Hero image

Jeevesh Kumar

Welcome to the ultimate resource hub for Computer Science education! With 15 years of experience as an IBDP Computer Science teacher, workshop leader, and examiner, I’ve curated an extensive collection of educational materials to cater to both students and educators, ranging from Key Stage 1 to the challenging International Baccalaureate Diploma Programme (IBDP) in Computer Science. My goal is to empower educators with comprehensive resources, lesson plans, and teaching materials, while also pro

Welcome to the ultimate resource hub for Computer Science education! With 15 years of experience as an IBDP Computer Science teacher, workshop leader, and examiner, I’ve curated an extensive collection of educational materials to cater to both students and educators, ranging from Key Stage 1 to the challenging International Baccalaureate Diploma Programme (IBDP) in Computer Science. My goal is to empower educators with comprehensive resources, lesson plans, and teaching materials, while also pro
Topic-3 Networks (9 hours)
jeeveshkumarjeeveshkumar

Topic-3 Networks (9 hours)

(0)
Network fundamentals 3.1.1 Identify different types of networks. 3.1.2 Outline the importance of standards in the construction of networks. 3.1.3 Describe how communication over networks is broken down into different layers. 3.1.4 Identify the technologies required to provide a VPN. 3.1.5 Evaluate the use of a VPN. Data transmission 3.1.6 Define the terms: protocol, data packet. 3.1.7 Explain why protocols are necessary. 3.1.8 Explain why the speed of data transmission across a network can vary. 3.1.9 Explain why compression of data is often necessary when transmitting across a network. 3.1.10 Outline the characteristics of different transmission media. 3.1.11 Explain how data is transmitted by packet switching. Wireless networking 3.1.12 Outline the advantages and disadvantages of wireless networks. 3.1.13 Describe the hardware and software components of a wireless network. 3.1.14 Describe the characteristics of wireless networks. 3.1.15 Describe the different methods of network security. 3.1.16 Evaluate the advantages and disadvantages of each method of network security.
Topic-2 Computer Organization (6 hours)
jeeveshkumarjeeveshkumar

Topic-2 Computer Organization (6 hours)

(0)
Computer Architecture 2.1.1 Outline the architecture of the central processing unit (CPU) and the functions of the arithmetic logic unit (ALU) and the control unit (CU) and the registers within the CPU 2.1.2 Describe primary memory. Distinguish between random access memory (RAM) and read-only memory (ROM), and their use in primary memory 2.1.3 Explain the use of cache memory 2.1.4 Explain the machine instruction cycle Secondary memory 2.1.5 Identify the need for persistent storage Operating systems and application systems 2.1.6 Describe the main functions of an operating system 2.1.7 Outline the use of a range of application software 2.1.8 Identify common features of applications Binary representation 2.1.9 Define the terms: bit, byte, binary, denary/decimal, hexadecimal 2.1.10 Outline the way in which data is represented in the computer Simple logic gates 2.1.11 Define the Boolean operators: AND, OR, NOT, NAND, NOR and XOR 2.1.12 Construct truth tables using the above operators 2.1.13 Construct a logic diagram using AND, OR, NOT, NAND, NOR and XOR gates
Topic-1 System fundamentals (20 hours)
jeeveshkumarjeeveshkumar

Topic-1 System fundamentals (20 hours)

(0)
1.1 Systems in organizations (10 hours) Planning and system installation 1.1.1 Identify the context for which a new system is planned. 1.1.2 Describe the need for change management 1.1.3 Outline compatibility issues resulting from situations including legacy systems or business mergers. 1.1.4 Compare the implementation of systems using a client’s hardware with hosting systems remotely 1.1.5 Evaluate alternative installation processes 1.1.6 Discuss problems that may arise as a part of data migration 1.1.7 Suggest various types of testing User focus 1.1.8 Describe the importance of user documentation 1.1.9 Evaluate different methods of providing user documentation 1.1.10 Evaluate different methods of delivering user training 1.1.11 Identify a range of causes of data loss 1.1.12 Outline the consequences of data loss in a specified situation 1.1.13 Describe a range of methods that can be used to prevent data loss Software Deployment 1.1.14 Describe strategies for managing releases and updates 1.2 System design basics (10 hours) Components of a computer system 1.2.1 Define the terms: hardware, software, peripheral, network, human resources. 1.2.2 Describe the roles that a computer can take in a networked world. 1.2.3 Discuss the social and ethical issues associated with a networked world. System design and analysis 1.2.4 Identify the relevant stakeholders when planning a new system. 1.2.5 Describe methods of obtaining requirements from stakeholders. 1.2.6 Describe appropriate techniques for gathering the information needed to arrive at a workable solution. 1.2.7 Construct suitable representations to illustrate system requirements. 1.2.8 Describe the purpose of prototypes to demonstrate the proposed system to the client. 1.2.9 Discuss the importance of iteration during the design process. 1.2.10 Explain the possible consequences of failing to involve the end-user in the design process. 1.2.11 Discuss the social and ethical issues associated with the introduction of new IT systems. Human interaction with the system 1.2.12 Define the term usability. 1.2.13 Identify a range of usability problems with commonly used digital devices. 1.2.14 Identify methods that can be used to improve the accessibility of systems. 1.2.15 Identify a range of usability problems that can occur in a system. 1.2.16 Discuss the moral, ethical, social, economic and environmental implications of the interaction between humans and machines.
Topic-1 System Fundamentals
jeeveshkumarjeeveshkumar

Topic-1 System Fundamentals

(0)
1.1 Systems in organizations (10 hours) Planning and system installation 1.1.1 Identify the context for which a new system is planned. 1.1.2 Describe the need for change management 1.1.3 Outline compatibility issues resulting from situations including legacy systems or business mergers. 1.1.4 Compare the implementation of systems using a client’s hardware with hosting systems remotely 1.1.5 Evaluate alternative installation processes 1.1.6 Discuss problems that may arise as a part of data migration 1.1.7 Suggest various types of testing User focus 1.1.8 Describe the importance of user documentation 1.1.9 Evaluate different methods of providing user documentation 1.1.10 Evaluate different methods of delivering user training 1.1.11 Identify a range of causes of data loss 1.1.12 Outline the consequences of data loss in a specified situation 1.1.13 Describe a range of methods that can be used to prevent data loss Software Deployment 1.1.14 Describe strategies for managing releases and updates 1.2 System design basics (10 hours) Components of a computer system 1.2.1 Define the terms: hardware, software, peripheral, network, human resources. 1.2.2 Describe the roles that a computer can take in a networked world. 1.2.3 Discuss the social and ethical issues associated with a networked world. System design and analysis 1.2.4 Identify the relevant stakeholders when planning a new system. 1.2.5 Describe methods of obtaining requirements from stakeholders. 1.2.6 Describe appropriate techniques for gathering the information needed to arrive at a workable solution. 1.2.7 Construct suitable representations to illustrate system requirements. 1.2.8 Describe the purpose of prototypes to demonstrate the proposed system to the client. 1.2.9 Discuss the importance of iteration during the design process. 1.2.10 Explain the possible consequences of failing to involve the end-user in the design process. 1.2.11 Discuss the social and ethical issues associated with the introduction of new IT systems. Human interaction with the system 1.2.12 Define the term usability. 1.2.13 Identify a range of usability problems with commonly used digital devices. 1.2.14 Identify methods that can be used to improve the accessibility of systems. 1.2.15 Identify a range of usability problems that can occur in a system. 1.2.16 Discuss the moral, ethical, social, economic and environmental implications of the interaction between humans and machines.
Topic 6 - Resource Management (IBDP Computer Science)
jeeveshkumarjeeveshkumar

Topic 6 - Resource Management (IBDP Computer Science)

(0)
6.1.1 Identify the resources that need to be managed within a computer system 6.1.2 Evaluate the resources available in a variety of computer systems 6.1.3 Identify the limitations of a range of resources in a specified computer system 6.1.4 Describe the possible problems resulting from the limitations in the resources in a computer system 6.1.5 Explain the role of the operating system in terms of managing memory, peripherals and hardware interfaces 6.1.7 Outline OS resource management techniques: scheduling, policies, multitasking, virtual memory, paging, interrupt, polling 6.1.8 Discuss the advantages of producing a dedicated operating system for a device 6.1.9 Outline how an operating system hides the complexity of the hardware from users and applications
PRE-RELEASE MATERIAL MAY/JUNE 2022
jeeveshkumarjeeveshkumar

PRE-RELEASE MATERIAL MAY/JUNE 2022

(0)
The pre-release tasks are open ended to allow more-able students to expand their program or programs. The purpose of the tasks is to allow students to develop their problem solving and programming skills, to create a suitable solution(s) to the tasks.