Applied Computing Unit 2
There are no prerequisites for this unit.
In this unit, students focus on developing innovative solutions to needs or opportunities that they have identified, and propose strategies for reducing security risks to data and information in a networked environment.
Areas of Study
In this area of study, students work collaboratively to develop an innovative solution to an identified need or opportunity. They apply all stages of the problem-solving methodology to investigate the use of digital devices and emerging technologies and their applications. The innovative solution may take the form of a proof of concept, prototype or product.
Software: any tool students can use to create their proof of concept, prototype or product.
In this area of study, students investigate how networks enable data and information to be exchanged locally and globally. Students examine the hardware and software components and procedures required to connect and maintain wired, wireless and mobile communications technology. They apply this knowledge to design a Local Area Network (LAN), describe its components and explain the transmission of data and information in this network.
Students also develop an understanding of cybersecurity issues when they investigate the threats, vulnerabilities and risks to data and information stored within and transmitted across networks, and propose strategies for reducing security risks.
Software: tools to create network diagrams and to investigate the operations of a network.
|Identify a need or opportunity that can be met with an innovative digital technology. Apply the stages of the problem-solving methodology to investigate the use of such technology to respond to the identified need or opportunity.
||Create a proof of concept, prototype or product using the selected digital technology, and explain how it meets the identified need or opportunity.
|Design a network with wireless capability that meets an identified need. Explain its configuration and predict benefits for intended users. Explain potential security risks and formulate strategies to prevent and respond to such risks.
Design a network solution, including a diagram, that meets an identified need.
Create a written analysis of the risks and benefits inherent to the network solution.
|Apply problem-solving methodology to create a solution using database management software, and explain the personal benefits and risks of interacting with a database.
||Create a solution using database management software, and explain the personal benefits and risks of interacting with a database.
Overall Final Assessment
End of Semester Examination – 1.5 hours.
Information can be obtained from the Victorian Curriculum and Assessment Authority, Victoria, Australia: www.vcaa.vic.edu.au