| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | KS3 and KS4 Scheme of work Computer | |||||||||||||||||||||||||
2 | ||||||||||||||||||||||||||
3 | ||||||||||||||||||||||||||
4 | HALF TERM 1 | HALF TERM2 | HALF TERM3 | HALF TERM 4 | HALF TERM 5 | HALF TERM 6 | ||||||||||||||||||||
5 | Topic Titles | Hardware | Software | Logic | Programming | Programming Project | Social, Ethical & Legal Considerations | |||||||||||||||||||
6 | Components of a computer Internal components Peripherals | Operating systems Application software Utility software | Binary numbers Logic gates Sequencing instructions | Planning & Design Variables Input & Output Sequencing Selection Iteration Arithmetic & Logic OperationsComments Testing & Evaluation | Planning & Design Variables Input & Output Sequencing Selection Iteration Arithmetic & Logic OperationsComments Testing & Evaluation | Social Considerations Ethical Considerations Legal Considerations | ||||||||||||||||||||
7 | Above expected GCSE 7-9 | To define a computer system To list examples of systems To describe the importance of computer systems in the modern world To be able to explain the need for reliability in computer systems To be able to explain the standards in computer systems To be able to explain the importance of ethical and legal considerations when creating computer systems To be able to explain the importance of environmental considerations when creating computer systems To respond to feedback on assessment To be able to describe input and output devices for a wide range of computer controlled situations | Students will demonstrate a mastery of having a good knowledge and understanding of Operating systems Application software and Utility software. Students will demonstrate that they can effectively use and develop Operating systems, Application software and Utility software | To be able to explain why data is represented in computer systems in binary form To understand and produce simple logic diagrams using the operations NOT, AND and OR To produce a truth table from a given logic diagram To produce a truth table from a given logic diagramTo define the terms bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte To understand that data needs to be converted into a binary format to be processed by a computer. To be able to convert positive denary whole numbers (0-255) into 8-bit binary numbers and vice versa To be able to add two 8-bit binary integers and explain overflow errors which may occur To be able to convert positive denary whole numbers (0-255) into 2-digit hexadecimal numbers and vice versa To be able to convert between binary and hexadecimal equivalents of the same number To respond to feedback on assessment To be able to explain the use of hexadecimal numbers to represent binary numbers | Introduction to Python Numbers and Arithmetic Selection Writing algorithms Assessment – Test a program Fix-it-Five While loops Searching Lists Procedures | Game analysis Sprites and objects Enemies and collision detection Firing projectiles Capturing the flag Testing and assessment Fix-it-Five | Students will demonstrate a mstery of how to ... • learn which information they should avoid sharing online because it is private. • understand which kinds of websites have privacy policies, and why. • practice checking websites they visit for privacy policies and privacy seals of approvals Students will be able to ... • reflect on what it means to be brave and stand up for others offline and online. • learn to show empathy for those who have been cyberbullied. • generate multiple solutions for helping others when cyberbullying occurs. Students will be able to ... • learn that they have a digital footprint and that information from it can be searched; copied and passed on; seen by a large, invisible audience, and can be persistent. • recognize that people’s online information can be helpful or harmful to their reputation and image. • consider their own digital footprints and what they want those footprints to be like in the future. Students will be able to ... • consider the possible benefits and risks of sharing information online. • recognize the importance of context in posting or viewing online images. • understand what choices they need to make to protect the privacy of others online. | |||||||||||||||||||
8 | Year 11 GCSE 5-6 | To define a computer system To list examples of systems To describe the importance of computer systems in the modern world To be able to explain the need for reliability in computer systems To be able to explain the standards in computer systems To be able to explain the importance of ethical and legal considerations when creating computer systems To be able to explain the importance of environmental considerations when creating computer systems To respond to feedback on assessment To be able to describe input and output devices for a wide range of computer controlled situations | Students will demonstrate a mastery of having a good knowledge and understanding of Operating systems Application software and Utility software. Students will demonstrate that they can effectively use and develop Operating systems, Application software and Utility software | To be able to explain why data is represented in computer systems in binary form To understand and produce simple logic diagrams using the operations NOT, AND and OR To produce a truth table from a given logic diagram To produce a truth table from a given logic diagramTo define the terms bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte To understand that data needs to be converted into a binary format to be processed by a computer. To be able to convert positive denary whole numbers (0-255) into 8-bit binary numbers and vice versa To be able to add two 8-bit binary integers and explain overflow errors which may occur To be able to convert positive denary whole numbers (0-255) into 2-digit hexadecimal numbers and vice versa To be able to convert between binary and hexadecimal equivalents of the same number To respond to feedback on assessment To be able to explain the use of hexadecimal numbers to represent binary numbers | Introduction to Python Numbers and Arithmetic Selection Writing algorithms Assessment – Test a program Fix-it-Five While loops Searching Lists Procedures | Game analysis Sprites and objects Enemies and collision detection Firing projectiles Capturing the flag Testing and assessment Fix-it-Five | Students will demonstrate a mstery of how to ... • learn which information they should avoid sharing online because it is private. • understand which kinds of websites have privacy policies, and why. • practice checking websites they visit for privacy policies and privacy seals of approvals Students will be able to ... • reflect on what it means to be brave and stand up for others offline and online. • learn to show empathy for those who have been cyberbullied. • generate multiple solutions for helping others when cyberbullying occurs. Students will be able to ... • learn that they have a digital footprint and that information from it can be searched; copied and passed on; seen by a large, invisible audience, and can be persistent. • recognize that people’s online information can be helpful or harmful to their reputation and image. • consider their own digital footprints and what they want those footprints to be like in the future. Students will be able to ... • consider the possible benefits and risks of sharing information online. • recognize the importance of context in posting or viewing online images. • understand what choices they need to make to protect the privacy of others online. | |||||||||||||||||||
9 | Year 10 GCSE 3-4 | • To understand the function and purpose of a computer • To understand that not every computer looks like a PC and that many everyday devices contain computers • • To be able to identify the main component parts of a computer • To be able to explain the role of the main components within a computer • | To be able to define the term ‘software’ • To understand that software provides instructions for the computer • To be able to identify different types of software • To be able to distinguish between system software and application software | To simply explain what is meant by binary data and to understand why a computer uses binary data • To be able to identify the first electronic computer • To gain a basic understanding of the role of Colossus in World War II • To gain a basic understanding of how Colossus made use of valves, rewiring and paper tape • To explain the purpose and use of a transistor in computing terms • To understand that computers are getting faster all the time (Moore’s Law) To define the terms bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte To understand that data needs to be converted into a binary format to be processed by a computer. To be able to explain why data is represented in computer systems in binary form Represent text as binary such as writing names in binary or decoding secret messages To respond to feedback on assessment Basic ASCII – work out denary value of your name Decode secret message from binary – Decode Binary worksheet and message. Write your name in Binary | To develop an understanding and use various computing pltaforms including: Variable Swap Codio Scratch Python To effectively learn Planning & Design, Variables, Input & Output Sequencing, Selection, Iteration, Arithmetic & Logic, Operations, Comments, Testing & Evaluation | •To simply give detailed information about the final product to be produced. • To contribute effectively to the work of a group most of the time, to produce detailed planning documents e.g. mind map, brainstorm, thought-shower, showing the allocation of tasks. • To list a range of appropriate success criteria will be given. • describe the main features of three different types of search engine, giving at least one example of each. • explain the appropriate use of at least three techniques when using search engines. • compare the results of searches using these techniques in three different types of search engine • identify a range of information required. • carry out research using the internet and at least two non-internet sources. • use effective internet search criteria. • list sources and evaluate the suitability and reliability of most of them. • comment on the copyright of most of the information found. • create a document as per their allocated task set by the group. • use information from at least four different sources, including at least one non-internet source. • download graphics and text • acknowledge their sources through appropriate captions or cross-references and in a bibliography. | Students will start to be able to ... • learn which information they should avoid sharing online because it is private. • understand which kinds of websites have privacy policies, and why. • practice checking websites they visit for privacy policies and privacy seals of approvals Students will be able to ... • reflect on what it means to be brave and stand up for others offline and online. • learn to show empathy for those who have been cyberbullied. • generate multiple solutions for helping others when cyberbullying occurs. Students will be able to ... • learn that they have a digital footprint and that information from it can be searched; copied and passed on; seen by a large, invisible audience, and can be persistent. • recognize that people’s online information can be helpful or harmful to their reputation and image. • consider their own digital footprints and what they want those footprints to be like in the future. Students will be able to ... • consider the possible benefits and risks of sharing information online. • recognize the importance of context in posting or viewing online images. • understand what choices they need to make to protect the privacy of others online. Students will be able to ... • identify the legal and ethical considerations involved in using the creative work of others. • understand an individual’s rights and responsibilities as a creator and consumer of content. • practice critical thinking and ethical decision making about the use of creative works. | |||||||||||||||||||
10 | Year 8 and 9 GCSE 1-2 | • To develop an understanding of the function and purpose of a computer • To understand that not every computer looks like a PC and that many everyday devices contain computers • • To be able to identify the main component parts of a computer • To be able to explain the role of the main components within a computer • | To develop an understanding of how to be able to define the term ‘software’ • To understand that software provides instructions for the computer • To be able to identify different types of software • To be able to distinguish between system software and application software | To explain what is meant by binary data and to understand why a computer uses binary data • To be able to identify the first electronic computer • To gain a basic understanding of the role of Colossus in World War II • To gain a basic understanding of how Colossus made use of valves, rewiring and paper tape • To explain the purpose and use of a transistor in computing terms • To understand that computers are getting faster all the time (Moore’s Law) To define the terms bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte To understand that data needs to be converted into a binary format to be processed by a computer. To be able to explain why data is represented in computer systems in binary form Represent text as binary such as writing names in binary or decoding secret messages To respond to feedback on assessment Basic ASCII – work out denary value of your name Decode secret message from binary – Decode Binary worksheet and message. Write your name in Binary | To effectively understand and use various computing pltaforms including: Variable Swap Codio Scratch Python To effectively learn Planning & Design, Variables, Input & Output Sequencing, Selection, Iteration, Arithmetic & Logic, Operations, Comments, Testing & Evaluation | • Give detailed information about the final product to be produced. • To contribute effectively to the work of a group most of the time, to produce detailed planning documents e.g. mind map, brainstorm, thought-shower, showing the allocation of tasks. • To list a range of appropriate success criteria will be given. • describe the main features of three different types of search engine, giving at least one example of each. • explain the appropriate use of at least three techniques when using search engines. • compare the results of searches using these techniques in three different types of search engine • identify a range of information required. • carry out research using the internet and at least two non-internet sources. • use effective internet search criteria. • list sources and evaluate the suitability and reliability of most of them. • comment on the copyright of most of the information found. • create a document as per their allocated task set by the group. • use information from at least four different sources, including at least one non-internet source. • download graphics and text • acknowledge their sources through appropriate captions or cross-references and in a bibliography. | Students will be able to ... • learn which information they should avoid sharing online because it is private. • understand which kinds of websites have privacy policies, and why. • practice checking websites they visit for privacy policies and privacy seals of approvals Students will be able to ... • reflect on what it means to be brave and stand up for others offline and online. • learn to show empathy for those who have been cyberbullied. • generate multiple solutions for helping others when cyberbullying occurs. Students will be able to ... • learn that they have a digital footprint and that information from it can be searched; copied and passed on; seen by a large, invisible audience, and can be persistent. • recognize that people’s online information can be helpful or harmful to their reputation and image. • consider their own digital footprints and what they want those footprints to be like in the future. Students will be able to ... • consider the possible benefits and risks of sharing information online. • recognize the importance of context in posting or viewing online images. • understand what choices they need to make to protect the privacy of others online. Students will be able to ... • identify the legal and ethical considerations involved in using the creative work of others. • understand an individual’s rights and responsibilities as a creator and consumer of content. • practice critical thinking and ethical decision making about the use of creative works. | |||||||||||||||||||
11 | year 7 Entry Level | Emerging understanding of: To understand the function and purpose of a computer • To understand that not every computer looks like a PC and that many everyday devices contain computers • • To be able to identify the main component parts of a computer • To be able to explain the role of the main components within a computer • | Emerging understanding of: To be able to define the term ‘software’ • To understand that software provides instructions for the computer • To be able to identify different types of software • To be able to distinguish between system software and application software | Emerging understanding of: To explain what is meant by binary data and to understand why a computer uses binary data • To be able to identify the first electronic computer • To gain a basic understanding of the role of Colossus in World War II • To gain a basic understanding of how Colossus made use of valves, rewiring and paper tape • To explain the purpose and use of a transistor in computing terms • To understand that computers are getting faster all the time (Moore’s Law) To define the terms bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte To understand that data needs to be converted into a binary format to be processed by a computer. To be able to explain why data is represented in computer systems in binary form Represent text as binary such as writing names in binary or decoding secret messages To respond to feedback on assessment Basic ASCII – work out denary value of your name Decode secret message from binary – Decode Binary worksheet and message. Write your name in Binary | Emerging understanding of: To effectively understand and use various computing pltaforms including: Variable Swap Codio Scratch Python To effectively learn Planning & Design, Variables, Input & Output Sequencing, Selection, Iteration, Arithmetic & Logic, Operations, Comments, Testing & Evaluation | Emerging understanding of: • Give detailed information about the final product to be produced. • To contribute effectively to the work of a group most of the time, to produce detailed planning documents e.g. mind map, brainstorm, thought-shower, showing the allocation of tasks. • To list a range of appropriate success criteria will be given. • describe the main features of three different types of search engine, giving at least one example of each. • explain the appropriate use of at least three techniques when using search engines. • compare the results of searches using these techniques in three different types of search engine • identify a range of information required. • carry out research using the internet and at least two non-internet sources. • use effective internet search criteria. • list sources and evaluate the suitability and reliability of most of them. • comment on the copyright of most of the information found. • create a document as per their allocated task set by the group. • use information from at least four different sources, including at least one non-internet source. • download graphics and text • acknowledge their sources through appropriate captions or cross-references and in a bibliography. | Emerging understanding of: Students will be able to ... • learn which information they should avoid sharing online because it is private. • understand which kinds of websites have privacy policies, and why. • practice checking websites they visit for privacy policies and privacy seals of approvals Students will be able to ... • reflect on what it means to be brave and stand up for others offline and online. • learn to show empathy for those who have been cyberbullied. • generate multiple solutions for helping others when cyberbullying occurs. Students will be able to ... • learn that they have a digital footprint and that information from it can be searched; copied and passed on; seen by a large, invisible audience, and can be persistent. • recognize that people’s online information can be helpful or harmful to their reputation and image. • consider their own digital footprints and what they want those footprints to be like in the future. Students will be able to ... • consider the possible benefits and risks of sharing information online. • recognize the importance of context in posting or viewing online images. • understand what choices they need to make to protect the privacy of others online. Students will be able to ... • identify the legal and ethical considerations involved in using the creative work of others. • understand an individual’s rights and responsibilities as a creator and consumer of content. • practice critical thinking and ethical decision making about the use of creative works. | |||||||||||||||||||
12 | ||||||||||||||||||||||||||
13 | ||||||||||||||||||||||||||
14 | ||||||||||||||||||||||||||
15 | ||||||||||||||||||||||||||
16 | ||||||||||||||||||||||||||
17 | ||||||||||||||||||||||||||
18 | ||||||||||||||||||||||||||
19 | ||||||||||||||||||||||||||
20 | ||||||||||||||||||||||||||
21 | ||||||||||||||||||||||||||
22 | ||||||||||||||||||||||||||
23 | ||||||||||||||||||||||||||
24 | ||||||||||||||||||||||||||
25 | ||||||||||||||||||||||||||
26 | ||||||||||||||||||||||||||
27 | ||||||||||||||||||||||||||
28 | ||||||||||||||||||||||||||
29 | ||||||||||||||||||||||||||
30 | ||||||||||||||||||||||||||
31 | ||||||||||||||||||||||||||
32 | ||||||||||||||||||||||||||
33 | ||||||||||||||||||||||||||
34 | ||||||||||||||||||||||||||
35 | ||||||||||||||||||||||||||
36 | ||||||||||||||||||||||||||
37 | ||||||||||||||||||||||||||
38 | ||||||||||||||||||||||||||
39 | ||||||||||||||||||||||||||
40 | ||||||||||||||||||||||||||
41 | ||||||||||||||||||||||||||
42 | ||||||||||||||||||||||||||
43 | ||||||||||||||||||||||||||
44 | ||||||||||||||||||||||||||
45 | ||||||||||||||||||||||||||
46 | ||||||||||||||||||||||||||
47 | ||||||||||||||||||||||||||
48 | ||||||||||||||||||||||||||
49 | ||||||||||||||||||||||||||
50 | ||||||||||||||||||||||||||
51 | ||||||||||||||||||||||||||
52 | ||||||||||||||||||||||||||
53 | ||||||||||||||||||||||||||
54 | ||||||||||||||||||||||||||
55 | ||||||||||||||||||||||||||
56 | ||||||||||||||||||||||||||
57 | ||||||||||||||||||||||||||
58 | ||||||||||||||||||||||||||
59 | ||||||||||||||||||||||||||
60 | ||||||||||||||||||||||||||
61 | ||||||||||||||||||||||||||
62 | ||||||||||||||||||||||||||
63 | ||||||||||||||||||||||||||
64 | ||||||||||||||||||||||||||
65 | ||||||||||||||||||||||||||
66 | ||||||||||||||||||||||||||
67 | ||||||||||||||||||||||||||
68 | ||||||||||||||||||||||||||
69 | ||||||||||||||||||||||||||
70 | ||||||||||||||||||||||||||
71 | ||||||||||||||||||||||||||
72 | ||||||||||||||||||||||||||
73 | ||||||||||||||||||||||||||
74 | ||||||||||||||||||||||||||
75 | ||||||||||||||||||||||||||
76 | ||||||||||||||||||||||||||
77 | ||||||||||||||||||||||||||
78 | ||||||||||||||||||||||||||
79 | ||||||||||||||||||||||||||
80 | ||||||||||||||||||||||||||
81 | ||||||||||||||||||||||||||
82 | ||||||||||||||||||||||||||
83 | ||||||||||||||||||||||||||
84 | ||||||||||||||||||||||||||
85 | ||||||||||||||||||||||||||
86 | ||||||||||||||||||||||||||
87 | ||||||||||||||||||||||||||
88 | ||||||||||||||||||||||||||
89 | ||||||||||||||||||||||||||
90 | ||||||||||||||||||||||||||
91 | ||||||||||||||||||||||||||
92 | ||||||||||||||||||||||||||
93 | ||||||||||||||||||||||||||
94 | ||||||||||||||||||||||||||
95 | ||||||||||||||||||||||||||
96 | ||||||||||||||||||||||||||
97 | ||||||||||||||||||||||||||
98 | ||||||||||||||||||||||||||
99 | ||||||||||||||||||||||||||
100 | ||||||||||||||||||||||||||