Skip to content
Browse by Grade: Secondary 4

Singapore · MOE Syllabus Outcomes

Secondary 4 Computing

A comprehensive upper secondary course focusing on advanced algorithmic problem solving and systems architecture. Students develop robust software solutions while analyzing the security and ethical implications of emerging technologies in the Singaporean digital landscape.

6 units·57 topics·Ages 15-16

01Complex Algorithmic Logic

11 topics·Semester 1

Deepening understanding of search and sort algorithms and their computational efficiency through Big O notation. Students learn to optimize code for performance and resource management.

Introduction to Algorithms and Problem Solving

Students will define what an algorithm is and explore various strategies for breaking down complex problems into smaller, manageable steps.

Think-Pair-ShareProblem-Based Learning
Efficiency of Search Algorithms: Linear vs. Binary

Comparing linear versus binary search algorithms, analyzing their steps and suitability for different data sets.

Problem-Based LearningStations RotationCollaborative Problem-Solving
Introduction to Sorting Algorithms: Bubble Sort

Students will learn the mechanics of bubble sort, tracing its execution with small data sets and identifying its limitations.

Simulation GamePeer Teaching
Advanced Sorting Algorithms: Merge Sort

Exploring the divide-and-conquer strategy of merge sort, understanding its recursive nature and improved efficiency.

Concept MappingProject-Based Learning
Analyzing Algorithm Efficiency: Step Counting

Understanding how to estimate the efficiency of algorithms by counting the number of operations or steps they perform, without formal Big O notation.

Problem-Based LearningSimulation Game
Modular Programming: Functions and Procedures

Breaking down large problems into manageable functions and procedures to improve code reusability and readability.

Collaborative Problem-SolvingPeer Teaching
Scope of Variables: Local and Global

Investigating the impact of local and global variables on program integrity and data encapsulation.

Problem-Based LearningThink-Pair-Share
Introduction to Data Structures: Arrays

Exploring one-dimensional and two-dimensional arrays for storing collections of similar data types.

Concept MappingProject-Based Learning
Advanced Data Structures: Records/Structs

Understanding how records (or structs) allow for grouping different data types into a single logical unit.

Case Study AnalysisCollaborative Problem-Solving
Introduction to Data Persistence: Saving and Loading

Exploring simple methods to save and load data within a program's execution, such as using lists or basic in-memory structures that reset on program close.

Problem-Based LearningCollaborative Problem-Solving
Error Handling and Debugging Techniques

Identifying common programming errors and applying systematic debugging strategies to resolve them.

Collaborative Problem-SolvingPeer Teaching

02Data Management and Database Systems

10 topics·Semester 1

Focusing on the relational model and SQL for managing large datasets efficiently. Students design schemas and perform complex queries to extract meaningful information.

Introduction to Data and Information

Students will differentiate between raw data and processed information, understanding the value of data in decision-making.

Think-Pair-ShareWorld Café
Database Concepts and Types

Exploring the purpose of databases, their advantages over flat files, and different types of database models.

Gallery WalkCase Study Analysis
Relational Database Design: Tables and Fields

Understanding the fundamental building blocks of relational databases: tables, fields, and data types.

Concept MappingCollaborative Problem-Solving
Primary and Foreign Keys

Understanding primary keys, foreign keys, and their role in establishing relationships between tables.

Case Study AnalysisDecision MatrixCarousel Brainstorm
Database Design Principles: Avoiding Redundancy

Understanding the importance of good database design to minimize redundant data and improve data consistency and integrity.

Case Study AnalysisThink-Pair-Share
Introduction to SQL: SELECT Statement

Mastering the use of the SELECT statement to retrieve specific data from database tables.

Problem-Based LearningEscape Room
SQL: Filtering and Sorting Data

Using WHERE and ORDER BY clauses to filter and sort query results for more precise data retrieval.

Flipped ClassroomCollaborative Problem-Solving
SQL: Aggregate Functions

Applying aggregate functions (COUNT, SUM, AVG, MIN, MAX) to perform calculations on sets of data.

Problem-Based LearningStations Rotation
SQL: Joining Tables

Mastering the use of JOIN operations to combine data from multiple related tables.

Problem-Based LearningPeer Teaching
Data Integrity and Validation

Implementing constraints and validation checks to ensure data accuracy and reliability.

Think-Pair-ShareCase Study Analysis

03Computer Networks and Communication

9 topics·Semester 1

Examining the architecture of the internet and local networks. Students explore protocols, hardware, and the layers of communication that enable global connectivity.

Introduction to Networks: Why Connect?

Understanding the fundamental reasons for networking computers and the benefits of shared resources.

Think-Pair-ShareWorld Café
Network Topologies: Star, Bus, Mesh

Analyzing star, bus, and mesh network layouts, comparing their advantages, disadvantages, and resilience.

Gallery WalkStations RotationConcept Mapping
Network Hardware: Routers, Switches, Hubs

Identifying and understanding the function of key network hardware components like routers, switches, and hubs.

Simulation GameDocument Mystery
Wired Transmission Media: Copper and Fiber Optics

Comparing wired transmission methods, including twisted pair, coaxial, and fiber optic cables, and their characteristics.

Case Study AnalysisInquiry Circle
Wireless Transmission Media: Wi-Fi and Bluetooth

Investigating wireless transmission methods, including Wi-Fi and Bluetooth, and factors affecting signal integrity and range.

Inquiry CircleProject-Based Learning
Network Protocols: The Rules of Communication

Understanding the concept of network protocols as a set of rules governing data exchange.

Role PlaySimulation Game
How Data Travels: Packets and Addressing

Understanding that data is broken into packets for transmission and how addresses (like MAC addresses) help direct these packets within a local network.

Simulation GameConcept Mapping
Ensuring Reliable Delivery: Basic Protocol Concepts

Exploring the basic concepts of how protocols ensure data arrives correctly and in order, without delving into the specifics of TCP/IP layers.

Role PlayProblem-Based Learning
IP Addressing and DNS

Understanding IPv4 and IPv6 addressing schemes and the role of the Domain Name System (DNS).

Problem-Based LearningFlipped Classroom

04Cybersecurity and Defense

9 topics·Semester 2

Identifying vulnerabilities in computer systems and implementing strategies to mitigate risks. Students learn about encryption, authentication, and defensive programming.

Introduction to Cybersecurity: Why it Matters

Understanding the importance of cybersecurity in protecting personal and organizational data in the digital age.

World CaféSocratic Seminar
Threat Landscape: Malware and Viruses

Classifying different types of cyber threats, including viruses, worms, and ransomware, and their modes of operation.

Case Study AnalysisJigsawCarousel Brainstorm
Social Engineering and Phishing

Examining human-based cyber threats like phishing, pretexting, and baiting, and strategies to identify and avoid them.

Role PlaySimulation GameDocument Mystery
Authentication and Authorization

Understanding different methods of user authentication (passwords, biometrics, multi-factor) and authorization.

Think-Pair-ShareDecision Matrix
Encryption Fundamentals: Symmetric Encryption

Understanding symmetric encryption, where the same key is used for both encryption and decryption.

Escape RoomProblem-Based Learning
Encryption in Everyday Life: HTTPS and Digital Certificates

Understanding how encryption is used in common applications like secure websites (HTTPS) and the concept of digital certificates for verifying identity.

Case Study AnalysisInquiry Circle
Defensive Programming: Input Validation

Learning to write code that anticipates and handles unexpected or malicious inputs through robust validation.

Collaborative Problem-SolvingPeer Teaching
Defensive Programming: Error Handling and Logging

Implementing effective error handling and logging mechanisms to improve program resilience and aid in security audits.

Problem-Based LearningCase Study Analysis
Cybersecurity Best Practices for Users

Educating students on personal cybersecurity hygiene, including strong passwords, safe browsing, and software updates.

Gallery WalkTown Hall Meeting

05Computer Architecture and Logic Gates

9 topics·Semester 2

Exploring the internal workings of the CPU and the fundamental logic gates that power digital computation.

Introduction to Computer Systems

Overview of the main components of a computer system: hardware, software, and their interaction.

Concept MappingGallery Walk
The Central Processing Unit (CPU)

Exploring the CPU as the 'brain' of the computer, its core functions, and key characteristics.

Think-Pair-ShareStations Rotation
How the CPU Works: Instructions and Processing

A high-level overview of how the CPU processes instructions, focusing on the idea of fetching, interpreting, and executing commands.

Simulation GameConcept Mapping
Binary Representation and Number Systems

Understanding how computers represent data using binary, and converting between binary, decimal, and hexadecimal.

Problem-Based LearningEscape Room
Boolean Logic: AND, OR, NOT Gates

Introduction to fundamental logic gates (AND, OR, NOT), their truth tables, and basic circuit diagrams.

Inquiry CircleSimulation Game
Advanced Logic Gates: NAND, NOR, XOR

Exploring more complex logic gates (NAND, NOR, XOR) and their applications in digital circuits.

Problem-Based LearningStations Rotation
Building Simple Logic Circuits from Problems

Applying knowledge of basic logic gates (AND, OR, NOT) to construct simple circuits that solve straightforward logical problems, without formal simplification techniques.

Problem-Based LearningSimulation Game
Memory Hierarchy: RAM and ROM

Comparing volatile (RAM) and non-volatile (ROM) memory, their characteristics, and roles in a computer system.

Decision MatrixConcept Mapping
Secondary Storage: HDDs and SSDs

Investigating secondary storage devices like Hard Disk Drives (HDDs) and Solid State Drives (SSDs), comparing their technologies and performance.

Decision MatrixStations Rotation

06Impacts and Ethics of Computing

9 topics·Semester 2

Analyzing the societal, legal, and ethical implications of technology, including AI, automation, and the digital divide.

Introduction to Ethical Computing

Defining ethical computing and exploring the importance of responsible technology use and development.

Socratic SeminarWorld Café
Privacy and Data Protection

Examining the concept of digital privacy, data collection practices, and regulations like PDPA.

Formal DebateCase Study Analysis
Copyright, Intellectual Property, and Plagiarism

Understanding intellectual property rights in the digital age, including copyright, fair use, and avoiding plagiarism.

Philosophical ChairsDocument Mystery
Cyberbullying and Online Safety

Addressing the challenges of cyberbullying, online harassment, and promoting responsible digital citizenship.

Role PlayTown Hall Meeting
Artificial Intelligence and Ethics

Discussing the benefits and risks of AI, including bias in machine learning models and accountability.

Socratic SeminarFishbowl DiscussionFormal Debate
Automation and the Future of Work

Examining the impact of automation and robotics on employment, job displacement, and the need for new skills.

World CaféHuman Barometer
The Digital Divide and Accessibility

Examining the gap between those with and without access to technology and its impact on equality and inclusion.

World CaféGallery Walk
Environmental Impact of Technology

Investigating the carbon footprint of data centers, electronic waste, and sustainable practices in the tech industry.

Project-Based LearningCase Study Analysis
Digital Footprint and Online Reputation

Understanding the concept of a digital footprint, its permanence, and strategies for managing online reputation.

Think-Pair-ShareCase Study Analysis