
Poses as a legitimate business to trick people into giving out confidential information

Pharming
Setting up a fake website to trick people

Click-jacking
Site appears to do one thing but your clicks do another

Spoofing
Change of email-header to appear as from another sender

Spyware
Software that monitors the way you use your computer and sends to a third party

Keylogger
Tracks your keystrokes to obtain your username and password

Computer virus
Used to disrupt functions of a computer

Computer worm
Distributes itself over a network

Trojan
A destructive program disguised as a useful program
Ransomware
Making data unavailable until hacker is paid

Adware
Software that bombards your computer with ads when connected to the internet

Bots
Computer that can be controlled remotely over the internet

12.2.9 - Implications of Communication Technologies:


Continuing the analysis of communication technologies' implications on human interaction, considering
societal factors.

Topic 3: Social and Ethical Issues (12.3.x)

12.3.1 - Evaluating the Effects of Computer Use:


Green Computing
Environmentally friendly use of computers
• Rather fix/reuse devices
• Switch off or sleep/hibernate when not in use
• Discard responsibly – with supplier
Identifying environmental impacts and solutions
• Save paper
o Print 2 per page, back to front, check print preview, distribute electronically
• Save ink
o Draft/Eco mode (lighter), less pictures

Use of computers to address global issues


• Artificial Intelligence for pattern detection
• Data Privacy
• Big Data
• Digital Heritage
Privacy and information sharing issues
Google Drive
Cyberbullying
Laws Related to Computer and Internet Usage
• POPI
• Electronic Communications
• Transactions Act
Risks of errors in computer-controlled equipment
Hospitals
Cars
UAV
Internet of Things (IoT) implications for security and privacy
Cryptocurrencies
Implications
Effects

Topic 4 – Data and Information Management and Solution Development


(12.4.x)

12.4.1 - Problem Solving:


Solving more complex problems using computational thinking.
Decomposition, pattern recognition, abstraction, and algorithm.
Efficiency considerations.

12.4.3 - Data and Data structures:


Dynamic arrays and combinations of different designs.
Acquiring data from common UI components.
Applies to multi-table databases.

12.4.5 - Method and OOP:


Designing reusable classes and applying object-oriented principles.
Extended objects, inheritance, and type determination.
Typed methods/functions and void methods/procedures.

12.4.7 - Persistence:
Concepts of data warehousing and data mining.
NoSQL databases and comparisons with SQL.
JSON files (not examinable in practical exams).

12.4.8 - Algorithm:
Solutions to simple problems requiring collections of data.
Search, sort, insert, delete with arrays of objects.
Efficiency considerations.

12.4.9 - Database:
Understanding the purposes and features of a database and DBMS.
Data integrity, security, and multiuser access control.
Backup recovery and management.

You might also like