Computing Handbook
Computing Handbook
STUDENT
HANBOOK
2023/24 LEVEL 4 & 5
2
Course Structure
Unit Details
Unit level 4
Credit value 15
Introduction
Programming involves describing processes and procedures that are derived from
algorithms. The ability to program is what sets apart a developer and an end user.
Typically, the role of the developer is to instruct a device (such as a computer) to carry
out instructions; the instructions are known as source code and are written in a
language that is converted into something the device can understand. The device
executes the instructions it is given.
Algorithms help to describe the solution to a problem or task by identifying the data
and the process needed to represent the problem or task and the set of steps needed
to produce the desired result. Programming languages typically provide the
representation of both the data and the process; they provide control constructs and
data types (which can be numbers, words and objects, and be constant or variable).
The control constructs are used to represent the steps of an algorithm in a convenient
yet unambiguous fashion. Algorithms require constructs that can perform sequential
processing, selection for decision making and iteration for repetitive control. Any
programming language that provides these basic features can be used for algorithm
representation.
This unit introduces students to the core concepts of programming along with an
introduction to algorithms and the characteristics of programming paradigms. Among
the topics included in this unit are: introduction to algorithms, procedural, object-
orientated and event-driven programming, security considerations, the integrated
development environment and the debugging process.
On successful completion of this unit, students will be able to design and implement
algorithms in a chosen language in a suitable Integrated Development Environment
(IDE). This IDE will be used to develop and help track any issues with the code. As a
result, students will develop skills such as communication literacy, critical thinking,
analysis, reasoning and interpretation, which are crucial for gaining employment and
developing academic competence.
Learning Outcomes
By the end of this unit students will be able to:
LO1 Define basic algorithms to carry out an operation and outline the process of
programming an application
LO2 Explain the characteristics of procedural, object-orientated and event-driven
programming
LO3 Implement basic algorithms in code using an IDE
LO4 Determine the debugging process and explain the importance of a coding
standard.
Essential Content
LO1 Define basic algorithms to carry out an operation and outline the process
of programming an application
Algorithm definition:
Characteristics of code:
Definitions of: data types (the role of constants/variables), data structures, e.g.
arrays, stacks, queues, methods (including input/output), control structures,
iteration, scope, parameter passing, classes, inheritance and events.
Key components of an IDE, with a brief explanation of each component.
Use of addition of advanced text editors to view code, such as Notepad++, Atom,
Sublime Text etc.
Implementation:
P4 Write a program that M3 Enhance the algorithm D3 Evaluate the use of an IDE
implements an algorithm written, using the features of for development of
using an IDE. the IDE to manage the applications contrasted with
development process. not using an IDE.
P5 Explain the debugging M4 Examine how the D4 Evaluate the role and
process and the debugging process can be purpose of a coding standard
debugging facilities used to help develop more and why it is necessary in a
available in the IDE. secure, robust applications. team as well as for the
individual.
P6 Explain the coding
standard you have used
in your code.
Unit 2: Networking
Unit level 4
Credit value 15
Introduction
Computer networks are the driving force behind the evolution of computer systems
and allow users to access data, hardware, and services regardless of their location.
Being knowledgeable about the underlying principles of networking is of vital
importance to all IT professionals. Networking is an environment that is increasingly
complex and under continuous development.
Complex computer networking has connected the world by groups of small networks
through internet links to support global communications. It supports access to digital
information any time, anywhere, using many applications like email, audio and video
transmission, including the World Wide Web, and this has opened the floodgates to
availability of information.
The aim of this unit is to give students a wider background knowledge of computer
networking essentials, how they operate, protocols, standards, security considerations
and the prototypes associated with a range of networking technologies. Students will
explore a range of hardware, with related software, and will configure and install
these to gain knowledge of networking systems. A range of networking technologies
will be explored to deliver a fundamental knowledge of Local Area Networking (LAN),
Wide Area Networking (WAN) and their evolution to form large-scale networks.
Students will also explore the protocol methodologies related to IP data networks.
On successful completion of this unit, students will have gained the knowledge and
skills needed to successfully install, operate and troubleshoot a small network; and
the operation of IP data networks, router, switching technologies, IP routing
technologies, IP services and basic troubleshooting. Supporting a range of units in the
Higher National suite, this unit underpins the principles of networks for all and
enables students to work towards their studies in vendor units, if applicable. Students
will develop skills such as communication literacy, critical thinking, analysis, reasoning
and interpretation, which are crucial for gaining employment and developing
academic competence.
Learning Outcomes
By the end of this unit students will be able to:
LO1 Examine networking principles and their protocols
LO2 Explain networking devices and operations
LO3 Design efficient networked systems
LO4 Implement and diagnose networked systems.
Essential Content
Introduction to networks:
Role of networks:
System types:
Networking standards:
Conceptual models, e.g. OSI model, TCP/IP model; standards, e.g. IEEE 802.x.
Topology:
Network representation logical, e.g. ethernet, Token Ring; physical, e.g. star, ring,
bus, mesh, tree.
Protocols:
Wireless networks:
Networking devices:
Networking software:
Server type:
Server selection:
Workstation:
Bandwidth:
Expected average load, anticipated peak load, local internet availability, cost
constraints, throughput.
Users:
Communications:
Scalability:
Selection of components:
Security:
Devices:
Network automation:
Maintenance schedule:
Policy review:
Conditions of service availability, time window for each level of service (prime
time and non-prime time), responsibilities of each party, escalation procedures,
and cost/service trade-offs.
Learning Outcomes and Assessment Criteria
Unit level 4
Credit value 15
Introduction
In the workplace, it is essential to be effective as a communicator, critical thinker,
analyser, team worker and team leader. These skills are needed on a daily basis in
order to carry out designated tasks as part of a job role. The development of
academic competence and the continuation of lifelong learning and continuing
professional development (CPD) are required to ensure that individuals have a valued
set of interpersonal skills that can be applied to any situation or environment.
This unit provides a foundation for good practice in a variety of contexts. The ability to
communicate effectively using different tools and mediums will ensure that practical,
research, design, reporting and presentation tasks are undertaken professionally and
in accordance with various communication conventions. In everyday life, the ability to
apply critical reasoning and solve problems are skills that enable tasks to be
completed successfully and facilitate effective decision making. Working with others in
a group environment such as an academic setting or in the workplace is an integral
part of everyday life. Therefore, understanding the dynamics of teams in terms of
culture, roles and responsibilities will ensure that there is a better understanding and
awareness of the importance and value of teamwork. Continuing professional
development, self-improvement, reflective practice and working towards various goals
are encouraged in the workplace through an appraisal framework. Professional
development includes at higher levels of learning and the ability to demonstrate
effective research skills and academic reporting skills.
This unit covers the development of communication skills and communication literacy
and the use of qualitative and quantitative data to demonstrate analysis, reasoning
and critical thinking. Students will carry out tasks that require working with others in a
team-based scenario and planning and problem solving.
On successful completion of the unit, students will be able to demonstrate leadership
skills through the dynamics of team working. Through reflective practice, they will be
able to evaluate the contributions they make as an individual and those of others.
Learning Outcomes
By the end of this unit students will be able to:
LO1 Demonstrate a range of interpersonal and transferable communication skills to
a target audience
LO2 Apply critical reasoning and thinking to a range of problem-solving scenarios
LO3 Discuss the importance and dynamics of working within a team and the impact
of team working in different environments
LO4 Examine the need for continuing professional development (CPD) and its role
within the workplace and for higher-level learning.
Essential Content
Effective communication:
Verbal and non-verbal, e.g. awareness and use of body language, openness and
responsiveness, formal and informal dialogue and feedback to a range of
different stakeholders, academic report writing, use of IT to enhance
communication, use of source information to undertake research.
Understanding of the reasons for communicating with internal and external
stakeholders, e.g. responding to queries, technical support, providing
instructions, raising awareness of issues.
Considerations when communicating with internal and external
stakeholders, e.g. maintaining privacy and security, tone of voice, use of
technical vocabulary or jargon, company image.
Consideration of issues relating to inclusion and diversity when communicating
and interacting with others.
Interpersonal skills:
Soft skills, e.g. personal effectiveness, working with others, use of initiative,
negotiating skills, assertiveness skills and social skills.
Time-management skills:
Evaluation:
LO3 Discuss the importance and dynamics of working within a team and the
impact of team working in different environments
Nature and dynamics of team and group work, informal and formal settings.
Purpose of teams and groups, e.g. long-term corporate objectives and strategy,
problem-solving and short-term development projects, flexibility and
adaptability, team player.
Individual responsibility when working as part of a team.
Working effectively on individual and collaborative tasks regardless of levels of
supervision.
Allocation and management of tasks between members of the team, identifying
team members’ strengths, communicating requirements and expectations
effectively.
Selecting team members e.g. specialist roles, skill and style/approach mixes.
Identification of team and work group roles.
Stages in team development, including team building, identity, loyalty,
commitment to shared beliefs, professionalism.
Team health evaluation, including promoting and maintaining a safe and secure
working environment, action planning, monitoring and feedback, coaching skills,
ethics.
Effective leadership skills, e.g. setting direction, setting standards, motivating,
innovative, responsive, effective communicator, reliability, consistency.
LO4 Examine the need for continuing professional development (CPD) and its
role within the workplace and for higher-level learning
Responsibilities:
Performance objectives:
Evidence criteria:
Development plan:
P9 Produce a development
plan that outlines
responsibilities,
performance objectives
and required skills for
future goals.
Unit 4: Database Design &
Development
Unit level 4
Credit value 15
Introduction
Organisations depend on their databases for providing information that is essential
for their day-to-day operations and to help them take advantage of today’s rapidly
growing and maturing e-commerce opportunities. An understanding of database
tools and technologies is an essential skill for designing and developing systems to
support them.
As applications get increasingly more sophisticated, database systems continue to
demand more complex data structures and interfaces. Most organisations collect and
store large volumes of data, either on their own systems or in the cloud, and this data
is used not just for the operational running of their business but is also mined for
other more intelligent and complex applications. Databases stand as the back-end of
most systems used by organisations for their operations.
Database design and development is a fundamental and highly beneficial skill for
computing students to master, regardless of their specialism.
The aim of this unit is to give students opportunities to develop an understanding of
the concepts and issues relating to database design and development. It will also
provide the practical skills needed to be able to translate that understanding into the
design and creation of complex databases.
Topics covered in this unit are: examination of different design tools and techniques;
examination of different development software options; consideration of the
development features of a fully-functional robust solution covering data integrity, data
validation, data consistency, data security and advanced database querying facilities
across multiple tables; appropriate user interfaces for databases and for other
externally linked systems; creating complex reports/dashboards, testing the system
against the user and system requirements; and elements of complete system
documentation.
On successful completion of the unit, students will be able to use appropriate tools to
design and develop a relational database system for a substantial problem. They will
be able to test the system to ensure that it meets user and system requirements, and
fully document the system by providing technical and user documentation. For
practical purposes, this unit covers relational databases and related tools and
techniques. A brief overview of object-oriented databases will also be covered. As a
result, students will develop skills such as communication literacy, critical thinking,
analysis, reasoning and interpretation, which are crucial for gaining employment and
developing academic competence.
Learning Outcomes
By the end of this unit students will be able to:
LO1 Use an appropriate design tool to design a relational database system for a
substantial problem
LO2 Develop a fully-functional relational database system, based on an existing
system design
LO3 Test the system against user and system requirements
LO4 Produce technical and user documentation.
Essential Content
LO1 Use an appropriate design tool to design a relational database system for a
substantial problem
Database design:
Implementation:
Testing methodologies:
Identify elements of the system that need to be tested. Consider data that
should be used to fully test the system.
Match tests against user and system requirements.
Test procedures to be used: test plans, test models, e.g. white box, black box;
testing documentation.
Functional and system testing and testing the robustness of the system,
including help menus, pop-ups, hot-spots, data validation checks.
Unit level 4
Credit value 15
Introduction
Security is one of the most important challenges modern organisations face. It is
about protecting organisational assets, including personnel, data, equipment and
networks, from attack through the use of prevention techniques in the form of
vulnerability testing/security policies and detection techniques, exposing breaches in
security and implementing effective responses.
The aim of this unit is to give students knowledge of security, the associated risks and
how it has an impact on business continuity. Students will examine security measures
involving access authorisation and regulation of use. They will implement contingency
plans and devise security policies and procedures. The unit also introduces students
to detection of threats and vulnerabilities in physical and IT security, and how to
manage risks relating to organisational security.
This unit includes network security design and operational topics, including address
translation, DMZ, VPN, firewalls, AV and intrusion detection systems. Remote access
will be covered, as will the need for frequent vulnerability testing as part of
organisational and security audit compliance. As a result, students will develop skills
such as communication literacy, critical thinking, analysis, reasoning and
interpretation, which are crucial for gaining employment and developing academic
competence.
Learning Outcomes
By the end of this unit students will be able to:
LO1 Assess risks to IT security
LO2 Describe IT security solutions
LO3 Review mechanisms to control organisational IT security
LO4 Manage organisational security.
Essential Content
IT security risks:
P4 Discuss, using an
example for each, how
implementing a DMZ, static
IP and NAT in a network
can improve network
security.
Unit level 4
Credit value 15
Introduction
This unit is assessed through a Pearson-set assignment. The project brief will be set
by the centre, based on a theme provided by Pearson (this will change annually). The
theme and chosen project within the theme will enable students to explore and
examine a relevant and current topical aspect of computing in the context of a
business environment.
As computing systems and technologies continually develop so do the ways in which
businesses utilise technologies to support their operations and remain competitive.
As a computing professional it is important to understand the ways in which
technology evolves and how it can be utilised in different sectors.
The aim of this unit is to give students an opportunity to demonstrate the research
skills required for developing a deeper understanding of a subject and the ability to
use evidence to inform decisions. Students will undertake independent research, and
investigation of a theme set by Pearson. Students will also investigate and research an
industry sector as outlined in the centre-set project brief. Students will use the
outcomes of their research to help them plan a computer-based project and to
support recommendations for how the identified business could utilise the tools and
technologies identified as part of their research.
On successful completion of this unit, students will have the confidence to engage in
decision making, problem solving, research activities and project planning tasks. They
will have the fundamental knowledge and skills that will enable them to investigate
and examine relevant computing concepts in a work-related context, determine
appropriate outcomes, decisions or solutions and present evidence to various
stakeholders in an acceptable and understandable format.
Learning Outcomes
By the end of this unit students will be able to:
LO1 Conduct small-scale research, information gathering and data collection to
generate knowledge on an identified subject
LO2 Explore the features and business requirements of organisations in an identified
sector.
LO3 Produce project plans based on research of the chosen theme for an identified
organisation
LO4 Present your project recommendations and justifications of decisions made,
based on research of the identified theme and sector.
Essential Content
Field work:
Using data collection tools, such as interviews and questionnaires, and their
advantages and disadvantages.
Using analytical techniques such as trend analysis, coding and typologies.
Sources of, and access to, data, including open and public data, administrative
and sensitive data, research data.
The principles of data to govern data, including data has value, data should be
reusable, data is managed according to its value, data should be fit for purpose.
Ensure that all research is conducted, data stored, processed and used in an
ethical way.
Research should also be reliable (similar results achieved from a similar sample)
and valid (the research should measure what it aimed to measure).
Ensure validity and reliability of secondary data and information used, including
consideration of who wrote or collected the information or data, age of data
collected, original purpose of the data collection, potential errors or variability in
the data, potential bias, e.g. sample size, sample participants, questions used,
interpretation of results.
LO2 Explore the features and business requirements of organisations in an
identified sector
Features of businesses:
The operational areas of a business (‘business functions’) and how they support
the organisation’s purpose, e.g. human resources, research and development,
sales, marketing, purchasing, production and quality, finance, customer service,
IT, administration.
Stakeholders:
The role of a business or systems analyst and the activities they undertake as
part of initiation of a project.
Analysing the features and requirements of an identified organisation to
establish their requirements.
Recommend potential solutions to identified business needs, including carrying
out a cost/benefit analysis, defining business objectives, scope and purpose of
the project.
Comprehensive project plans, including defining functional and non-functional
requirements of the system, stakeholder requirements and expectations,
carrying out impact analysis, prioritising requirements, describing the
deliverables to be produced, timescales and time management, costs, change
management planning, risk and challenges analysis.
Success criteria to be used, e.g. Key Performance Indicators (KPIs), performance
metrics, quality metrics, and business targets.
Use of an identified project management methodology, e.g. Waterfall, Agile,
Rapid Application Development (RAD).
Consider approaches to continuous integration, version and source control.
Tools:
Tools for effective project planning, resource planning and allocation, and work
breakdown structure, including Project Initiation Documents (PID), bar and Gantt
charts, Critical Path Analysis (CPA), risk matrix.
Quality of secondary and primary data used to inform planning and make
decisions.
Awareness that some studies may result in generalised findings and how this can
impact on the quality of decisions and the accuracy of conclusions made.
Evaluate the quality of the data and information used to inform project initiation
plans, e.g. sample size, sample characteristics, user experience during collection,
domain context.
Reach conclusions as to the likely accuracy and reliability of assertions made.
Learning Outcomes and Assessment Criteria
Unit level 4
Credit value 15
Introduction
The software development lifecycle is an integrated process that promotes building
good quality, secure software throughout the entire development process. The aim of
this unit is to give students the knowledge and skills needed to understand software
development lifecycles so that they can demonstrate their knowledge by implementing
a software development lifecycle with a suitable methodology.
The unit introduces students to lifecycle decision making at different stages of the
software development process. They will examine various lifecycle models and learn
to appreciate their particular characteristics in order to understand for which project
environments they are most appropriate. Theoretical understanding will be translated
into practical skills through an actual software development lifecycle project. Students
will become confident in the use of particular tools and techniques relevant to a
chosen methodology.
Among the topics included in this unit are iterative and sequential models of software
development lifecycles and reference frameworks for initially capturing conceptual
data and information through a feasibility study, and requirement gathering
techniques through to analysis, design and software implementation activities.
Students will develop skills such as communication literacy, critical thinking, analysis,
reasoning and interpretation, which are crucial for gaining employment and
developing academic competence.
Learning Outcomes
By the end of this unit, students will be able to:
LO1 Describe different software development lifecycles
LO2 Explain the importance of a feasibility study
LO3 Undertake a software development lifecycle
LO4 Discuss the suitability of software behavioural design techniques.
Essential Content
Testing and integration, including relationship between test activities and software
development activities, levels of testing, building test environments, developing test
harnesses, functional and structural testing, incremental testing, system testing,
acceptance test and integration approaches, changeover strategies, trials and Go-Live
prerequisites.
Identify the different individuals in a project, e.g. project manager, business analyst,
systems analyst, programmer, DevOps engineer, testing engineer etc.
Contributions, including quality assurance, common core skills, tools and behaviours.
Explore how the psychology and mindset of testing differs to that development mindset
and their possible influence on the overall success of a software project.
LO2 Explain the importance of a feasibility study
Requirement gathering:
Requirement gathering techniques, including how to categorise, validate and
prioritise, e.g. MosCow method, functional requirements, non-functional
requirements, users and constraints.
Key drivers for change, including performance and efficiency, legacy systems
upgrade, automation, elimination of human error.
Use of appropriate systems analysis terminology and tools, including data stores and
entities, data flows, process representation techniques relationships (1:1, 1:M and
M:M).
Unit level 4
Credit value 15
Introduction
Wireless, public hotspot, mobile broadband and unlimited network connections mean
that accessing and using the internet to request, use and post information has never
been so easy, or so important. As public, organisational and business demand
increases so does user expectation. Designers need to use technology successfully to
deliver high-quality and consistent User Experiences (UX) through friendly and
functional User Interfaces (UI). However, as the software and hardware evolve so does
the challenge of design.
This unit introduces students to the underpinning services required to host, manage
and access a secure website. Students will then be introduced to and explore the
methods used by designers and developers to blend back-end technologies (server-
side) with front-end technologies (client-side). To help ensure that new designers are
able to design and deliver a site that offers an outstanding User Experience (UX)
supported by an innovative User Interface (UI), students will discuss the reasons,
requirements, relationships, capabilities and features of the systems they will be
using. This gives them an opportunity to explore various tools, techniques and
technologies with ‘good design’ principles in order to plan, design and review a
multipage website.
Among the topics included in this unit are: domain structure, domain name systems,
web protocols, database servers, development frameworks, website publishing,
content management, search engine optimisation, web browsers, HTML standards,
CSS and CSS pre-processing (LESS, SASS), presentation models, responsive design,
integrated development environments, user requirements, interface design, user
experience, branding, navigation, optimisation and validation.
On successful completion of the unit, students will be able to explain the server
technologies and management services associated with the hosting and management
of secure websites, categorise website technologies, tools and software used to
develop websites, utilise website technologies, tools and techniques with good design
principles to create a multipage website and create and use a Test Plan to review the
performance and design of a multipage website.
As a result, students will develop skills such as communication literacy, critical
thinking, analysis, reasoning and interpretation, which are crucial for gaining
employment and developing academic competence.
Learning Outcomes
By the end of this unit students will be able to:
LO1 Explain server technologies and management services associated with hosting
and managing websites
LO2 Categorise website technologies, tools and software used to develop websites
LO3 Utilise website technologies, tools and techniques with good design principles to
create a multipage website
LO4 Create and use a Test Plan to review the performance and design of a multipage
website.
Essential Content
Differences between web server hardware, software and host operating systems.
Advantages of an integrated database system with regard to expanding website
capability.
Common web development technologies and frameworks.
Website technologies:
LO4 Create and use a Test Plan to review the performance and design of a
multipage website
Unit level 5
Credit value 30
Introduction
This unit is assessed through a Pearson-set assignment. Students will choose their
own project based on a theme provided by Pearson (this will change annually). The
project must be related to their specialist pathway of study (unless the student is
studying the general computing pathway). This will enable students to explore and
examine a relevant and current topical aspect of computing in the context of a
business environment and their chosen specialist pathway.
The aim of this unit is to give students the opportunity to engage in sustained
research in a specific field of study. Students will be able to demonstrate the capacity
and ability to identify a research theme, to develop research aims, objectives and
outcomes, and to present the outcomes of such research in both written and verbal
formats. Students are encouraged to reflect on their engagement in the research
process, during which recommendations for personal development are key learning
points.
On successful completion of this unit, students will have the confidence to engage in
problem-solving and research activities. Students will have fundamental knowledge
and skills that will enable them to investigate workplace issues and problems,
determine appropriate solutions and present evidence to various stakeholders in an
acceptable and understandable format.
Students will have developed skills such as communication literacy, critical thinking,
analysis, synthesis, reasoning, and interpretation, which are crucial for gaining
employment and developing academic competence.
Learning Outcomes
By the end of this unit students will be able to:
LO1 Examine appropriate research methodologies and approaches as part of the
research process
LO2 Conduct and analyse research relevant to a computing research project
LO3 Communicate the outcomes of a research project to identified stakeholders
LO4 Reflect on the application of research methodologies and concepts.
Essential Content
Literature review:
Research as a process:
Analysing data:
Stakeholders:
Convincing arguments:
Reflective writing:
P4 Apply appropriate
analytical tools, analyse
research findings and
data.
Pass Merit Distinction
LO3 Communicate the outcomes of a research project to
identified stakeholders
P5 Communicate research M3 Analyse the extent to D2 Evaluate outcomes and
outcomes in an which outcomes meet set make valid, justified
appropriate manner for research objectives and recommendations.
the intended audience. communicate judgements
effectively for the intended
audience
LO4 Reflect on the application of research
methodologies and concepts
P6 Discuss the M4 Analyse results in D3 Demonstrate reflection
effectiveness of research recommended actions for and engagement in the
methods applied, for improvements and future resource process, leading
meeting objectives of the research considerations. to recommended actions
computing research for future improvement.
project.
P7 Discuss alternative
research methodologies
and lessons learnt in view
of the outcomes.
Unit 17: Business Process Support
Unit level 5
Credit value 15
Introduction
Data and information are core to any organisation and business process. Accurate
data and meaningful information are of high value to an organisation and are key
drivers for effective decision making and problem solving. Business intelligence relies
on the use of data science, which makes use of a range of tools and methods,
including data mining, data integration, data quality and data warehousing, in
conjunction with other information management systems and applications.
This unit introduces students to a range of tools, techniques and technologies used
for acquiring data and processing it into meaningful information that can be used to
support business functions and processes.
Students will examine how data and information support business processes, the
mechanisms to source and utilise data and turn it in to usable, and valuable,
information output. Students will explore real-world business problems, the
emergence of data science and how the application of data science can be used to
support business processes. Finally, students will demonstrate practical application of
data science techniques to support real-world business problems.
On successful completion of this unit, students will appreciate the importance and
value of data and information in terms of optimising decision making and
performance. By exploring the tools, techniques and systems that support business
processes, students will be aware of the role and contribution of these technologies
and methodologies, and their importance to organisations. As a result, students will
develop skills such as communication literacy, critical thinking, analysis, reasoning and
interpretation, which are crucial for gaining employment and developing academic
competence.
Learning Outcomes
By the end of this unit students will be able to:
LO1 Discuss the use of data and information to support business processes and the
value they have for an identified organisation
LO2 Discuss the implications of the use of data and information to support business
processes in a real-world scenario
LO3 Explore the tools and technologies associated with data science and how it
supports business processes
LO4 Demonstrate the use of data science techniques to make recommendations to
support real-world business problems.
Essential Content
LO1 Discuss the use of data and information to support business processes and
the value they have for an identified organisation
Mechanisms:
Data generation, including human generated, e.g. social media posts, documents
and files, email and text messages, website content.
Machine generated data, e.g. sensor readings, log files, system performance
metrics, transactional data.
Tools to collect, store, manage, analyse and display data and information,
including application software, content management systems, social media
platform analytics tools, databases, scripting languages.
LO2 Discuss the implications of the use of data and information to support
business processes in a real-world scenario
Recognise the social, ethical and professional issues related to the use of data
and information to support business processes, e.g. how data and information is
collected and used, use of cookies and other transactional data, sharing of data,
e.g. between departments, services and organisations.
Legal and regulatory issues related to the use of data and information to support
business processes in reference to current legislation and principles of good
practice, as recommended by computing professional bodies.
Cybersecurity management:
Common threats to data and information, e.g. internal and external threats.
Impact of human behaviour on cyber security, e.g. how motive and opportunity
combine to become a threat.
Concept of ‘secure by design’ when developing and using systems to handle data
and information.
Ways to mitigate common threats to data and information at personal and
organisational level.
Organisational implications of failing to adequately protect data and information,
e.g. legal actions, financial impact, disruption of operations and reduction in
productivity, damage to public image.
LO3 Explore the tools and technologies associated with data science and how it
supports business processes
Explore how the exponential growth of the amount of data generated impacts on
the way data is collected and used.
The core aims of data science, including making data useful and retrievable,
extracting actionable intelligence to improve business performance, automating
extraction and implementation.
Key job roles, including data engineer and data scientist, and how they work with
other members of a team, e.g. senior managers, business and data analysts,
software engineers in change and development lifecycles.
Data-science-related skills, including mathematics and statistics, programming
and scripting skills, investigation and integration of data, core business
knowledge.
Sub-disciplines in the data science field, including data engineering, machine
learning and artificial intelligence.
Using data:
Core data handling techniques and concepts, including input and capture, data
processing and conversion, information output and security considerations.
Forms of data, including unstructured and semi-structured data, and
implications on use and analysis.
Data types, e.g. date, integer, real, character, string, Boolean.
Format of source and target data files, e.g. JSON, fixed-width text file, CSV, ASCII,
XML.
The use of coding and scripting languages to automate data science processes,
e.g. Python, R.
Turning data into usable information, including data mining techniques to find
anomalies, cluster patterns and relationships between data sets, web scraping,
descriptive and predictive analysis, converting data into visual information, e.g.
charts, graphs, histograms, other visual mediums.
Predictive modelling, e.g. forecasting, use of statistical models to predict and
identify trends.
Communicating information effectively to a range of stakeholders.
Solutions:
P1 Discuss how data and M1 Assess the value of D1 Evaluate the wider
information support data and information to implications of using data
business processes and individuals and and information to
the value they have for organisations in relation to support business
organisations. real-world business processes in an identified
processes. organisation.
P2 Discuss how data is
generated and the tools
used to manipulate it to
form meaningful data to
support business
operations.
P4 Describe common
threats to data and how
they can be mitigated at on
a personal and
organisational level.
Pass Merit Distinction
LO3 Explore the tools and technologies associated with
data science and how it supports business processes
P5 Discuss how tools and M3 Assess the benefits of D2 Evaluate the use of
technologies associated using data science to solve data science techniques
with data science are used problems in real-world against user and business
to support business scenarios. requirements of an
processes and inform identified organisation.
decisions.
Unit level 5
Credit value 15
Introduction
LO2 Research design and development tools and methodologies for the creation
of a business application
Unit level 5
Credit value 15
Introduction
Machine learning is the science of getting computers that have the ability to learn
from data or experience to solve a given problem without being explicitly
programmed. It has been around for many years, however it has become one of the
hottest fields of study in the computing sector. Machine learning is in use in several
areas such as predictive modelling, speech recognition, object recognition, computer
vision, anomaly detection, medical diagnosis and prognosis, robot control, time series
forecasting and many more.
This unit introduces students to the basic theory of machine learning, the most
efficient machine learning algorithms and practical implementation of these
algorithms. Students will gain hands-on experience of getting these algorithms to
solve real-world problems.
Topics included in this unit are: the foundations of machine learning, types of learning
problems (classification, regression, clustering etc.), taxonomy of machine learning
algorithms (supervised learning, unsupervised learning, reinforcement learning),
machine learning algorithms (decision tree, naïve Bayes, k-nearest neighbor, support
vector machine etc.).
On successful completion of this unit, students will understand the concept of
machine learning and machine learning algorithms. They will have gained hands-on
experience in implementing algorithms using a programming language such as C/C++,
C#, Java, Python, R, or a machine learning tool such as Weka, KNIME, Microsoft
AzureML. As a result, students will develop skills such as communication literacy,
critical thinking, analysis, reasoning and interpretation, which are crucial for gaining
employment and developing academic competence.
Learning Outcomes
By the end of this unit students will be able to:
LO1 Analyse the theoretical foundation of machine learning to determine how an
intelligent machine works
LO2 Investigate the most popular and efficient machine learning algorithms used in
industry
LO3 Develop a machine learning application using an appropriate programming
language or machine learning tool for solving a real-world problem
LO4 Evaluate the outcome or the result of the application to determine the
effectiveness of the learning algorithm used in the application.
Essential Content
LO2 Investigate the most popular and efficient machine learning algorithms
used in industry
Investigate the machine learning algorithm and demonstrate using the programming
language or a tool:
Problem definition:
Investigate and characterise the problem in order to better understand the goals
of the project.
Data analysis:
Understand the available data (rows, columns, classes data range etc.).
Data preparation:
Separate the data as training sets and testing set in order to better expose the
structure of the prediction to modelling algorithms.
LO4 Evaluate the outcome or the result of the application to determine the
effectiveness of the learning algorithm used in the application
P4 Demonstrate the
efficiency of these
algorithms by
implementing them using
an appropriate
programming language or
machine learning tool.
Pass Merit Distinction
LO3 Develop a machine learning application using an
appropriate programming language or machine learning
tool for solving a real-world problem
P6 Implement a machine
learning solution with a
suitable machine learning
algorithm and
demonstrate the outcome.
Unit level 5
Credit value 15
This unit is aligned to the Microsoft Azure Fundamentals Certification. See section 3.1.4 for
guidance on claiming certification.
Introduction
Cloud computing has revolutionised the way IT services are delivered and has become
an important part of the computing sector. Cloud computing is internet-hosted
computing, which means that it uses the internet to deliver data and other IT services
such as storage, printing, server facilities. In other words, end users and organisations
no longer need to have their own extensive network environment on the premises but
can get the same services provided virtually over the internet.
The fundamental difference between traditional networking and cloud computing is
that the technical details of the system are hidden from the end user. This means the
networking infrastructure does not have to be on the premises as it would be hosted
off-site in the cloud. However, the end user can use the services without the fear of
technical difficulties or disasters as they would be managed by the cloud service
provider. Cloud computing is a natural evolution of networking and is adapting
modern network-oriented technologies such as virtualisation, service-oriented
architecture, utility computing and ubiquitous computing.
This unit is designed to develop understanding of the fundamental concept of cloud
computing, cloud segments and cloud deployment models and the need for cloud
computing. Students will gain appreciation of issues associated with managing cloud
service architecture and develop a critical awareness of cloud-computing-based
projects. Topics included in the unit are the paradigms of networking, fundamentals
of cloud computing, cloud computing architecture, deployment models, service
models, security, technological drivers and cloud service providers.
On successful completion of this unit, students will understand the concept, architecture
and services of cloud computing. They will have hands-on experience of configuring a
cloud service from major providers such as ECM, Google, Amazon, Microsoft and IBM
and of implementing a simple cloud platform using open source software with an
appropriate networking platform. As a result, students will develop skills such as
communication literacy, critical thinking, analysis, reasoning and interpretation, which are
crucial for gaining employment and developing academic competence.
Learning Outcomes
By the end of this unit students will be able to:
LO1 Demonstrate an understanding of the fundamentals of cloud computing and its
architectures
LO2 Evaluate the deployment models, service models and technological drivers of
cloud computing and validate their use
LO3 Develop cloud computing solutions using service provider frameworks and open
source tools
LO4 Analyse the technical challenges for cloud applications and assess their risks.
Essential Content
Networking paradigm:
LO2 Evaluate the deployment models, service models and technological drivers
of cloud computing and validate their use
Deployment models:
Service models:
LO3 Develop cloud computing solutions using service provider frameworks and
open source tools
Open source:
Open source tools for IaaS, open source tools for PaaS, open source tools for
SaaS, distributed computing tools, e.g. Cassandra, Hadoop, MongoDB, NGrid,
Ganglia.
LO4 Analyse the technical challenges for cloud applications and assess their
risks
Security aspects:
Platform-related security:
SaaS Security issues, PaaS Security Issues, IaaS Security Issues, Audit and
Compliance.
Describe CSP security features, e.g. Azure Security Centre, Key Vault, AWS
GuardDuty, Azure Sentinel, Dedicated Hosts, Network Security Groups (NSG),
DDoS protection.
Learning Outcomes and Assessment Criteria
P2 Design an appropriate
architectural cloud
computing framework for
a given scenario.
Unit level 5
Credit value 15
Introduction
‘Who is accessing my network?’ ‘A bank was hacked last week, did you hear about
that?’ ‘Last night l blocked my neighbours from accessing their internet because they
did not have a Wireless Equivalent Protection (WEP) or WPA (Wi-Fi Protected Access)
key on their wireless.’ It is estimated that network security (NS) breaches occur every
second worldwide, from small home networks to massive corporate networks. The
cost to businesses is in billions, if not trillions. There are several methods, techniques
and procedures that need to be implemented on a network in order for it to be
‘secure’. Sometimes basic procedures such as locking your network room, changing
your password regularly, and putting a password on all your network devices, are all
that is needed to achieve some basic network security.
This unit introduces students to the fundamental principles of network security
practices. As systems administration and management are important tasks in the day-
to-day functioning and security of information systems, poor or improper practices
can lead to loss of data, its integrity, performance reductions, security breaches and
total system failure. Special planning and provision need to be made for ongoing
support of systems and networks, which account for a significant proportion of the IT
budget. With the widespread use of computers and the internet for business
customers and home consumers, the topic of security continues to be a source for
considerable concern.
Among the topics included in this unit are: historical network security principles and
associated aspects such as firewalls, routers, switches, MD5, SSL, VPN, AES, SHA-1/2,
RSA, DES, 3DES; different types of public and private key cryptography such as Caesar
cipher, IPsec; types of attacks that can be carried out on a network and methods of
preventing attacks such as man-in-the-middle (MITM) (eavesdropping), Denial of
Service (DoS), Distributed Denial of Service (DDoS) (ping); certificate authority (CA);
‘The Cloud’ security aspects and associated counter-measures such public cloud,
private cloud, hybrid cloud, community cloud, Platform-as-a-Service (PaaS),
Infrastructure-as-a-Service (IaaS), phishing, spoofing, DNS attack, SQL injection, Media
Access Control (MAC) address spoofing/control. Firewalls and other Gateways can be
used as a tool for Intrusion Detection and Prevention as they can be situated on the
perimeter of the Network to provide security.
On successful completion of this unit, students will be able to confidently discuss
several types of network security measures and associated protocols, and
cryptographic types and configuration settings of network security environments.
They will also be able to test the security of a given network to identify and fix
vulnerabilities. As a result, they will develop skills such as communication literacy,
critical thinking, analysis, reasoning and interpretation, which are crucial for gaining
employment and developing academic competence.
Learning Outcomes
By the end of this unit students will be able to:
LO1 Examine network security principles, protocols and standards
LO2 Design a secure network for a corporate environment
LO3 Configure network security measures for the corporate environment
LO4 Undertake the testing of a network using a Test Plan.
Essential Content
Network protocols:
Planning a network:
Considerations must be thought through on what the network will be used for
(purpose).
Backup, recovery and business continuity requirements.
Compliance with legislative and regulatory requirements.
Hardware and software considerations:
Size considerations:
Consideration of the size and distance between nodes on the network, use of
public, private or hybrid connections between sites, who has access to the
network, how connections are secured.
Select the appropriate tools and comply with organisational policies and
processes when configuring and upgrading systems.
Configure network security measures such as firewalls, routers, switches,
gateways, SSL, IPSec, HTTPs, FTPs, passwords and back-up devices.
Cybersecurity:
Explain the different threats posed to networks, e.g. malware and phishing,
ransomware.
Identify different types of attacks on computer systems, illustrate the potential
impact of different attacks.
Discuss ways in which system users affect system vulnerability and potential
physical vulnerabilities to systems, data and information.
Testing methods:
Tests should be carried out on all devices including firewall, servers, domain
controllers, email servers, routers, switches, gateways and passwords.
Make recommendations:
Unit level 5
Credit value 15
Introduction
Customer expectations:
Raised expectations for a quick and efficient service, e.g. timely responses to
customer communications, quick delivery of the product or service, accurate
information, reduced pricing for the product/service, greater choice.
Benefits:
Wider market, niche target marketing, lower overheads and costs, greater
flexibility and access to goods and services 24/7.
Drawbacks:
Visibility, security issues and threats, down-time, high se- up and maintenance
costs, need to employ a technician or web-based administrator to manage the
provision.
Web architecture:
Web servers, browsers, server software, web authoring tools, database system,
shopping cart software, scripting software, browser and platform compatibility.
networking technology, e.g. TCP/IP, addresses, ports and protocols; domain
names, multiple registration of domains (.com as well as .co.uk); setting up the
server directory structure, deploying access configuration/security.
Database technology:
Uses, e.g. email support, forum; search engine optimisation; additional hardware
and software components required to support communications.
Data transmission:
Features e.g. download speeds, transfer rates, bandwidth required for given
applications, including text, graphics, video, speech.
Considerations:
Hardware and software, design and development, costs and resources, security,
maintenance, customer online support and logistics.
Internet strategy:
Marketing strategy:
Electronic payment:
Methods, e.g. online transaction processing, Commercial Off the Shelf Software
(COTS), other payment systems, e.g. PayPal, WorldPay.
LO4 Implement an E-Commerce strategy based on a given end-user requirement
or specification
Implementation:
Evaluation:
Technique:
P3 Discuss the types of M3 Analyse the factors and D3 Appraise the design and
strategies that could be resources that should be functionality of the
used to drive an considered when designing E-Commerce solution.
E-Commerce solution. an E-Commerce strategy.
Butwal Campus
Janakinagar, Butwal
071 437238
1.2 Helpful Contacts
Admission
[email protected] Library Services
[email protected]
Student Service
[email protected] IT Services
[email protected]
Student Finance/Account
[email protected] Academic & Assignment Support
[email protected]
Counselling
[email protected] Scholarships
[email protected]
Operation
[email protected]
This policy applies to students in the BSc.IT, BBA, and BHM programmes. You
should comply with any other published Policies, Code or Procedures that are
designed to ensure the effective operation of the ISMT College. Student should
make themselves familiar with the policies:
Kathmandu Campus
1.6 On Campus and regulation
Upon enrolment student will be issued with an ISMT Student ID card. Keeping
student safe is our responsibility; please help us by wearing Student ID card at
all times while in college premises. Student must show ID card upon asked by
Security Officer or College Staff.
If you lose your Student ID card, visit our student service for instructions on how
to get a replacement. You can also contact student service by email. ID card
must be used by the student they belong to. For security reason, student must
not offer or allow another person to use their ID card. Failure to comply the
policy will lead to strict disciplinary action.
1.6.3 Attendance
Students are subject to the Attendance Policy in force for the relevant academic
year. It is the responsibility of students to complete each stage of their studies
successfully, understanding that attendance is necessary to enhance their
educational development.
Students must aim for 100% attendance for all activities relating to their
programme, and a minimum of 80% attendance is required. The College
understands that unavoidable reasons for absence, like illness, may exist.
Nevertheless, a minimum of 80% attendance is required for all scheduled
lectures and seminars to either pass or receive credit for each module.
(For additional information, see the Attendance Policy and Procedure)
1.6.4 Updating Information
Module study guides are available online; you can contact your program leader
or Assignment and Exam Department for e-Copy. Students should read them as
it helps them to understand their course requirements.
Your course handbook provides all the essential information about your course,
skills you develop and career opportunities. You can also find information about
your Program Head and Module Leaders. If you encountered issues that you
can’t hand your work in on time, Module Leader should be the first person you
contact.
(For additional information, see the Program Specification Handbook)
The Academic Regulations are the framework that governs our courses. They set
out how we assess your assignment, how you can progress through your course
and how we calculate your final grades.
(For additional information, see the Pearson BTEC HND Handbook)
Assessments are important at ISMT College, they measure how much you have
learned and skills you have developed. Modules consist of formative assessment
and summative assessments. Formative assessments are important in helping
you to understand how you can improve and what you need to do to get good
grades in your summative assessments.
We offer various Academic Workshops to help you develop industry relevant
skills. Workshops related to your course, Professional development, and
Employability.
If there’s anything you don’t understand or you think you need additional
support, reach out to you Module Leaders or Program Head. You should discuss
your feedback with Module Leader and take actions to improve your weakness.
Apart from that, if you are struggling with emotional or mental health, ISMT
Counselling is here for you. They offer various guidance and support for
student’s wellbeing. Our team provides safe and confidential space for you to
talk about anything you would like to share or discuss.
Email us at: [email protected].
2.5 Assessments
Assessments are split into two main types: Coursework and Exams.
Coursework includes:
• Written Assignments (E.g. Report, Literature Review, Critical Reviews,
Reflection, Research Proposal, Web-based exercise,
Statistical/mathematical Solutions, Class Test, etc)
• Oral Assignment (E.g. Viva, Presentation and Performances)
• Artefacts (E.g. single piece of work – Website, Software, Audio/Visual
Compositions, or Culinary output)
• Practical (E.g. Lab-based)
Academic integrity means that the work submitted by you is your own work; it
should be correctly and completely referenced following the ethical guidelines.
Any attempt to present someone else work as your own (plagiarism), to cheat to
obtain advantage is known as Academic Misconduct. This can have severe
consequences for your studies and may result in academic disciplinary actions
being taken.
Plagiarism is attempting to pass off other people’s work and ideas as your
own.
Plagiarism can include:
• copying from another learner copying from books or the internet
• paraphrasing
• subcontracting the work to someone else
• submitting the same piece of work for two different purposes
(For additional information, see the Assessment Policy and Procedure, Academic
Misconduct Policy and Procedure)
Turnitin is a service that matches text and checks originality from student
assignments against its database of previously submitted coursework,
research papers and other online sources. ISMT recommends that student
must submit their work to check the originality and prevent plagiarism.
(See also, BTEC Plagiarism Factsheets, Malpractice and Plagiarism)
Referencing is acknowledging the sources of information that you have used to write your
assignment. In academic work, student must use existing knowledge of others to backup
and provide evidence for your claims and arguments. Books, journals both printed and
online, newspaper, publications, websites, etc. are the sources of information you may use.
You must use standard system of referencing developed by American Psychological
Association (APA) adopted by the ISMT College.
(For additional information, see ISMT APA Guidelines)
Students must plan their work so that assignments are submitted by the specified date.
This will be clearly indicated by the class tutor. Extensions will only be granted where the
student’s work has been interrupted by substantial adverse circumstances (such as illness).
Such extensions can only be granted by the Courses Coordinator. In the case of a dispute,
the issue will be referred to the Head of the department.
2.7 Examination
Student must familiarise themselves with the relevant information of examination. There are
two assessments scheduled – Midterm and End-of-module. Depending upon the subjects
requirements assessment tasks are formal written, oral, or computer-based examinations, and
any other assessment tasks (which may be tutor-marked or computer-marked tasks) that are
approved as the examinable assessment component.
Student will be informed of the date, time, and location of the examination, given full
information about how an examination will be held.
ISMT College take very seriously any form of misconduct or other forms of unfair means.
(For additional information, see the Assessment Policy and Procedure, Academic Misconduct
Policy and Procedure)
Here are few quick dos and don’ts:
Do: Don’t:
• Do check your exam timetable • Don’t cheat or have any written
carefully and regularly, to make material or devices on you which
sure you know the time and could be used to cheat, such as
location of the exam, and that your mobile phone
nothing’s changed. • Don’t have anything on your
• Do bring your Student ID card, desk except your exam papers,
and keep it on your desk during stationery, Student ID card,
the exam watch, and bottle of water.
• Do listen to and follow all • Don’t talk or communicate in
instructions from invigilators, any way with another student
examination office staff, or once you’re under exam
security staff conditions
If you miss an exam, or have to leave during an exam due to illness, you must inform Exam
Department immediately. In case of illness, you have to provide medical certificate.
It is never too early to develop start planning your career plans. Our friendly and professional
teams are here to help you as well as guide you in career support, with all the aspects of
professional development. Producing CV, interviews tips, and filling up application forms. Our
service is for all our students, we offer a welcoming, supportive and confidential environment
in which you can discuss your career options, identify skills and abilities.
We host number of career and placement seminars with our partner companies throughout the
year.