Computer Science

Computing is integral in all people’s lives, more so now than ever before. Our vision and aim are to provide a high-quality computing education to enable pupils to use computational thinking and creativity to understand and shape the world. Computing has profound links with mathematics, science, design and technology. It provides insights into both natural and artificial systems.

Year 7 - Term 1

Term 1 

What?

We are learning how to use technology safely, effectively and responsibly. This will include use of social media and the pros and cons of using it. 

Students will learn about the possible dangers that could arise when online/or on social media. 

We will interleave an introduction to career paths in computing to provide relevance to the subject outside of school. 

Students can find the introduction to technical language challenging, logging into the school network and remembering passwords.  However, this is will enable them to take responsibility for their personal information and data. 

 

Why?

Data security is a very important aspect of computing, even more so than ever before as it has become a huge commodity. Every student will be allocated a username and password that has to be reset that meets the requirement. Students also will need to know how to access their files and school email. 

Social media is also something that is important to young people and therefore they need to be aware of how to use if safely and effectively.  

Also, many young people with the start of secondary school, will have access to a mobile device and social media account so it would be an ideal time to teach e-safety.

How?  

Core knowledge:  

Students will have access to all lesson material used in advance, keywords and meaning. Activities will be differentiated. 

Students can independently  

  • Create a secure password and memorable password 
  • Importance of creating a strong password/resetting password 
  • Manage files in File explorer
  • Identify the possible dangers of social networking sites
  • Demonstrate how to respond to threats on the Internet
  • Keep your identity secure on the Internet and protect identity online
  • Demonstrate how to avoid being a victim of an email scam.

 

How well? 

Learning checkpoints: Key word quiz and multiple choice assessment at the end of the term. Q&A sessions during lessons. Students should be able to answer questions on who they can share personal data with, what criteria is used to create a secure password, who should they report any safety issues to.  

Where next?

  • Taking personal responsibility and responsibility of own learning, working independently

  • Awareness of personal safety and impact it can have both positive and negative

  • Awareness of safety and legal issues in terms of copyright laws and other legislations

  • This will lead us to the hardware we use for the devices we use.

Year 7 - Term 2

Term 2 

What?

Understanding computers: It is a theoretical unit covering the basic principles of computer architecture and use of binary.

Students will revise some of the theory on input and output covered in previous learning and continue to look at the Input-Process-Output sequence and the Fetch-Decode-Execute cycle through practical activities.

We will interleave career paths in computing.

Students find technical language/keywords and meaning difficult due to infrequent use outside of the class.

Visualising how the individual components work together and processes taking place internally.

 

Why?

To understand how the equipment we use work and connect together.

To understand various gadgets and tools that serves a function in our daily lives.

More vulnerable students do require extra support in showing tools and technology that could be to benefit to society and to them.

How?  

Core knowledge:  

Students can identify different parts of hardware and also categorise them into input and output devices.

The purpose and functions of a piece of hardware and memory.

Students will have access to all lesson material used in advance, keywords and meaning. Activities will be differentiated.

 

How well? 

Learning checkpoints: Key word quiz and multiple choice assessment at the end of the term on different parts of computer hardware, input and output devices.

Where next?

  • Taking personal responsibility and responsibility of own learning, working independently

  • Awareness of personal safety and impact it can have both positive and negative

  • Awareness of safety and legal issues in terms of copyright laws and other legislations

  • This will lead us to the hardware we use for the devices we use.

Year 7 - Term 3

Term 3 

What?

Using the computer safely and purposefully: It is a practical unit covering the basic principles of searching for information safely, using the online tool to familiarise keys on keyboard and composing a letter.

We will interleave career paths in computing.

Students find technical language/keywords and meaning difficult due to infrequent use outside of the class.

Logging in and remember username passwords is also challenging.

Visualising how the individual components work together and processes taking place internally.

 

Why?

To understand how to search for reliable information online and to distinguish what is reliable.

To familiarise with the position of the keys on the keyboard to improve speed and accuracy.

To demonstrate use of software to compose a letter using MS Word.

More vulnerable students do require extra support in showing tools and technology that could be to benefit to society and to them.

How?  

Core knowledge:  

Students can identify different ways to behave online and to identify what information is reliable and what isn’t.

Students can access online typing resources to practice using keys on the keyboard.

Students can layout a formal letter.

Students will have access to all lesson material used in advance, keywords and meaning. Activities will be differentiated.

 

How well? 

Learning checkpoints: Key word quiz and multiple choice assessment at the end of the term on the lessons covered.

Where next?

  • Taking personal responsibility and responsibility of own learning, working independently

  • Awareness of personal safety and impact it can have both positive and negative

  • Awareness of using tools and equipment efficiently

  • This will lead us to the hardware we use for the devices we use.

Year 7 - Term 4

Term 4 

What?

Understanding what are computers, distinguish between hardware, software, input and output devices.

Understand that the CPU is responsible for all processing of data, memory and storage allocation.

Understanding units of data.

Students find technical language/keywords and meaning difficult due to infrequent use outside of the class.

Logging in and remember username passwords is also challenging. Visualising how the individual components work together and processes taking place internally.

Why?

To differentiate between different parts of the computer and the role it plays in the cost of a computer.

More vulnerable students do require extra support in showing tools and technology that could be to benefit to society and to them.

How?  

Core knowledge:  

Understanding what are computers, distinguish between hardware, software, input and output devices.

Draw a block diagram of the main components of a computer: input, processor, output and storage.

Distinguish between main memory and permanent storage devices.

Students will have access to all lesson material used in advance, keywords and meaning. Activities will be differentiated.

How well? 

Learning checkpoints: Key word quiz and multiple choice assessment at the end of the term on the lessons covered.

Where next?

  • Taking personal responsibility and responsibility of own learning, working independently

  • Awareness of equipment and resources we use and how it is interlinked

  • Awareness of how price is impacted based on computer speed, processing and storage

  • This will lead us to the hardware we use for the devices we use.

Year 8 - Term 1

Term 1 

What?

My Digital World - Knowing What to Trust Online. 

We will be learning what to look for in websites when deciding if they are trustworthy and reliable. 

We will practice evaluating a range of websites for trustworthiness and reliability based on a set criteria. 

We will learn how to perform searches on search engines to ensure efficiency.  

We will look at Copywrite Laws and infringement of Copyright Laws.         

Password reset/ Password issues are the challenges for most in the first few lessons back after the summer.

Why?

To understand that not all information online is reliable and how to used online material effectively without breaking laws. As information is abundant online, being able to use search criteria to speed up what you are looking for, can be very helpful, especially when students are doing research for homework/school work. 

More vulnerable students do require extra support in understanding the content of website and how it can be unreliable or when breaking copyright laws.

How?  

Core knowledge:  

  • Students can identify if the information available on a website is trustworthy and reliable
  • Be able to complete different types of searches to achieve effective results
  • Look at copyright laws and avoid plagiarism. 

 

 

How well? 

Learning checkpoints: Key word quiz and multiple choice assessment at the end of the term based on what has been taught.

Students need to identify websites that are safe to provide personal information and how to identify which website is reliable/trustworthy.

To demonstrate understanding of Copyright Laws and impact it can have on an individual if they do break the law.

Identify search criteria terms.

Where next?

  • Create own website using HTML and CSS programming - designing and creating content for websites.

Year 8 - Term 2

Term 2 

What?

We are learning how to create our own website using HTML & CSS which will interleave with the careers in computing.

Students find accuracy in programming difficult and following the syntax of a programming language.

Why?

To enable students to independently create their own webpage or to adapt a webpage.

To understand how effective websites can be if created well and how to adapt it if required.

More vulnerable students do require extra support in showing tools and technology that could be to benefit to society and to them that could lead to a potential career in web development.

How?  

Core knowledge:  

  • Students will look at various websites and understand how design can affect the appearance and perception
  • Students will create their own website using HTML and CSS code (using Brackets)
  • Understand how to insert and alter the look of images using CSS code
  • Use DIV tags for formatting
  • Understand what DIV tags are used for
  • Understand how to add divisions into a webpage
  • Understand how to apply different CSS code to different divisions
  • To create a webpage which contains Divisions and where CSS code applies different styles to the different divisions.

How well? 

Learning checkpoints: Key word quiz and multiple choice assessment at the end of the term based on what has been taught.

Where next?

  • Data representation and how everything we use on the computer is converted into Binary
  • Looking at Binary to Denary conversion and vice versa
  • Looking at ASCII code and code breaking.

 

Year 8 - Term 3

Term 3 

What?

We are learning how data is represented and stored in a computer.

Performing binary addition, binary to denary conversion and vice versa.

We are learning how characters are represented in a computer using ASCII characters.

Students find accuracy to detail challenging and maths concepts of addition and place holder values for binary numbers.

Why?

To enable students to understand that data gets converted to 1s and 0s regardless of type of data.

To understand how we can convert between binary numbers to denary and use ASCII character sets for characters.

More vulnerable students do require extra support in understanding the maths concepts involved but having knowledge and interleaving with another core subject could lead to better attainment overall.

How?  

Core knowledge:  

  • Understand the binary number system
  • Understand why it is important in computing
  • Understand how to add binary number together
  • Understand that in a computer system, characters are represented by binary numbers.

How well? 

Learning checkpoints: Key word quiz and multiple choice assessment at the end of the term based on what has been taught.

Where next?

  • Data representation and how everything we use on the computer is converted into Binary
  • Looking at Binary to Denary conversion and vice versa
  • Looking at ASCII code and code breaking
  • Moving onto Images and editing images next term.

 

Year 8 - Term 4

Term 4 

What?

We are learning how to manipulate and edit images.

How the colours used may evoke different emotions.

How cloning can be used in photo editing to change the composition.

Identifying if images have been edited or had filters added.

Students find accuracy to detail challenging following steps in sequence.

Why?

Images play a crucial part in social media and body image of young people as well as web technologies, and using a free tool like paint.net will enable students to see how images can play a important role in people’s perception and can lead to different career paths like social media marketing, social media influencer, Web developer.

How?  

Core knowledge:  

  • Can manipulate and edit an image using paint.net
  • Can identify emotional changes that may occur with different colours and scenes
  • Can clone and edit an image using paint.net

How well? 

Learning checkpoints: Key word quiz and multiple choice assessment at the end of the term based on what has been taught.

Where next?

  • We will be moving onto using Microsoft Office software.

Year 9 - Term 1

Term 1 

What?

We are revisiting programming using Python, interleaved with the careers in computing. 

Students find accuracy in programming difficult and following the syntax of a programming language.

Students also find it challenging to sequence a program to reach a particular outcome.

Why?

To enable students to independently plan and develop their own program to produce a desired outcome as this is a requirement in GCSE. 

To ensure students practice their programming skills that they have acquired in Year 7 and Year 8. 

More vulnerable students do require extra support in showing tools and technology that could be to benefit to society and to them that could lead to a potential career in web development. 

How?  

Core knowledge:  

  • Learn to write algorithms in pseudocode 
  • Review the difference between syntax errors, run-time errors and logic errors 
  • Learn techniques for debugging programs•
  • Use a while loop in a program 
  • Use an if statement within a while loop•  
  • Be able to apply python knowledge to create own program independently – apply if, else and loop to program 

Students will have access to all resources used during lessons in advance. 

 

 

How well? 

Learning checkpoints: Key word quiz and multiple choice assessment at the end of the term based on what has been taught. 

Students should know the difference between logic error and syntax errors.  

Students should be able to write a basic program that takes input, stores value and outputs 

Students should be able to perform calculations using python programming

Where next?

  • We will move onto cyber security next term.

Year 9 - Term 2

Term 2 

What?

We are learning Cyber security.

We are learning about data and information and what happens to that data/information once it is available online.

We are learning how data available about us online provides social profiling which leads to what information we see online.

We are learning about the need for the Computer Misuse Act.

Students find it difficult to understand that their data/information that they provide on an online platform has any impact.

Why?

To provide knowledge to students on the impact their presence online has and also develop knowledge for GCSE.

To ensure students can make an informed decision when choosing their options.

More vulnerable students do require extra support in understanding concepts and scenarios where data breach may arise.

How?  

Core knowledge:  

  • Explain the difference between data and information
  • Critique online services in relation to data privacy
  • Identify what happens to data entered online
  • Explain the need for the Data Protection Act
  • Recognise how human errors pose security risks to data
  • Implement strategies to minimise the risk of data being compromised through human error
  • Define hacking in the context of cybersecurity
  • Explain how a DDoS attack can impact users of online services
  • Identify strategies to reduce the chance of a brute force attack being successful
  • Explain the need for the Computer Misuse Act

Students will have access to all resources used during lessons in advance. 

How well? 

Learning checkpoints: Key word quiz and multiple choice assessment at the end of the term based on what has been taught. 

Students should know the difference between data and information.

Students should be able to identify concept of social engineering and impact on society/world/politics etc.

Students should be able to identify Computer Misuse Act.

Students should be able to perform calculations using python programming

Where next?

  • We will move onto data science next term.

Year 9 - Term 3

Term 3 

What?

The aim of this unit is to introduce the learners to data science, and in particular the usefulness of visualising data and how this can provide insights that may not be obvious when you are looking at raw data.

Students find it difficult to understand that data can have meaning before it is processed.

Why?

To provide knowledge to students on the impact their data has and how it can be used.

To ensure students can make an informed decision when choosing their options and career path as a Data analyst.

More vulnerable students do require extra support in understanding concepts and scenarios where data breach may arise.

How?  

Core knowledge:  

  • To be able to define data science
  • Explain how visualising data can help us to identify patterns and trends in order to gain insights
  • Use an appropriate software tool to visualise data sets and look for patterns or trends
  • Recognise examples of where large data sets are used in daily life
  • Select criteria and use data sets to investigate predictions
  • Evaluate findings to support arguments in favour of or against a prediction
  • Define the terms correlation and outliers in relation to data trends
  • Identify the steps of the investigative cycle
  • Solve a problem by implementing steps of the investigative cycle on a data set
  • Use findings to support a recommendation

Students will have access to all resources used during lessons in advance. 

How well? 

Learning checkpoints: Key word quiz and multiple choice assessment at the end of the term based on what has been taught. 

Students should know the difference between data and information.

Students should be able to investigate data sets and make predictions.

Students should be able to Identify data needed to answer a question defined by the learner.

Where next?

  • We will move onto system software next term.

Year 9 - Term 4

Term 4 

What?

We are learning about System Software, which manages the hardware and software resources of a computer system and provides an interface for the user.

Students find it difficult to conceptualise what is happening internally inside a computer and with technical terminology.

Why?

To provide knowledge to students on system software that they use and also pre learning for GCSE topic.

More vulnerable students do require extra support in understanding concepts and scenarios where data breach may arise.

How?  

Core knowledge:  

  • To understand the purpose of an operating system
  • To understand the 5 major roles that an operating system provides
  • To understand the purpose of ‘Utility Software’ in a computer system
  • To understand the roles of a variety of utility software
  • To know the purpose and functionality of operating systems
  • To know the different types of user interface and understand the features of each

Students will have access to all resources used during lessons in advance. 

How well? 

Learning checkpoints: Key word quiz and multiple choice assessment at the end of the term based on what has been taught. 

Students should know the difference between data and information.

Students should be able to investigate data sets and make predictions.

Students should be able to Identify data needed to answer a question defined by the learner.

Where next?

  • We will move onto networks next term.

Year 10 - Term 1

Term 1 

What?

We are learning about data storage of numbers & characters, logic gates and creating and refining algorithms for programming. We are also learning Python programming 

Students find it challenging to conceptualise sequencing of an algorithm in the order of an outcome. Accuracy can also be challenging for logic gates. 

Why?

To provide knowledge to students for their GCSE. 

To ensure students can understand the basis of program design from the onset. 

More vulnerable students do require extra support in understanding concepts and scenarios. 

How?  

Core knowledge:  

  • 2.4.1 Boolean logic 
  • 1.2.4 Data storage - Numbers 
  • 2.1.2 Designing, creating and refining algorithms 
  • 2.1.1 Computational thinking 

Programming practice using Python 

Students will have access to all resources used during lessons in advance-PowerPoints, keywords, worksheets. Regular one-to-one feedback. 

How well? 

Learning checkpoints: Key word quiz and multiple choice assessment at the end of topic assessments based on what has been taught. 

Students should know the units data in measured in and storage capacity.  

Students should be able to identify logic gates, create Truth Tables and create a logic gate circuit based on an equation. 

Students should be able break down a problem to create algorithms using flowcharts and Pseudocode. 

Where next?

  • We will continue with Data storage of Images and compression 

  • 2.1.2 Designing, creating and refining algorithms 

  • Programming practice

Year 10 - Term 2

Term 2 

What?

We are learning about data; creating and refining algorithms for programming.

We are also learning Python programming.

Students find it challenging to conceptualise sequencing of an algorithm in the order of an outcome.

Accuracy can also be challenging for logic gates.

Why?

To provide knowledge to students for their GCSE.

To ensure students can understand the basis of program design from the onset.

More vulnerable students do require extra support in understanding concepts and scenarios.

How?  

Core knowledge:  

  • 2.1.2 Designing, creating and refining algorithms
  • 2.2.1 Programming fundamentals
  • 2.2.2 Data types
  • Practical Programming Skills

Students will have access to all resources used during lessons in advance-PowerPoints, keywords, worksheets. Regular one-to-one feedback. 

How well? 

Learning checkpoints: Key word quiz and multiple choice assessment at the end of topic assessments based on what has been taught. 

Students should know the data types for programming

Students should be able to programming concepts Sequence, Selection and Iteration.

Students should be able break down a problem to create algorithms using flowcharts and Pseudocode.

Where next?

  • 2.2.3 Additional programming techniques.

Year 10 - Term 3

Term 3 

What?

We are learning about programming techniques and algorithms by using practical programming skills.

We are learning about architecture of the CPU and how common characteristics of CPU can affect performance.

We are learning about embedded systems.

Students find it challenging to conceptualise sequencing of an algorithm for a specific outcome, visualising what is happening internally inside a CPU.

Why?

To provide knowledge to students for their GCSE specification of component 1&2.

To ensure students can understand how the CPU works and the importance it has on whole computer system.

More vulnerable students do require extra support in understanding concepts and scenarios.

How?  

Core knowledge:  

  • Creating and refining algorithms, Programming fundamentals, Practical Programming Skills
  • Understand what the CPU of a computer does, what the registers in a CPU are, and the stages of the fetch, execute cycle
  • Describe the Von Neumann architecture and know the components of the Von Neumann architecture.
  • Know what factors affect the speed of a CPU
  • Know what is meant by the term: ‘embedded system’, and examples of embedded systems

Students will have access to all resources used during lessons in advance-PowerPoints, keywords, worksheets. Regular one-to-one feedback. 

How well? 

Learning checkpoints: Key word quiz and multiple choice assessment at the end of topic assessments based on what has been taught. 

Students should know the basic fundamentals of programming.

Students should be able to programming concepts Sequence, Selection and Iteration.

Students should be able identify the purpose of a CPU, the fetch execute life cycle, factors that affect performance of a CPU, and know the purpose of an embedded system.

Where next?

  • We will move onto memory and storage, and practical programming exercises.

Year 10 - Term 4

Term 4 

What?

We are learning about programming techniques and algorithms by using practical programming skills .

We are learning about primary and secondary storage.

Students find it challenging to conceptualise sequencing of an algorithm for a specific outcome, visualising how different storage work and how data is stored.

Applying knowledge to a given scenario.

Why?

To provide knowledge to students for their GCSE specification of component 1&2.

To ensure students can understand the difference between primary and secondary storage, RAM and ROM, and what type of storage is suitable for a given scenario.

More vulnerable students do require extra support in understanding concepts and scenarios.

How?  

Core knowledge:  

  • Practical programming skills
  • Understand the need for primary storage
  • Know the difference between RAM and ROM
  • Know the purpose of RAM and ROM in a computer system
  • Understand the need for virtual memory
  • Understand the need for secondary storage
  • Know the common types of storage and what it is used for
  • Know the characteristics of storage devices
  • Understand how to program
  • Understand the suitability of storage devices for given applications.

Students will have access to all resources used during lessons in advance - PowerPoints, keywords, worksheets. Regular one-to-one feedback. 

How well? 

Learning checkpoints: Key word quiz and multiple choice assessment at the end of topic assessments based on what has been taught. 

Students should know the basic fundamentals of programming.

Students should be able to programming concepts; Sequence, Selection and Iteration.

Students should be able identify the purpose of a CPU, the fetch execute life cycle, factors that affect performance of a CPU, and know the purpose of an embedded system.

Where next?

  • We will move onto character sets, compression, sound storage, bitmaps, and practical programming exercises.

Year 12 - Term 1

Term 1 

What?

We are learning how different input output and storage devices can be applied to the solution of different problems and applications of the storage devices.  Simple problem solving tasks in Python using programming construct of sequence selection and iteration using Intergrated Development Environment. 

We will also be learning about the system architecture. 

Why?

To provide knowledge to students for their A-Level and programming project. 

To ensure students can understand the basis of program design from the onset. 

More vulnerable students do require extra support in understanding concepts and scenarios.

How?  

Core knowledge:  

1.1.3 

a) How different input output and storage devices can be applied to the solution of different problems 

b) The uses of magnetic, flash and optical storage devices, RAM and ROM, Virtual storage 

2.1.2 Thinking ahead (introduced) Simple problem solving tasks 

2.2.1 Introduction to the Use of an IDE to develop/debug a program Procedural/Imperative language IDE of Centre’s choice 

1.2.3 b) Writing and following algorithms 

2.2.1 Programming constructs: sequence, iteration, branching. Programming exercises involving sequence 

5 1.1.1 a) The Arithmetic and Logic Unit; ALU, Control Unit and Registers (Program Counter; PC, Accumulator;  ACC, Memory Address Register; MAR, Memory Data  Register; MDR, Current Instruction Register; CIR):  How this relates to assembly language programs  

b) The Fetch-Decode-Execute Cycle 

2.1.4 Thinking logically (introduced) 

2.2.1 a) Programming constructs: sequence, iteration,  branching. Programming exercises involving branching (IF, nested IF, SELECT/CASE) 

Students will have access to all resources used during lessons in advance-PowerPoints, keywords, worksheets. Regular one-to-one feedback. Access to online subscription such as Isaac Computing, CraignDave, TeachICT

How well? 

Learning checkpoints: Key word quiz and exam questions will be used throughout and end of term. 

Students should know different types of input and output devices and apply to real life scenarios. 

Students should know different types of storage devices available and suitability to real life scenarios. 

Students should be able to demonstrate understanding of system architecture and registers. 

Students should be able break down a problem to create algorithms using flowcharts/Pseudocode and apply programming constructs. 

Where next?

  • Operating systems, processors, device drivers 

  • Programming  

  • Data representation

Year 12 - Term 2

Term 2 

What?

We are learning how operating systems function and purpose of operating systems.

We are learning about number representation and different types of programming language.

We are also looking at programming project proposal for component 3 of the course.

Why?

To provide knowledge to students for their A-Level and programming project. 

To ensure students can understand and apply course content.

More vulnerable students do require extra support in understanding concepts and scenarios.

How?  

Core knowledge:  

  • 1.2.1 Operating systems
  • 1.4.1 Represent positive numbers
  • Application software
  • Procedural programming languages

Students will have access to all resources used during lessons in advance - PowerPoints, keywords, worksheets. Regular one-to-one feedback. 

How well? 

Learning checkpoints: Key word quiz and exam questions will be used throughout and end of term. 

Students should know different types number representation.

Students should know different types of operating systems and functions.

Students should be have knowledge of different programming languages.

Students should be able to make informed choices on future programming project.

Where next?

  • We will continue with number representation and programming.

Year 12 - Term 3

Term 3 

What?

We are learning about binary and hexadecimal number representation.

We are also looking at programming project proposal for component 3 of the course and well as practical programming.

Why?

To provide knowledge to students for their A-Level and programming project.

To ensure students can understand and apply course content.

More vulnerable students do require extra support in understanding concepts and scenarios.

How?  

Core knowledge:  

1.4.1

  1. Represent positive integers in binary
  2. Use of Sign and Magnitude and Two’s Complement to represent negative numbers in binary
  3. Addition and subtraction of binary integers
  4. Represent positive integers in hexadecimal
  5. Representation and normalisation of floating point numbers in binary
  6. Floating point arithmetic, positive and negative numbers, addition and subtraction
  7. Bitwise manipulation and masks: shifts, combining with AND, OR, and XOR
  8. How character sets (ASCII and UNICODE) are used to represent text

2.1.3 - Thinking Procedurally (introduced)

2.2.1

  1. Global and local variables
  2. Modularity, functions and procedures, parameter passing by value and by reference

2.2.2

  1. Features that make a problem solvable by computational methods
  2. Problem Recognition
  3. Problem Decomposition
  4. Use of divide and conquer

Programming exercises involving functions, procedures and parameters.

Students will have access to all resources used during lessons in advance - PowerPoints, keywords, worksheets. Regular one-to-one feedback. 

How well? 

Learning checkpoints: Key word quiz and exam questions will be used throughout and end of term. 

Students should know how to apply functions, procedures parameters and arrays in a program.

Students should know to identify and a problem, decompose and find solution.

Students should be be able to apply knowledge of binary and hexadecimal numbers to find a solution to a problem

Students should be able to make informed choices on future programming project.

Where next?

  • We will move onto programming, and data structures and different methodologies.

Year 12 - Term 4

Term 4 

What?

Programming and algorithms.

Data structures for storing data and different methodologies.

Using Boolean logic

Why?

To provide knowledge to students for their A-Level and programming project.

To ensure students can understand and apply course content.

More vulnerable students do require extra support in understanding concepts and scenarios.

How?  

Core knowledge:  

1.4.2 - Structures to store data: linked-list, graph (directed and undirected), stack, queue, tree, binary search tree, hash table. How to create, traverse, add data to and remove data from the data structures mentioned above

1.2.3

  1. Understand the waterfall lifecycle, agilemethodologies, extreme programming, thespiral model and rapid application development
  2. The relative merits and drawbacks of differentmethodologies and when they might be used

1.4.3

  1. Define problems using Boolean logic
  2. Use the following rules to derive or simplify statements in Boolean algebra: De Morgan’s Laws, distribution, association, commutation, double negation

2.3.1

  1. Analysis and design of algorithms for a given situation
  2. The suitability of different algorithms for a given task and data set, in terms of execution time and space
  3. Algorithms for the main data structures, (Stacks, queues, trees, linked lists, depth-first (post-order) and breadth-first traversal of trees
  4. Standard algorithms (Bubble sort, insertion sort, merge sort, quick sort, Dijkstra’s shortest path algorithm, A* algorithm, binary search and linear search)

2.2.2

  1. Features that make a problem solvable by computational methods
  2. Problem Recognition
  3. Problem Decomposition
  4. Use of divide and conquer

Programming exercises involving functions, procedures and parameters.

Students will have access to all resources used during lessons in advance - PowerPoints, keywords, worksheets. Regular one-to-one feedback. 

How well? 

Learning checkpoints: Key word quiz and exam questions will be used throughout and end of term. 

Students should know how to apply their knowledge of data structures to workout the outcome of a given scenario.

Students should know to identify and a problem, decompose and find solution to the best methodology for the scenario.

Students should be be able to apply their knowledge of Boolean logic to provide a solution to a given problem.

Students should be able to make informed choices on creating / modifying algorithms for a specific task.

Where next?

  • Programming
  • Little man computing, Lossy and Lossless compression, Relational databases

Year 13 - Term 1

Term 1 

What?

We are learning how about Object-oriented languages (using Java/C++ style pseudocode) with an understanding of classes, objects, methods, attributes, inheritance, encapsulation and polymorphism.

Why?

To provide knowledge to students for their A-Level and programming project. 

To ensure students can understand and apply course content. 

More vulnerable students do require extra support in understanding concepts and scenarios.  

How?  

Core knowledge:  

1.2.4 

d) Object-oriented languages (using Java/C++ style pseudocode) with an understanding of classes, objects, methods, attributes, inheritance, encapsulation and polymorphism 

2.1.1 

  • Thinking abstractly (introduced) 
  • Practical OO programming 

Students will have access to all resources used during lessons in advance-PowerPoints, keywords, worksheets. Regular one-to-one feedback.

How well? 

Learning checkpoints: Key word quiz and exam questions will be used throughout and end of term. 

Students should know different types programming. 

Students should know different types of OO programming aspects such as classes, objects, methods, attributes,inheritance, encapsulation and polymorphism. 

Students should be able to make informed choices on future programming project. 

Where next?

  • Continue working on NEA 
  • Programming 
  • Processors 
  • Memory management  

Year 13 - Term 2

Term 2 

What?

We are learning how different processors compare in a given situation, memory allocation and management.

We will also learn about computational thinking and features that make a problem solvable by computational methods.

Why?

To provide knowledge to students for their A-Level and programming project. 

To ensure students can understand and apply course content. 

More vulnerable students do require extra support in understanding concepts and scenarios.  

How?  

Core knowledge:  

1.1.2

  1. The differences between and uses of CISC and RISC processors
  2. GPUs and their uses (including those not related tographics)
  3. Multicore and Parallel systems

1.1.1 

  • The use of pipelining in a processor to improve efficiency

2.2.2

  1. Use of abstraction
  2. Candidates should apply their knowledge of: Backtracking; data mining; heuristics; performance modelling; pipelining; visualisation, to solving problems

2.1.5 - Thinking concurrently (introduction). Programming exercises complex enough to demonstrateand utilise computational methods.

1.2.1 - Memory Management (paging, segmentation and virtual memory). Features that make a problem solvable by computational methods.

Students will have access to all resources used during lessons in advance-PowerPoints, keywords, worksheets. Regular one-to-one feedback. Access to online subscription such as Isaac Computing, CraignDave, TeachICT.

How well? 

Learning checkpoints: Key word quiz and exam questions will be used throughout and end of term. 

Students should know different types of processors.

Students should know different programming constructs and be able to create code/pseudocode for a given computational scenario.

Students should be able to make informed choices on NEA.

Where next?

  • Continue working on NEA 
  • Programming 
  • Software development methodologies and applications 

Year 13 - Term 3

Term 3 

What?

We are learning about the component 3 of course (programming project) and looking at the design, problem, solution and testing involved.

We will also review topics from the diagnostics i.e. Methodologies, Legal and Ethical issues, Programming and algorithms.

Students find applying knowledge learned to a given scenario challenging. Answers are not specific enough to the topic given.

Why?

To provide knowledge to students for their A-Level and programming project. 

To ensure students can understand and apply course content. 

More vulnerable students do require extra support in understanding concepts and scenarios.  

How?  

Core knowledge:  

3.2 - Design

3.2.1 - Decompose the problem

3.2.2 - Describe the solution

3.3.2 - Describe the approach to testing

Students need to have a solid understanding of Methodologies, Legal and Ethical issues, Programming paradigms and algorithms and be able to apply it to any given scenario.

Students will have access to all resources used during lessons in advance-PowerPoints, keywords, worksheets. Regular one-to-one feedback. Access to online subscription such as Isaac Computing, CraignDave, TeachICT.

How well? 

Learning checkpoints: Key word quiz and exam questions will be used throughout and end of term. 

Students should know different Methodologies, Legal and Ethical issues, Programming paradigms and algorithms.

Students should know different programming constructs and be able to create code/pseudocode for a given computational scenario.

Students should be able to make informed choices on NEA.

Where next?

  • Continue working on NEA 
  • Programming 
  • Software development methodologies and applications 

Year 13 - Term 4

Term 4 

What?

We are completing our NEA for submission and revising topics from course based on diagnostics.

Students find applying knowledge to any given scenario challenging. Answers are not specific enough to the topic given.

Students find completing the NEA documentation challenging due to lack of confidence in coding.

Why?

To provide knowledge to students for their A-Level and programming project. 

To ensure students can understand and apply course content. 

More vulnerable students do require extra support in understanding concepts and scenarios.  

How?  

Core knowledge:  

3.3 - Developing (and testing) the solution

3.3.1 - Iterative development process

3.3.2 - Development Testing

3.3.3 - Post development testing

3.4 - Evaluation

3.4.1 - Success of solution

3.4.2 - Describe the final product

3.4.3 - Maintenance and development.

Students need to have a clear understanding of the outcome and expectations of the NEA project and remember to complete the cyclic analysis, design, testing of each testing section completed. This ensures outcome met or rectified. Also, it is a good indication of authencity of the project.

Students also need to ensure regular revision of various topics is carried out based on their individual strengths and weaknesses using diagnostic spreadsheets that is shared with them.

Students will have access to all resources used during lessons in advance-PowerPoints, keywords, worksheets. Regular one-to-one feedback. Access to online subscription such as Isaac Computing, CraignDave, TeachICT.

How well? 

Learning checkpoints: Key word quiz and exam questions will be used throughout and end of term. 

Students should know expectations of NEA submission

Students should know different programming constructs and be able to create code/pseudocode for a given computational scenario.

Students should be able to make informed choices on NEA.

Where next?

  • Programming 
  • Revision 
Your browser is out-of-date!

Update your browser to view this website correctly. Update my browser now

×