7–10Computing Technology 7–10 Syllabus
The new Computing Technology 7–10 Syllabus (2022) is to be implemented from 2024.
2024 – Start teaching the new syllabus
Students who commenced studying the Information and Software Technology 7–10 Syllabus (2003) in 2023 may continue to study that Syllabus in 2024.
School sectors are responsible for implementing syllabuses and are best placed to provide schools with specific guidance and information on implementation given their understanding of their individual contexts.
Content
Stage 4
- CT4-ADJ-01
in Stage 4 teachers may adjust the Stage 5 outcomes as appropriate to the needs of students in Years 7 and 8
Describe the purpose of connecting people and systems
Describe inputs, storage, processes and outputs in connecting people and systems
Define a real-world problem or need that can be solved by connecting people and systems, including breaking it down into manageable parts and describing the users of the solution
Specify the functional requirements of a networked solution, including stating the purpose of a solution, describing use cases and developing test cases of input and expected outputs
Specify the non-functional requirements of a networked solution
Evaluate the social impacts and ethical and legal responsibilities in connecting people and systems
Describe common network hardware for wired, wireless and mobile networks
Describe common network security vulnerabilities and the mitigation strategies
Apply features of Graph Theory to model computer networks
Calculate node degree and paths between nodes and explain their meaning
Represent real-world social networks visually as a graph
Evaluate the development of a sociogram model
Explore how people’s changing expectations and concerns for security and privacy have shaped computer technology
Explore network and social connections considering the perspectives of diverse groups, including Aboriginal and Torres Strait Islander Peoples, culturally and linguistically diverse people, people of different ages and gender, and people with disability
Investigate how hardware and software are used to manage, control and secure the movement of, and access to, data in networked digital systems
Investigate how the profile and attributes of end users are used by developers when creating products
Plan and manage a project that connects people and systems using an iterative approach, including access control, privacy and cybersecurity
Generate alternative designs and evaluate them against the requirements to select a preferred design
Create a computer network between multiple devices and describe how nodes are connected
Create a network of connected devices to model the Internet of Things (IoT)
Implement a solution that connects people and systems using the preferred design
Create interactive solutions for sharing information online using a visualisation library
Specify what data is collected, who owns it, and how it will be protected, considering privacy and cybersecurity, including when interpreting data
Represent, store and transmit data to facilitate computation, including selecting appropriate data types, understanding the limitations of data types and structuring data systematically
Explain simple compression of data and types of compression, including the impact on data transmission
Model entities, events and relationships within a network
Model the relationships between entities and events using relational data
Create a record of project development demonstrating iterative design and evaluation
Select and use specialist terminology in context
Access datasets and collect data from users or the environment considering privacy and personally identifying information (PII)
Validate data is correct and investigate the impact of invalid data
Analyse data to make decisions and generate reports using a database
Filter, sort and limit database queries using SELECT, WHERE, ORDER BY and LIMIT clauses
Load, insert and update data in a database
Visualise data to identify trends, patterns, relationships and outliers using a range of tools
Evaluate solutions against the predetermined functional and non-functional requirements that meet social, ethical and legal responsibilities and cybersecurity principles
Test and evaluate the efficiency of a network navigation map
Test, monitor and evaluate a network in terms of bandwidth, connectedness, compatibility, reliability and ease of use
Evaluate the security of networks in terms of vulnerability to attacks and exploitation
Explore careers in connecting people and systems