Skip to content

A NSW Government website

Welcome to the NSW Curriculum website

NSW Curriculum
NSW Education Standards Authority

7–10Computing Technology 7–10 Syllabus (2022)

Record of changes

Content

Stage 4

Enterprise information systems: Modelling networks and social connections
Identifying and defining
  • Describe the purpose of connecting people and systems

  • Describe inputs, storage, processes and outputs in connecting people and systems

  • Define a real-world problem or need that can be solved by connecting people and systems, including breaking it down into manageable parts and describing the users of the solution

  • Specify the functional requirements of a networked solution, including stating the purpose of a solution, describing use cases and developing test cases of input and expected outputs

  • Specify the non-functional requirements of a networked solution

  • Evaluate the social impacts and ethical and legal responsibilities in connecting people and systems

  • Describe common Loading  Loading  for wired, wireless and mobile networks

  • Describe common network security vulnerabilities and the mitigation strategies

  • Apply features of Graph Theory to model computer networks

  • Calculate node degree and paths between nodes and explain their meaning

  • Represent real-world Loading  visually as a graph

  • Evaluate the development of a Loading  Loading 

Researching and planning
  • Explore how people’s changing expectations and concerns for security and privacy have shaped computer technology

  • Explore network and social connections considering the perspectives of diverse groups, including Loading , culturally and linguistically diverse people, people of different ages and gender, and people with Loading 

  • Investigate how hardware and software are used to manage, control and secure the movement of, and access to, Loading  in networked digital systems

  • Investigate how the profile and attributes of end users are used by developers when creating Loading 

Producing and implementing
  • Plan and manage a Loading  that connects people and systems using an iterative approach, including access control, privacy and Loading 

  • Generate alternative designs and evaluate them against the requirements to select a preferred design

  • Create a computer network between multiple devices and describe how nodes are connected

  • Create a network of connected devices to model the Internet of Things (IoT)

  • Implement a solution that connects people and systems using the preferred design

  • Create interactive solutions for sharing Loading  online using a Loading  library

  • Specify what data is collected, who owns it, and how it will be protected, considering privacy and cybersecurity, including when interpreting data

  • Represent, store and transmit data to facilitate computation, including selecting appropriate data types, understanding the limitations of data types and structuring data systematically

  • Explain simple compression of data and types of compression, including the impact on data transmission

  • Model entities, events and relationships within a network

  • Model the relationships between entities and events using relational data

  • Create a record of project development demonstrating iterative design and evaluation

  • Select and use specialist terminology in context

  • Access Loading  and collect data from users or the environment considering privacy and personally identifying information (PII)

  • Validate data is correct and investigate the impact of invalid data

  • Analyse data to make decisions and generate reports using a Loading 

  • Filter, sort and limit database queries using SELECT, WHERE, ORDER BY and LIMIT clauses

  • Load, insert and update data in a database

  • Visualise data to identify trends, patterns, relationships and outliers using a range of tools

Testing and evaluating
  • Evaluate solutions against the predetermined functional and non-functional requirements that meet social, ethical and legal responsibilities and cybersecurity principles

  • Test and evaluate the efficiency of a network navigation map

  • Test, monitor and evaluate a network in terms of bandwidth, connectedness, compatibility, reliability and ease of use

  • Evaluate the security of networks in terms of vulnerability to attacks and exploitation

  • Explore careers in connecting people and systems

Related files