Computing Curriculum Guide

Page 1


“Whether you want to uncover the secrets of the Universe,

or you want to pursue a career in the 21st Century, basic Computer Programming is an essential skill to learn.” - Stephen Hawking We live in the Computer Age and are surrounded by a myriad of examples of it’s digital technology. Our lives are circumscribed by it, from work to leisure and every area between. Digital literacy is arguably as important as literacy. To make the most of what the world now offers, we will need to understand how these technologies work and what impact they have on our lives. Further, it is essential that we are able to maximise the way in which technology can help us develop as a well rounded and self-sufficient member of today’s society. As global citizens, we must be discerning of the information available, able to it, analyse it, use it and create it in a morally and ethically unassailable manner.


Knowledge Term 1 13

Skills

Term 2

Term 3

Project (Examined)

Applications Generation Project (Examined)

Project Examination

Types of Processor

Project (Examined)

External Examinations

Computing related Legislation Moral and Ethical Issues

Systems Software Computational Methods

Applications Generation Programming techniques

11

10

Data Structures Boolean Algebra Software Development Algorithms

Ethical Impact of Technology

Review of Programming

Preparation Network Communication

Non-Examined Assessment (NEA)

Non-Examined Assessment (NEA)

Data Structures

Problem Solving Programming (Python) Components of a Computer Programming Concepts

Networks Programming Structures Environmental Impact of Technology Exchanging Data Programming Review

Types of Programming Languages Compression, Encryption and Hashing Networks Databases Web Technologies Review and Revision GCSE Exams

Data Representation Internal Components Programming Methods The Bigger Picture Network Security

Review of eSafety Computer Crime and Cyber Security

Text-based Code Review [Python] Python Next Steps

Practical Programming Revision Techniques

8

eSafety Elements of a Computer

More Visual Programming [FMS Logo] Introduction to Text-based Co [Python]

Algorithms and Computational Methods Programming Journal [Update] Revision Techniques

7

Induction eSafety eSafety Presentation Introduction to Computers

9

Visual Programming [FMS Logo] Applications [Spreadsheets]

Applications [Spreadsheets] Programming Journal [Update] Revision Techniques

Communication and the Network

Computational Thinking Systems Software

Problem solving and programming

Data & Data Representation

Structure and function of the Processor

Data Types

Programming and Development

Input, output and storage

Problem Solving / Algorithms

12


The focus for Year 7 is to both introduce them to the workings of the technology that is ubiquitous in today’s World and to give them a basic understanding for now to use this safely. We begin with a tailored overview of the Digital World they inhabit, focusing on how it can be navigated safely by being aware of the dangers it presents, bringing awareness of Phishing, Cyberbullying and other forms of potential dangers concomitant with having a digital presence. We look at what defines a computer, using specific examples through history to illustrate this. This leads from Alan Turing and Colossus to Tim Berners-Lee and the creation of the World Wide Web, then on to Moore’s Law as we consider how computing will progress. Students then begin their journey into computational thinking. This begins with an immersion into a visual programming language, designed to lead them gently through programming concepts by getting them to work on more and more complex tasks - building upon earlier tasks and tools they have put together themselves. This is detailed in a contemporaneous journal which serves to reinforce the logical steps they are undertaking. Their journey concludes with a practical application of computational modelling in the form of spreadsheet usage. They move from identifying the components and syntax of a spreadsheet to being tasked to create simple models for problems with them - taking design requirements and translating these into a modelled solution.


Term 1

Topic

Summary of Content

Assessment

Induction

eSafety Presentation

Term 2 Visual Programming [FMS Logo]

Applications [Spreadsheets]

eSafety

Introduction to Computers

Induction covers an introduction of the basics for students using ICT facilities at Holyport College.

The eSafety Presentation is a group based project to display an aspect of eSafety which they researched.

Visual Programming [FMS Logo]

5. Logo Journal [Tracking the methods they learned].

1. Basic Usage [syntax]

Applications [Spreadsheets]

Introduction to Computers This gives pupils an Insight into what makes a computer, with examples through history (focus on Colossus/ENIAC) leading students through to consider Moore’s Law to gain a view of computers

2. Simple Methods [Basic Commands, Creating Basic Shapes]

1. Introduction [Functionality and usage]

eSafety This is an overview of internet safety; covering how social media affects students, cyber bullying, Digital footprint, email scams and the methods they can apply to best ensure online safety.

Trial

3 . Teaching Shapes [EdAll and ‘Do’ methods] 4. Procedures [Advanced shapes and parameters]

2. Basics [Simple Terms and Methods] 3. Formulae [Referencing cells, simple operations]

Term 3 Applications [Spreadsheets] Applications [Spreadsheets]

Programming Journal [Update] Revision Techniques Programming Journal Update

4. Functions [usage of Review and Basic functions, consolidation: intermediate references 1. Group Journal for and basic formatting]. eSafety with 5. Problem Solving presentations [Problem solving using a spread- sheet model] 2. Solo Journals for FMS Logo updates. 3. Solo Journal to explain use, and modelling, in spreadsheets. Revision: [Techniques and good practice]

Trail

End of Year Trial


The focus for Year 8 is to introduce them to the inner workings of the very computers they take for granted and expose them to the basics of Computer Programming. We begin by investigating the elements of a computer, looking at components such as the CPU and storage devices. To build on this, they are shown the fundamentals of binary, including how binary addition is used. Students are then introduced to computer programming, and hence exposed to computational methods and algorithms. Initially this is done using a visual programming language (LOGO), a modern iteration of ‘turtle graphics’ developed in 1966 and which has stood the test of time. It allows students to develop their computational and logical thinking skills as they move through a series of tasks to create shapes. Following on from this, the students will be introduced to a text based programming language namely Python. This is a language well suited to teaching since it relies on a reduced instruction set and a simpler design for code blocks. They are shown the fundamentals of syntax and the constructs needed to create simpler programs. Finally, this is followed up by an introduction to algorithms, using flow charts to illustrate the program logic needed to program specific tasks - giving context for the steps between a problem’s initial definition and the resultant final code blocks.


Term 1

Topic

eSafety

A review of online safety: Cyber bullying, Digital footprints, Email scams, Phishing, Malware Summary of and methods to best Content mitigate these and so ensure online safety.

Assessment

Elements of a Computer Covering: Computer Basics, The CPU, Binary overview, Binary Addition, Storage Devices, New Technology

Term 2 More Visual Programming [FMS Logo] 1. Simple Methods [Review of Basic Shapes and Commands]

2. Algorithms and Programming 3. Procedures in Programming

Introduction to Text-based Code [Python]

Algorithms and Computational Methods

Programming Journal [Update] Revision Techniques

1. Strings and Variables

1. Writing Algorithms Review and [Pseudocode] consolidation:

2. Numbers and Arithmetic

2. Flowcharts and program logic.

3. Selection Statements

3. Solo Journal to explain use of Algorithms.

4. Loops [while]

4. Parameters

Trial

Term 3

Trail

1. Pair based Journal for single eSafety topic with projects 2. Solo Journals for FMS Logo updates. Revision: [Techniques and good practice]

End of Year Trial


Year 9 focuses on the introduction of some of the basic skills and information needed in preparation for being built upon in the Computer Science GCSE. Initially we cover computer crime and the cyber security used to counter it. It introduces the concept of Hacking, as defined by the Computer Misuse Act UK (1990), and runs through many of the hazards such as email scams and phishing. We look at the safety of personal data and it’s protections, such as copyright. Following on from this, the students will review the fundamentals of Python programming and the IDE used to create it that they studied previously. They are then led through the next steps towards being more confident programmers. This builds on the fundamentals and introduces new concepts such as lists and procedures. Finally, the students cover and overview of networks. This covers the simpler network topologies, computer connectivity - which leads to the internet - and finally encryption something that is both essential and ubiquitous in all modern day communications.


Term 1 Review of eSafety Topic

Computer Crime and Cyber Security

A review of online safety. Cyber bullying, Digital footprints, Email scams, Phishing, Malware and Summary of methods to best Content mitigate these and so ensure online safety.

Computer Crime and Cyber Security Online Hazards, including: Email Scams, Phishing, Hacking, Personal Data, Copyright, and Health & Safety

Term 2 Text-based Code Review [Python] 1. The IDE

Python Next Steps 1. Using the Basics

2. Strings and Varia- 2. Using Loops bles 3. Using Lists 3. Numbers and 4. Using Procedures Arithmetic 5. Using Functions 4. Selection Statements

Term 3

Networks

1. The Internet 2. Connectivity 3. Topologies 4. Client-Server 5. Encryption

Practical Programming Revision Techniques 1. Task based programming 2. Debugging techniques Revision: [Techniques and good practice]

5. Loops [while]

Leading into Cyber Crime and Security Assessment

Trial

Trail

End of Year Trial


In Computer Science, students will begin by exploring systems architecture: how keystrokes are translated into binary, how machine code as binary instructions are used to code computer instructions and how this data representation extends to Images and Sound. Networks and cyber security follow, as these concepts play a large role in how computer systems affect our modern, digital, lives. This broadens to online safety, looking at how both malicious code and social engineering can be utilised to attack systems. This is all alongside an introduction to computational thinking. This is the basics needed for the solution of problems via flowcharts, pseudocode algorithms and eventually fully worked high-level programming solutions. As a means of creating these solutions, students are introduced to Boolean operators, string-handling functions, searching and sorting algorithms.


Term 1

Topic

Problem Solving

Components of a Computer

Programming (Python)

Programming Concepts

Problem Solving: - Decomposition - Analysis Programming: - I/O Functions - Formatting Summary of - Selection Constructs Content

Components of a Computer: - H/W vs S/W - Von Neumann Architecture - the IPO Model - Binary - Hexadecimal Programming Concepts: - Flow Charts - Boolean Operators - Truth Tables - Pseudocode - Data Types

Assessment

Trial

Term 2 Networks Programming Structures

Networks: - LANs and WANs - Client-Sever vs. Peer-Peer - Connectivity - Topologies - Protocols Programming Structures: - Data Types - Validation - Functions - Scope - Constants

Environmental Impact of Technology

Term 3 Data Representation

Exchanging Data

Internal Components

Programming Review

Programming Methods

Environmental Data RepresentaImpact of Technol- tion ogy: - ASCII/Unicode - Health - Images/Bitmaps - Energy Use - Dictionaries - Resources - Sound Exchanging Data: - Compression - Encryption - Data Storage Programming Review: - Libraries - Boolean Logic Trail

Internal Components: - Hardware - ROM / RAM Programming Methods: - Decomposition - Error Checking - Testing

The Bigger Picture Network Security The Bigger Picture: - Copyright - Licensing - Intellectual Property - Open Source vs Proprietary Network Security: - Cyber Attacks - Social Engineering - Phishing - Shoulder Surfing - Protection

End of Year Trial

https://qualifications.pearson.com/content/dam/pdf/GCSE/Computer%20Science/2020/specification-and-sample-assessments/GCSE_L1_L2_Computer_Science_2020_Specification.pdf


In year 11, the main focus is the undertaking of a programming project; solving a problem specified by the exam board. Students utilise, practice and improve their existing programming repertoire by looking into more on procedures, functions and methods for passing parameters. In tandem with this, we look into the ethical, legal and environmental impacts of digital technology on the wider society, including such issues as privacy, development of critical thinking and the impact of the digital divide. We also look at aspects of professionalism within the Information Technology industry and how it impacts society. All of these areas are studied in relation to the World Wide Web and the Internet, upon which it sits. This includes it’s method of operation: methods for routing communications and the DNS system that underpins this.


Term 1

Topic

Summary of Content

Assessment

Ethical Impact of Technology:

Network Communication

Non-Examined Assessment (NEA) Preparation

Non-Examined Assessment (NEA) Preparation

Term 2 Review of Programming Non-Examined Assessment (NEA)

Ethical Impact of Technology:

Network Communication

Review of Programming

- Privacy - Inclusion - Professionalism

- The Internet - Routing / DNS - The WWW

- Algorithms - Analysis - Testing

NEA Preparation

NEA Preparation

NEA

- Analysis - Design - Implementation

- Implementation - Testing Cycle - Refining - Evaluation

- Analysis - Design - Implementation - Testing

Mock Exams

Non-Examined Assessment (NEA) Evaluation Data Structures

Term 3

Review and Revision GCSE Exams

NEA

Review and Revision

- Evaluation

- Gap Analysis - Exam Technique - Sample Papers

Data Structures - Structured vs Unstructured - Databases - Tables - Relationships

Mock Paper

https://qualifications.pearson.com/content/dam/pdf/GCSE/Computer%20Science/2020/specification-and-sample-assessments/GCSE_L1_L2_Computer_Science_2020_Specification.pdf


In KS5, students revisit all the basics of computer systems, but in much greater depth. The first year of this begins with a look at the structure and function of processors, storage methods and a greater understanding of the purpose and use of the OS and BIOS. It continues with a look at Networks and Web technologies, including use of HTML, CSS and Javascript.

We follow this with a further look at how systems operate, with a detailed look at more complex uses of Binary: representing floating point arithmetic, signed numbers and their normalisation to optimise memory usage. Students will also carry out work to look into computational thinking methods and more advanced programming techniques: linked-lists, stacks, queues, and advanced algorithms from those of Von Neumann to Dijkstra.


Term 1

Topic

Input, output and storage

Systems Software

Structure and function of the Processor

Applications Generation

Computational - How I/O and storage devices can be applied to the solution of different problems. - The uses of magnetic, flash and optical storage devices. - RAM and ROM. Summary of - Virtual storage. Content - The ALU, CU and Registers - Buses - The Fetch- Decode - Execute Cycle - Thinking Ahead

Assessment

Term 2

Programming techniques - Defining OS and comparing types of OSs. - BIOS. - Device drivers. - Programming constructs. - Recursion, use and comparison to iterative approach. - Use of an IDE to develop/debug a program. - The nature of applications. - Utilities. - Open source vs closed source.

Data Types

Data Structures

Data Structures

Boolean Algebra

Problem solving and programming

Software Development

Primitive data types - Binary: Sign and magnitude, two’s complement, addition and subtraction. - positive integers in hexadecimal. - Floating point arithmetic, positive and negative numbers, normalisation.

Create/amend linkedlists, stacks, queues, search trees and hash tables.

- Arrays (of up to 3 dimensions), records, lists, tuples. - Programming techniques - Computational methods

Algorithms

- Define problems using Boolean logic and simplify these expressions with Karnaugh maps. - Development Methods including waterfall lifecycle, spiral model, RAD and others, - Write and follow algorithms.

Topic Tests, Code Tests

Term 3 Types of Programming Languages

Networks Databases

Compression, Encryption and Hashing.

Web Technologies

- Characteristics and variety, with Procedural and Assembly languages as example paradigms. Also includes Memory addressing. - Object Oriented languages.

- Internet structure and networks, with TCP/IP stack, DNS andNetwork Security. Also Protocols and standards.

- Lossy vs. Lossless Compression - RLE and Dictionary encoding - Symmetric vs. Asymmetric encryption

- RDBs, keys, normalisation and function such as ACID. - HTML, CSS, JavaScript with PageRank algorithms and Server vs Client side processes.

- Uses for Hashing.

End of Year Exam

https://www.ocr.org.uk/Images/170844-specification-accredited-a-level-gce-computer-science-h446.pdf


The second year of KS5 will be primarily focused on the solution of a complex problem of the student’s choice. This task involves applying the total software development life cycle to the problem, from initial analysis all the way through to final testing. It will be a problem requiring evidence of proficiency in computing techniques and detailed application of design methods and evaluation criteria. This work will run concurrently with a detailed look at both the legal and moral issues that circumscribe the use of computing technology in the real world today.


Term 1 Computing related Legislation Topic

Moral and Ethical Issues Project (Examined)

Summary of Content

- Data Protection Act (1998) - Computer Misuse Act (1990 - Copyright Design and Patents Act (1988) - R.I.P.A (2000) - Risks and digital technology: - AI, Censorship, Piracy, Internet and Environment Project - Project Analysis - Project Design

Assessment

Term 2

Term 3

Types of Processor

Systems Software Computational Methods

Applications Generation Project (Examined)

Project (Examined)

Project Examination

External Examinations

Project (Examined) - CISC vs RISC - GPU uses - Multicore/Parallel system - Interrupts, paging, OS, FDE cycle, BIOS and device drivers.

Nature of Applications - Utilities - Open vs Closed Source - Translators - Compilation stages - Linkers /Loaders

Project - Detailed Design - Testing cycle - Evaluation cycle

Project - Completion - Assessment for external moderation.

External Examinations Paper #1 - Computer Principles Paper #2 - Algorithms and Problem Solving

- Recognition and decomposition - Methods with heuristics, pipelining Project and abstraction. - Detailed Analysis Project - Detailed Design - Project Analysis - Evaluation cycle - Project Design

Topic Tests

Topic Tests

Code Test

Code Test

Mock Exam

Project Examination

External Examination

https://www.ocr.org.uk/Images/170844-specification-accredited-a-level-gce-computer-science-h446.pdf


Underpinning our knowledge rich curriculum are essential skills. Both knowledge and skills intertwine to enrich the learning experience of our students at Holyport College. Our curriculum has been designed to ensure the students acquire the knowledge and skills that they need and gives them opportunities to practice and apply them over time, in order to master them. The following skills are vitally important and are assessed at regular intervals throughout each academic year.

These are the assessment descriptors' for the key skills in English; 

FLLIGHT PATH TO BE ADDED HERE

Problem Solving / Algorithms

Recognises that some problems share the same characteristics and use the same algorithm to solve both. (AL) (GE) • Understands the notion of performance for algorithms and appreciates that some algorithms have different performance characteristics for the same task. (AL) (EV)

Programming and Development

Designs and writes nested modular programs that enforce reusability utilising sub-routines wherever possible. (AL) (AB) (GE) (DE) Understands the difference between ‘While’loop and ‘For’ loop, which uses a loop counter.(AL) (AB) Understands and uses two dimensional data structures. (AB) (DE) Understand how to manipulate files using computer programs [read from file into a data structure, write into file](AB) (DE) (AL)

Data & Data Representation

Understands and can explain the need for data compression, and performs simple compression methods. (AL) (AB) Knows the relationship between data representation and data quality. (AB)

Communication and the Network

Understand the role of and need for network protocols (Ethernet, Wi-Fi, TCP/IP, HTTP. HTTPS, FTP, email (POP3,SMTP, IMAP))(AB)(EV)(DE)(GE) Understands the hardware associated with networking computer systems,including WANs and LANs, understands their purpose and how they work,including MAC addresses. (AB) (AL) (DE)(GE)

Link to full A Level and GCSE Skills Assessment Grid for Computing


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.