Assignment, Variables, Constants & Sequences
Inputs, Outputs & Type Conversion
Condition controlled Loops
Count Controlled loops
Nested Selection and Iteration
Subroutines 1 - Procedures
Subroutines 2 - Functions
Operators and Operations
Structured Programming
Validation and verification
Authentication
There is no Powerpoint to go with this section. You can download the notes sheet from Task 1 and make some notes on the topic, however most tasks are to be completed in your book. Don't forget to update your learning objectives at the end!
Open a Cornell notes sheet by clicking on the image below.
Remember good notes allow students to help each other problem solve
Good notes will help you organise and process data and information
Cornell notes help you retain and recall information by having three different ways/sections where you process the information.
Note taking is a way of helping you to remember things you would otherwise forget. It also stimulates our critical thinking skills.
Remember! whenever you see the notes icon this means the information is important and you should write it down on your notes sheet.
The purpose of verification and authentication is to check if a user is allowed to access a system. The most common method use for verification is a user ID and password.
We use authentication an check to see both if a user is allowed access to a system and to check that they are who they say they are. To do this we might ask for details that only they would know, like a pin number or a mother’s maiden name.
In more recent times sometimes authentication is done via biometrics, which can include: