CSC AL Guide Final
CSC AL Guide Final
Teacher’s Guide
to the
High School Computer Science Syllabus
This Computer Science (CS) teaching syllabus for High Schools is a two-year
rigorous, University entry-level preparatory curriculum that builds Advanced Level
learners with broad foundations in the field of Computer Science. It covers a wide range
of fundamental topics including Data Structures and Algorithm Design, Programming,
Information Systems, Computer Organization and Networks, Digital Privacy and
Security, and the Societal impacts of computing.
The total learning time for all the modules on this High School Computer
Science teaching syllabus is 426 periods, with 224 periods for the Lower Sixth (First
Year) course work and 192 periods for the Upper Sixth (Second Year) course work. A
period here refers to the teaching time scheduled on the school timetable and it ranges
from 50 to 60 minutes. The way that this time is spent will reflect the subject matter of
each module. In this regard, the average total teaching time is eight periods per school-
week, with six periods for theory and two periods for practical work. Also, the judicious
use of internet and laboratory facilities and overhead projectors would greatly enhance
the quality and effectiveness of teaching periods.
The following Table summarizes the teaching load of High School Computer Science:
LOWER SIXTH
04 04 224 05
(First Year)
UPPER SIXTH
04 04 192 05
(Second Year)
o Learners willing to study this high school Computer Science course require no
specific or formal qualification in Computer Science but must have Ordinary
Level Mathematics and should have an understanding of civic education and a
disposition for skills acquisition and responsible social behaviour. Basic
computer literacy skills are an advantage.
o Learners should have a mastery of English Language at least the Ordinary Level
and demonstrate a working knowledge of it.
2.3 MODULES
Module V: PROGRAMMING 40
Each module is presented as a table having three main columns with nine sub-headings
among them. This structure is intended to give teachers an orientation on how to exploit
the module entries and subsequently prepare lessons. The terminology used for the
column headings is contextual and non-standard and so the following definitions and
clarifications are significant.
III. RESOURCES: Resources refer to the cognitive and material requirements that
ensure a successful lesson. This column has five sub-headings:
• Core knowledge: These are expressions and concepts that learners should be
able to define and comprehend in an effective lesson.
• Skills: These are indicators of competencies/skills that the learner should
demonstrate in class/team during a lesson, or out of class as the context may
demand.
• Attitudes: These are the behavioural responses the learner develops and
demonstrates competence in during and after the lesson. It is inherent in the
learner so that the learner attains performance requisite levels in the learning
process.
• Other Resources: These are material resources to be used by the teacher or
learner and are required to facilitate the teaching/learning process. They are
mostly standard teaching aids black-/white- board, overhead projectors and
computers.
• Duration: This is the expected duration, typically divided into periods, in which
the associated material should be formally taught or learned.
4 METHODOLOGY
4.1 METHODS OF TEACHING COMPUTER SCIENCE
4.1.3 EXPOSITORY
In this method, the teacher presents the contents of a structured lesson to
the learners in the form of an exposé. In the context of CBA, this method is only
recommended when the teacher is presenting external resources necessary for the
acquisition of a competence, such as when explaining or defining a new concept.
4.1.4 DEMONSTRATIVE
In the demonstrative method, the teacher leads learners to do (demonstrate,
experiment or formulate) something by demonstrating it, and then he/she guides the
learner to do same, while evaluating the degree of learner comprehension.
4.1.5 INTERROGATIVE
In this method, the learner is assumed to have some knowledge on what is
to be acquired, or an idea of its contents. Through appropriate questioning by the
teacher, the learner constructs his own knowledge based on his/her own understanding
of the situation and his/her attempts to link ideas and make some sense out of them.
This method is often used when the teacher seeks to determine the level of knowledge in
learners.
4.1.6 DISCOVERY
With the discovery method, the teacher creates a pedagogic scenario and
uses appropriate materials to allow the learners use trial and error methods for learning.
The teacher makes use of his personal experience or those of the learners to solve a
given problem, using the means available. Intra-cognitive and collaborative work here
are highly utilised. This method must be used with care given that it is expensive and
time consuming.
4.2 PHASES IN LESSON DELIVERY
All teaching and learning activities are done in three essential phases:
planning, execution and follow-up/evaluation.
4.2.1 THE PLANING PHASE
The planning phase consists of putting in place preparatory materials for
teaching and learning activities, acquiring didactic resources, and identifying how
evaluation would be done. The planning phase provides foresight into how the lesson
would look like. Planning also helps him/her to save time and energy, avoid redundant
work, and enhance the presentation quality of the lesson. During the planning phase, all
the actions of the teaching and learning processes are previewed to ensure that they
develop competencies in the learner. To achieve this, we focus on three elements:
• Essential components of the CBA: knowledge, skill and attitude;
• Integration activities; and
• Evaluation (which is usually formative).
The role of the teacher is to create the learning requirements, situations and
environments that favor the development of the competency in view. These activities
take into consideration the individual characteristics of the learner such as fast learner,
slow learner, physically challenged, impaired, etc. The teacher should prepare lessons
following the recommendations in the CBA concept.
The teacher follows up learner activities, provides guidance and corrects
work-in-progress. The teacher is also required to end every lesson or a group of lessons
with assignments that consist of tasks or mini-projects that provide the opportunity for
learners to develop their skills in problem solving. Requirements for mini-projects may
span modules, and so their correct teaching order and methods must be ascertained.
The teacher is expected to obtain and use appropriate material from sources
which will facilitate the development of the desired competency in the learner. The use
of projectors and multimedia platforms in the display of information is strongly
recommended. These materials help secure learner attention as well as facilitate
teaching.
Learners are introduced problems from real life whose solutions require
that they exhibit creative, innovative and entrepreneurial abilities. With the teacher’s
guidance, the learner acquires the necessary ingredients needed to exercise the expected
competency. The learner spends time carrying out research on projects given out by the
teacher.
6 ASSESSMENT
Honour Needs
Remark Excellent Good Satisfactory Failed Ungraded
Roll improvement
% Score 90 to 100 80 to 89 70 to 79 60 to 69 50 to 59 40 to 49
< 40
Grade A B C D E F U
7 SYLLABUS OUTLINES
Description of Computer Describe types of Input devices; Compare characteristics: Learners should be
system computers; Processing devices; size, processing taught how to effectively
Identify input & output Output devices; capabilities, price. of connect a computer
devices; Storage devices; computers; system and the
Describe how a Peripheral devices Connect correctly input, computing devices should
computer system processing and output be taught equally to them
functions; devices;
Manipulate input and Power a computer (soft
output devices. and warm booting);
Transfer data/information
to peripheral devices;
transfer data/information
from Peripheral devices;
Enter information into
computer system;
Print a document
Management of Explain the role of OS in Process • Describe how the file directory is The learners are
processes in a process management Sharing of processor: organised (single level, two level, supposed to know just
computer. Explain concepts in process Multi-tasking tree structure directories) the concepts
management Multi-programming • Determine ratings of file access
Describe scheduling Process creation methods
strategies used by the OS to and termination • Outline file attributes
manage processes. Concurrent • Outline OS operations on a file
processes; • Differentiate Sequential Access
Race condition; and direct access
Mutual exclusion; Compare file systems.
Deadlock;
Deadlock detection
and resolution
strategies
Context switching.
Scheduling
strategies:
Notion of burst time
pre-emptive
notion of quantum
time,
Round Robin
Priority
Shortest Remaining
Time Next.
non pre-emptive
First Come First
Served,
Shortest Job First,
Gantt chart
representation of
process scheduling.
Specific objectives: On completion of this module, students should have the opportunity to:
a) Appreciate the need for data communication networks.
b) Identify the different equipment and components used.
c) Know all transmission modes, and media.
d) Describe the various network communications standards
e) Recognize the need for communication Protocols.
f) Understand modulation and multiplexing.
g) Explain the concepts of computer Networks and Topology.
h) Understand network implementation and security.
• recall types of network • Types of network • Choose appropriate Better ways or best route
(LAN, MAN, WAN) (LAN, MAN, WAN); type of network for a of connecting network
• Describe types of • Components of a given context; should be examined.
network connections network; • outline network
Compare physical
(point to point, • Network topology; software;
topology apart from Commented [elyse ple3]: compare physical topology with
multipoint, …) • Network operating • Compare, network
logical topology logical....
Exploration of computer • Explain features of system; topologies based on
network platform network operating Network architecture. characteristics like:
systems (multitasking, robustness, scalability
multi-user) …
• Describe network • Select suitable
architectures. physical and logical
topologies;
Differentiate types of
network architectures.
• Explain how network • Network devices; • Select and connect the You should have an
devices function • Transmission hardware components open mind when
(MODEM, repeaters, mediums; of a network; cables, teaching this section as
switches, bridges, • network configuration; switch, router, modem; technology evolved
routers, and gateways • Mobile technology; • Compare transmission frequently.
… ); Network mediums based on
Explanation should be
• Describe transmission troubleshooting. characteristics (data
given how equipment
mediums (cables and rate, transmission
function individually as
wireless); distance, ease of
well as collectively
• Configure the installation …);
Setting up a computer
operating system for • Explain the difference Also insist on the
network
network; between wired and specification of
Explain how mobile wireless transmission; addresses, as well as
communication • Outline errors that may some errors that may
technology work. occur in a network; occurred.
• Set up a network;
• Configure an operating
system for networking;
Troubleshoot a
network.
• Explain data security; • data security, privacy • Explain concepts The importance of
• Describe safety and integrity; related to data security plagiarism should be
principles in protecting • Protect network, (privacy, integrity, …); mentioned to the learner.
data and network from computer and data • Explain how backup
Practical lessons should
malware; from viruses, spyware ensures data security;
be conducted at this
• Use antivirus to unauthorized access • Explain in a report
level to illustrate security
protect computer ... technique used to fight
measures to learners.
network from virus, • Data backup; plagiarism;
Trojan horse, worm ; • Firewall; • Apply safety principles
• describe different • Data encryption; in protecting data and
types of error • Malware; network from malware
detecting code (parity Plagiarism. (scan every incoming
bits, hamming codes, document/program
cyclic redundancy before opening or
Data security, privacy checks/check sum ); running, …);
and integrity • Explain measures • Scan a computer
used to protect system using an
computers and antivirus;
networks from • Set up a firewall and
intruders and natural web filtering using an
disaster (username antivirus;
and password, • Save data on cloud
firewall, data storage systems
encryption, backup, (Google drive, …).
…);
Recognize ownership
of digital information
and guard against
digital theft and
plagiarism.
• Describe different • Standards and • Produce a report The OSI model should
network standards, protocols; comparing the OSI be well elaborated
Networking standards and TCP reference
and protocols; • The OSI reference Ask learners to produce
and protocols. models;
Explain the OSI model; a report here to show the
reference model. Internet protocols. Discuss internet other aspects of the
protocols (TCP, UDP, various protocols used in
IP, FTP …) (essay). the OSI model
• Describe the history of • history of the Internet; • Explain in a report Emphasis should be
the internet; • Notions of: Internet major events in the made known to the
• Explain the concepts Intranet and extranet; history of the internet; learners that everything
intranet, extranet and • Internet services; • Select suitable that is done or work
Internet; • Safety and security hardware and carried out online is
• Describe services risks in participating software needed for businesses
available on the online; access to internet
Internet (e-commerce, connectivity;
e-learning, e-banking • Access a website
…); using a browser;
• Exchange information • Select appropriate
using email; internet service for a
• Use search engines; given context;
• Doing business online; • Manage bookmarks
• Change privacy using a browser;
settings. • Send and receive e-
Using the Internet
mail;
• Apply for a job online;
• Apply for scholarship;
• ensure privacy;
• Search information on
the internet using a
search engine;
• assess online
information for
relevance, bias,
validity, reliability and
sufficiency;
Download from the
internet (images, files,
software, and drivers).
Specific objectives: On completion of this module, students should have the opportunity to:
Distinguish the various • Character; • Outline examples of a Specify the types of data
data types. • Integer; given data type; type.
• Real or float; • Calculate memory
• Boolean; allocated to each data
Simple data types
Representation of each type;
data type in a Declare variables using a
programming language. programming language
syntax.
Specific objectives: On completion of this module, students should have the opportunity to:
Technical requirements
should be emphasis as
the elements needed to
develop software
• Identify stages in
• Identify components of software design
• Data types and data
a software to be (interface, architectural
structures design;
Design process in designed; and detailed design); Implementation
• Architectural design;
software • Explain design Produce design strategies were replaced
• Interface design;
elements; document. with specify design
• test data;
Specify design elements. This concept
Algorithm design; Commented [elyse ple4]: this concept should be well
elements. should be explained well explained
a) Work in a team to integrate and apply the learning outcomes from the modules to the
later stages of a sustained project.
b) Develop a small computer related business from the point of starting-up to running it.
• Study IT success
stories (Nji Collins,
Arthur Zang, Mark Success stories of
Zuckerberg, Bill prominent IT
• Identify businesses personalities should be
Gates, Steve Jobs,
related to basic • Business world presented to learners
Starting a business Jack Mah, )
skills • E-commerce like Bill Gates and the
• Study IT success
Explain customer rest. Learners should be
stories (Google,
needs asked to investigate
Apple, Amazon)
about the success
Detect community needs
stories of this prominent
that can be solved with
IT personalities
IT.
Specific objectives: On completion of this module, students should have the opportunity to:
a) Demonstrate knowledge and understanding of main aspects of Information Systems.
b) Demonstrate an understanding of the components of an information system and the links between
them.
c) Introducing data flow diagrams and their use in the description of an information system.
d) Understand the need for designing user interfaces, and becoming familiar with design principles.
Category of actions Examples of actions Core knowledge Skills Explanatory Notes
Setting up an IS in an
institution like a school
should be specific.
Learners could be
asked to put in place an
IS for a school library
only, or for processing
marks. It should just be
an aspect and not a
complete IS for the
whole school. Teachers
should download
“ARCMAP”
Specific objectives: On completion of this module, students should have the opportunity to:
a) Describe the nature and purpose of database models and how they are used;
b) Describe the functions of the tools readily available in database packages;
c) Appreciate the advantages of relational database systems over traditional file systems;
d) Understand how a relational database is designed, created, used, and maintained;
e) Describe the components of a database management system;
f) Describe the different types of database organizations;
g) Distinguish between shared and distributed databases;
h) Describe some ways databases are used on the Web.
MODULE 11:
Specific objectives:
On completion of this module, students should have the opportunity to:
a) Use a variety of problem-solving strategies to solve different types of problems
independently and as part of a team;
b) Develop Algorithmic thinking skills, and Design algorithms according to specifications;
c) Design software solutions to meet a variety of challenges;
d) Apply a software development life-cycle model to a software development project.
e) Show understanding of how testing can expose possible errors (syntax
errors, logic errors and run-time errors) and error detection in the development of a system.
• Explain the
concept of
• Solve a given problem algorithm; This module is
in well-defined steps; supposed to be taught
• Enumerate
• Demonstrate mastery in a way that learners
examples of
in solving a problem by carry out projects.
problems solved by
solving its constituent • Algorithm. divide conquer;
parts; • Algorithms Development • Write simple
• Explain models used in Techniques algorithms;
Problem-solving
solving computing (Divide and Conquer or • Describe
strategies
problems (divide and Stepwise refinement, approaches to
conquer, stepwise Incremental, design algorithms
refinement, Parallelism). (top-down and
incremental, …); bottom-up design);
• Use models to solve a • Resolve a problem
problem. using problem
solving models.