Skip to content

A NSW Government website

Welcome to the NSW Curriculum website

NSW Curriculum
NSW Education Standards Authority

7–10Computing Technology 7–10 Syllabus

Record of changes
Implementation from 2024
Expand for detailed implementation advice

Content

Stage 4

Enterprise information systems: Modelling networks and social connections
Identifying and defining
  • Describe the purpose of connecting people and systems

  • Describe inputs, storage, processes and outputs in connecting people and systems

  • Define a real-world problem or need that can be solved by connecting people and systems, including breaking it down into manageable parts and describing the users of the solution

  • Specify the functional requirements of a networked solution, including stating the purpose of a solution, describing use cases and developing test cases of input and expected outputs

  • Specify the non-functional requirements of a networked solution

  • Evaluate the social impacts and ethical and legal responsibilities in connecting people and systems

  • Describe common network hardware for wired, wireless and mobile networks

  • Describe common network security vulnerabilities and the mitigation strategies

  • Apply features of Graph Theory to model computer networks

  • Calculate node degree and paths between nodes and explain their meaning

  • Represent real-world social networks visually as a graph

  • Evaluate the development of a sociogram model

Researching and planning
  • Explore how people’s changing expectations and concerns for security and privacy have shaped computer technology

  • Explore network and social connections considering the perspectives of diverse groups, including Aboriginal and Torres Strait Islander Peoples, culturally and linguistically diverse people, people of different ages and gender, and people with disability

  • Investigate how hardware and software are used to manage, control and secure the movement of, and access to, data in networked digital systems

  • Investigate how the profile and attributes of end users are used by developers when creating products

Producing and implementing
  • Plan and manage a project that connects people and systems using an iterative approach, including access control, privacy and cybersecurity

  • Generate alternative designs and evaluate them against the requirements to select a preferred design

  • Create a computer network between multiple devices and describe how nodes are connected

  • Create a network of connected devices to model the Internet of Things (IoT)

  • Implement a solution that connects people and systems using the preferred design

  • Create interactive solutions for sharing information online using a visualisation library

  • Specify what data is collected, who owns it, and how it will be protected, considering privacy and cybersecurity, including when interpreting data

  • Represent, store and transmit data to facilitate computation, including selecting appropriate data types, understanding the limitations of data types and structuring data systematically

  • Explain simple compression of data and types of compression, including the impact on data transmission

  • Model entities, events and relationships within a network

  • Model the relationships between entities and events using relational data

  • Create a record of project development demonstrating iterative design and evaluation

  • Select and use specialist terminology in context

  • Access datasets and collect data from users or the environment considering privacy and personally identifying information (PII)

  • Validate data is correct and investigate the impact of invalid data

  • Analyse data to make decisions and generate reports using a database

  • Filter, sort and limit database queries using SELECT, WHERE, ORDER BY and LIMIT clauses

  • Load, insert and update data in a database

  • Visualise data to identify trends, patterns, relationships and outliers using a range of tools

Testing and evaluating
  • Evaluate solutions against the predetermined functional and non-functional requirements that meet social, ethical and legal responsibilities and cybersecurity principles

  • Test and evaluate the efficiency of a network navigation map

  • Test, monitor and evaluate a network in terms of bandwidth, connectedness, compatibility, reliability and ease of use

  • Evaluate the security of networks in terms of vulnerability to attacks and exploitation

  • Explore careers in connecting people and systems

Related files