Skip to main content
Home Home
Main navigation
  • About

    About our school

    Vision and values
    Culture and wellbeing
    Safeguarding
    Key information and policies
    Ofsted and results

    Phases

    Primary
    Secondary
    Sixth form

    Our community

    Staff
    Governance
    Pupil Leadership
    Ark schools
  • Curriculum

    Our approach

    Curriculum overview
    Digital
    Reading
    Special educational needs

    Subjects

    List by subject
    List by year group
    Choosing GCSEs
    Sixth Form courses

    Extended curriculum

    Overview
    Performing arts
    Sport
    Clubs
    Primary Passport
    Duke of Edinburgh

    Careers & destinations

    Our careers programme
    Bursaries
  • Admissions
  • Parent Hub

    Parent handbook

    Parent handbook

    Key information and resources for parents, carers and families.

    Parent hub

    Quick links

    Reporting absence
    Term dates
    School meals
    Uniform
    Payments

    Communication

    My Child at School (MCAS)
    SchoolCloud
    Parent engagement
    Newsletters
    Parent letters
    Guides and resources
  • News
  • Calendar
  • Jobs
  • Contact
User account menu
  • Hire facilities
  • Support us

Breadcrumb

  1. Home
  2. Curriculum
  3. Subjects
  4. Computer Science

Computer Science

GCSE Exam & Specification
Year 1
Year 2
Year 3
Year 4
Year 5
Year 6
Year 7
Year 8
Year 9
Year 10
Year 11
Year 12
Year 13
Support from Home
Feedback
Career Pathways
Enrichment & Educational Visits

GCSE Exam & Specification

GCSE Exam Board: 

OCR  

Link to GCSE Specification: 

https://www.ocr.org.uk/Images/558027-specification-gcse-computer-science-j277.pdf 

 

Curriculum Intent 

Our curriculum is designed to meet the needs of our students in our local context and is underpinned by these 4 guiding principles: 

  • Rich and Powerful Knowledge: Our curriculum is ambitious and inclusive, aiming to equip students with programming skills, the ability to create projects, and proficiency in computational thinking. Our curriculum goes beyond the national standards by exposing students to a diverse range of programming languages. At KS3, students encounter more than two programming languages, broadening their understanding and capabilities. Our data shows that we received above the national standards in our 2023 GCSE results, regardless of how tough paper 2 – the computational thinking paper was because we work on this through reception all the way to year 13. We prioritize collaborative efforts between primary and secondary education to ensure alignment and facilitate adaptations when necessary. This cohesive approach enhances the continuity and effectiveness of our curriculum. 

We recognize the diverse needs of our students and, therefore provide scaffolds where necessary. This ensures that each student receives tailored support, fostering a conducive environment for success. 

  • Objective and Question Driven: Clear objectives are sequenced through the units, so that knowledge can be mastered lesson to lesson and unit to unit. 

Every objective is designed with real-world relevance, connecting theoretical knowledge to practical applications. This approach not only enhances comprehension but also instils a sense of the curriculum's applicability in students' lives e.g., when studying network hardware, the students can relate to this hardware at home and understand the purpose of it as well as name the cables needed for making connections. We frame our curriculum around key questions (what is an algorithm – year 7, how is sequencing programmed in python? How is selection and iteration implemented in a program? 10/11, advanced programming concepts stacks, queues, and lists. 

Mastering The Foundations (Literacy and Numeracy):  Explicitly reading out code. Inclusive and ambitious: meets the national curriculum through three years and exam board specifications from years 10 – 13. KS3 the students learn three programming languages (scratch – block based, python and HTML) KS4 – meets the exam board specifications e.g., networks and network security, drip fed knowledge from year 7. KS5 - goes beyond as some students pick up a choice of a different programming language other than python.   

  • Inclusive and Ambitious: Subject experts – Intellectual preparation (CPD videos)   

  • Our curriculum is not only objective-driven but also integrates assessments regularly (Low stake tests at the start of every lesson, diagnostic assessments twice a half term, interim assessments once a half term). Regular assessments are strategically placed to gauge student understanding, allowing for continuous improvement and differentiated support. 

  • Follows the whole school structure of an INA lesson using the RPC principles with the NN to ensure than lessons are delivered effectively (Do Now, New Learning with I, we, then application, plenary).  This provides consistency throughout the whole academy and built on cognitive science to retrieve, position and chunk learning. 

  • Strong climate for learning – regular CPD sessions on perfect starts and ends, clear route for circulating to check. 

  • Embedding Routines – students know to always come in log on and access their LSTs using google classroom- green pen and update trackers in their books.   

  • Memory – focus on key vocabulary with clear modelling and LIVE Coding to support chunking of information. 

  • Precise assessment & feedback - MCQ to assess knowledge, live-feedback, next step challenges and reflections.   

  • Shared pedagogical strategies & routines –Intentionally monitoring (circulating to check), CCC, RPC.  

Implementation 

Our curriculum implementation is shaped across all phases of the academy by a set of shared principles that underpin pedagogy at AINA. The following curriculum map outlines the ambitious curriculum your child will experience at AINA.  

Year 1 - Computer Science

Autumn 1 - Into the Woods  Autumn 2 - Mind the Gap

Can I create an eBook? 

 

Use Tux Paint to Illustrate an eBook (link to English core text ‘Little Red Riding Hood’) 

- Can I create and store the illustrations?

- How do I retrieve and manipulate the illustrations?

- How do I use Tux Paint to create an eBook?

E-safety

- How do I keep myself safe online?

- What is intellectual property?

What will my digital card look like?

 Use Fresh Paint to create a card digitally (Winter card/Christmas card) 

- How do I practice with the keyboard to become a fluent typist?

- How do I use the internet safely to search for images??

- What does it mean to combine the text, images and refine the card.

E-safety

-How do I use technology safely?

Who do I speak to if I have concerns?

-What is copyright?

Spring 1 - The Magic Toymaker Spring 2 - From A to B

Can I programme a toy? 

Use Programmable toys: BeeBots 

-How do I record an algorithm?

- What are the features of a Beebot?

- How do I programme the robot to find treasure?

- How do I debug the errors in the algorithm?

E-safety

- How do I use simple programmable toys safely and sensibly?

- How do I ensure filming is done with appropriate consent and assent?

How do I use the internet safely? 

Finding images using the web (link to transport) 

-How do I use the internet to search for images of vehicles?

- How do I organise vehicles in to two categories?

- How do I peer review the PowerPoint presentations?

E-safety

- How do I search for images safely?

- How do I show respect for others’ intellectual property through observing copyright conditions?

Summer 1 - Out of Africa Summer 2 - Seen and not Heard

What is an audio book? 

Create a talking book (audio book) on Grace & Family using PowerPoint & Book Creator   

- What is an audiobook?

- How do I practise with the microphone/audio recorder?

- How do I record sound effects?

- How do I record the story?

E-safety

-How do I use a digital video camera safely?

- Do I recognise the need for consent and assent?

Can I be a TV presenter?

Videoing a set of instructions and using Movie Maker to edit. 

- How do I create an algorithm to programme a sandwich-making robot?

- How do I practise with the camera?

- How do I film the instruction video?

E-safety

- Can I use audio recorders of microphones and audio recording software safely and sensibly?

 

All Year 1 Subjects Next Year 1 Subject - Drama

Year 2 - Computer Science

Autumn 1 - Super Humans Autumn 2 - Are you sitting comfortably?

What does it take to create a game on Scratch? 

 Use Scratch Jr to find the objects in George’s house. 

- How do I program a Beebot to make predictions on where the robot will end up?

- How do I programme the sprite to move.

E-safety

- What is a Creative Commons licence?

- How do I upload my project to Scratch safely?

- What do I do if I encounter something that makes me feel uncomfortable?

What do game testers look for? 

Use Scratch to test out different games. 

-How do I test different games?

- How do I test more complex games?

- How do I adapt a game’s algorithm?

E-safety

- What is PEGI age restrictions?

- How can I report the comments Scratch if they are inappropriate?

Spring 1 - Young Entrepreneurs Spring 2 - Time Travellers

What does it take to be a photographer?

Practise using a camera to take photos and use Pixlr and Microsoft Photos to edit photos. 

- What are the different parts of a camera?

- How do I start organising photos using Pixlr and Microsoft Photos?

- How do I edit and enhance the photos?

E-safety

- Do I know how  to minimise risks when posting online?

- What should I do if I have concerns about images I  encounter on the web?

- What is an acceptable and unacceptable photograph? 

Can I create my own PowerPoint presentation?

Use the internet for research and create Microsoft PowerPoint presentation

-How do I start scoping a topic and breaking down questions using FreeMind?

- How do I search safely and effectively using Google?

- How do I start preparing a presentation using Microsoft PowerPoint?

E-safety

- How do I stay safe while researching online, and show respect for others’ ideas and intellectual property?

- How do I use safe search filters?

Summer 1 - Roots, Shoots, Animals and Fruits Summer 2 - Oh i do like to be beside the seaside!

What does it take to be a zoologist?

Use Microsoft Excel, Google Photos and Google Earth to

Collect data. (Links to Science)

- How do I brief, prepare and use a database to start classifying?

- How do I use a database and a camera on our bug hunt?

- How do I work with data on Excel?

- How do I use Google Earth to work with maps?

E-safety

-How do I keep my personal information private?

- How do I respect rules for using digital equipment when out of the classroom?

 What does a detective do?

 Use Microsoft Email Accounts & Google Sheets to solve a mystery. (Link to topic) 

- How do I read and reply to an email?

- How do I use the email attachments feature?

- How do I compose an email?

- How do I  organise information using an Excel template?

E-safety

-What are the risks associated with emails?

- Can attached files contain viruses?

- What is spam?

 

All Year 2 Subjects Next Year 2 Subject - Drama

Year 3 - Computer Science

Autumn 1 - Did Dinosaurs exist?  Autumn 2 - Who were the first people on Earth

 What will my screencast presentation on dinosaurs feature?

Use PowerPoint to create and record over presentations. 

- How do I use Microsoft PowerPoint to plan the presentation?

- How do I source content such as images and videos?

- How do I use the video and audio recording feature on PowerPoint?

E-safety

- What is my digital footprint?

- What do I do when I encounter inappropriate content?

- Why do I need the owner’s permission before I copy content?

What will my programmed animation look like? 

Use Scratch to create and programme and animation based on the Stone Age. 

- How do I create a character and a background?

- How do I start animating the characters by converting the storyboard algorithm on to Scratch.

- How do I add sounds to the animations?

E-safety

- What is safe search?

- What is YouTube’s safety mode?

- How do I stay safe when browsing?

Spring 1 - Who were the Romans? Spring 2 - How do forces help us?

Can I communicate safely on the internet?

 Use Teams & Zoom to teach children how to communicate online. 

- How do  emails work?

- How do I use emails safely?

- How do I email using attachments?

- How do I share the presentations in a video conference?

E-safety

- What is email etiquette?

- What are the dangers of spoofed links and malware via attached files.

- How old must I be to set up accounts on certain platforms?

Can I find and correct bugs in programs?

Use Scratch or Snap to find and correct bugs in programs. (Link to maths) 

- How do I spot and correct performance bugs?

- How do I spot and correct multi-thread bugs?

- How do I spot and correct conceptual bugs?

- How do I spot and correct arithmetical bugs?

- How do I correct resource bugs?

E-safety

- Why must I never share the shared account details for Scratch?

- How do I stay safe when carrying out online research?

Summer 1 - Who were the Anglo Saxons? Summer 2 - How does my body move?

How do I collect and analyse data?

Use Google Forms & Microsoft Excel to collect and analyse data on keeping healthy. (Link to PSHE) 

-How do I plan a survey on FreeMind?

- How do I develop questions on Google Forms?

- How do I use Google Forms to create the online survey?

- How do I analyse and evaluate the data using Excel?

E-safety

- What are the ethics of surveys?

- What is the expectation of anonymity and confidentiality?

- How do I ensure my survey does not include questions that could allow a person to be identified?

How can I present some information in a short video?

 Use WeVideo to create a one-minute edited video on how our bodies move. 

- How do I use a video camera to record short clips?

- How do I  start shooting the video?

- How do I edit the video using WeVideo?

- How do I improve the video by adding in text, sounds and effects?

E-safety

- Why should I seek parental consent when sharing videos?

- Why must I keep personal information private?

 

All Year 3 Subjects Next Year 3 Subject - Drama

Year 4 - Computer Science

Autumn 1 - What happened in 1066? Autumn 2 - Can you hear me?

What does it take to develop a game? 

Use Scratch to develop a simple educational game on the Vikings. 

- How do I analyse educational games?

- How do I build a game prototype on Scratch?

- How do I add in repetition?

- How do I work on the interface?

- How do I build in progression?

E-safety

-What is copyright when sourcing images or media?

- How do I keep my personal information private on the If the pupils participate in the Scratch community?

What will my interactive toy look like? 

Use Snap! & Pyonkee to – prototype an interactive toy for Varjak Paw 

- What are inputs and outputs?

- How do I design a toy using Kickstarter?

- How do I design a  toy in Snap?

- How do I program the toy simulation?

- How do I test and improve the toy simulation?

E-safety

-What is copyright?

- What is intellectual property?

- How do I use the internet safely to research ideas?

Spring 1 - What are the origins of chocolate? Spring 2 - How useful is electricity?

 What is Wikipedia?

Use SlimWiki to produce a Wikipedia page on Chocolate 

- How do I use Wikipedia to find information.

- How do I edit the wiki pages?

- How do I edit Wikipedia?

E-safety

- What is the reliability of online content?

- What conduct is appropriate when collaborating on a shared resource?

What can I create by being a HTML editor?

Use Thimble Editor & Khan Academy to edit and write HTML and to then produce a web page on how useful electricity is. 

- What is the web and the hidden meanings of URLs?

- How do I edit HTML in web pages?

- How do I start my first HTML project using Thimble Editor?

- How do I develop and refine the webpage?

E-safety

-What are the risks of using the web?

- How could I best keep myself safe?

- Web pages can be modified, so what is the reliability of web-based content?

Summer 1 - Who were the Tudors? Summer 2 - How do i keep healthy?

 How do I produce music digitally? 

Use Isle of Tune, Audacity & MuseScore to produce digital music. (Link to Music lessons) 

- Can I make a sequence using Isle of Tune?

- How do I record samples?

- How do I work with different samples?

E-safety

- What is copyright when sourcing audio or publishing?

- What is the illegal downloading and sharing of copyrighted music?

What does a meteorologist do?

Use Excel and PowerPoint to collect data, analyse and present the weather. 

- How do I record the weather using Microsoft Excel?

- How do I use Excel to analyse the data?

- How do I prepare a weather forecast

- How do I give a TV-style weather forecast?

E-safety

-  What is the importance of obtaining and using accurate data?

- Why do I need to ensure appropriate permission is obtained? – What are the implications of uploading my film to the school network or to the internet? 

 

All Year 4 Subjects Next Year 4 Subject - Drama

Year 5 - Computer Science

Autumn 1 - Who were the Ancient Eygyptians? Autumn 2 - What forces are around me?

 Can I create a game?

Use Scratch 3.0 to create a maze game linking to the Egyptians. 

- How do I create and source assets?

- How do I create a prototype of my game?

- How do I debug the game script?

- How do I write game instructions?

E-safety

- What is copyright when sourcing images or media ?

- How do I develop safe search habits?

- What are the personal implications of playing games, perhaps including violent computer games?

 Will my website help promote cyber safety? 

Use Google Sites to create a website promoting cyber safety. 

-  How does Search work?

- How do I curate website content?

- How do I add media to the website?

- How do I improve my website?

E-safety

-Why should I consider the reliability and bias of online connect?

- How do I contribute positively to a shared resource?

- How do I use search engines safely and effectively?

Spring 1 - What's out of this world? Spring 2 - Who were the Ancient Greeks?

Can I create a 3D virtual galaxy?

 

Use Inkscape, Scratch & Terragen to create a galaxy using ideas from maths (geometry) & Islamic art (link to RE) 

-How do I create simple tessellations using Inkscape?

-How do I use Inkscape to create art?

- How do I create computer-generated landscapes in Terragen?

E-safety

-How do I stay safe searching and evaluating the quality of online content?

- How do I protect personal information?

How does internet cryptography work?

Use The Black Chamber (website) and Scratch 3.0

to be in the role of a Spartan warrior and communicate with the military leaders.

- How do I transmit information in semaphore?

- How do I use Morse code?

- How do I use Caesar cipher to create and crack codes?

- How do I substitute ciphers and frequency analysis?

- What’s the importance of password security?

E-safety

-How is information communicated in secret over open channels?

- How do I check the security certificates of encrypted websites?

- What makes a secure password?

Summer 1 - What are the states of matter? Summer 2 - How do we grow and change?

 How will my blog impact my readers?

Create a blog using WordPress about a healthy and balanced diet and include a recipe for their readers to use. 

- What makes a good blog?

- How do I write a blog post?

- How do I comment on blog posts?

- How do I add images on blog posts?

- How do I work with media?

E-safety

- What is appropriate shared content?

- What constitutes acceptable behaviours when commenting on others’ blog posts?

Can I showcase my work in my virtual art gallery?

Use Trimble SketchUp (used for 3D modelling) to create a virtual art gallery. This links to maths (geometry) 

- How do I create a virtual sculpture?

- How do I start creating the gallery?

- How do I hang pieces of work and art?

- How do I create a virtual tour of the gallery?

E-safety

-What is good practice when searching for and selecting digital content?

- What is copyright and what significance does it hold?

 

All Year 5 Subjects Next Year 5 Subject - Drama

Year 6 - Computer Science

Autumn 1 - Lights, Camera, Action! Autumn 2 - What was Ilford like in the past?

Can I create a short television advert?

Use iMovie to create a television advert on anti-bullying. 

- How do I practice shooting techniques?

- How do I source other media?

- How do I assemble a rough-cut using iMovie?

- How do I use iMovie to polish the final cut?

E-safety

-What is the school policy in relation to videoing?

- Why must I obtain consent before uploading a video?

- What are the implications of sharing videos online?

What makes the computer network, including the internet?

Pupils take part in activities to learn about computer networks and create a poster to share their knowledge with others 

- How do I understand how messages are passed along networks?

- How do I use Scratch to learn how the DNS simulation program works?

- How do I create a presentation showing how the internet works and how to keep safe online?

E-safety

- What are the safety implications of internet communication?

- How do I keep myself and my work safe online?

Spring 1 - How do i looks after myself? Spring 2 - Where in the world?

What will my simple mobile phone app look like? 

Use App Lab to develop a simple mobile phone app.

- How do I use the toolkit on App Lab?

- How do I assemble the assets for the app?

- How do I establish the algorithms?

- How do I debug and refine the app?

E-safety

-What are the precautions to take when using a shared account?

- Why must I seek parental consent before posting online?

What algorithm can I create to test prime numbers and to find factors?

Use Scratch and Snap to master algorithms for searching, sorting and mathematics.

-How do I carry random and linear searches?

- How do I carry out a binary search?

- How do I carry out the selection sort algorithm?

E-safety

- Why must I seek permission before creating an account?

- Why must I keep comments respectful?

- What do I do if I find an inappropriate comment?

Summer 1 - What can we learn from ancient civilisations? Summer 2 - All Change!

What will my adventure game look like?

 Use Python and trinket.io to create a simple, text-based adventure game. 

- How do I use Python to print descriptions?

- How do I use Python for selection and variables?

- How do I use trinket.io and Python to create separate procedures?

E-safety

-Why must Python be used responsibly?

- Why must I not share personal information publicly via Trinket?

Can I showcase my time at primary school in our yearbook?

Use Book Creator to create a yearbook. 

- How do I commission and source content?

- How do I start adding text and photos?

- How do I use Microsoft Publisher to begin assembling pages?

E-safety

- What are the implications of including photographs of pupils in their work?

- Why must I seek permission before using someone else’s work?

 

All Year 6 Subjects Next Year 6 Subject - Drama

Year 7 - Computer Science

Autumn 1 - E - Safety Autumn 2 - Scratch

-To learn the policy regarding school computer use

-To learn to manage files in File Explorer.

-To learn some useful tips for using software packages

-To understand the importance of backup

-Learn about the possible dangers of social networking sites.

-Learn how to respond to threats on the Internet

-Learn how to keep your identity secure on the Internet

-Learn how to create a secure, memorable password

-Learn how to identify a phishing scam

- Learn how to avoid being a victim of an email scam

-To learn how to

-send, respond to and forward emails

-search your old emails for a sender, subject, etc.

-resize large image files before -sending

manage your contacts list

-Be aware of the advantages and disadvantages of email

Define the term “search engine” and name examples

Learn techniques to use a search engine efficiently

Appreciate that there is no guarantee that the information on the Internet is accurate

  • How can I relate computational abstractions and simple programming code to on-screen actions that will take place in my game?
  • How can I use variables in programming structures to assemble code in procedural blocks, make them flow and set timers?
  • How can I carry out simple tests to debug my scratch game?
Spring 1 - Python Spring 2 - Computer crime and cyber security
  • Write, save and run simple Python programs in Interactive or Script mode
  • Understand what a syntax error is and how to interpret an error message
  • Know the rules for variable names and use variables in a program

 

  • Understand correct data types

 

  • Use the int, float and round functions

 

  • Write a program involving input, calculation and output
  • Use selection statements if, else and elif in a program
  • Learn how to use different comparison operators

- Identify common types of computer crime

-Look at examples of computer crime on the Internet

-Learn about different types of email scam

-Recognise the signs of fraudulent emails

-Learn about the Computer Misuse Act – which makes certain activities illegal.

- Look at examples of computer misuse.

- Understand what is meant by hacking.

- Understand what is meant by malware.

- Learn ways to protect yourself from malware and hacking.

-Be aware of who might hold personal data about you

- Discuss the need for various organisations to hold data about you

- Be aware of the possibility of identity theft

Know how to minimize the chance of identity theft

-Understand Copyright law and look at examples of copyright infringement

- Understand the damage that illegal copying does to individuals, companies, and society

- Compare copyright

infringement with plagiarism

-Learn about some of the common health and safety problems associated with computer use.

- Learn ways of avoiding these problems.

- Learn about Health and Safety law.

Summer 1 - HTML/CSS Summer 2 - Revision/end of year exam

Introduction to HTML, CSS and JavaScript

  • Write HTML code to create a simple web page and display it in a browser.
  • Write CSS to define the styles used in a web page.
  • Create a simple navigation system using HTML.

Revision of all topics

End of year exam

 

All Year 7 Subjects Next Year 7 Subject - Drama

Year 8 - Computer Science

Autumn 1 - Understanding Computers Autumn 2 - Introduction to Networking

- Distinguish between hardware and software

- Identify Input, Output and Storage devices

- Name at least five pieces of software

- Suggest appropriate input and output devices for a given scenario

- Know the components of a computer: input, processor, output and storage as a block diagram

- Name the three stages in the Fetch Execute Cycle

- Explain what main memory is used for

- Distinguish between main memory and permanent storage devices

- Define Hz, MHz and GHz and state how these relate to the speed of the processor

- Understand the difference between RAM and ROM and ---what ROM is used for

-Why all data is represented in binary in a computer

- What is the difference between basic numbering and computer numbering system

- How to convert integers to binary numbers

- How to convert binary numbers to integers

- How to convert integers to binary numbers

- How to convert binary numbers to integers

- What are the rules of binary addition

- How to perform binary addition

- State the typical capacities, strengths and weaknesses of different storage devices

- Describe how data is stored on a CD

- Describe how 0s and 1s are represented by pits and lands on a CD

- Name three types of optical storage device

- Review the history and development of communication.

- Understand how modern communication and computing devices combine multiple technologies

- Discuss the different ways and applications in which modern technology is used

- Discuss future uses of technology and the pace of change (Moore’s Law)

  • Describe the difference between a Local Area Network and a Wide Area Network
  • Describe what topologies are and how they help with network designing.
Understand wireless modes of connection, including Wi-Fi and discuss the advantages and disadvantages of this type of connection.
Spring 1 - Introduction to databases Spring 2 - Python Continued

-To get an overview of what a database is.

- To understand why a database is useful in many different applications.

- To learn what is meant by a database, record & field.

- Create a database table and structure

- Use suitable data types including numbers and text

- Explain the purpose of a Primary key

- Add validations and validation text to at least one field

- Note examples of queries on websites

- Use complex criteria to select records

- Create a parameterised query

- Sort the data on one or more fields

- Choose which fields to display in the Results table

Add a calculated field

  • Discuss examples of forms on websites
  • Create a new form from a table or query
  • Make the form user-friendly by adding help text, combo boxes, etc
  • Sort and navigate tables using a form
  • Find, enter, modify and delete records using a form
  • Create a report based on a query
  • Edit the layout of the report
  • Create a consistent design
  • Use indentation correctly to define a block of code
  • What is pseudo-code
  • What is the difference between syntax errors, run-time errors and logic errors
  • Learn techniques for debugging programs
  • Use a while loop in a program
  • Use an if statement within a while loop
  • Use a function to generate a random number
  • Compare alternative algorithms for a given problem
  • Use a linear search to find a number
  • Understand how a binary search works
Summer 1 - Python Project Summer 2 - Revision/end of year exam

Use Python to create a simple, text-based adventure game/ project. 

- How do I use Python to output descriptions?

- How do I use Python for selection and variables?

- How do I use Python to create separate procedures?

- How can i use python to keep a score count using iteration such as while loops/ for loops

- How can I use Python to add sound to the screen?

Revision of all topics

End of year exam

 

All Year 8 Subjects Next Year 8 Subject - Drama

Year 9 - Computer Science

Autumn 1 - Data Modelling Autumn 2 - Python Next Steps
  • Understand how to create basic Formulas for calculations
  • Revise spreadsheet basics: entering text, numbers and formulae
  • Use relative and absolute referencing
  • Format cells, insert a graphic
  • Understand what is meant by the term computer model, and compare different types of model
  • Understand that spreadsheets can be used to build financial models
  • Revise spreadsheet basics: entering text, numbers and formulae
  • Use relative and absolute referencing
  • Format cells, insert a graphic
  • Use of goal seek
  • Create a financial model to predict the profit on the sale of merchandise
  • Make the model as realistic as possible based on known sales figures and prices
  • Consider ways of increasing profit to meet a given target
  • Use IF statements & Goal seek within the spreadsheet model
  • Use a spreadsheet to model outcomes
  • Use functions including Max, Min and If
  • Try out different ‘What if’ scenarios to achieve a goal
  • Display formulae in a spreadsheet
  • Create a seat booking system for a live show
  • Use validation techniques to ensure that only valid data can be entered
  • Use conditional formatting to show which seats have been booked
  • Use a Countif function in calculations of seat sales
  • Read and understand an existing Python program
  • Recall different data types
  • Use the int(), float() and str() functions to convert data types
  • Write an if-else statement
  • Use selection statements if, else and elif in a program
  • Learn how to use different comparison operators
  • Use indentation correctly to define a block of code
  • Use a while loop to repeat a section of code
  • Use a for loop to repeat a section of code
  • Make a choice about which loop to use, and why
  • Be able to store and update values in a list
  • Be able to append data to a list
  • Be able to use a for() loop to step through a list
  • Understand why using a list can be more efficient than using single variables
  • Understand what a procedure is
  • Be able to define and call a procedure
  • Understand why procedures are useful
  • Be able to use parameters in a procedure
  • Understand what a function is
  • Be able to define a function
  • Be able to call a function and capture the return value
Spring 1 - Networks Spring 2 - Programming and Algorithms
  • Learn what the Internet and world wide web are
  • Learn how web addresses are constructed
  • Learn what a protocol is and why one is needed for data communication
  • Understand how packet switching works
  • Learn what the Domain Name Server (DNS) does
  • Learn the meaning and significance of bandwidth
  • Compare different types of cable, and the relative speeds of data transmission
  • Calculate time taken to download files of different sizes at different bandwidths
  • Understand what is meant by buffering and why it is used
  • Understand the difference between LANs and WANs
  • Be able to give example of each type of network
  • Know what extra hardware is needed for a LAN to operate
  • Identify three different network topologies – bus, ring and star
  • Understand what constitutes a client-server network
  • Contrast a client-server network with a peer-to-peer network
  • Be able to list advantages and disadvantages of each model
  • Understand what is meant by cloud computing
  • List the main advantages of cloud computing
  • To identify some of the types of data that need to be kept secure
  • To learn some of the ways in which data is kept secure
  • To learn how unauthorised people can break ciphers and read encrypted data
  • To learn some classical encryption techniques
  • Understand algorithms written using flow diagrams or pseudocode
  • Correct or complete algorithms
  • Produce algorithms using flow diagrams or pseudocode to solve problems
  • Understand and use sequence, selection and iteration in an algorithm
  • Write algorithms in pseudocode involving sequence, selection and iteration
  • Trace through given algorithms to explain what they do, correct or complete them
  • Define the terms variable and constant
  • Use and identify variables and constants in program code
  • Identify and use the data types of integers, real, Boolean, character and string

Summer 1 - Programming and Algorithms

Summer 2 - Revision/end of year exam
  • Use one-dimensional arrays
  • Correct logic errors in a program
  • Learn what is meant by boundary data
  • Write a test plan to test an algorithm
  • Use a trace table to trace through a program
  • Understand the difference between high level code and machine code
  • Understand the need for translators to convert high level code to machine code
  • Describe the characteristics of an assembler, a compiler and an interpreter
  • Explain what is meant by an Integrated Development Environment (IDE)
  • Describe and give examples of syntax, logic and runtime errors
  • Describe common tools and facilities available in an IDE to help debug programs

Revision of all topics

End of year exam

 

All Year 9 Subjects Next Year 9 Subject - Drama

Year 10 - Computer Science

Autumn 1 - Systems Architecture Autumn 2 - Networks
  • Understand the purpose of the CPU and the
    fetch-execute cycle
  • Understand the following registers in the Von Neumann architecture:
  • MAR (Memory Address Register
  • MDR (Memory Data Register
  • Program Counter
  • Accumulator
  • Understand common CPU components including:
  • ALU (Arithmetic Logic Unit)
  • CU (Control Unit)
  • Cache
  • Registers
  • Understand the function of cache in the CPU
  • Describe how common characteristics of CPUs affect their performance including:
  • Clock speed
  • Cache size
  • Number of cores
  • Explain the purpose and give examples of embedded systems
  • Explain the need for primary storage
  • Describe the difference between RAM and ROM
  • Describe the purpose of RAM and ROM in a computer system
  • Explain the need for virtual memory
  • Discuss the need for secondary storage including optical, magnetic and solid state storage
  • Evaluate suitable storage devices and media for a given application using the following characteristics:
    • Capacity
    • Speed
    • Portability
    • Durability
    • Reliability
    • Cost
  • Understand the function of cache in the CPU
  • Describe how common characteristics of CPUs affect their performance including:
    • Clock speed
    • Cache size
    • Number of cores
  • Explain the purpose and give examples of embedded systems
  • Explain the need for primary storage
  • Describe the difference between RAM and ROM
  • Describe the purpose of RAM and ROM in a computer system
  • Explain the need for virtual memory
  • Discuss the need for secondary storage including optical, magnetic and solid state storage
  • Evaluate suitable storage devices and media for a given application using the following characteristics:
    • Capacity
    • Speed
    • Portability
    • Durability
    • Reliability
    • Cost
  • Define a Wide Area Network
  • Describe the nature of the Internet as a worldwide collection of computer networks
  • Explain the need for IP addressing of resources on the Internet and how this can be facilitated by the role of DNS services
  • Understand the need for Network Interface Cards and the uses of MAC addressing
  • Explain packet switching
  • Describe the difference between a Local Area Network and a Wide Area Network
  • Describe star and mesh network topologies
  • Describe routers and switches needed to connect stand-alone computers into a Local Area Network
  • Explain the use of Ethernet standards to transmit data over a wired network
  • Explain the concept of virtual networks
  • Understand wireless modes of connection, including:
  • Wi-Fi
  • Bluetooth
  • Explain the need for Wireless Access Points to create wireless hotspots
  • Understand how encryption is used to secure data across network connections
  • Explain the role of computers in client-server and peer-to-peer networks
  • Explain the advantages and disadvantages of client-server and peer-to-peer networks
  • Describe what is meant by:
  • Hosting
  • The Cloud
  • Explain the advantages and disadvantages of various transmission media

Describe the factors that affect network performance

  • Describe the uses of communications protocols including:
  • HTTP
  • HTTPS
  • FTP
  • POP
  • IMAP
  • SMTP
  • TCP/IP
  • Explain the concept of layers in the TCP/IP
    protocol stack
  • Define the terms bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte and petabyte
  • Understand that data needs to be converted into a binary format to be processed by a computer
  • Convert positive denary whole numbers (0-255) into
  • 8-bit binary numbers and vice versa
  • Define the terms bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte and petabyte
  • Understand that data needs to be converted into a binary format to be processed by a computer
  • Convert positive denary whole numbers (0-255) into
  • 8-bit binary numbers and vice versa
  • Understand the use of binary codes to represent characters
  • Understand the term ‘character set’
  • Explain the relationship between the number of bits per character in a character set, and the number of characters that can be represented using:
  • ASCII
  • Extended ASCII
  • Unicode
  • Understand how a bitmap graphic is made up of individual pixels
  • Explain how each pixel is represented in binary
  • Understand that the number of bits per pixel determines the number of available colours for an image
  • Explain the need for image metadata
  • Explain the relationship between file size and image resolution
  • Understand how sound is sampled and stored in
    digital form
  • Be able to represent a short sound file in binary
  • Explain how sampling intervals and resolution affect the size of a sound file using the terms:
  • Sample rate
  • Bit depth
  • Explain the trade-off between file size and the quality of playback
  • Explain the need for compression
  • Describe the difference between lossy and lossless compression
Spring 1 - Data Representation Spring 2 - Algorithms
  • Define the terms bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte and petabyte
  • Understand that data needs to be converted into a binary format to be processed by a computer
  • Convert positive denary whole numbers (0-255) into
    8-bit binary numbers and vice versa
  • Convert positive denary whole numbers (0-255) into
    2-digit hexadecimal numbers and vice versa
  • Convert between binary, denary and hexadecimal equivalents of the same number
  • Add two 8-bit binary integers and explain overflow errors which may occur
  • Understand the use of binary shifts
  • Understand the use of binary codes to represent characters
  • Understand the term ‘character set’
  • Explain the relationship between the number of bits per character in a character set, and the number of characters that can be represented using:
  • ASCII
  • Extended ASCII
  • Unicode
  • Understand how a bitmap graphic is made up of individual pixels
  • Explain how each pixel is represented in binary
  • Understand that the number of bits per pixel determines the number of available colours for an image
  • Explain the need for image metadata
  • Explain the relationship between file size and image resolution
  • Understand how sound is sampled and stored in
    digital form
  • Be able to represent a short sound file in binary
  • Explain how sampling intervals and resolution affect the size of a sound file using the terms:
  • Sample rate
  • Bit depth
  • Explain the trade-off between file size and the quality of playback
  • Explain the need for compression
  • Describe the difference between lossy and lossless compression

-Understand the principles of
computational thinking including

-Abstraction

-Decomposition

-Algorithmic thinking

-Be able to produce structure diagrams to show:

-The structure of a problem

Subsections and their links to other subsections

-Understand and use different types of search

    • Binary search
    • Linear search

Understand the standard sort algorithms:

    • Bubble sort
    • Insertion sort
    • Merge sort
  • Understand flowchart symbols
  • Create, interpret, correct, complete and refine algorithms using flowcharts
  • Understand arithmetic operators and variables
  • Be able to apply each algorithm to a data set
  • Be able to Identify an algorithm if given the
    code for it
  • Define the data types integer, real, Boolean, character, string
  • Be able to use Boolean operators
  • Write algorithms in pseudocode involving sequence, selection and iteration
  • Understand the purpose of a given algorithm and how an algorithm works
  • Understand how to determine the correct output of an algorithm for a given set of data
  • Understand how to identify and correct errors in algorithms
  • Create and use of trace tables to follow an algorithm
Summer 1 - Logic and Languages Summer 2 - Programming
  • Construct truth tables for the following logic gates:
    • NOT
    • AND
    • OR
  • Construct truth tables for simple logic circuits
  • Interpret the results of truth tables
  • Create, modify and interpret simple logic
    circuit diagrams
  • Describe defensive design considerations:
  • Input validation
  • Anticipating misuse
  • Authentication
  • Understand how to make maintainable programs including:
  • The use of sub programs
  • Naming conventions
  • Indentation
  • Commenting
  • Understand the purpose of testing including:
  • Iterative testing
  • Final/terminal testing
  • Identify syntax and logic errors
  • Select and use suitable test data including:
  • Normal
  • Boundary
  • Invalid
  • Erroneous
  • Describe the characteristics and purpose of different levels of programming language, including:
  • Low-level languages
  • High-level languages
  • Understand the purpose of translators
  • Describe the characteristics of a compiler
    and interpreter
  • Understand the use of an Integrated Development Environment (IDE) to develop programs, including the following:
  • Editors
  • Error diagnostics
  • Run-time environment
  • Understand and use data types: integer, real, Boolean, character and string
  • Declare and use constants and variables
  • Use input, output and assignment statements
  • Use arithmetic operators including MOD and DIV
  • Use string handling and conversion functions
  • Use selection and nested selection statements
  • Use NOT, AND and OR when creating Boolean expressions
  • Use random number generation
  • Understand and use iteration in an algorithm
  • Write algorithms in pseudocode involving sequence, selection and iteration
  • Use one- and two-dimensional arrays in the design of solutions to simple problems
  • Understand the concept of subroutines
  • Learn how to write simple procedures and functions
  • Understand and use parameters to pass data to procedures and functions
  • Know that subroutines may use local variables which are accessible only within the subroutine
  • Use local variables and explain why it is good practice to do so
  • Explain the advantages of using subroutines in programs
  • Understand and use basic file handling operations:
  • open
  • read
  • write
  • close
  • Read from and write to a text file
  • Use SQL (Structured Query Language) statements to search for data:        
  • Formulate criteria involving AND, OR and LIKE
  • Use SELECT, FROM, WHERE, ORDER BY statements
  • Use the wildcard *

 

All Year 10 Subjects Next Year 10 Subject - Drama

Year 11 - Computer Science

Autumn 1 - Network Security and System Software Autumn 2 - Impacts of Digital Technology
  • Understand forms of attack and threats posed
    to a network:
  • Malware
  • Phishing
  • Social engineering
  • Brute force attacks
  • Denial of service attacks
  • Data interception and theft
  • SQL injection
  • Identify and understand the prevention of vulnerabilities including the use of:
  • penetration testing
  • anti-malware software
  • firewalls
  • user access levels
  • passwords
  • encryption
  • physical security
  • Explain the need for the following functions of an operating system:
  • User interface
  • Memory management and multitasking
  • Peripheral management and drivers
  • User management
  • File management
  • Describe the purpose and functionality of common
    utility software including:
  • Encryption software
  • Defragmentation software
  • Data compression software
  • Discuss the impacts of digital technology on the wider society including:

Ethical issues

Cultural issues

  • Discuss the impacts of digital technology on the environment including:

The impact of manufacture and disposal

The impact of upgrading or replacing

The impact of e-waste

  • Discuss the impacts of digital technology on wider society including:

Legal issues

Privacy issues

  • Describe legislation relevant to Computer Science:

The Data Protection Act 2018

Computer Misuse Act 1990

Copyright Designs and Patents Act 1988

Software licences including open source and proprietary

Spring 1 - PPE1 Revision Spring 2 - PPE2 Revision/Exam

Key questions/objectives

This will be focusing on the year groups gaps based on Autumn mock assessments

Topics will typically include:

 

  • Computer networks
  • Legal, ethical, environmental and moral issues
  • Data representation sounds and images
  • Exam style questions and responses specific to the gaps 

Key questions/objectives

This will be focussing on the year groups gaps based on Autumn mock assessments

Topics will typically include:

 

  • Reading and writing algorithms
  • Logic gates
Programming fundamentals, sequencing, selection and iteration
Summer 1 - Topic(s) Summer 2
Key questions/objectives  

 

All Year 11 Subjects Next Year 11 Subject - Drama

Year 12 - Computer Science

Autumn 1 - Data Represenation Autumn 2 - Programming
  • Categorise numbers as natural, integer, rational, irrational, real or ordinal
  • Understand how a number’s base affects its value
  • Convert between decimal, binary and hexadecimal number systems
  • Understand how data is stored and processed in a computer system
  • Define bits and bytes, and use names, symbols and corresponding powers of 2 for binary prefixes (Ki, Mi)
  • Differentiate between the character code of a decimal digit and its pure binary representation
  • Describe ASCII and Unicode coding systems and explain why Unicode was introduced
  • Describe methods used for error-checking and correction
  • Be able to add and multiply together two unsigned binary numbers
  • Convert between signed binary and decimal
  • Represent positive and negative numbers in two’s complement and specify the range of n bits
  • Perform subtraction using two’s complement
  • Understand how numbers with a fractional part can be represented in binary
  • Use fixed point binary form to represent a real number in a given number of bits
  • Understand how bitmapped images are represented in terms of size in pixels, resolution and colour depth
  • Be able to calculate the storage requirements for a bitmap image
  • Be aware that images contain metadata and be able to describe typical metadata
  • Explain how vector graphics represents images using lists of objects (A Level only)
  • Compare the vector graphics approach with the bitmap graphics approach
  • Describe the digital representation of sound in terms of sampling rate and resolution
  • Describe the principles of operation of an analogue to digital converter and a digital to analogue converter
  • Understand and apply the Nyquist theorem
  • Calculate sound sample sizes in bytes
  • Describe the purpose and advantages of MIDI and the use of event messages
  • Understand how and why image, sound and text data are compressed
  • Contrast lossy and lossless methods of compression in terms of size and accuracy of data
  • Use and compare the Caesar and Vernam encryption techniques for encrypting messages
  • Define what is meant by an algorithm and pseudocode
  • Learn how and when different data types are used
  • Learn the basic arithmetic operations available in a typical programming language
  • Become familiar with basic string handling operations
  • Distinguish between variables and constants
  • Write pseudocode solutions to simple problems
  • be able to use relational operators
  • be able to use Boolean operations AND, OR
  • be able to use nested selection statements
  • Understand and use three different types of iterative statement WHILE, REPEAT and FOR
  • Be familiar with, and be able to use, random number generation
  • Be familiar with the concept of a data structure
  • Use 1- and 2-dimensional arrays in the design of solutions to simple problems
  • Be familiar with subroutines, their uses and advantages
  • Use subroutines that return values to the calling routine
  • Use arguments/parameters to pass data within programs
  • Contrast the use of local and global variables
  • Define the terms field, record, file
  • Read from and write to a text file
  • Read from and write to a binary file
  • Understand when and how to use exception handling in a program
Spring 1 - Computer Systems Spring 2 - Software Development
  • Identify the internal components of a computer system
  • Understand the role of the processor, main memory, buses and I/O controllers
  • Describe how these components are connected and how communication is controlled between them
  • Determine the most appropriate computer architecture for a given application
  • Understand the concept of addressable memory
  • Describe the stored program concept
  • Identify the role and operation of a processor and its major components
  • Explain the stages of the Fetch-Execute cycle and determine the roles of the various processor registers in facilitating this
  • Examine factors that affect the performance of a processor
  • Describe the role of interrupts and interrupt service routines and their effect on the Fetch Execute cycle
  • Describe the role of an instruction set within processors
  • Explore the format of processor instructions and the role various components perform
  • Compare direct and immediate addressing within processor instructions
  • Use basic machine code operations expressed in mnemonic-form assembly language
  • Understand and apply immediate and direct addressing modes
  • Learn the main characteristics and principles of:
  • Barcode readers
  • Digital cameras
  • Laser printers
  • RFID
  • Understand the purpose and suitability of these devices
  • Explain the need for secondary storage within a computer system
  • Know the main characteristics and principles of operations of:
  • Hard disk drives (HDD)
  • Optical disks
  • Solid-State Disks (SSD)
  • Understand the purposes and suitability of these devices
  • Compression, Encryption and Hashing:
  • Lossy vs Lossless compression.
  • Run length encoding and dictionary coding for
  • lossless compression.
  • Symmetric and asymmetric encryption.
  • Different uses of hashing.
  • list the stages in the waterfall lifecycle model
  • name two other systems development models
  • name and describe different types of testing
  • write a pseudocode algorithm to solve a simple problem
  • use a trace table to trace through an algorithm
  • interpret simple algorithms to describe their purpose
  • list two features of a good algorithm
  • Define the term “programming paradigm” and give an example of two paradigms
  • define the terms object, class, method, attribute, inheritance
  • draw a simple inheritance diagram for a set of classes in an object-oriented approach
  • follow through a simple program using the LMC instruction set
Summer 1 - Communication Methods Summer 2 - Problem Solving
  • Define serial and parallel transmission methods
  • Discuss the advantages of serial over parallel transmission
  • Define and compare synchronous and asynchronous data transmission
  • Define baud rate, bit rate, bandwidth, latency, protocol
  • Differentiate between baud rate and bit rate
  • Understand the relationship between bit rate and bandwidth
  • Describe star and bus topologies for a local area network
  • Differentiate between physical and logical network topologies
  • Explain the operation of physical star and logical bus network topologies
  • Describe the advantages and disadvantages of each topology
  • Explain peer-to-peer and client-server networking
  • Describe situations where peer-to-peer and client-server networking might be used
  • Describe the advantages and drawbacks of cloud computing
  • Explain the purpose of Wi-Fi
  • Describe the components required for wireless networking
  • Explain how wireless networks are secured
  • Explain the wireless protocols CSMA/CA and RTS/CTS
  • Describe the purpose of SSID
  • Understand how developments in digital technologies enable organisations to monitor behaviour, amass and analyse personal information
  • Understand the potential for individual computer scientists and software engineers to produce great good, but also great harm
  • Be able to discuss the challenges facing legislators in the digital age
  • Understand the current capacity to distribute, publish, communicate and disseminate personal information
  • Understand that software and their algorithms embed moral and cultural values
  • Understand that computer scientists and software engineers have power, as well as the responsibility that goes with it, in the algorithms that they devise and the code that they deploy
  • Be able to discuss the challenges facing legislators in the digital age
  • Understand what is meant by “computational thinking”
  • Explore different strategies for problem-solving
  • Be able to develop solutions to simple logic problems
  • Be able to check solutions to simple logic problems
  • Understand the structured approach to program design and construction
  • Be able to construct and use hierarchy charts when designing programs
  • Be able to explain the advantages of the structured approach
  • To understand the term ‘algorithm’
  • To learn how to write and interpret algorithms using pseudocode
  • Understand the purpose of testing
  • Devise a test plan
  • Select test data covering normal (typical), boundary and invalid or erroneous data
  • Be able to hand-trace algorithms
  • Describe the skills involved in computational thinking
  • Understand the concept of abstraction
  • Give examples of different types of abstraction
  • Describe the process of abstraction for solving problems
  • Understand what is meant by a finite state machine
  • List some of the uses of a finite state machine
  • Draw and interpret simple state transition diagrams for finite state machines with no output
  • Draw a state transition table for a finite state machine with no output

 

All Year 12 Subjects Next Year 12 Subject – Further Maths

Year 13 - Computer Science

Autumn 1 - Data Structures Autumn 2 - Database and Software Development
  • Understand the concept of an abstract data type
  • Be familiar with the concept and uses of a queue
  • Describe the creation and maintenance of data within a queue (linear, circular, priority)
  • Describe and apply the following to a linear, circular and priority queue

add an item

remove an item

test for an empty queue

test for a full queue

  • Explain how a list may be implemented as a static or dynamic data structure
  • Show how items may be added to or deleted from a list
  • Be familiar with the concept and uses of a stack
  • Be able to describe the creation and maintenance of data within a stack
  • Be able to describe and apply the following operations: push, pop, peek (or top), test for empty stack, test for full stack
  • Be able to explain how a stack frame is used with subroutine calls to store return addresses, parameters and local variables
  • Be familiar with a hash table and its uses
  • Be able to apply simple hashing algorithms
  • Know what is meant by a collision and how collisions are handled using rehashing
  • Be familiar with the concept of a dictionary
  • Be familiar with simple applications of a dictionary
  • Be aware of a graph as a data structure used to represent complex relationships
  • Be familiar with typical uses for graphs
  • Be able to explain the terms: graph, weighted graph, vertex/node, edge/arc, undirected graph, directed graph
  • Know how an adjacency matrix and an adjacency list may be used to represent a graph
  • Be able to compare the use of adjacency matrices and adjacency lists
  • Know that a tree is a connected, undirected graph with no cycles
  • Know that a binary tree is a rooted tree in which each node has at most two children
  • Be familiar with typical uses for rooted trees
  • Be familiar with the concept of a vector and notations for specifying a vector as a list of numbers, as a function or as a geometric point in space
  • Represent a vector using a list, dictionary or array data structure
  • Perform operations on vectors: addition, scalar vector multiplication, convex combination, dot or scalar product
  • Use the dot product to find the angle between
    two vectors
  • Produce a data model from given data requirements for a simple scenario involving multiple entities
  • Produce entity descriptions representing a data model in the form
    Entity1 (Attribute1, Attribute2…)
  • Produce entity relationship diagrams representing a data model
  • Be able to define the terms relation, attribute, primary key, composite primary key, foreign key
  • Explain the concept of a relational database
  • Normalise relations to third normal form
  • Understand why databases are normalised
  • Use SQL to retrieve data from multiple tables of a relational database
  • Be able to use SQL to define a database table
  • Be able to use SQL to update, insert and delete data from multiple tables of a relational database
  • Know that a client server database system provides simultaneous access to the database for multiple clients
  • Know how concurrent access can be controlled to preserve the integrity of the database
  • Describe aspects of software development
  • Explain the prototyping/agile approach that may be used in the analysis, design and implementation of a system
  • Understand what is meant by data modelling
  • Know the criteria for evaluating a computer system
Spring 1 - Functional Programming Spring 2 - Computer Networks
  • Class
  • Object
  • Instantiation
  • Encapsulation
  • Understand inheritance, polymorphism and overriding
  • Understand concepts of aggregation
  • Composition
  • Association
  • Be aware of object-oriented design principles:
  • encapsulate what varies
  • favour composition over inheritance
  • program to interfaces, not implementation
  • Be able to draw and interpret class diagrams
  • Understand what is meant by a
    programming paradigm
  • Define function type, domain and co-domain
  • Understand what is meant by a first-class object and how such an object may be used
  • Be able to evaluate simple functions
  • Use functional composition to combine two functions
  • Understand what is meant by partial
    function application
  • Know that a function takes only one argument which may itself be a function
  • Define and use higher-order functions, including map, filter and fold
  • Understand that a list is a concatenation of a head and a tail, where the head is an element of a list and the tail is a list
  • Define an empty list
  • Describe and apply list operations:
  • return head/tail of list
  • test for empty list
  • return length of list
  • construct an empty list
  • prepend / append an item to a list
  • Understand that Big Data is a term used to describe data whose volume is too large to fit on a single server and is generally unstructured
  • Describe examples of Big Data
  • Describe features of functional programming which make it suitable for analysing Big Data
  • Be familiar with the fact-based model for
    representing data
Be familiar with graph schema for capturing the structure of the dataset
  • Understand the structure of the Internet
  • Describe the term ‘Uniform Resource Locator’ (URL) in the context of networking
  • Explain the terms ‘domain name’ and ‘IP address’
  • Describe how domain names are organised
  • Understand the purpose and function of the Domain Name Server (DNS) system
  • Explain the service provided by Internet registries and why they are needed
  • Understand the role of packet switching and routers
  • Know the main components of a packet
  • Consider where and why routers and gateways
    are used
  • Explain how routing is achieved across the Internet
  • Understand how a firewall works
  • Explain symmetric and asymmetric encryption and key exchange
  • Explain how digital signatures and certificates are obtained and used
  • Discuss worms, Trojans and viruses and the vulnerabilities that they exploit
  • Discuss how improved code quality, monitoring and protection can be used against such threats
  •  
  • Describe the roles of the four layers in the TCP/IP protocol stack
  • Describe the role of sockets in the TCP/IP stack
  • Be familiar with MAC addresses
  • Explain and differentiate between the common protocols and the well‐known ports they use
  • Be familiar with transferring files using FTP as an anonymous and non‐anonymous user
  • Know how Secure Shell (SSH) is used for remote management including the use of application level protocols for sending and retrieving email
  • Explain the role of an email server in sending and retrieving email
  • Explain the role of a web server in serving up web pages in text form
  • Understand the role of a web browser in retrieving web pages and web page resources and rendering these accordingly
  • Know that an IP address is split into a network identifier and a host identifier part
  • Know how a subnet mask is used to identify the network identifier part of the IP address
  • Know that there are currently two standards of IP address, (v4 and v6) and why v6 was introduced
  • Distinguish between routable and non‐routable IP addresses
  • Understand the purpose and function of the Dynamic Host Configuration Protocol (DHCP) system
  • Explain the basic concepts of Network Address Translation (NAT) and port forwarding and why they are used
  • Be familiar with the client server model
  • Be familiar with the WebSocket protocol and know why and where it is used
  • Understand the principles of web CRUD applications and REpresentational State Transfer (REST)
  • Compare JSON (JavaScript Object Notation) with XML
  • Compare and contrast thin‐client computing with thick‐client computing
Summer 1 - Revision / Exam Summer 2
Key questions/objectives  

 

All Year 13 Subjects Next Year 13 Subject – Further Maths

Support from Home

Recommended websites/online platforms for home/independent learning: 

  • BBC Bitesize 

  • Seneca 

  • YouTube à Mr CSBrown 

  • Replit 

  • CSNewbs  

Feedback

Our aim is to ensure feedback helps drive student achievement by providing meaningful information that helps to address misconceptions and close curriculum and knowledge gaps.  

Every piece of feedback given to our students should results in an action by the student. The following types of feedback that are given to students at AINA are:  

  • Self and peer assessment 

  • Written feedback 

  • Verbal feedback 

Students receive written teacher feedback after formative diagnostic or interim assessments. The cycle is as follows: 

  • A score/percentage for the assessment 

  • Precise teacher comment/s linked to the curriculum/knowledge gap written in red 

  • A response/action/redo by the student in green pen 

Career Pathways

Success in this subject can lead to: 

University courses in: 

  • Software engineer 

  • Data scientist  

  • Computer networks  

  • Law 

  • Cyber security  

  • Engineering 

  • Machine learning  

  • Graphics design  

Careers in: 

  • Computer scientist  

  • Software developer  

  • Data Scientist 

  • Biotechnology  

  • Dev ops  

  • Graphic designer  

  • Biotechnologist  

Enrichment & Educational Visits

Enrichment and educational visits in this subject include: 

  • Ark hackathon  

  • Dell technology  

  • GCHQ  

  • Chemistry
  • Design and Technology
Footer
  • Welcome
    • Primary
    • Secondary
    • Sixth form
  • About
    • Culture and wellbeing
    • Team
    • Policies and reports
  • Curriculum
    • Our approach
    • Subjects
    • Extended curriculum
    • Careers and destinations
  • Parent Hub
    • Term dates
    • Attendance
    • School meals
    • Uniform

Image
Ofsted logo

Image
Living Wage logo

info@isaacnewtonacademy.org
020 8911 6666

 

Ark Isaac Newton Academy, 1 Cricklefield Pl, Ilford IG1 1FY

© Ark Schools | Privacy