JAVA-OOP - Flexible Instruction Delivery Plan Template (FIDP)
JAVA-OOP - Flexible Instruction Delivery Plan Template (FIDP)
Subject Title: Object-Oriented Programming (JAVA) No. of Hours/School Year: 240 hours
Course Description:
This course is designed to develop & enhance the knowledge, skills, & attitudes of a programmer in accordance with industry standards. It covers the basic, common & core competencies on programming
language, specifically Java. The nominal duration of 240 hours covers the required units at Java Programming NC III. TVET providers can, however, offer a longer, ladderized course covering the basic,
common and core plus specialized competency unit/s.
BASIC COMPETENCIES
64 hours
4.Questioning
techniques
4.1. Direct
4.2. Indirect
4.3. Open-ended
Solve workplace 4.1 Explain the 1.Analytical techniques Assessment requires 1.1. Variances 1.1. Variances Written test
problem related analytical 1.1. Brainstorming evidence that the are identified are identified Practical/
to work activities techniques. 1.2. Intuitions/Logic candidate: from normal from normal performanc
4.2 Identify the 1.3. Cause and effect 1.1.Identified the problem operating operating e test
problem. diagrams 1.2.Determined the parameters; and parameters; and Online
4.3 Determine 1.4. Pareto analysis fundamental causes of the product quality product quality discussion
the possible 1.5.WOT analysis problem 1.2. Extent, 1.2. Extent, Self-
cause/s of the 1.3.Determined the cause and nature cause and nature Situational Learning
1.6. Gant chart, Pert
problem. correct / preventive action are of the are of the Understan Role Play Module
CPM and graphs K K Representation
1.4.Provided problem are problem are ding (Problem Brainstormi
1.7. Scatter grams Solving)
recommendation to defined through defined through ng
2.Problem manager observation, observation,
2.1. Non – routine These aspects may be best investigation and investigation and
process and quality assessed using a range of analytical analytical
problems scenarios / case studies / techniques techniques
2.2. Equipment what ifs as a stimulus with 1.3. Problems 1.3. Problems
selection, availability a walk-through forming are clearly stated are clearly stated
and failure
2.3. Teamwork and part of the response. and specified and specified
work allocation These assessment 1.4. Possible 1.4. Possible
problem activities should include a causes are causes are
2.4. Safety and range of problems, identified based identified based
emergency situations including new, unusual and on experience on experience
and incidents improbable situations that and the use of and the use of
may have happened. problem-solving problem-solving
3.Action plans 1.5. Competence includes tools / analytical tools / analytical
3.1. Priority a thorough knowledge and techniques. techniques.
requirements understanding of the 1.5. Possible 1.5. Possible
3.2. Measurable process, normal operating cause cause
objectives parameters, and product statements are statements are
3.3. Resource quality to recognize non- developed based developed based
requirements standard situations on findings on findings
1.6. Competence to 1.6.Fundamental 1.6.Fundamental
3.4. Timelines
include the ability to apply causes are causes are
3.5. Co-ordination and
and explain, enough for identified per identified per
feedback requirements
the identification of results of results of
3.6. Safety
fundamental cause, investigation investigation
requirements
determining the corrective conducted conducted
3.7. Risk assessment action and provision of 1.7. All possible 1.7. All possible
3.8. Environmental recommendations options are options are
requirements 1.6.1. Relevant equipment considered for considered for
and operational processes resolution of the resolution of the
1.6.2. Enterprise goals, problem problem
targets and measures 1.8. Strengths 1.8. Strengths
1.6.3. Enterprise quality, and weaknesses and weaknesses
OHS and environmental of possible of possible
requirement options are options are
1.6.4. Principles of considered considered
decision-making strategies 1.9. Corrective 1.9. Corrective
and techniques actions are actions are
1.6.5. Enterprise determined to determined to
information systems and resolve the resolve the
data collation problem and problem and
1.6.6. Industry codes and possible future possible future
standards causes causes
1.7. Using range of formal 1.10. Action 1.10. Action
problem-solving plans are plans are
techniques developed developed
1.8. Identifying and identifying identifying
clarifying the nature of the measurable measurable
problem objectives, objectives,
1.9. Devising the best resource needs resource needs
solution and timelines in and timelines in
1.10. Evaluating the accordance with accordance with
solution safety and safety and
1.11.Implementation of a operating operating
developed plan to rectify procedures procedures
the problem 1.11. Report on 1.11. Report on
recommendation recommendation
s are prepared s are prepared
1.12.Recommen 1.12.Recommen
dations are dations are
presented to presented to
appropriate appropriate
personnel. personnel.
1.13.Recommen 1.13.Recommen
dations are dations are
followed-up, if followed-up, if
required required
Use mathematical 5.1 Identify 1.Mathematical Assessment requires 1.1Problem 1.1Problem Online
concepts and mathematical techniques evidence that the areas are areas are discussion
techniques tools and May include but are candidate: identified based identified based Self-
techniques to not limited to: 1.1 Identified, applied and on given on given Learning
solve problem 1.1Four fundamental reviewed the use of condition condition Module
5.2 Apply operations mathematical concepts 1.2.Mathematica 1.2.Mathematica Brainstormi
mathematical 1.2Measurements and techniques to l techniques are l techniques are ng
procedures/solu 1.3Use/Conversion of workplace problems selected based selected based
tion units of measurements on the given on the given
5.3 Analyze 1.4. Use of standard 2.1 Fundamental problem problem
results formulas operation (addition,
2.Appropriate action subtraction, division, 2.1.Mathematica 2.1.Mathematica
multiplication) l techniques are l techniques are
2.1 Review in the use
2.2 Measurement system applied based on applied based on
of mathematical Situational
2.3 Precision and accuracy the problem the problem
techniques (e.g. Role Play
recalculation, re- 2.4 Basic measuring identified U identified U Applying Connections
(Problem
modeling) tools/devices 2.2.Mathematica 2.2.Mathematica
Solving)
l computations l computations
2.2 Report error to
3.1 Applying mathematical are performed to are performed to
immediate superior for
computations the level of the level of
proper action
3.2 Using calculator accuracy accuracy
3.3Using different required for the required for the
measuring tools problem problem
The following resources 2.3 Results of 2.3 Results of
MUST be provided: mathematical mathematical
4.1 Calculator computation is computation is
4.2 Basic measuring tools determined and determined and
4.3 Case Problems verified based on verified based on
job requirements job requirements
Use relevant 6.1 Identify 1.Technology Assessment requires 1.1. Usage of 1.1. Usage of Online
technologies appropriate May include but are evidence that the different different discussion
technology not limited to: candidate: technologies is technologies is Self-
6.2 Apply 1.1Office technology 1.1 Studied and selected determined determined Learning
relevant 1.2Industrial appropriate technology based on job based on job Module
technology technology consistent with work requirements requirements Brainstormi
6.3 Maintain/ 1.3System technology requirements 1.2. Appropriate 1.2. Appropriate ng
enhance 1.4Information 1.2 Applied relevant technology is technology is
relevant technology technology selected as per selected as per
technology 1.5Training technology 1.3Maintained and work work
2.Management enhanced operative ability specification specification
concepts of relevant technology 2.1. Relevant 2.1. Relevant
May include but not technology is technology is
limited to: 2.1Awareness on effectively used effectively used
2.1Real Time technology and its function in carrying out in carrying out
Management 2.2 Repair and function function
Case Study
2.2 KAIZEN or maintenance procedure 2.2. Applicable 2.2. Applicable
(Use of
continuous 2.3 Operating instructions software and software and
U U Applying technology Connections
improvement 2.4 Applicable software hardware are hardware are
for Office
2.3. 5s 2.5 Communication used as per task used as per task
Productivity)
2.4. Total Quality techniques requirement requirement
Management 2.6 Health and safety 2.3.Management 2.3.Management
2.5. Other procedure concepts are concepts are
management/producti 2.7 Company policy in observed and observed and
vity tools relation to relevant practiced as per practiced as per
3.Industry standard technology established established
operating procedure 2.8 Different management industry industry
3.1Written guidelines concepts practices practices
relative to the usage of 2.9 Technology 3.1.Maintenance 3.1.Maintenance
office adaptability of technology is of technology is
technology/equipment applied in applied in
3.2. Verbal 3.1 Relevant technology accordance with accordance with
advise/instruction from application/implementatio the industry the industry
the co-worker n standard standard
4.Manufacturer’s 3.2 Basic communication operating operating
operating guidelines/ skills procedure, procedure,
instructions 3.3 Software applications manufacturer’s manufacturer’s
4.1. Written skills operating operating
instruction/manuals of 3.4 Basic troubleshooting guidelines and guidelines and
specific technology/ skills occupational occupational
equipment health and safety health and safety
4.2General instruction procedure to procedure to
manual ensure its ensure its
4.3. Verbal advise from operative ability operative ability
manufacturer relative 3.2. Updating of 3.2. Updating of
to the operation of technology is technology is
equipment maintained maintained
through through
5.Occupational health continuing continuing
and safety procedure education or education or
5.1 Relevant statutes training in training in
on OHS accordance with accordance with
5.2Company guidelines job requirement job requirement
in using 3.3. Technology 3.3. Technology
technology/equipment failure/ defect is failure/ defect is
immediately immediately
6.Appropriate action reported to the reported to the
6.1 Implementing concern/ concern/
preventive responsible responsible
maintenance schedule person or person or section
6.2. Coordinating with section for for appropriate
manufacturer’s appropriate action
technician action
COMMON COMPETENCIES
16 hrs.
Apply Quality 1.1 Assess 1Materials Assessment must show 1.1.Requirement 1.1.Requirement Demonstrat
Standards quality of 1.1Materials may that the candidate: s of task are s of task are ion &
received include but not limited 1.1. Carried out work in determined in determined in questioning
materials to: accordance with the accordance with accordance with Observation
1.2 Assess own 1.1.1. Manuals company’s standard the required the required Workplace &
work 1.1.2. Job orders operating procedures output. output. Operation questioning
1.3 Engage in 1.1.3. Instructional 1.2. Performed task 1.2.Appropriate 1.2.Appropriate (List of Third party
quality videos according to specifications hardware and U hardware and U Applying workplace Connections report
improvement 2. Faults 1.3. Reported defects software are software are Standard Online
2.1Faults may include detected in accordance selected selected Operation discussion
but not limited to: with standard operating according to task according to task Procedure) Self-
2.1.1. Materials not to procedures assigned and assigned and Learning
specification 1.4. Carried out work in required required Module
2.1.2. Materials accordance with the outcome. outcome. Brainstormi
contain process improvement 1.3. Task is 1.3. Task is ng
incorrect/outdated procedures planned to planned to
information 1.5. Relevant production ensure that OH ensure that OH
2.1.3. Hardware processes, materials and & S guidelines & S guidelines
defects products and procedures and procedures
2.1.4. Materials that do 1.6. Characteristics of are followed. are followed.
not conform with any materials, software and 1.4. Client - 1.4. Client -
regulatory agencies hardware used in specific specific
3Documentation production processes guidelines and guidelines and
3.1. Organization work 1.7. Quality checking procedures are procedures are
procedures procedures followed. followed.
3.2. Manufacturer’s 1.8. Workplace procedures 1.5. Required 1.5. Required
instruction manual 1.9. Safety and data security data security
3.3. Customer environmental aspects of guidelines are guidelines are
requirements production processes applied in applied in
3.4. Forms 1.10. Fault identification accordance with accordance with
4. Errors and reporting existing existing
4.1. Errors may be 1.11. Quality improvement procedures. procedures.
related but not limited processes 1.6. Data are 1.6. Data are
to the following: 1.12. Reading skills entered into the entered into the
4.1.1. Deviation from required to interpret work computer using computer using
the requirements of instruction appropriate appropriate
the Client 1.13. Communication skills program/applica program/applicat
4.1.2. Deviation from needed to interpret and tion in ion in
the requirement of the apply defined work accordance with accordance with
organization procedures company company
5.Quality standards 1.14. Carry out work in procedures. procedures.
5.1. Quality standards accordance with OHS 1.7. Accuracy of 1.7. Accuracy of
may be related but not policies and procedures information is information is
limited to the 1.15. Critical thinking checked, and checked, and
following: 1.16. Solution providing information is information is
5.1.1. Materials and decision-making saved in saved in
5.1.2. Hardware accordance with accordance with
5.1.3. Final product standard standard
5.1.4. Production operating operating
processes procedures. procedures.
5.1.5. Customer service 1.8. Inputted 1.8. Inputted
6Customer data is stored in data is stored in
6.1Co-worker storage media storage media
6.2Supplier/Vendor according to according to
6.3Client requirements. requirements.
6.4Organization 1.9. Work is 1.9. Work is
receiving the product performed performed
or service within within
ergonomic ergonomic
guidelines. guidelines.
1.10. Correct 1.10. Correct
program/applica program/applicat
tion is selected ion is selected
based on job based on job
requirements. requirements.
1.11. Program 1.11. Program
/application /application
containing the containing the
information information
required is required is
accessed accessed
according to according to
company company
procedures. procedures.
1.12. Desktop 1.12. Desktop
icons are icons are
correctly correctly
selected, opened selected, opened
and closed for and closed for
navigation navigation
purposes. purposes.
1.13. Keyboard 1.13. Keyboard
techniques are techniques are
carried out in carried out in
line with OH & S line with OH & S
requirements for requirements for
safe use of safe use of
keyboards. 1.1. keyboards. 1.1.
Entered data are Entered data are
processed using processed using
appropriate appropriate
software software
commands. commands.
1.2. Data are 1.2. Data are
printed out as printed out as
required using required using
computer computer
hardware hardware
/peripheral /peripheral
devices in devices in
accordance with accordance with
standard standard
operating operating
procedures. procedures.
1.3. Files and 1.3. Files and
data are data are
transferred transferred
between between
compatible compatible
systems using systems using
computer computer
software, software,
hardware/periph hardware/periph
eral devices in eral devices in
accordance with accordance with
standard standard
operating operating
procedures. procedures.
1.4.Information 1.4.Information
requirements for requirements for
internet search internet search
are established. are established.
1.5. Browser is 1.5. Browser is
launched. launched.
1.6. Search 1.6. Search
engine is loaded. engine is loaded.
1.7.Appropriate 1.7.Appropriate
search criteria/or search criteria/or
URL of site is URL of site is
entered. entered.
1.8. Relevant 1.8. Relevant
links are links are
followed to followed to
locate required locate required
information. information.
1.9. Useful pages 1.9. Useful pages
are bookmarked are bookmarked
or printed as or printed as
required. required.
1.10.Procedures 1.10.Procedures
for ensuring for ensuring
security of data, security of data,
including regular including regular
back-ups and back-ups and
virus checks are virus checks are
implemented in implemented in
accordance with accordance with
standard standard
operating operating
procedures. procedures.
1.11. Basic file 1.11. Basic file
maintenance maintenance
procedures are procedures are
implemented in implemented in
line with the line with the
standards standards
operating operating
procedures. procedures.
Operate a 2.1 Plan and 1.Hardware and Assessment must show 1.1.Requirement 1.1.Requirement Demonstrat
Personal prepare for task peripheral devices that the candidate: s of task are s of task are ion &
Computer to be 1.1. Personal 1.1. Selected and used determined in determined in questioning
undertaken computers hardware components accordance with accordance with Observation
2.2 Input data 1.2. Networked correctly and according to the required the required &
into computer systems the task requirement output. output. questioning
2.3 Access 1.3. Communication 1.2. used basic software 1.2.Appropriate 1.2.Appropriate Third party
information equipment applications to create new hardware and hardware and report
using computer 1.4. Printers files and documents software are software are Assessment
2.4 Produce 1.5. Scanners 1.3. Produced accurate selected selected of output
output/data 1.6. Keyboard and complete data in according to task according to task product
using computer 1.7. Mouse accordance with the assigned and assigned and Portfolio
system 1.8. Voice/Data logger requirements required required Computer-
2.5 Use basic 2.Software 1.4. Used appropriate outcome. outcome. based
functions of a Software includes the devices and procedures to 1.3.Task is 1.3.Task is assessment
web browser to following but not transfer files/data planned to planned to
locate limited to: accurately ensure that OH ensure that OH
Identificatio
information 2.1 Word processing 1.5. Used basic functions & S guidelines & S guidelines
n
2.6 Maintain packages of a www-browser to and procedures and procedures
(Identify the
computer 2.2Database packages locate information. are followed. are followed.
parts of a
equipment and 2.3Internet 1.6. Basic ergonomics of 1.4.Client - D 1.4.Client - D Creating Problem Solving
Personal
systems 2.4Spreadsheets keyboard and computer specific specific
Computer
2.5Client Specific user guidelines and guidelines and
and their
Software 1.7. Main types of procedures are procedures are
function)
3OH & S guidelines computers and basic followed. followed.
3.1.OHS guidelines features of different 1.5.Required 1.5.Required
3.2. Enterprise operating systems data security data security
procedures 1.8. Main parts of a guidelines are guidelines are
4.Storage media computer applied in applied in
Storage media include 1.9. Storage devices and accordance with accordance with
the following but not basic categories of existing existing
limited to: memory procedures. procedures.
4.1. Diskettes 1.10. Relevant types of 1.6.Data are 1.6.Data are
4.2. CDs software entered into the entered into the
4.3. Zip disks 1.11. General security, computer using computer using
4.4. hard disk drives, privacy legislation and appropriate appropriate
local and remote copyright program/applica program/applicat
4.5. Optical drives 1.12. Viruses tion in ion in
5.Ergonomic guidelines 1.13. OH & S principles and accordance with accordance with
5.1. Types of responsibilities company company
equipment used 1.14. Calculating computer procedures. procedures.
5.2. Appropriate capacity 1.7. Accuracy of 1.7. Accuracy of
furniture 1.15. Productivity information is information is
5.3. Seating posture Application checked, and checked, and
5.4. Lifting posture 1.16. Business Application information is information is
5.5. Visual display unit 1.17. System Software saved in saved in
screen brightness 1.18. Reading and accordance with accordance with
6.Desktop icons comprehension skills standard standard
6.1. Icons include the required to interpret work operating operating
following but not instruction and to procedures. procedures.
limited to: interpret basic user 1.8. Inputted 1.8. Inputted
6.2. Directories/folders manuals. data is stored in data is stored in
6.3. Files 1.19. Communication skills storage media storage media
6.4. Network devices to identify lines of according to according to
6.5. Recycle bin communication, request requirements. requirements.
6.6. Program icons advice, follow instructions 1.9. Work is 1.9. Work is
7.Maintenance and receive feedback. performed performed
7.1. Creating and 1.20. Technology skills to within within
managing more space use equipment safely ergonomic ergonomic
in the hard disk and including keyboard skills. guidelines. guidelines.
other peripherals The assessor may select 1.10. Correct 1.10. Correct
7.2. Reviewing two of the following program/applica program/applicat
programs assessment methods to tion is selected ion is selected
7.3. Deleting unwanted objectively assess the based on job based on job
files candidate: requirements. requirements.
7.4. Backing up files 1.21. Direct Observation 1.11. 1.11.
7.5. Checking hard and Oral Questioning Program/applica Program/applicat
drive for errors 1.22. Practical tion containing ion containing
7.6. Using up to date demonstration the information the information
anti-virus programs 1.23. Computer hardware required is required is
7.7. Cleaning dust from with peripherals accessed accessed
internal and external 1.24. Appropriate software according to according to
surfaces 1.25. Assessment may be company company
conducted in the procedures. procedures.
workplace or in a 1.12. Desktop 1.12. Desktop
simulated environment icons are icons are
correctly correctly
selected, opened selected, opened
and closed for and closed for
navigation navigation
purposes. purposes.
1.13. Keyboard 1.13. Keyboard
techniques are techniques are
carried out in carried out in
line with OH & S line with OH & S
requirements for requirements for
safe use of safe use of
keyboards. keyboards.
1.1. Entered data 1.1. Entered data
are processed are processed
using using
appropriate appropriate
software software
commands. commands.
1.2. Data are 1.2. Data are
printed out as printed out as
required using required using
computer computer
hardware hardware
/peripheral /peripheral
devices in devices in
accordance with accordance with
standard standard
operating operating
procedures. procedures.
1.3. Files and 1.3. Files and
data are data are
transferred transferred
between between
compatible compatible
systems using systems using
computer computer
software, software,
hardware/periph hardware/periph
eral devices in eral devices in
accordance with accordance with
standard standard
operating operating
procedures. procedures.
1.4. Information 1.4. Information
requirements for requirements for
internet search internet search
are established. are established.
1.5. Browser is 1.5. Browser is
launched. launched.
1.6. Search 1.6. Search
engine is loaded. engine is loaded.
1.7. Appropriate 1.7. Appropriate
search criteria/or search criteria/or
URL of site is URL of site is
entered. entered.
1.8. Relevant 1.8. Relevant
links are links are
followed to followed to
locate required locate required
information. information.
1.9. Useful pages 1.9. Useful pages
are bookmarked are bookmarked
or printed as or printed as
required. required.
1.10. Procedures 1.10. Procedures
for ensuring for ensuring
security of data, security of data,
including regular including regular
back-ups and back-ups and
virus checks are virus checks are
implemented in implemented in
accordance with accordance with
standard standard
operating operating
procedures. procedures.
1.11. Basic file 1.11. Basic file
maintenance maintenance
procedures are procedures are
implemented in implemented in
line with the line with the
standards standards
operating operating
procedures. procedures.
CORE COMPETENCIES
160 hours
Perform object- 1.1 Apply basics 1. Executable Java Assessment requires 1.1. Executable 1.1. Executable Online
oriented analysis of Java language applications evidence that the Java applications Java applications discussion
and design in Java 1.2 Work with •Hello World candidate: are created in are created in Self-
technology methods and 1.1 Applied Basics of Java accordance with accordance with Learning
•Hello with name
encapsulation language Java framework Java framework Module
•Hello with name and 1.2 Worked with Programmin
1.3 Work with date 1.2 Java 1.2 Java g Activity Brainstormi
Methods and
inheritance and 1. Working with Java Encapsulation packages are packages are (Develop a ng
handling Data Types 1.3 Worked with imported to imported to program
exceptions. Inheritance and Handling make them D make them D Creating Problem Solving
•Declare and initialize that adheres
1.4 Examine variables Exceptions accessible in the accessible in the with the
object-oriented 1.4 Use object-oriented code code best
•Differentiate between
concepts and technologies and perform 1.3 Working with 1.3 Working with practices)
object references and
terminology object-oriented analysis Java Data types Java Data types
primitive variables and design.
1.5 Explain is demonstrated is demonstrated
•Read and write to 1.5 Follow a software
modeling and in accordance in accordance
object fields development process
software with Java with Java
•Explain an object’s using an OO software
development lifecycle (creation, project. framework framework
process dereference, and 1.6 Use the widely 1.4 Using 1.4 Using
1.6 Create Use garbage collection) adopted graphical Operators and Operators and
Case Diagrams •Call methods on modeling language - the Decision Decision
Unified Modeling
and Use Case objects Constructs is Constructs is
Language (UML) version
Scenarios •Manipulate data demonstrated in demonstrated in
2.2.
1.7 Transition using StringBuilder 1.7 Manage complexity of accordance with accordance with
analysis to class and its methods artifacts; describe the Java framework Java framework
design using •Create and problem and proposed 1.5 Creating and 1.5 Creating and
Interaction manipulate Strings solution. Using Arrays is Using Arrays is
Diagrams 2. Using Operators and demonstrated in demonstrated in
1.8 Introduce Decision Constructs 2.1. Uses of various Java accordance with accordance with
Architectural programming language Java framework Java framework
•Use Java operators
Concepts and constructs to create 1.6 Using Loop 1.6 Using Loop
•Use parenthesis to several Java technology
Architecture Constructs is Constructs is
override operator applications
Tiers Diagrams demonstrated in demonstrated in
precedence Define the scope of
accordance with accordance with
•Test equality between variables
Java framework Java framework
strings and other Define the structure of
a Java class 2.1 Methods 2.1 Methods
objects using == and
Differentiate between with arguments with arguments
equals()
default and user- and return and return
•Create and use if-else
defined constructors values are values are
constructs
2.2. Uses of decision and created in created in
•Use a switch looping constructs and accordance with accordance with
statement methods to dictate Java framework Java framework
3. Creating and Using program flow 2.2 Static 2.2 Static
Arrays 2.3. Basic error handling keywords are keywords are
•Declare, initialize, and for your Java technology applied to applied to
use a one-dimensional programs methods and methods and
array 2.4. Intermediate Java
fields in fields in
•Declare, initialize, and programming and object-
oriented (OO) concepts in accordance with accordance with
use a multi- Java framework Java framework
Java technology programs
dimensional array 2.3 Overloaded 2.3 Overloaded
Determine the effect
•Declare and use an upon object references method is method is
ArrayList and primitive values created in created in
4. Using Loop when they are passed accordance with accordance with
Constructs into methods that Java framework Java framework
•Create and use while change the values 2.4 Access 2.4 Access
loops Differentiate between modifiers are modifiers are
the type of a reference applied in applied in
•Create and use for
and the type of an
loops including the accordance with accordance with
object Determine when
enhanced for loop Java framework Java framework
casting is necessary
•Create and use do- 2.5. Java technology and 2.5 2.5
while loops the Java programming Encapsulation Encapsulation
•Compare loop language principled are principled are
constructs 2.6. Understanding of applied to a class applied to a class
•Use break and basic object-oriented in accordance in accordance
continue concepts such as with Java with Java
5. OOSD Workflows inheritance, encapsulation, framework framework
and abstraction 3.1 Inheritance is 3.1 Inheritance is
•Requirements
2.7. Uses and manipulation
Gathering implemented in implemented in
of object references to
•Requirements accordance with accordance with
write simple error handling
Analysis, code Java framework Java framework
• Architecture and Differentiate among 3.2 Code that 3.2 Code that
Design, checked exceptions, demonstrates demonstrates
Implementation RuntimeExceptions, the use of the use of
•Testing & and Error polymorphism is polymorphism is
Deployment Describe what developed in developed in
exceptions are used accordance with accordance with
6. Defining
for in Java Java framework Java framework
Architecture Tiers Invoke a method that 3.3 Super and 3.3 Super and
•Describe the concepts throws an Exception this syntax are this syntax are
of the Client and Recognize common used to access used to access
Presentation tiers exception classes and objects and objects and
•Describe the concepts categories
constructors in constructors in
of the Business tier 2.8 Recognize and
document use case accordance with accordance with
•Describe the concepts Java framework Java framework
of the Resource and dependencies using UML
notation for extends, 3.4 Abstract 3.4 Abstract
Integration tiers classes and classes and
includes, and
•Describe the concepts generalization interfaces are interfaces are
of the Solution model 2.9 Describe how to used in used in
manage the complexity of accordance with accordance with
Use Case Diagrams by Java framework Java framework
creating UML packaged 3.5 How 3.5 How
views Identify and exceptions alter exceptions alter
document scenarios for a
normal program normal program
use case
2.10 Describe how to flow are flow are
reference included and determined by determined by
extending use cases creating a try- creating a try-
2.11 Identify and catch block. catch block.
document non-functional 4.1 Important 4.1 Important
requirements (NFRs), object-oriented object-oriented
business rules, risks, and (OO) concepts (OO) concepts
priorities for a use case are described in are described in
2.12 Identify the purpose accordance with accordance with
of a Supplementary Java framework Java framework
Specification Document
4.2 Fundamental 4.2 Fundamental
2.13 Identify the essential
elements in an Activity OO terminology OO terminology
diagram are defined in are defined in
3.1.Basic computer accordance with accordance with
operation skills Java framework Java framework
3.2.Logic analysis 5.1 Object- 5.1 Object-
3.3.Communication skills Oriented Oriented
3.4.Code writing and Software Software
debugging skills Development Development
(OOSD) process (OOSD) process
is explained in is explained in
accordance with accordance with
Java framework Java framework
5.2 Benefits of 5.2 Benefits of
modeling modeling
software are software are
explained in explained in
accordance with accordance with
Java framework Java framework
5.3 Purpose, 5.3 Purpose,
activities, and activities, and
artifacts of the artifacts of the
following OOSD following OOSD
workflows workflows
(disciplines) are (disciplines) are
explained explained
6.1 The need for 6.1 The need for
a Use Case a Use Case
Diagram is Diagram is
justified in justified in
accordance with accordance with
Java framework Java framework
6.2 Use Case 6.2 Use Case
Diagram for a Diagram for a
software system software system
is developed is developed
based on the based on the
goals of the goals of the
business owner business owner
6.3 Use Case 6.3 Use Case
Diagrams is Diagrams is
developed based developed based
on the goals of on the goals of
all the all the
stakeholders stakeholders
6.4 Use Case 6.4 Use Case
form is created form is created
describing a describing a
summary of the summary of the
scenarios in the scenarios in the
main and main and
alternate flows alternate flows
7.1 Purpose and 7.1 Purpose and
elements of the elements of the
Design model Design model are
are explained in explained in
accordance with accordance with
Java framework Java framework
7.2 Essential 7.2 Essential
elements of a elements of a
UML UML
Communication Communication
diagram are diagram are
identified in identified in
accordance with accordance with
Java framework Java framework
7.3 7.3
Communication Communication
diagram view of diagram view of
the Design the Design
model is created model is created
in accordance in accordance
with Java with Java
framework framework
7.4 Sequence 7.4 Sequence
diagram view of diagram view of
the Design the Design
model is created model is created
in accordance in accordance
with Java with Java
framework framework
8.1 Difference 8.1 Difference
between between
architecture and architecture and
design is design is
distinguished in distinguished in
accordance with accordance with
Java framework Java framework
8.2 Tiers, layers, 8.2 Tiers, layers,
and systemic and systemic
qualities are qualities are
described in described in
accordance with accordance with
Java framework Java framework
8.3 Architecture 8.3 Architecture
workflow is workflow is
described in described in
accordance with accordance with
Java framework Java framework
8.4 Architecture 8.4 Architecture
Tiers are defined Tiers are defined
in accordance in accordance
with Java with Java
framework framework
Create and fine 2.1 Apply Basics 1. Access Modifier Assessment requires 1.1 Access 1.1 Access Online
tune Java of Java Class •private, evidence that the modifiers are modifiers are discussion
technology Design •protected, candidate: used in used in Self-
applications using 2.2 Apply Java 1.1 Performed multiple accordance with accordance with Learning
•public operations on database
object-oriented Advance Class 2. Object Class Java framework Java framework Module
tables, including creating,
programming Design and 1.2 Instance of 1.2 Instance of Brainstormi
•(hashCode(), reading, updating and
concept Object-Oriented deleting using JDBC operator and operator and ng
•equals(),
Design technology casting are used casting are used
•toString())
Principles 1.2 Process strings using a in accordance in accordance
2.3 Apply string 2Object Oriented with Java with Java
variety of regular
processing, Design Principles expressions and create framework framework
exceptions and •Choose between high-performing multi- 1.3 Virtual 1.3 Virtual
assertions interface inheritance threaded applications that method method
2.4 Build and class inheritance avoid deadlock invocation is invocation is
database •Develop code that 1.3 Implement used in used in
applications implements IS-A input/output (I/O) accordance with accordance with
and/or HAS-A functionality to read from
with JDBC Java framework Java framework Programmin
relationships (apply and write to data and text
2.5 Monitor files and understand 1.4 Override 1.4 Override g Activity
operating high cohesion and low methods from methods from
advanced I/O streams (Develop a
system coupling principles) the Object class the Object class
1.4 Create Java program
performance •Apply object are used to D are used to D Creating Problem Solving
technology applications that adheres
2.6 Work with composition principles that leverage the object- improve the improve the with the
language level (including HAS-A oriented features of the functionality of functionality of best
concerns and relationships) Java language, such as class class practices)
garbage •Design a class using encapsulation, inheritance, 1.1Package and 1.1Package and
collection the Singleton design and polymorphism import import
2.7 Work with pattern 1.5 Set up a statements are statements are
performance-tuning
performance •Write code to used in used in
environment
tuning at the implement the Data accordance with accordance with
1.1 Monitor Java
language level Access Object (DAO) applications Java framework Java framework
pattern 1.2 Apply rigor to the task 2.1 Proper use of 2.1 Proper use of
•Design and create of performance tuning when and how when and how to
objects using a Factory, 1.3 Use various tools and to apply abstract apply abstract
and use factories from mechanisms for classes is classes is
the API monitoring, profiling and identified identified
4. Generics and tuning Java applications 2.2 Abstract Java 2.2 Abstract Java
Collections Principles 2.1 Knowledge of Java I/O classes and classes and
Fundamentals subclasses are subclasses are
•Use the diamond
•Read and write data from
syntax to create a constructed in constructed in
the console
collection and for type •Use streams to read and accordance with accordance with
inference write files Java framework Java framework
•Analyze the 2.2 Knowledge Java File 2.3 Static and 2.3 Static and
interoperability of I/O (NIO.2) final keywords final keywords
collections that use •Use the Path class to are used in are used in
operate on file and
raw types and generic accordance with accordance with
directory paths
types Java framework Java framework
•Use the Files class to
•Use wrapper classes, check, delete, copy, or 2.4 Top-level and 2.4 Top-level and
autoboxing and move a file or directory nested classes nested classes
unboxing •Read and change file and are created in are created in
•Create and use List, directory attributes accordance with accordance with
Set, and Deque •Recursively access a Java framework Java framework
implementations directory tree using the 2.5 Enumerated 2.5 Enumerated
•Create and use a Map DirectoryStream and types are used in types are used in
FileVisitor interfaces accordance with accordance with
•Use •Find a class using the
java.util.Comparator Java framework Java framework
PathMatcher class 2.6 Write code 2.6 Write code
and •Watch a directory for
java.lang.Comparable that declares, that declares,
changes by using
•Sort and search arrays WatcherService implements, implements,
and lists 2.3 Understand and/or extends and/or extends
fundamentals of Java interfaces interfaces
1.Build Strings
Virtual Machine 2.1Object 2.1Object
•Scanner
•Performance Principles Oriented Design Oriented Design
•StringTokenizer •Common Performance Principles are Principles are
• StringBuilder Problems applied in applied in
• String •Performance accordance with accordance with
• Formatter Methodology Java framework Java framework
6. Java Virtual Machine •Development and 2.8 Generics and 2.8 Generics and
Performance
•HotSpot Generational Collections Collections
2.4 Apply basic
Garbage Collector performance tuning Principles are Principles are
•Monitor the Garbage principles to a Java used in used in
Collector with application accordance with accordance with
Command Line Tools 2.5 Profile the Java framework Java framework
•Monitor the Garbage performance of a Java 3.1 Search, 3.1 Search,
Collector with Application and tune the parse, and build parse, and build
VisualVM performance of a Java strings are used strings are used
application at the language in accordance in accordance
•Monitor the JIT
level with Java with Java
Compiler
3.1. Basic computer framework framework
•Throughput and operation skills
Responsiveness 3.2 String 3.2 String
3.2. Logic analysis
7. Garbage Collection formatting is formatting is
3.3. Communication skills
Tuning 3.4. Code writing and used in used in
debugging skills accordance with accordance with
•Find Memory Leaks
Java framework Java framework
•Identify Lock
3.3 Throw and 3.3 Throw and
Contention
throws throws
•Heap Profiling Anti- statements are statements are
patterns used in used in
•Method Profiling accordance with accordance with
Anti-patterns Java framework Java framework
•Garbage Collection 3.4 Try 3.4 Try
•Generational Garbage statement with statement with
Collection multi-catch is multi-catch is
•GC Performance used in used in
Metrics accordance with accordance with
Java framework Java framework
3.5 Autoclose 3.5 Autoclose
features with a features with a
try-with- try-with-
resources resources
statement are statement are
used in used in
accordance with accordance with
Java framework Java framework
3.6 Custom 3.6 Custom
exceptions are exceptions are
created in created in
accordance with accordance with
Java framework Java framework
3.7 Invariants by 3.7 Invariants by
using assertions using assertions
are tested in are tested in
accordance with accordance with
Java framework Java framework
4.1 Layout of the 4.1 Layout of the
JDBC API is JDBC API is
defined in defined in
accordance with accordance with
Java framework Java framework
4.2 JDBC driver is 4.2 JDBC driver is
used to connect used to connect
to database in to database in
accordance with accordance with
Java framework Java framework
4.3 JDBC 4.3 JDBC
RowSetProvider, RowSetProvider,
RowSetFactory, RowSetFactory,
and RowSet and RowSet
interfaces are interfaces are
used in used in
accordance with accordance with
Java framework Java framework
4.4 4.4
PreparedStatem PreparedStatem
ent and ent and
CallableStateme CallableStateme
nt objects are nt objects are
created and used created and used
5.1 Monitoring 5.1 Monitoring
CPU Usage is CPU Usage is
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
5.2 Monitoring 5.2 Monitoring
Network I/O is Network I/O is
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
5.3 Monitoring 5.3 Monitoring
Disk I/O is Disk I/O is
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
5.4 Monitoring 5.4 Monitoring
Virtual Memory Virtual Memory
Usage is Usage is
Demonstrated in Demonstrated in
accordance with accordance with
Java framework Java framework
5.5 Monitoring 5.5 Monitoring
Java Virtual Java Virtual
Machine is Machine is
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
5.6 Garbage 5.6 Garbage
Collection Tuning Collection Tuning
is demonstrated is demonstrated
in accordance in accordance
with Java with Java
framework framework
6.1 Garbage 6.1 Garbage
Collection Collection
Algorithms are Algorithms are
created in created in
accordance with accordance with
Java framework Java framework
6.2 Types of 6.2 Types of
Garbage Garbage
Collectors are Collectors are
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
6.3 JVM 6.3 JVM
Ergonomics are Ergonomics are
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
6.4 Garbage 6.4 Garbage
Collection is Collection is
tuned in tuned in
accordance with accordance with
Java framework Java framework
6.5 Correct 6.5 Correct
Garbage Garbage
Collector is Collector is
selected in selected in
accordance with accordance with
Java framework Java framework
6.6 Garbage 6.6 Garbage
Collection Collection
Output is Output is
interpreted in interpreted in
accordance with accordance with
Java framework Java framework
7.1 Reference 7.1 Reference
Types in Java are Types in Java are
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
7.2 The use of 7.2 The use of
Finalizers is Finalizers is
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
7.3 String- 7.3 String-
efficient Java efficient Java
Applications are Applications are
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
7.4 Collection 7.4 Collection
Classes are Classes are
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
7.5 Threads are 7.5 Threads are
used in used in
accordance with accordance with
Java framework Java framework
7.6 I/O is 7.6 I/O is
efficiently used efficiently used
in accordance in accordance
with Java with Java
framework framework
Transfer Goal: The students will learn to develop a software that adheres with the best practice, this will also enable them to think critically and assess the role of software in solving real world problem.
The Dominican College of Tarlac is aiming to launch a software that will be beneficial not only for students and teacher but for society in general. Your subject teacher encourages all of you to develop
and present a software that could help the society with the current problems it is facing. Your work will be presented to the teachers, students and principal in the annual school colloquium. It will be
evaluated according to; Content, Research, Technicality, Creativity, Code Readability and Functions.
Situation: The Dominican College of Tarlac is aiming to launch a Software that will be beneficial not only for students and teacher but for society in general.