Singapore · MOE Syllabus Outcomes
Secondary 4 Computing
A comprehensive upper secondary course focusing on advanced algorithmic problem solving and systems architecture. Students develop robust software solutions while analyzing the security and ethical implications of emerging technologies in the Singaporean digital landscape.

01Complex Algorithmic Logic
Deepening understanding of search and sort algorithms and their computational efficiency through Big O notation. Students learn to optimize code for performance and resource management.
Students will define what an algorithm is and explore various strategies for breaking down complex problems into smaller, manageable steps.
Comparing linear versus binary search algorithms, analyzing their steps and suitability for different data sets.
Students will learn the mechanics of bubble sort, tracing its execution with small data sets and identifying its limitations.
Exploring the divide-and-conquer strategy of merge sort, understanding its recursive nature and improved efficiency.
Understanding how to estimate the efficiency of algorithms by counting the number of operations or steps they perform, without formal Big O notation.
Breaking down large problems into manageable functions and procedures to improve code reusability and readability.
Investigating the impact of local and global variables on program integrity and data encapsulation.
Exploring one-dimensional and two-dimensional arrays for storing collections of similar data types.
Understanding how records (or structs) allow for grouping different data types into a single logical unit.
Exploring simple methods to save and load data within a program's execution, such as using lists or basic in-memory structures that reset on program close.
Identifying common programming errors and applying systematic debugging strategies to resolve them.

02Data Management and Database Systems
Focusing on the relational model and SQL for managing large datasets efficiently. Students design schemas and perform complex queries to extract meaningful information.
Students will differentiate between raw data and processed information, understanding the value of data in decision-making.
Exploring the purpose of databases, their advantages over flat files, and different types of database models.
Understanding the fundamental building blocks of relational databases: tables, fields, and data types.
Understanding primary keys, foreign keys, and their role in establishing relationships between tables.
Understanding the importance of good database design to minimize redundant data and improve data consistency and integrity.
Mastering the use of the SELECT statement to retrieve specific data from database tables.
Using WHERE and ORDER BY clauses to filter and sort query results for more precise data retrieval.
Applying aggregate functions (COUNT, SUM, AVG, MIN, MAX) to perform calculations on sets of data.
Mastering the use of JOIN operations to combine data from multiple related tables.
Implementing constraints and validation checks to ensure data accuracy and reliability.

03Computer Networks and Communication
Examining the architecture of the internet and local networks. Students explore protocols, hardware, and the layers of communication that enable global connectivity.
Understanding the fundamental reasons for networking computers and the benefits of shared resources.
Analyzing star, bus, and mesh network layouts, comparing their advantages, disadvantages, and resilience.
Identifying and understanding the function of key network hardware components like routers, switches, and hubs.
Comparing wired transmission methods, including twisted pair, coaxial, and fiber optic cables, and their characteristics.
Investigating wireless transmission methods, including Wi-Fi and Bluetooth, and factors affecting signal integrity and range.
Understanding the concept of network protocols as a set of rules governing data exchange.
Understanding that data is broken into packets for transmission and how addresses (like MAC addresses) help direct these packets within a local network.
Exploring the basic concepts of how protocols ensure data arrives correctly and in order, without delving into the specifics of TCP/IP layers.
Understanding IPv4 and IPv6 addressing schemes and the role of the Domain Name System (DNS).

04Cybersecurity and Defense
Identifying vulnerabilities in computer systems and implementing strategies to mitigate risks. Students learn about encryption, authentication, and defensive programming.
Understanding the importance of cybersecurity in protecting personal and organizational data in the digital age.
Classifying different types of cyber threats, including viruses, worms, and ransomware, and their modes of operation.
Examining human-based cyber threats like phishing, pretexting, and baiting, and strategies to identify and avoid them.
Understanding different methods of user authentication (passwords, biometrics, multi-factor) and authorization.
Understanding symmetric encryption, where the same key is used for both encryption and decryption.
Understanding how encryption is used in common applications like secure websites (HTTPS) and the concept of digital certificates for verifying identity.
Learning to write code that anticipates and handles unexpected or malicious inputs through robust validation.
Implementing effective error handling and logging mechanisms to improve program resilience and aid in security audits.
Educating students on personal cybersecurity hygiene, including strong passwords, safe browsing, and software updates.

05Computer Architecture and Logic Gates
Exploring the internal workings of the CPU and the fundamental logic gates that power digital computation.
Overview of the main components of a computer system: hardware, software, and their interaction.
Exploring the CPU as the 'brain' of the computer, its core functions, and key characteristics.
A high-level overview of how the CPU processes instructions, focusing on the idea of fetching, interpreting, and executing commands.
Understanding how computers represent data using binary, and converting between binary, decimal, and hexadecimal.
Introduction to fundamental logic gates (AND, OR, NOT), their truth tables, and basic circuit diagrams.
Exploring more complex logic gates (NAND, NOR, XOR) and their applications in digital circuits.
Applying knowledge of basic logic gates (AND, OR, NOT) to construct simple circuits that solve straightforward logical problems, without formal simplification techniques.
Comparing volatile (RAM) and non-volatile (ROM) memory, their characteristics, and roles in a computer system.
Investigating secondary storage devices like Hard Disk Drives (HDDs) and Solid State Drives (SSDs), comparing their technologies and performance.

06Impacts and Ethics of Computing
Analyzing the societal, legal, and ethical implications of technology, including AI, automation, and the digital divide.
Defining ethical computing and exploring the importance of responsible technology use and development.
Examining the concept of digital privacy, data collection practices, and regulations like PDPA.
Understanding intellectual property rights in the digital age, including copyright, fair use, and avoiding plagiarism.
Addressing the challenges of cyberbullying, online harassment, and promoting responsible digital citizenship.
Discussing the benefits and risks of AI, including bias in machine learning models and accountability.
Examining the impact of automation and robotics on employment, job displacement, and the need for new skills.
Examining the gap between those with and without access to technology and its impact on equality and inclusion.
Investigating the carbon footprint of data centers, electronic waste, and sustainable practices in the tech industry.
Understanding the concept of a digital footprint, its permanence, and strategies for managing online reputation.