Testing Schedule Chap No Test No Topics Problem Solving (Steps defining a Problem, Understanding a problem, Planning a Solution, Defining Candid Solution, Selecting Best Solution), Flowcharts (Definition, Importance of 1 Flowcharts in Problem Solving, Determining Requirements for a flowchart, Flowchart symbol 1 and Example ) Problem Algorithm (Definition, Role of Algorithms, Formulation of an algorithms, Examples, Efficiency of Solving 2 Algorithms, Deference between Algorithm & Flowchart), Test Data (Importance of Test Data, Types of Test Data) Verification & Validation, Identification & Correction of an Errors(Trace Table, Using Invalid 3 data for Testing) + Complete Exercise Introduction to Number System( Decimal, Binary, Hexadecimal), Number System Conversion(Decimal to Binary & Binary to Decimal, Decimal to Hexadecimal & Hexadecimal to 2 4 Decimal, Hexadecimal to Binary & Binary to Hexadecimal), Memory and Data Storage( Binary Memory, Data Representation in computer Memory, Storage Devices) Measurement of Size of Computer Memory, Boolean Algebra(Boolean Proposition, Truth System 5 Values, Logical Operators AND OR & NOT, Truth Table, Laws of Boolean Algebra) + Complete Exercise Computer Networks(Need of a Computer Networks, Client Server), Physical Structure of 6 Networks(Types of Connection, Network Topologies) 3 Basics of Data Communication(Components of Communication System), Computer Network Computer 7 Models(Protocols in TCP/IP Suit), The Need For Addressing(Importance of Addressing in Data Communication, Mapping Between Telephone and Network Addressing) Networks Sending HTTP Request and Receiving HTTP Response over the internet(Understanding IP 8 Addressing), Routing(Understand a Router, Routing in Internet, Routing Process)+ Complete Exercise Ethical Issues related to Security(Understanding Ethical Issues related to data Security, Safeguarding Privacy of others), Importance of data Privacy(Privacy concerns that Arise 9 through the Mass Collection of Data, Analyzing the Personal Privacy and Security Concerns that 4 Arise with any computational system) Simple Encryption(Importance of Encryption for Data and Everyday of life on internet, Caesar Cipher, Vigenere Cipher, Using Vigenere Cipher Widget) Encryption with Random Substitution using Frequency analysis, Weakness and Security Flaws if Piracy Substitution Ciphers, Encryption with Keys and Password(Relation between Cryptographic and 10 Password, characteristics of good password), Cybercrime(Characteristics of a Phishing Attacks, DoS, Denial of Services Attack) + Complete Exercise Introduction to HTML(Definition, Crating first Webpage and Display it, Identify the Tag to used 5 11 Markup HTML Elements, Attributes in HTML Tags, Main section in webpage HTML HEAD & BODY), Text Formatting(Content Formatting in HTML, Identify the text formatting tags,) Designing Creating Lists(Types of Lists, Background and Images), Define a Hyperlinks(Create a Hyperlink Websites 12 to Webpage, Define an Anchor Tag, create a hyperlinks within a webpage, create a graphical hyperlink), Crating Tables + Complete Exercise