Checkfu

Standard set

Computer Science (0478)

Computer ScienceGrades 09, 10, 11, 12CSP ID: FCE70E1103CD4BB6ABD08415384FA786Standards: 109

Standards

Showing 109 of 109 standards.

Filter by depth

Depth 0

Data Representation 

DT.2.0

Depth 0

Data Transmission 

HW.3.0

Depth 0

Hardware

SW.4.0

Depth 0

Software

INT.5.0

Depth 0

The Internet and its uses

AET.6.0

Depth 0

Automated and Emerging Technologies

ALG.7.0

Depth 0

Algorithm design and problem-solving

PROG.8.0

Depth 0

Programming 

DB.9.0

Depth 0

Databases

BL.10.0

Depth 0

Boolean Logic

DR.1.1

Depth 1

Number systems

DR.1.2

Depth 1

Text, sounds and images

DR.1.3

Depth 1

Data Storage and Compression

DT.2.11

Depth 1

Understand that data is broken down into packets for transmitted; describe the structure of a packet; describe the process of packet switching.

DT.2.12

Depth 1

Describe how data is transmitted from one device to another using different methods of data transmission. Explain the suitability of the method of data transmission for a given scenario.

DT.2.13

Depth 1

Understand the universal serial bus (USB) interface and how it is used to transmit data.

DT.2.21

Depth 1

Understand the need to check for errors after data transmission and how these errors can occur.

DT.2.22

Depth 1

Describe the processes involved in error detection methods. 

DT.2.23

Depth 1

Describe how a check digit is used to detect errors in data entry including ISBN numbers and bar codes.

DT.2.24

Depth 1

Describe how an automatic repeat request (ARQ) can be used to establish that data is received without error.

DT.2.31

Depth 1

Understand the need for and purpose of encryption when transmitting data.

DT.2.32

Depth 1

Understand how data is encrypted using symmetric and asymmetric encryption.

HW.3.11

Depth 1

 Understand the role of the central processing unit (CPU) in a computer. Understand what is meant by a microprocessor.

HW.3.12

Depth 1

Understand the purpose of the components in a CPU, in a computer that has a Von Neumann architecture. Describe the role of each component in the process of the fetch–decode–execute cycle.

HW.3.13

Depth 1

Understand what is meant by CPU core, cache and clock how they can affect the performance of a CPU.

HW.3.14

Depth 1

Understand the purpose and use of a CPU instruction set.

HW.3.15

Depth 1

Describe the purpose and characteristics of an embedded system and identify devices in which they are commonly used.

HW.3.21

Depth 1

Understand what is meant by an input device and why it is required.

HW.3.22

Depth 1

Understand what is meant by an output device and why it is required.

HW.3.23

Depth 1

Understand what is meant by a sensor and the purpose of sensors. Identify the type of data captured by each sensor, and when each sensor would be used, including selecting the most suitable sensor for a given context.

HW.3.31

Depth 1

Understand what is meant by primary storage.

HW.3.32

Depth 1

Understand what is meant by secondary storage.

HW.3.33

Depth 1

Describe the operation of magnetic, optical and solid-state storage and give examples of each.

HW.3.34

Depth 1

Describe what is meant by virtual memory, how it is created, used and why it is necessary

HW.3.35

Depth 1

Understand what is meant by cloud storage.

HW.3.36

Depth 1

Explain the advantages and disadvantages of storing data on the cloud in comparison to storing it locally.

HW.3.41

Depth 1

 Understand that a computer needs a network interface card (NIC) to access a network.

HW.3.42

Depth 1

Understand what is meant by the purpose and structure of a media access control (MAC) address, including its structure.

HW.3.43

Depth 1

Understand what is meant by the purpose of an internet protocol (IP) address. Understand that there are different types IP address.

HW.3.44

Depth 1

Describe the role of a router in a network.

SW.4.11

Depth 1

Describe the difference between system software and application software and provide examples of each.

SW.4.12

Depth 1

Describe the role and basic functions of an operating system.

SW.4.13

Depth 1

Understand how hardware, firmware and an operating system are required to run applications software.

SW.4.14

Depth 1

Describe the role and operation of interrupts.

SW.4.21

Depth 1

Explain what is meant by a high-level language, and low-level language, including the advantages and disadvantages of each.

SW.4.22

Depth 1

Understand that assembly language is a form of low-level language that uses mnemonics, and that an assembler is needed to translate an assembly language program into machine code.

SW.4.23

Depth 1

Describe the operation of a compiler and an interpreter, including how a high-level language is translated by each and how errors are reported.

SW.4.24

Depth 1

Explain the advantages and disadvantages of a compiler and an interpreter.

SW.4.25

Depth 1

Explain the role of an IDE and the common functions it provides.

INT.5.11

Depth 1

Understand the difference between the internet and the world wide web.

INT.5.12

Depth 1

Understand what is meant by a uniform resource locator (URL).

INT.5.13

Depth 1

Describe the purpose and operation of hypertext transfer protocol (HTTP) and hypertext transfer protocol secure (HTTPS).

INT.5.14

Depth 1

Explain the purpose and functions of a web browser.

INT.5.15

Depth 1

Describe how web pages are located, retrieved and displayed of on a device when a user enters a URL.

INT.5.16

Depth 1

Explain what is meant by cookies and how they are used, including session cookies and persistent cookies.

INT.5.21

Depth 1

Understand the concept and use of digital currency.

INT.5.22

Depth 1

Understand the process of blockchain and how it is used to track digital currency.

INT.5.31

Depth 1

Describe the processes involved in, and the aim of carrying out a range of cyber security threats.

INT.5.32

Depth 1

 Explain how a range of solutions are used to help keep data safe from security threats.

AET.6.11

Depth 1

Describe how sensors, microprocessors and actuators can be used to create automated systems.

AET.6.12

Depth 1

Describe the advantages and disadvantages of automated systems used for a given scenario.

AET.6.21

Depth 1

Understand what is meant by robotics.

AET.6.22

Depth 1

Describe the characteristics of a robot.

AET.6.23

Depth 1

Understand the roles that robots can perform and the advantages and disadvantages of their use 

AET.6.31

Depth 1

Understand what is meant by artificial intelligence (AI).

AET.6.32

Depth 1

Describe the main characteristics of AI.

AET.6.33

Depth 1

Explain the basic operation and components of AI systems to simulate intelligent behaviour.

ALG.7.11

Depth 1

Understand the program development life cycle: analysis, design, coding and testing.

ALG.7.12

Depth 1

Understand that every computer system is made up of sub-systems, which are made up of further sub-systems. Understand how a problem can be decomposed into its component parts. Use different methods to design and construct a solution to a problem

ALG.7.13

Depth 1

Explain the purpose of a given algorithm.

ALG.7.14

Depth 1

Understand standard methods of solution.

7.15

Depth 1

Understand the need for validation checks to be made on input data and the different types of validation check. Understand the need for verification checks to be made on input data and the different types of verification check.

ALG.7.16

Depth 1

Suggest and apply suitable test data.

ALG.7.17

Depth 1

Complete a trace table to document a dry-run of an algorithms.

ALG.7.18

Depth 1

Identify and suggest ways of correcting of errors in algorithms.

ALG.7.19

Depth 1

Write and amend algorithms for given problems or scenarios using, pseudocode, program code and flowcharts.

PROG.8.11

Depth 1

Declare and use variables and constants.

PROG.8.12

Depth 1

Understand and use basic data types.

PROG.8.13

Depth 1

Understand and use input and output.

PROG.8.14

Depth 1

Understand and use the concepts of sequence; selection; iteration, totalling; counting; string handling; and arithmetic, logical and Boolean operators.

PROG.8.15

Depth 1

 Understand and use nested statements. 

PROG.8.16

Depth 1

Understand what is meant by procedures, functions and parameters; Define and use procedures and functions, with or without parameters; Understand and use local and global variables.

PROG.8.17

Depth 1

Understand and use library routines.  

PROG.8.18

Depth 1

Understand how to create a maintainable program.

PROG.8.21

Depth 1

Declare and use one-dimensional (1D) and two-dimensional (2D) arrays.

PROG.8.22

Depth 1

Understand the use of arrays.

PROG.8.23

Depth 1

Write values into and read values from an array using iteration.

PROG.8.31

Depth 1

Understand the purpose of storing data in files.

PROG.8.32

Depth 1

Open, close and use a file for reading and writing.

DB.9.11

Depth 1

Define a single-table database from given data storage requirements.

DB.9.12

Depth 1

Suggest suitable basic data types.

DB.9.13

Depth 1

Understand the purpose of a primary key and identify a suitable primary key for a given database table.

DB.9.14

Depth 1

Read, understand and complete structured query language (SQL) scripts to query data stored in a single database table.

BL.10.11

Depth 1

Identify and use the standard symbols for logic gates.

BL.10.12

Depth 1

Define and understand the functions of the logic gates.

BL.10.13

Depth 1

 (a) Use logic gates to create given logic circuits from a: (i) problem statement (ii) logicexpression (iii) truth table (b) Complete a truth table from a: (i) problem statement (ii) logicexpression (iii) logic circuit (c) Write a logic expression from a: (i) problem statement (ii) logiccircuit (iii) truth table.

DR.1.1.1

Depth 2

Understand how and why computers use binary to represent all forms of data

DR.1.1.2

Depth 2

(a) Understand the denary, binary and hexadecimal number systems. (b) Convert between (i) positive denary and positive binary (ii) positive denary and positive hexadecimal (iii) positive hexadecimal and positive binary

DR.1.1.3

Depth 2

Understand how and why hexadecimal is used as a beneficial method of data representation

DR.1.1.4

Depth 2

(a) Add two positive 8-bit binary integers (b) Understand the concept of overflow and why it occurs in binary addition

DR.1.1.5

Depth 2

Perform a logical binary shift on a positive 8-bit binary integer and understand the effect this has on the positive binary integer

DR.1.1.6

Depth 2

Use two’s complement to represent positive and negative 8-bit binary integers

DR.1.21

Depth 2

Understand how and why a computer represents text and the use of character sets, including ASCII and Unicode.

DR.1.22

Depth 2

Understand how and why a computer represents sound, including the effects of the sample rate and sample resolution.  

DR.1.23

Depth 2

3 Understand how and why a computer represents an image, including the effects of the resolution and colour depth

DR.1.31

Depth 2

Understand how data storage is measured.

DR.1.32

Depth 2

Calculate file sizes for image and sound files

DR.1.33

Depth 2

Understand the purpose of and need for data compression.

DR.1.34

Depth 2

4 Understand how files are compressed using lossy and lossless file compression methods.

Framework metadata

Source document
IGCSE Computer Science Syllabus (0478) / 0478 Scheme of Work
License
CC BY 4.0 US