BTEC National Computing Student Book

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Author(s): Jenny Phillips, Alan Jarvis, Richard McGill, Mark Fishpool, Tim Cook, David Atkinson-Beaumont
Edition: 1
Publisher: Pearson
Year: 2016

Language: English
Pages: 590
City: London
Tags: BTEC

Cover
Contents
Introduction
Chapter 1: Principles of Computer Science
A: Computational thinking
Decomposition
Pattern recognition
Pattern generalisation and abstraction
Algorithm design
B: Standard methods and techniques used to develop algorithms
Structured English (pseudocode)
Flowcharts using standard symbols
C: Programming paradigms
Handling data with a program
Arithmetic operations
Built-in functions
Validating data
Control structures
Data structures
Common/standard algorithms
D: Types of programming and mark-up languages
Procedural programming
Object-oriented programming
Event-driven programming
Coding for the web
Translation
Chapter 2: Fundamentals of Computer Systems
A: Hardware and software
Computer hardware within a computer system
Computer software within a computer system
Data processing
B: Computer architecture
Approaches to computer architecture
The concepts of microarchitecture
Registers and register handling
C: How data is represented by computer systems
Number systems
Text representation
Image representation
D: How data is organised on computer systems
Data structures
Indices and matrices
E: How data is transmitted by computer systems
Transmitting data
Error detection
Error correction
F: The use of logic and data flow in computer systems
Boolean logic
Flow charts and system diagrams
Chapter 3: Planning and Mangement of Computing Projects
A: Project management concepts
Costs and timescales
Quality and deliverables
Risk
Benefits
The project life cycle
Professionalism
B: Starting up a computing project
Interpreting the business case
Stakeholders
Identifying assumptions and constraints
The Project Initiation Document (PID)
C: Project planning
Scheduling and milestones
Resources and budgeting
Risk management strategy
Use of a risk matrix to classify risks as green, amber or red
Quality management
Communications
D: Executing and monitoring a project
The waterfall software development life cycle model
Monitoring and tracking progress
Recording quality management activity
Managing issues
Change management
Implementation strategy
E: Project closure and post-project review
Closing a live project
Review of project success
Chapter 4: Software Design and Development Project
A: Software development life cycle
Stages of software development
B: Standard methods and techniques to develop designed solutions
Flow charts and use of standard symbol conventions
Structured English (pseudocode)
Test data
C: Software design considerations
Design concepts
Code readability
D: Programming paradigms
Handling data within a program
Arithmetic operations
Built-in functions
Validating data
Control structures
Data structures
E: Evaluating a software development project
Evaluation of design
Evaluation of software testing
Evaluation of the software
Chapter 7: IT Systems Security and Encryption
A: Understand current IT security threats, information security and the legal requirements affecting the security of IT systems
Threat types
Computer network-based threats
Information security
Legal requirements
Impact of security breaches
B: Investigate cryptographic techniques and processes used to protect data
Cryptographic principles
Cryptographic methods
Applications of cryptography
C: Examine the techniques used to protect an IT system from security threats
Physical security
Policies and procedures
Software-based protection
D: Implement strategies to protect an IT system from security threats
Group policies
Anti-malware protection
Firewall configuration
Wireless security
Access control
Testing and reviewing protection
Chapter 8: Business Applications of Social Media
A: Explore the impact of social media on the ways in which organisations promote their products and services
Social media websites
Organisational uses of social media for business purposes
Risks and issues
B: Develop a plan to use social media in a business to meet requirements
Social media planning process
Organisational requirements
Content planning and publishing
Developing an online community
Developing a social media policy
Reviewing and refining plans
C: Implement the use of social media in an organisation
Creating accounts and profiles
Content creation and publication
Implementation of online community building
Data gathering and analysis
Search engine optimisation
Chapter 9: The Impact of Computing
A: Understand the impact of developments in computing on an organisation
Hardware and software developments
Changing markets and new opportunities
Emerging technologies
Big data, data warehousing and data mining
Issues and risks
B: Investigate the impact of developments in computing technology
Social impacts
Employment and business impact
Environmental impacts
Ethical issues
C: Develop a plan to implement a computing technology development in an organisation
Information gathering
Implementation planning
Managing risk
D: Review a plan to implement a computing technology development in an organisation
Obtaining feedback
Review and analyse
Skills, knowledge and behaviours
Chapter 14: Computer Games Development
A: Investigate technologies used in computer gaming
Gaming trends and society
Gaming technology
B: Design a computer game to meet client requirements
Computer games design processes and techniques
Design documentation
Reviewing and refining designs
C: Develop a computer game to meet client requirements
Principles of computer games development
Developing computer games
Testing computer games
Reviewing computer games
External reviews and quality characteristics
Chapter 15: Website Development
A: Understand the principles of website development
Purpose and principles of website products
Factors affecting website performance
B: Design a website to meet client requirements
Website design
Common tools and techniques used to produce websites
C: Develop a website to meet client requirements
Website development
Client-side scripting
Other issues involved in website development
Website review
Website optimisation
Chapter 17: Mobile Apps Development
A: Investigate mobile apps and mobile devices
Types of mobile apps
Context of mobile apps
Mobile device integration
Mobile app programming
B: Design a mobile app that utilises device functions
Analyse requirements for an app
Designing a mobile app
C: Develop a mobile app that utilises device functions
Content preparation for mobile apps
Developing a mobile app
Testing a mobile app
Lessons learned from developing a mobile app
Glossary
Index
Back Cover
9781292277172_FC.pdf
Front Cover
Contents
Introduction
Chapter 1: Principles of Computer Science
A: Computational thinking
Decomposition
Pattern recognition
Pattern generalisation and abstraction
Algorithm design
B: Standard methods and techniques used to develop algorithms
Structured English (pseudocode)
Flowcharts using standard symbols
C: Programming paradigms
Handling data with a program
Arithmetic operations
Built-in functions
Validating data
Control structures
Data structures
Common/standard algorithms
D: Types of programming and mark-up languages
Procedural programming
Object-oriented programming
Event-driven programming
Coding for the web
Translation
Chapter 2: Fundamentals of Computer Systems
A: Hardware and software
Computer hardware within a computer system
Computer software within a computer system
Data processing
B: Computer architecture
Approaches to computer architecture
The concepts of microarchitecture
Registers and register handling
C: How data is represented by computer systems
Number systems
Text representation
Image representation
D: How data is organised on computer systems
Data structures
Indices and matrices
E: How data is transmitted by computer systems
Transmitting data
Error detection
Error correction
F: The use of logic and data flow in computer systems
Boolean logic
Flow charts and system diagrams
Chapter 3: Planning and Mangement of Computing Projects
A: Project management concepts
Costs and timescales
Quality and deliverables
Risk
Benefits
The project life cycle
Professionalism
B: Starting up a computing project
Interpreting the business case
Stakeholders
Identifying assumptions and constraints
The Project Initiation Document (PID)
C: Project planning
Scheduling and milestones
Resources and budgeting
Risk management strategy
Use of a risk matrix to classify risks as green, amber or red
Quality management
Communications
D: Executing and monitoring a project
The waterfall software development life cycle model
Monitoring and tracking progress
Recording quality management activity
Managing issues
Change management
Implementation strategy
E: Project closure and post-project review
Closing a live project
Review of project success
Chapter 4: Software Design and Development Project
A: Software development life cycle
Stages of software development
B: Standard methods and techniques to develop designed solutions
Flow charts and use of standard symbol conventions
Structured English (pseudocode)
Test data
C: Software design considerations
Design concepts
Code readability
D: Programming paradigms
Handling data within a program
Arithmetic operations
Built-in functions
Validating data
Control structures
Data structures
E: Evaluating a software development project
Evaluation of design
Evaluation of software testing
Evaluation of the software
Chapter 7: IT Systems Security and Encryption
A: Understand current IT security threats, information security and the legal requirements affecting the security of IT systems
Threat types
Computer network-based threats
Information security
Legal requirements
Impact of security breaches
B: Investigate cryptographic techniques and processes used to protect data
Cryptographic principles
Cryptographic methods
Applications of cryptography
C: Examine the techniques used to protect an IT system from security threats
Physical security
Policies and procedures
Software-based protection
D: Implement strategies to protect an IT system from security threats
Group policies
Anti-malware protection
Firewall configuration
Wireless security
Access control
Testing and reviewing protection
Chapter 8: Business Applications of Social Media
A: Explore the impact of social media on the ways in which organisations promote their products and services
Social media websites
Organisational uses of social media for business purposes
Risks and issues
B: Develop a plan to use social media in a business to meet requirements
Social media planning process
Organisational requirements
Content planning and publishing
Developing an online community
Developing a social media policy
Reviewing and refining plans
C: Implement the use of social media in an organisation
Creating accounts and profiles
Content creation and publication
Implementation of online community building
Data gathering and analysis
Search engine optimisation
Chapter 9: The Impact of Computing
A: Understand the impact of developments in computing on an organisation
Hardware and software developments
Changing markets and new opportunities
Emerging technologies
Big data, data warehousing and data mining
Issues and risks
B: Investigate the impact of developments in computing technology
Social impacts
Employment and business impact
Environmental impacts
Ethical issues
C: Develop a plan to implement a computing technology development in an organisation
Information gathering
Implementation planning
Managing risk
D: Review a plan to implement a computing technology development in an organisation
Obtaining feedback
Review and analyse
Skills, knowledge and behaviours
Chapter 14: Computer Games Development
A: Investigate technologies used in computer gaming
Gaming trends and society
Gaming technology
B: Design a computer game to meet client requirements
Computer games design processes and techniques
Design documentation
Reviewing and refining designs
C: Develop a computer game to meet client requirements
Principles of computer games development
Developing computer games
Testing computer games
Reviewing computer games
External reviews and quality characteristics
Chapter 15: Website Development
A: Understand the principles of website development
Purpose and principles of website products
Factors affecting website performance
B: Design a website to meet client requirements
Website design
Common tools and techniques used to produce websites
C: Develop a website to meet client requirements
Website development
Client-side scripting
Other issues involved in website development
Website review
Website optimisation
Chapter 17: Mobile Apps Development
A: Investigate mobile apps and mobile devices
Types of mobile apps
Context of mobile apps
Mobile device integration
Mobile app programming
B: Design a mobile app that utilises device functions
Analyse requirements for an app
Designing a mobile app
C: Develop a mobile app that utilises device functions
Content preparation for mobile apps
Developing a mobile app
Testing a mobile app
Lessons learned from developing a mobile app
Glossary
Index
Back Cover