EST Content

1.0 the concept of project management, including:

1.1 planning
1.2 scheduling
1.3 budgeting
1.4 tracking

1.1 planning

1.2 scheduling

Scheduling is to ensure that a project is completed on-time as a result of the necessary resources being available when and where they are needed. (The student needs to articulate the role/purpose of scheduling to be on identifying tasks and attaching times/sequencing to these tasks.)
#EST 2020 Qu1

1.3 budgeting

Budgeting is to ensure that project activities are planned and monitored to remain within available resources. Typically only considered with respect to money, but other physical/plant, virtual and human resources are finite and their requirements need to be quantified, whether there is an associated $ cost or not.
#EST 2020 Qu1

1.4 tracking

Tracking consists of those processes performed to follow project execution so that potential
problems can be identified in a timely manner and corrective action can be taken, when necessary, to control the execution of the project.
#EST 2020 Qu1

1.5 computer system hardware and software


1.6 the concept of boot process

The purpose of the boot process is to test the functionality of hardware prior to loading the computer operating system.
#EST 2019 Qu 2

Steps in the Boot Process
– As soon as the computer is turned on, the basic input-output system (BIOS) on the system’s read-only memory (ROM) chip is switched on
– The boot process is where a computer loads the operating system into the RAM. It commences with a series of hardware tests, identifies the boot devices then reads the data into the primary memory
#EST 2019 Qu2

Explain the concept of boot process.
– The computer performs a power on test (POST).
– The BIOS accesses the boot disk (HDD or SDD) with OS
– BIOS loads bootstrap loader from ROM into RAM
– BIOS passes on work to boot loader and begins launching the OS.
#EST 2021 Qu4a

1.7 storage capacities, including

1.7.1. bit
1.7.2. byte
1.7.3. kilobyte
1.7.4. megabyte
1.7.5. gigabyte
1.7.6. terabyte

1.10 functions of the components of the central processing unit (CPU):

1.10.1 arithmetic logic unit (ALU)
1.10.2 control unit (CU)
1.10.3 registers
1.10.4 program counter
1.10.5 system clock

1.10.1 arithmetic logic unit (ALU)

Arithmetic logic unit (ALU)
The ALU performs the arithmetic and logical functions that are required to complete processing tasks.
#EST 2023 Qu1

ALU:
– The arithmetic logic unit (ALU) contains the electronic circuitry that executes all arithmetic and logical operations.
– The arithmetic logic unit can perform four kinds of arithmetic operations, or mathematical calculations: addition, subtraction, multiplication and division. As its name implies, the arithmetic logic unit also performs logical operations.
#EST 2021 Qu1

1.10.2 control unit (CU)

Control unit (CU)
The control unit directs the operation of the processor and decodes instructions.
#EST 2023 Qu1

Control unit:
The control unit of the CPU contains circuitry that uses electrical signals to direct the entire computer system to carry out, or execute, stored program instructions. The control unit does not execute program instructions; rather, it directs other parts of the system to do so. The control unit must communicate with both the arithmetic logic unit and memory.
#EST 2021 Qu1

1.10.3 registers

Registers
These are small parts of the computer’s memory that is used to store the instructions temporarily in order to transfer data to other components of the processor.
#EST 2023 Qu1

Registers:
Register is a small amount of storage available as part of a central processing unit (CPU) or other digital processor.
#EST 2021 Qu1

1.10.4 program counter

Program counter
The program counter is a register that contains the address or location of the instructions being executed at the current time.
#EST 2023 Qu1

1.10.5 system clock

System clock
The system clock controls the timing and speed of the functions of different components of the CPU.
#EST 2023 Qu1

1.11 the concept of the fetch-execute cycle

The fetch-execute cycle has four major steps
FETCH: The next instruction is fetched from the memory address that is currently stored in the Program counter (PC) and stored in the Instruction register (IR). At the end of the fetch operation, the PC points to the next instruction that will be read at the next cycle.
DECODE: The decoder interprets the instruction. During this cycle the instruction inside the IR gets decoded.
EXECUTE: The CU passes the decoded information as a sequence of control signals to the relevant function units of the CPU to perform the actions required by the instruction such as reading values from registers, passing them to the ALU to perform mathematical or logic functions on them.
STORE: The result is written back to registers or memory.
#EST 2021 Qu1

Outline how the fetch-execute cycle works
The fetch-execute cycle is the basic operation/instruction cycle of a CPU. It involves fetching and storing data from RAM, executing and decoding data in the CPU.
#EST 2023 Qu1b

2.3 data protection methods, including:

2.3.1 encryption
2.3.2 authentication
2.3.2.1 passwords
2.3.2.2 biometric
2.3.2.3 digital signature

Describe a data protection method the bank can use to protect a customer’s credit card
data when digitally transferring payment.
Encryption:
– All sensitive data should be encrypted to make sure that, even if intercepted, the details are unreadable.
– This is done by using a mathematical key/formula that is used to change the plain text of the message into cypher text.
#EST 2023 Qu3b

2.3.1 encryption

Describe the role of encryption in data protection.
Encryption is used to deter malicious parties from accessing sensitive data. It protects data confidentially when stored on computer system and when transmitted across computer networks.
#EST 2022 Qu1c

2.3.2 authentication

 identify one method of authentication that can be used by the bank.
Users will need to authenticate themselves to the bank based on at least one matching pair of credentials e.g. user name & password, account number & PIN etc.
#EST 2023 Qu3c

2.3.2.1 passwords

Two ways passwords assist to ensure data is protected
Passwords can be secure, because only the correct user knows it.
Passwords can be changed regularly to reduce opportunity for guessing and phishing
#EST 2022 Qu1a

2.3.2.2 biometric

2.3.2.3 digital signature

2.5 database terms, including:

2.5.1 data, field and record
2.5.2 data integrity
2.5.3 data redundancy

2.5.1 data, field and record

2.5.2 data integrity

2.5.3 data redundancy

2.12 create a working single table database which includes:

2.12.1 data types
2.12.2 primary keys
2.12.5 queries

2.12.1 data types

2.12.2 primary keys

2.12.5 queries