Content:
Introduction to human-centric computing
- Investigate the effects of disruptive technology on everyday computing, including:
- effects on the individual
- innovations in infrastructure, hardware and software
- trends and technology buzzwords
- Investigate the application of graph and network theory in the design of social networks
- Describe how web applications and dedicated apps for mobile devices influence the success of social networking
- Investigate how the development of hardware and software has influenced the adoption of the Internet of Things (IoT) and the Internet of Me (IoMe), including:
- impact on the individual
- impact on enterprise, including edge computing
- hardware infrastructure
- software protocols
- data backup
- regulation, compliance and cybersecurity
- Outline the business and individual cultural characteristics that contribute to the success of start-ups
Storage and workflow in enterprise networks
- Investigate how the developments in network connectivity and speed have influenced work practices within an enterprise, including:
- remote working opportunities
- file sharing
- task delegation and monitoring
- Examine the benefits and limitations of digital workflows operating in an enterprise
- Investigate data storage requirements for an enterprise, including:
- capacity
- accessibility
- location
- security
- Explore cloud computing services, including:
- Infrastructure as a Service (IaaS)
- Software as a Service (SaaS)
- Platform as a Service (PaaS)
- Compare different types of cloud-based data storage in terms of access and services, including:
- public cloud
- private cloud
- hybrid cloud
- non-cloud on premises
Network architecture and infrastructure
- Describe key components of an organisation’s information technology infrastructure, including:
- networking, including servers, storage and end-point devices
- on-premises computing
- cloud computing
- Describe how transmission media is used in networks
- Explain factors that interfere with the transmission of data across a computer and social network, including:
- distance
- topography
- physical barriers
- environmental barriers
- Investigate ways to improve data flow within a system, considering proximity and modes of connectivity, including:
- size, location and power of antennae when using satellite and microwave
- traffic filtering
- flow scheduling and traffic monitoring on telecommunications, including wireless broadband for mobile devices (3G→), Bluetooth and wi-fi
- Investigate the application of graph theory and network theory in the design of optimised computer networks, including:
- adjacency
- centrality
- connectedness
- weighted graphs
- Explore device interoperability within an Internet of Things (IoT) based enterprise network, including supervisory control and data acquisition (SCADA)
- Investigate communication protocols between devices in an Internet of Things (IoT) network
- Explore the benefits of interfacing machine learning (ML) with IoT, including:
- data-driven optimisation to enable predictive maintenance and logistics in manufacturing
- data acquired from medical imaging to improve accuracy of diagnosis
- improving traffic control through ML and sensors
- automating soil moisture data collection to manage farm irrigation
- Investigate security measures used to control access to networks, including:
- password systems
- biometric measures
- CAPTCHA
- trusted Platform Module (TPM)
- automatic software updates
- Examine data security for an intelligent home network, including:
- access levels, including universal plug and play (UPnP)
- passwords and firewalls
- port management on routers and switches
- wi-fi device positioning
- virtual private networks (VPNs) and hidden networks
- backup and disaster recovery
Creating a network
- Design and model a network of interconnected devices for a specific purpose
- Apply appropriate project management tools to develop a project
- Configure devices within a network, including:
- naming the device
- updating the device
- configuring security protocols
- connecting to the internet
- Implement procedures and security protocols considering cybersecurity
- Explore opportunities for optimising network performance, including:
- improving bandwidth
- updating drivers and firmware
- Evaluate the role of hardware and software related to the transmission of data, including:
- unsecured data
- encrypted data
- infrastructure