Year 1 - Computer Science
Autumn 1 | Autumn 2 |
---|---|
Use Tux Paint to Illustrate an eBook - Can I create and store the illustrations? - How do I retrieve and manipulate the illustrations? - How do I use Tux Paint to create an eBook? E-safety - How do I keep myself safe online? - What is intellectual property? |
Use Fresh Paint to create a card digitally (Winter card/Christmas card) - How do I practise with the keyboard to become a fluent typist? - How do I use the internet safely to search for images?? - What does it mean to combine the text, images and refine the card. E-safety -How do I use technology safely? Who do I speak to if I have concerns? -What is copyright? |
Spring 1 | Spring 2 |
---|---|
Use Programmable toys: BeeBots -How do I record an algorithm? - What are the features of a Beebot? - How do I programme the robot to find treasure? - How do I debug the errors in the algorithm? E-safety - How do I use simple programmable toys safely and sensibly? - How do I ensure filming is done with appropriate consent and assent? |
Finding images using the web (link to transport) -How do I use the internet to search for images of vehicles? - How do I organise vehicles in to two categories? - How do I peer review the PowerPoint presentations? E-safety - How do I search for images safely? - How do I show respect for others’ intellectual property through observing copyright conditions? |
Summer 1 | Summer 2 |
---|---|
Create a talking book (audio book) on Grace & Family using PowerPoint & Book Creator - What is an audiobook? - How do I practise with the microphone/audio recorder? - How do I record sound effects? - How do I record the story? E-safety -How do I use a digital video camera safely? - Do I recognise the need for consent and assent? |
Videoing a set of instructions and using Movie Maker to edit - How do I create an algorithm to programme a sandwich-making robot? - How do I practise with the camera? - How do I film the instruction video? E-safety - Can I use audio recorders of microphones and audio recording software safely and sensibly? |
Year 2 - Computer Science
Autumn 1 | Autumn 2 |
---|---|
Use Scratch Jr to find the objects in George’s house. - How do I program a Beebot to make predictions on where the robot will end up? - How do I programme the sprite to move. E-safety - What is a Creative Commons licence? - How do I upload my project to Scratch safely? - What do I do if I encounter something that makes me feel uncomfortable? |
Use Scratch to test out different games. -How do I test different games? - How do I test more complex games? - How do I adapt a game’s algorithm? E-safety - What is PEGI age restrictions? - How can I report the comments Scratch if they are inappropriate? |
Spring 1 | Spring 2 |
---|---|
Practise using a camera to take photos and use Pixlr and Microsoft Photos to edit photos. - What are the different parts of a camera? - How do I start organising photos using Pixlr and Microsoft Photos? - How do I edit and enhance the photos? E-safety - Do I know how to minimise risks when posting online? - What should I do if I have concerns about images I encounter on the web? - What is an acceptable and unacceptable photograph? |
Use the internet for research and create Microsoft PowerPoint presentation -How do I start scoping a topic and breaking down questions using FreeMind? - How do I search safely and effectively using Google? - How do I start preparing a presentation using Microsoft PowerPoint? E-safety - How do I stay safe while researching online, and show respect for others’ ideas and intellectual property? - How do I use safe search filters? |
Summer 1 | Summer 2 |
---|---|
Use Microsoft Excel, Google Photos and Google Earth to Collect data. - How do I brief, prepare and use a database to start classifying? - How do I use a database and a camera on our bug hunt? - How do I work with data on Excel? - How do I use Google Earth to work with maps? E-safety -How do I keep my personal information private? - How do I respect rules for using digital equipment when out of the classroom? |
Use Microsoft Email Accounts & Google Sheets to solve a mystery. (Link to topic) - How do I read and reply to an email? - How do I use the email attachments feature? - How do I compose an email? - How do I organise information using an Excel template? E-safety -What are the risks associated with emails? - Can attached files contain viruses? - What is spam? |
Year 3 - Computer Science
Autumn 1 | Autumn 2 |
---|---|
Use PowerPoint to create and record over presentations. - How do I use Microsoft PowerPoint to plan the presentation? - How do I source content such as images and videos? - How do I use the video and audio recording feature on PowerPoint? E-safety - What is my digital footprint? - What do I do when I encounter inappropriate content? - Why do I need the owner’s permission before I copy content? |
Use Scratch to create and programme and animation based on the Stone Age. - How do I create a character and a background? - How do I start animating the characters by converting the storyboard algorithm on to Scratch. - How do I add sounds to the animations? E-safety - What is safe search? - What is YouTube’s safety mode? - How do I stay safe when browsing? |
Spring 1 | Spring 2 |
---|---|
Use Teams & Zoom to teach children how to communicate online. - How do emails work? - How do I use emails safely? - How do I email using attachments? - How do I share the presentations in a video conference? E-safety - What is email etiquette? - What are the dangers of spoofed links and malware via attached files. - How old must I be to set up accounts on certain platforms? |
Use Scratch or Snap to find and correct bugs in programs. - How do I spot and correct performance bugs? - How do I spot and correct multi-thread bugs? - How do I spot and correct conceptual bugs? - How do I spot and correct arithmetical bugs? - How do I correct resource bugs? E-safety - Why must I never share the shared account details for Scratch? - How do I stay safe when carrying out online research? |
Summer 1 | Summer 2 |
---|---|
Use Google Forms & Microsoft Excel to collect and analyse data on keeping healthy. -How do I plan a survey on FreeMind? - How do I develop questions on Google Forms? - How do I use Google Forms to create the online survey? - How do I analyse and evaluate the data using Excel? E-safety - What are the ethics of surveys? - What is the expectation of anonymity and confidentiality? - How do I ensure my survey does not include questions that could allow a person to be identified? |
Use WeVideo to create a one-minute edited video on how our bodies move. - How do I use a video camera to record short clips? - How do I start shooting the video? - How do I edit the video using WeVideo? - How do I improve the video by adding in text, sounds and effects? E-safety - Why should I seek parental consent when sharing videos? - Why must I keep personal information private? |
Year 4 - Computer Science
Autumn 1 | Autumn 2 |
---|---|
Use Scratch to develop a simple educational game on the Vikings. - How do I analyse educational games? - How do I build a game prototype on Scratch? - How do I add in repetition? - How do I work on the interface? - How do I build in progression? E-safety -What is copyright when sourcing images or media? - How do I keep my personal information private on the If the pupils participate in the Scratch community? |
Use Snap! & Pyonkee to – prototype an interactive toy for Varjak Paw - What are inputs and outputs? - How do I design a toy using Kickstarter? - How do I design a toy in Snap? - How do I program the toy simulation? - How do I test and improve the toy simulation? E-safety -What is copyright? - What is intellectual property? - How do I use the internet safely to research ideas? |
Spring 1 | Spring 2 |
---|---|
Use SlimWiki to produce a Wikipedia page on Chocolate - How do I use Wikipedia to find information. - How do I edit the wiki pages? - How do I edit Wikipedia? E-safety - What is the reliability of online content? - What conduct is appropriate when collaborating on a shared resource? |
Use Thimble Editor & Khan Academy to edit and write HTML and to then produce a web page on how useful electricity is. - What is the web and the hidden meanings of URLs? - How do I edit HTML in web pages? - How do I start my first HTML project using Thimble Editor? - How do I develop and refine the webpage? E-safety -What are the risks of using the web? - How could I best keep myself safe? - Web pages can be modified, so what is the reliability of web-based content? |
Summer 1 | Summer 2 |
---|---|
Use Isle of Tune, Audacity & MuseScore to produce digital music. - Can I make a sequence using Isle of Tune? - How do I record samples? - How do I work with different samples? E-safety - What is copyright when sourcing audio or publishing? - What is the illegal downloading and sharing of copyrighted music? |
Use Excel and PowerPoint to collect data, analyse and present the weather. - How do I record the weather using Microsoft Excel? - How do I use Excel to analyse the data? - How do I prepare a weather forecast - How do I give a TV-style weather forecast? E-safety - What is the importance of obtaining and using accurate data? - Why do I need to ensure appropriate permission is obtained? – What are the implications of uploading my film to the school network or to the internet? |
Year 5 - Computer Science
Autumn 1 | Autumn 2 |
---|---|
Use Scratch 3.0 to create a maze game linking to the Egyptians. - How do I create and source assets? - How do I create a prototype of my game? - How do I debug the game script? - How do I write game instructions? E-safety - What is copyright when sourcing images or media ? - How do I develop safe search habits? - What are the personal implications of playing games, perhaps including violent computer games? |
Use Google Sites to create a website promoting cyber safety. - How does Search work? - How do I curate website content? - How do I add media to the website? - How do I improve my website? E-safety -Why should I consider the reliability and bias of online connect? - How do I contribute positively to a shared resource? - How do I use search engines safely and effectively? |
Spring 1 | Spring 2 |
---|---|
Use Inkscape, Scratch & Terragen to create a galaxy using ideas from maths (geometry) & Islamic art -How do I create simple tessellations using Inkscape? -How do I use Inkscape to create art? - How do I create computer-generated landscapes in Terragen? E-safety -How do I stay safe searching and evaluating the quality of online content? - How do I protect personal information? |
Use The Black Chamber (website) and Scratch 3.0 to be in the role of a Spartan warrior and communicate with the military leaders. - How do I transmit information in semaphore? - How do I use Morse code? - How do I use Caesar cipher to create and crack codes? - How do I substitute ciphers and frequency analysis? - What’s the importance of password security? E-safety -How is information communicated in secret over open channels? - How do I check the security certificates of encrypted websites? - What makes a secure password? |
Summer 1 | Summer 2 |
---|---|
Create a blog using WordPress about a healthy and balanced diet and include a recipe for their readers to use. - What makes a good blog? - How do I write a blog post? - How do I comment on blog posts? - How do I add images on blog posts? - How do I work with media? E-safety - What is appropriate shared content? - What constitutes acceptable behaviours when commenting on others’ blog posts? |
Use Trimble SketchUp (used for 3D modelling) to create a virtual art gallery. - How do I create a virtual sculpture? - How do I start creating the gallery? - How do I hang pieces of work and art? - How do I create a virtual tour of the gallery? E-safety -What is good practice when searching for and selecting digital content? - What is copyright and what significance does it hold? |
Year 6 - Computer Science
Autumn 1 | Autumn 2 |
---|---|
Use iMovie to create a television advert on anti-bullying. - How do I practice shooting techniques? - How do I source other media? - How do I assemble a rough-cut using iMovie? - How do I use iMovie to polish the final cut? E-safety -What is the school policy in relation to videoing? - Why must I obtain consent before uploading a video? - What are the implications of sharing videos online? |
Pupils take part in activities to learn about computer networks and create a poster to share their knowledge with others - How do I understand how messages are passed along networks? - How do I use Scratch to learn how the DNS simulation program works? - How do I create a presentation showing how the internet works and how to keep safe online? E-safety - What are the safety implications of internet communication? - How do I keep myself and my work safe online? |
Spring 1 | Spring 2 |
---|---|
Use App Lab to develop a simple mobile phone app. - How do I use the toolkit on App Lab? - How do I assemble the assets for the app? - How do I establish the algorithms? - How do I debug and refine the app? E-safety -What are the precautions to take when using a shared account? - Why must I seek parental consent before posting online? |
Use Scratch and Snap to master algorithms for searching, sorting and mathematics. -How do I carry random and linear searches? - How do I carry out a binary search? - How do I carry out the selection sort algorithm? E-safety - Why must I seek permission before creating an account? - Why must I keep comments respectful? - What do I do if I find an inappropriate comment? |
Summer 1 | Summer 2 |
---|---|
Use Python and trinket.io to create a simple, text-based adventure game. - How do I use Python to print descriptions? - How do I use Python for selection and variables? - How do I use trinket.io and Python to create separate procedures? E-safety -Why must Python be used responsibly? - Why must I not share personal information publicly via Trinket? |
Use Book Creator to create a yearbook. - How do I commission and source content? - How do I start adding text and photos? - How do I use Microsoft Publisher to begin assembling pages? E-safety - What are the implications of including photographs of pupils in their work? - Why must I seek permission before using someone else’s work? |
Year 7 - Computer Science
Autumn 1 - E - Safety | Autumn 2 - Scratch |
---|---|
How can I recognise extensions for common file types such as .doc or .docx, .ppt, .jpg? What constitutes a “strong” password for an online account? What are the possible responses to cyberbullying? |
How can I relate computational abstractions and simple programming code to on-screen actions? How can I use variables in programming structures to assemble code in procedural blocks? How can I carry out simple tests to debug my project? |
Spring 1 - Introduction to Python Programming | Spring 2 - Networks |
---|---|
Introduction to python programming How can I distinguish different types of programming errors that can occur my code such as syntax and logic errors? What relational operators control the order in which program statements are executed? Use comments to document programs and explain how they work |
Networks Distinguish that the Internet is a wide area network, and the world wide web is part of the Internet. Give examples of LANs and WANs Define the meaning of the terms “domain name”, http protocol. |
Summer 1 - Computer Systems | Summer 2 - Introduction to HTML, CSS & JavaScript |
---|---|
Distinguish between hardware and software. Give examples of computer hardware and software Draw a block diagram showing CPU, input, output and storage devices |
Introduction to HTML, CSS and JavaScript Write HTML code to create a simple web page and display it in a browser. Write CSS to define the styles used in a web page. Create a simple navigation system using HTML. |
Year 8 - Computer Science
Autumn 1 - Computer Crime & Cybersecurity | Autumn 2 - Computer Networks |
---|---|
Name the major Acts concerning computer use. Describe briefly some of the dangers of putting personal data on social networking sites. Describe briefly ways of protecting online identity and how to report concerns. |
Describe the difference between a Local Area Network and a Wide Area Network Describe what topologies are and how they help with network designing. Understand wireless modes of connection, including Wi-Fi and discuss the advantages and disadvantages of this type of connection. |
Spring 1 - Computer Systems | Spring 2 - Python Programming |
---|---|
Perform simple binary arithmetic. Write an error-free, well-documented program involving selection and iteration.
Devise their own algorithms to solve reasonably complex problems.
|
Write an error-free, well-documented program involving selection and iteration. Devise their own algorithms to solve reasonably complex problems. Test and debug their programs and correct both syntax and logic errors. |
Summer 1 - Spreadsheets | Summer 2 - Introduction to Data Representations |
---|---|
Explain what is meant by a financial model. Explain the advantages of naming cells in a spreadsheet model. Format, construct, and manipulate a spreadsheet model using formulae |
Introduction to Data representations Understand the use of binary. Define the terms nibble, terabyte and petabyte. Convert positive denary whole numbers (0-255) into 8-bit binary numbers and vice versa and convert positive denary whole numbers (0-255) into |
Year 9 - Computer Science
Autumn 1 - Computer Crime & Cybersecurity | Autumn 2 - Computer Systems |
---|---|
Name the major Acts concerning computer use. Describe briefly some of the dangers of putting personal data on social networking sites. Describe briefly ways of protecting online identity and how to report concerns. |
Perform binary arithmetic shifts and how this affects binary values. State strengths and weaknesses of different storage devices. Describe briefly how data is stored on a CD. Identify input and output devices for more complex scenarios. |
Spring 1 - Python Programming | Spring 2 - Spreadsheets |
---|---|
Devise own algorithms to solve reasonably complex problems, e.g. a binary search Test and debug their programs and correct both syntax and logic errors. Make allowances in their programs for user input errors, ensuring that the program still runs to a successful conclusion – which may include printing an error message and stopping the run |
Explain what is meant by a computer model. Explain the advantages of naming cells in a spreadsheet model. Format, construct, and manipulate a spreadsheet model using formulae |
Summer 1 - Computer Networks |
Summer 2 - Python Next Steps |
---|---|
Explain the meaning and significance of bandwidth. Explain what is meant by buffering and why it is used. State the advantages and disadvantages of different network topologies and design a simple network layout. |
Understand arithmetic operators and variables. Define the data types of integer, real, Boolean, character, string. Understand the purpose of a given algorithm and how an algorithm works. |
Year 10 - Computer Science
Autumn 1 - Data Representation | Autumn 2 - Python Programming |
---|---|
Understand the term ‘character set’. Explain the relationship between the number of bits per character in a character set, and the number of characters that can be represented. Explain the need for image metadata. Explain the relationship between file size and image resolution. Be able to represent a short sound file in binary |
Python programming Learn how to write effective procedures and functions in Python. Understand and use parameters to pass data to procedures and functions. Know that subroutines may use local variables which are accessible only within the subroutine. Use local variables and explain why it is good practice to do so |
Spring 1 - Computer Systems | Spring 2 - Networks |
---|---|
Describe the characteristics of CPUs that affect their performance including clock speed, cache size, number of cores. Understand the purpose and characteristics of embedded systems. Describe how virtual memory is used. Accurately evaluate the differences in characteristics between different devices Describe the Von Neumann architecture including MAR, MDR, Program counter, accumulator. |
Describe the nature of the Internet as a worldwide collection of computers networks. Describe the difference between a Local Area Network and a Wide Area Network Describe star and mesh network topologies. Understand wireless modes of connection, including Wi-Fi and Bluetooth |
Summer 1 - Network Threats | Summer 2 - Impacts of Technology |
---|---|
Understand forms of attack and threats posed to a network including: ‒ Malware ‒ Phishing ‒ Social engineering ‒ Brute force attacks ‒ Data interception and theft Identify and understand the prevention of vulnerabilities including the use of: ‒ penetration testing ‒ user access levels ‒ encryption Explain the need for the following functions of an operating system: ‒ User interface ‒ Memory management and multitasking ‒ Peripheral management and drivers ‒ User management ‒ File management Describe the purpose and functionality of common utility software including: ‒ Encryption software ‒ Defragmentation software ‒ Data compression software |
At the end of this Unit all pupils should be able to: List ethical issues, cultural issues, and environmental issues in relation to a given scenarios. List items of legislation that relate to digital technology. Discuss the impacts of digital technology on the wider society including ethical issues, cultural issues, and environmental issues. Discuss the impact of manufacture, disposal, upgrading and replacing digital technology as well as discuss the impact of e-waste. Algorithms At the end of this Unit all pupils should be able to: Create, interpret, correct, complete, and refine algorithms using flowcharts. Be able to use Boolean operators. Write algorithms in pseudocode involving sequence, selection, and iteration. Understand the purpose of a given algorithm and how an algorithm works. Understand how to identify and correct errors in algorithms. Create and use of trace tables to follow an algorithm |
Year 11 - Computer Science
Autumn 1 - Computer Networks | Autumn 2 - Computer Networks & Security |
---|---|
At the end of this Unit all pupils should be able to: Be able to list the common types of storage: optical, magnetic, solid state. Choose suitable storage devices and storage media for a given application. Describe the advantages and disadvantages of different storage devices and media relating to the following characteristics: capacity, speed, portability, durability, reliability, cost. Describe the characteristics of CPUs that affect their performance including clock speed, cache size, number of cores. Understand the purpose and characteristics of embedded systems. Describe how virtual memory is used. Accurately evaluate the differences in characteristics between different devices Describe the Von Neumann architecture including MAR, MDR, Program counter, accumulator |
At the end of this Unit all pupils should be able to: Explain the need for the following functions of an operating system: ‒ User interface ‒ Memory management and multitasking ‒ Peripheral management and drivers ‒ User management ‒ File management Describe the purpose and functionality of common utility software including: ‒ Encryption software ‒ Defragmentation software ‒ Data compression software Understand forms of attack and threats posed to a network including: ‒ Malware ‒ Phishing ‒ Social engineering ‒ Brute force attacks ‒ Data interception and theft |
Spring 1 - Computer Networks | Spring 2 - Logic & Languages |
---|---|
At the end of this Unit all pupils should be able to apply knowledge to exam question on the following: Define a Wide Area Network Describe the nature of the Internet as a worldwide collection of computers networks. Describe the difference between a Local Area Network and a Wide Area Network Describe star and mesh network topologies. Understand wireless modes of connection, including:
|
At the end of this Unit all pupils should be able to: Select and use suitable test data including: ‒ Normal ‒ Boundary ‒ Invalid ‒ Erroneous Understand the purpose of translators. Describe the characteristics of a compiler and interpreter. Producing robust programs Interpret the results of truth tables. Understand how to make maintainable programs including: ‒ The use of sub programs Describe the characteristics and purpose of different levels of programming language, including: ‒ Low-level languages ‒ High-level languages |
Summer 1 | Summer 2 |
---|---|
Exam practice on common misconceptions and closing gaps | Exams |
Year 12 - Computer Science
Autumn 1 | Autumn 2 |
---|---|
Structure and functions of a processor. At the end of this Unit all pupils should be able to: Compression, Encryption and Hashing: Lossy vs Lossless compression. Run length encoding and dictionary coding for lossless compression. Symmetric and asymmetric encryption. Different uses of hashing. Data Representation: Convert between decimal, binary, and hexadecimal number systems. Define bits and bytes, and use names, symbols, and prefixes appropriately. Know how to use the ASCII table. Use arithmetic operations and Boolean operations NOT, AND and OR Know how simple error checking methods are used in transmission. Know how to add and multiply two unsigned binary numbers. Convert between signed binary and decimal. System software The need for, function and purpose of operating systems. Memory Management (paging, segmentation and virtual memory). Interrupts, the role of interrupts and Interrupt Service Routines (ISR), role within the Fetch‑Decode-Execute Cycle. Scheduling: round robin, first come first served, multi-level feedback queues, shortest job first and shortest remaining time. |
Computational methods At the end of this Unit all pupils should be able to: Understand what is meant by computational. Thinking Understand the benefits of applying. computational thinking to solving a wide variety. of problems Understand the principles of solving problems by computational methods Be able to use algorithms to describe problems. Be able to analyse a problem by identifying its component parts. Software Development: Understand the waterfall lifecycle, agile, methodologies, extreme programming, the spiral model and rapid application development. The relative merits and drawbacks of different Methodologies and when they might be used. Writing and following algorithms. At the end of this Unit all pupils should be able to: Need for and characteristics of a variety of programming paradigms. Procedural languages. Assembly language (including following and writing simple programs with the Little Man Computer instruction set). Modes of addressing memory (immediate, direct, indirect and indexed). Object-oriented languages for pseudocode style) with an understanding of classes, objects, methods, attributes, inheritance, encapsulation and polymorphism. |
Spring 1 | Spring 2 |
---|---|
Data structures At the end of this Unit all pupils should be able to: Program arrays (of up to 3 dimensions), records, lists, tuples. The following structures to store data: linked list, graph (directed and undirected), stack, queue, tree, binary search tree, hash table. How to create, traverse, add data to and remove data from the data structures mentioned above. (NB this can be either using arrays and procedural programming or an object-oriented approach). Databases: Relational database, flat file, primary key, foreign key, secondary key, entity relationship modelling, normalisation and indexing. Methods of capturing, selecting, managing and exchanging data. Normalisation to 3NF. SQL – Interpret and modify. Referential integrity. Transaction processing, ACID (Atomicity, Consistency, Isolation, Durability), record locking and redundancy. |
Boolean Algebra At the end of this Unit all pupils should be able to: Define problems using Boolean logic. Manipulate Boolean expressions, including the use of Karnaugh maps to simplify Boolean expressions. Use the following rules to derive or simplify statements in Boolean algebra: De Morgan’s Laws, distribution, association, commutation, double negation. Using logic gate diagrams and truth tables. The logic associated with D type flip flops, half, and full adders. Web Technologies: HTML, CSS, and JavaScript. See appendix 5d. Search engine indexing. PageRank algorithm. Server and client-side processing. Data types |
Summer 1 | Summer 2 |
---|---|
Structure and functions of a processor. At the end of this Unit all pupils should be able to: Applications Generation The nature of applications, justifying suitable applications for a specific purpose. Utilities Open-source vs closed source. Translators: Interpreters compilers and assemblers. Stages of compilation (lexical analysis, syntax analysis, code generation and optimisation). Linkers and loaders and use of libraries. Software Development Need for and characteristics of a variety of programming paradigms. Procedural languages. Assembly language (including following and writing simple programs with the Little Man Computer instruction set). Modes of addressing memory (immediate, direct, indirect and indexed). Object-oriented languages for pseudocode style) with an understanding of classes, objects, methods, attributes, inheritance, encapsulation and polymorphism. |
Revision of key topics such as Algorithms Building on knowledge from year 12 (a)Measures and methods to determine the efficiency. of different algorithms, Big O notation (constant, linear, polynomial, exponential and logarithmic complexity). (b) Comparison of the complexity of algorithms. (c) Algorithms for the main data structures, (stacks, queues, trees, linked lists, depth-first (post-order) and breadth-first traversal of trees). Standard algorithms (bubble sort, insertion sort, merge sort, quick sort, Dijkstra’s shortest path algorithm, A* Begin programming NEAs and continue to work on the documentation |
Year 13 - Computer Science
Autumn 1 | Autumn 2 |
---|---|
At the end of this Unit all pupils should be able to apply knowledge to exam question on the following: The Arithmetic and Logic Unit; ALU, Control Unit and Registers (Program Counter; PC, Accumulator; ACC, Memory Address Register; MAR, Memory Data Register; MDR, Current Instruction Register; CIR). Buses: data, address, and control: how this relates to assembly language programs. (b) The Fetch-Decode-Execute Cycle, including its effects on registers. (c) The factors affecting the performance of the CPU: clock speed, number of cores, cache. The use of pipelining in a processor to improve efficiency. (e) Von Neumann, Harvard an Complete NEA First Draft Revision in response to formative and summative assessment in preparation for exams |
Data Structures At the end of this Unit all pupils should be able to apply knowledge to exam question on the following: Algorithms Building on knowledge from year 12 (a)Measures and methods to determine the efficiency. of different algorithms, Big O notation (constant, linear, polynomial, exponential and logarithmic complexity). (b) Comparison of the complexity of algorithms. (c) Algorithms for the main data structures, (stacks, queues, trees, linked lists, depth-first (post-order) and breadth-first traversal of trees). Standard algorithms (bubble sort, insertion sort, merge sort, quick sort, Dijkstra’s shortest path algorithm, A* Databases: Build knowledge from year 12 focus will be on Normalisation to 3NF. SQL – Interpret and modify. See appendix 5d. Referential integrity. Transaction processing, ACID (Atomicity, Consistency, Isolation, Durability), record locking and redundancy |
Spring 1 | Spring 2 |
---|---|
NEA Completion At the end of this Unit all pupils should be able to apply knowledge to exam question on the following: Data structures Arrays (of up to 3 dimensions), records, lists, tuples. The following structures to store data: linked list, graph (directed and undirected), stack, queue, tree, binary search tree, hash table. How to create, traverse, add data to and remove data from the data structures mentioned above. (NB this can be either using arrays and procedural programming or an object-oriented approach). Algorithms: Building on knowledge from year 12 (a)Measures and methods to determine the efficiency. of different algorithms, Big O notation (constant, linear, polynomial, exponential and logarithmic complexity). (b) Comparison of the complexity of algorithms. (c) Algorithms for the main data structures, (stacks, queues, trees, linked lists, depth-first (post-order) and breadth-first traversal of trees). Standard algorithms (bubble sort, insertion sort, merge sort, quick sort, Dijkstra’s shortest path algorithm, A* |
At the end of this Unit all pupils should be able to apply knowledge to exam question on the following: Need for and characteristics of a variety of programming paradigms. (b) Procedural languages. (c) Assembly language (including following and writing simple programs with the Little Man Computer instruction set). (d) Modes of addressing memory (immediate, direct, indirect, and indexed). (e) Object-oriented languages with an understanding of classes, objects, methods, attributes, inheritance, encapsulation, and polymorphism. Continued work on the NEA documentation, ready for a final draft. |
Summer 1 | Summer 2 |
---|---|
Focus will be on exam specific topics | Exams |