Key Stage 3 Descriptors Computing Year 9. Y9 Descriptors Computer Science ICT Digital Literacy

Size: px
Start display at page:

Download "Key Stage 3 Descriptors Computing Year 9. Y9 Descriptors Computer Science ICT Digital Literacy"

Transcription

1 Key Stage 3 Descriptors Computing Year 9 Y9 Descriptors Computer Science ICT Digital Literacy 9.9 I can research and use extra code to enhance my program. My comments also include reasons why I have used these techniques. I can explain and justify the extra code I have found from my research. I can use arrays/lists in my code. I can independently complete additional control mimics using a range of sensors. control a sequence of events using more than one DECISION, OUTPUT, DELAY and VARIABLE. I can create my own VARIABLES and use these in a flowchart. I can research how a real life control system failed and the implications of this. I can create a professional poster that could be used by an organisation. I have identified copyright issues when using images and linking QR codes. I have used advanced photo editing tools in my (E.g. layers and transparency) I can create a professional poster and DVD case that could be used by an organisation. 9.8 I can use a wide range of techniques to create a complex program. I have included detailed comments explaining each part of the code. I can use a range of programming technical I can use FOR loops or WHILE loops (iteration) in my code. I can select the sensors that a new control system will need and justify my choices. control a sequence of events using more than one DECISION, OUTPUT and DELAY. I can use persuasion in my poster for my target audience to choose cyber security as a career. I can use clear and consistent colours and fonts and images/text are appropriately laid out. I have included 2 or more different QR codes in my poster and DVD case. My QR code is seamlessly included in my poster and DVD case and looks part of another image. My poster uses clear and consistent colours and fonts and images/text are appropriately laid out. I can research and analyse what cyber security careers could exist in the future. I can explain the impact of cyber security risks on individuals and organisations in society. I can explain how and why encryption is used in modern society. I can research and explain fully the legal act covering unauthorised access to computer files. I can convert denary numbers into hexadecimal. I can explain how colours increase image size. I can identify a range of cyber security risks and give correct advice on how to minimise these. I can evaluate an advantage and disadvantage of using a cipher. I can use my own rule to encrypt messages.

2 9.7 I can combine a sequence of instructions into more than one SUBROUTINE and use these in a MAIN FLOWCHART. I can point out what has gone wrong in a faulty control system and suggest how this might be corrected. I can convert binary numbers to characters using ASCII. I can calculate the size of an image in bytes. I can use a range of techniques in one program to solve a complex problem. I have included comments explaining all functions of the main parts of my code. I can use many programming technical I can use IF and ELSE statements (selection) in my code. I can select the sensors that a new control system will need. control a sequence of events using at least one DECISION, OUTPUT and DELAY. I can combine a sequence of instructions into more than one SUBROUTINE and use these in a MAIN FLOWCHART. I can point out what has gone wrong in a faulty control system and give an idea of how this might be corrected. I can convert denary numbers to characters using ASCII. I can calculate the size of a small black and white image in bytes. I can use a range of techniques in one program to solve a problem. I have included comments explaining the main parts of my code. I can consider the needs of the target audience in my I can use clear and consistent colours and fonts and images/text are mostly laid out well. I have included 2 different QR codes in my poster and DVD case. My QR code is seamlessly included in my poster and DVD case. My poster uses appropriate colours and fonts and images/text are appropriately laid out. I can combine images and text appropriately and there is some clear consistency in colours and font. The QR code I have included links to something relevant to my product. I can identify a range of cyber security risks and give some advice on how to minimise these. I can give an advantage and disadvantage of using a cipher. I can create an idea for an encryption rule. I can describe what different cyber security jobs involve. I can identify a range of cyber security

3 I can use many programming technical I can use IF statements (selection) in my code. I can give examples of common types of sensors used in control systems. I can create a flowchart to control a sequence of events using at least one DECISION, OUTPUT and DELAY. I can combine a sequence of instructions into a SUBROUTINE and use this in a MAIN FLOWCHART. I can suggest the measures that could be taken to make sure a control system is safe. I can convert denary numbers to binary. I can show how computers represent images using bytes. I can create my own program that uses some techniques. I have included simple comments I can use some programming technical I can use different types of variables and inputs/outputs (sequence). I can give at least one example of common types of sensors used in control systems. I can create a flowchart to control a sequence of events using at least one OUTPUT and DELAY. repeat sequences of instructions using LOOPS. I can suggest one measure that could be taken to make sure a control system is safe. I can convert small denary numbers to binary. My QR code is an appropriate size and in an appropriate position on my DVD case and My poster uses images and text correctly and there is some clear consistency in colours and font. I can combine images and text and there is some clear consistency in colours or font. The QR code I have included works. My QR code is an appropriate size for use on my DVD case and My poster uses appropriate images and text. I can give a disadvantage of using a cipher. I can decrypt and encrypt messages using the Caesar Cipher. I can give simple examples of what different cyber security jobs involve. I can identify 3 or 4 cyber security I can decrypt and encrypt messages using the Caesar Cipher.

4 I can explain how computers represent images using bytes I can adapt the sample code to create my own programs. I have included simple comments I can use and understand the meaning of some programming technical terms. I can use variables and inputs/outputs (sequence). I can identify everyday situations where control systems are used. sequence of events using OUTPUTS and DELAYS. using a LOOP. I can explain how a control system might be dangerous if it did not work properly. I can convert binary numbers to denary. I can explain what is meant by the term resolution. I can adapt the sample code to create my own simple programs. I have included some simple comments I can use and understand the meaning of some programming technical terms. I can use variables and inputs/outputs (sequence). I can identify an everyday situation where a control system is used. sequence of events using OUTPUTS and DELAYS. using a LOOP. I can convert a binary number to denary. I can combine images and text but they are not consistent or appropriately laid out. I have included a QR code in my poster and DVD case. My QR code is visible on my DVD case and My poster uses some images and text. I can use images and text in my I have included a QR code in my poster and/or DVD case. My QR code is visible on my DVD case and/or My poster/dvd case uses some images and text. I can identify example cyber security jobs. I can identify 1 or 2 cyber security I can say why a cipher is useful. I can decrypt simple messages using the Caesar Cipher. I can identify one example cyber security job. I can identify 1 or 2 cyber security I can understand what a cipher is. I can decrypt a few words using the Caesar Cipher.

5 I can briefly describe what resolution means I can adapt parts of the sample code to create my own simple programs. I have included few simple comments I can use two or three programming terminology. I can use a variable and inputs/outputs in my code. sequence of events using OUTPUTS. using a LOOP, but this might not completely work. I can convert 4 bit binary numbers to denary. I can briefly describe what resolution means. I can adapt parts of the sample code to create simple programs. I have included a simple comment explaining part of my code. I can use inputs/outputs in my code. sequence of events using OUTPUTS. using a LOOP, but this does not completely work. I can convert a 4 bit binary number to denary. I can use images and text in my I have included a QR code in my poster or DVD case. My QR code is visible on my DVD case or I can use simple images and text in my I can use QR code generating software to create a QR code. I can put my QR code into another document. I can identify a cyber security risk. I can decrypt letters using the Caesar Cipher. I can identify a cyber security risk. I can decrypt letters using the Caesar Cipher.

6 autumn spring summer autumn spring summer 9.9 (8B/8A) autumn spring summer 8.9 (7A/8C) 9.8 (7A/8C) 6b-6a 7.9 (7C/7B) 8.8 (7C/7B) 9.7 (7C/7B) 6c-5a 7.8 (6A) 8.7 (6A) 9.6 (6A) 5b-5c 7.7 (6C/6B) 8.6 (6C/6B) 9.5 (6C/6B) 4a 7.6 (5B/5A) 8.5 (5BB/5A) 9.4 (5B/5A) 4b 7.5 (5C) 8.4 (5C) 9.3 (5C) 4c-3a 7.4 (4B/4A) 8.3 (4B/4A) 9.2 (4B/4A) 3b-3c 7.3 (3A/4C) 8.2 (3A/4C) 9.1 (3A/4C) (3C/3B) 8.1 (3C/3B) <2 7.1 (2A) KS2 LEVEL Year 7 Year 8 Year 9

KS3 Computing - Life Without Levels

KS3 Computing - Life Without Levels Project Elite Standard Foundation To create a strong password and log To create a strong password and log on. Create a password and log on with on independently. Give a basic explanation as to what makes

More information

Teaching KS3 Computing. Session 3 Theory: More on binary and representing text Practical: Introducing IF

Teaching KS3 Computing. Session 3 Theory: More on binary and representing text Practical: Introducing IF Teaching KS3 Computing Session 3 Theory: More on binary and representing text Practical: Introducing IF Today s session 5:00 6:00 Representing text as numbers characters and the computer 6.00 7.00 Programming

More information

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7 Computing at Cox Green Curriculum Plan Key Stage 3 Year 7 Term 1 Term 2 Term 3 Term 4 Term 5 Term 6 E-safety Database Programming Spreadsheet and modelling Web design How data is represented in s? How

More information

Lymm High School- KS3 Life after levels - Computing & ICT

Lymm High School- KS3 Life after levels - Computing & ICT Half Term 1 & 2 E- Safety BRONZE SILVER GOLD PLATINUM D and below= GCSE 1,2,3 C= GCSE 4 C/B= GCSE 5,6 A/A*= GCSE 7,8,9 Understand a range of ways Understand a range of Understand a range of Understand

More information

This document contains additional questions; it is not intended to be treated as a complete paper.

This document contains additional questions; it is not intended to be treated as a complete paper. 1 AS COMPUTER SCIENCE Paper 2 Additional Questions These questions focus primarily on topics that were not covered by the AQA AS and A-level Computing specifications, introduced in 2009. It is hoped that

More information

Switching to AQA from Edexcel

Switching to AQA from Edexcel Switching to AQA from Edexcel This resource compares our new GCSE Computer Science specification (8520) with the new Edexcel Computer Science specification (1CP1). If you are thinking of switching from

More information

Administrative Notes February 9, 2017

Administrative Notes February 9, 2017 Administrative Notes February 9, 2017 Feb 10: Project proposal resubmission (optional) Feb 13: Art and Images reading quiz Feb 17: In the News call #2 Data Representation: Part 2 Text representation Colour

More information

AQA GCSE Computer Science PLC

AQA GCSE Computer Science PLC 1 - Fundamentals of Algorithms Useful Websites BBC Bite Size Cambridge GCSE Exam Dates https://www.bbc.co.uk/education/subjects/z34k7ty Paper 1 14/05/2018 am https://www.cambridgegcsecomputing.org/ Paper

More information

Year 7 Autumn A Autumn B Spring C Spring D Summer E and Summer F

Year 7 Autumn A Autumn B Spring C Spring D Summer E and Summer F Year 7 Autumn A Autumn B Spring C Spring D Summer E and Summer F Introduction to Computing E-Safety Hardware and Software Introduction to programming and coding Visual coding tools and programming languages

More information

elc International School

elc International School Subject: COMPUTER SCIENCE (0478) Syllabus 2016 Topics to be covered Section 1: Theory of Computer Science Theory: At the end of the section candidates should be able to Practical: At the end of the section

More information

Edexcel GCSE in Computer Science Microsoft IT Academy Mapping

Edexcel GCSE in Computer Science Microsoft IT Academy Mapping Edexcel GCSE in Computer Science Microsoft IT Academy Mapping Topic 1: Problem solving Subject Content: 1.1 Algorithms MOAC course and lesson(s) MVA course and module(s) : 1.1.1 Understand what an algorithm

More information

Switching to AQA from OCR

Switching to AQA from OCR Switching to AQA from OCR This resource compares our new GCSE Computer Science specification (8520) with the new OCR Computer Science specification (J276). If you are thinking of switching from OCR to

More information

CS 135: Fall Project 2 Simple Cryptography

CS 135: Fall Project 2 Simple Cryptography CS 135: Fall 2010. Project 2 Simple Cryptography Project Rules: You should work on the project in your assigned team. This project is worth 60 points towards your total projects grade. If you choose to

More information

UNIT 1 USING LOGIC. UPGRADE 8 Write a detailed report on how logic gates would be used to add up two nibbles using examples and explanations

UNIT 1 USING LOGIC. UPGRADE 8 Write a detailed report on how logic gates would be used to add up two nibbles using examples and explanations UNIT 1 USING LOGIC Create a working example of a full adder logic gate circuit and test its operation with a series of bytes that need to be added. Report on the findings and limitations found Write a

More information

Learning Programme Fundamentals of data representation AS Level

Learning Programme Fundamentals of data representation AS Level Learning Programme Fundamentals of data representation AS Level Topic/Content Objectives/Skills Homework Assessment Stretch & Challenge (Thirst for Learning) Number systems Be familiar with the concept

More information

Understand the purpose and properties of digital graphics R082 LO1. START YOUR SCRAPBOOK or DIGITAL DOCUMENT WITH THE FRONT PAGE THAT SAYS:

Understand the purpose and properties of digital graphics R082 LO1. START YOUR SCRAPBOOK or DIGITAL DOCUMENT WITH THE FRONT PAGE THAT SAYS: R082 LO1 Understand the purpose and properties of digital graphics START YOUR SCRAPBOOK or DIGITAL DOCUMENT WITH THE FRONT PAGE THAT SAYS: UNIT R082 (Your Name) Learning Outcome 1: Understand the purpose

More information

Computing at STA. GCSE Exam Results : 100% A C

Computing at STA. GCSE Exam Results : 100% A C Computing at STA GCSE Exam Results 2007 2015: 100% A C KS3 Year 7 In Year 7, students study: Computer Science. The course allows students to learn the basics of computing theory which enhances their ideas

More information

Year 8 Computing Science End of Term 3 Revision Guide

Year 8 Computing Science End of Term 3 Revision Guide Year 8 Computing Science End of Term 3 Revision Guide Student Name: 1 Hardware: any physical component of a computer system. Input Device: a device to send instructions to be processed by the computer

More information

Business, Enterprise, Computing and Information Technology. Curriculum Map 2018/19

Business, Enterprise, Computing and Information Technology. Curriculum Map 2018/19 Business, Enterprise, Computing and Information Technology Curriculum Map 2018/19 Computing & Information Technology (CIT) Number of Year 7 Year 8 Year 9 Autumn 1 2018 8 E-Safety & Basic IT Skills E-Safety

More information

PrinterOn iphone and ipad app

PrinterOn iphone and ipad app PrinterOn iphone and ipad app Contents PrinterOn App... 2 iphone And ipad app... 3 Main Screen... 4 Print Queues... 5 Printing Photos... 6 Printing web pages... 7 Email attachment Printing... 8 Print Preview...

More information

You will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are:

You will choose to study units from one of four specialist pathways depending on the career you wish to pursue. The four pathways are: Qualification Title: OCR Level 3 Cambridge Technical Diploma in IT Qualification Number: 601/7101/7 Overview This qualification is designed for you if you re 16 years old or over and prefer to study IT

More information

OCR J276 GCSE Computer Science

OCR J276 GCSE Computer Science Name: Class Teacher: Date: OCR J276 GCSE Computer Science REVISION BOOKLET 2.6 DATA REPRESENTATION Content in J276 GCSE Computer Science: 1.1 Systems Architecture 1.2 Memory 1.3 Storage 1.4 Wireless and

More information

Learning objectives. Computer principles The characteristics of contemporary processors, input, output and storage devices

Learning objectives. Computer principles The characteristics of contemporary processors, input, output and storage devices Learning objectives Computer principles 1.1. The characteristics of contemporary processors, input, output and storage devices Components of a computer and their uses 1.1.1 Structure and function of the

More information

KS3 Programme of Study Subject: Computing Year group: Y7

KS3 Programme of Study Subject: Computing Year group: Y7 KS3 Programme of Study Subject: Computing Year group: Y7 Cybercrime 14/11/16 2/12/16 due AF1 Introduction - savings, set up folders, Health and Safety, Classroom Rules How to log on and secure passwords

More information

Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2. networks. environmental concerns. Knowledge and skills covered: Knowledge and skills covered:

Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2. networks. environmental concerns. Knowledge and skills covered: Knowledge and skills covered: Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2 1.8 Ethical, 1.4 Wired 1.8 Ethical, 1.4 Wired 1.8 Ethical, 1.4 Wired legal, cultural and and wireless legal, cultural and and wireless legal, cultural

More information

Key Learning in Computing: Years 5 and 6 Information Technology

Key Learning in Computing: Years 5 and 6 Information Technology Information Technology Programme of Study Select, use and combine a variety of software (including internet services) on a range of digital devices to design and creat e a range of programs, systems and

More information

WEB DESIGN: CONSTRUCTION, FILES, CODE AND COLOURS UNIT NUMBER: H383 34

WEB DESIGN: CONSTRUCTION, FILES, CODE AND COLOURS UNIT NUMBER: H383 34 WEB DESIGN: CONSTRUCTION, FILES, CODE AND COLOURS UNIT NUMBER: H383 34 OUTCOME 1 Knowledge requirements Web page construction methods File formats Terminology html type Web safe colours WEB PAGE CONSTRUCTION

More information

Thursday 12 January 2017 Afternoon Time allowed: 1 hour

Thursday 12 January 2017 Afternoon Time allowed: 1 hour Level 3 Cambridge Technical in IT 05838/05839/05840/05841/05842/05877 Unit 3: Cyber security Thursday 12 January 2017 Afternoon Time allowed: 1 hour You must have: Insert (C387) INSTRUCTIONS Use black

More information

OCR GCSE Computing Learning Grids H/W

OCR GCSE Computing Learning Grids H/W COMPUTING GCSE OCR J275 OCR GCSE Computing Learning Grids H/W Unit A451: Computer Systems and Programming This learning grid H/W belongs to: Name: Form: Mr. Ahmed A451 - ATTENTION! Please read! These learning

More information

COMPUTING SUBJECT KNOWLEDGE AUDIT

COMPUTING SUBJECT KNOWLEDGE AUDIT COMPUTING SUBJECT KNOWLEDGE AUDIT Use this needs analysis to help self-assess and track your computing subject knowledge. Topic Area 1 Computational thinking Define, explain and use these concepts with

More information

Cambridge International Examinations Cambridge International General Certificate of Secondary Education

Cambridge International Examinations Cambridge International General Certificate of Secondary Education Cambridge International Examinations Cambridge International General Certificate of Secondary Education *2603247663* COMPUTER SCIENCE 0478/12 Paper 1 Theory February/March 2017 1 hour 45 minutes Candidates

More information

Rosa Rawlings BTEC Level 2 Extended Certificate in Information and Creative Technology Unit 3: A Digital Portfolio Assignment 3: Review Your Portfolio

Rosa Rawlings BTEC Level 2 Extended Certificate in Information and Creative Technology Unit 3: A Digital Portfolio Assignment 3: Review Your Portfolio How The Final Portfolio Is Suitable For The Intended Audience: My portfolio of PDF files of my work which showcases my work to the company. I have created a range of written documents, images and videos

More information

Flying Start AS Computer Science. September 2015

Flying Start AS Computer Science. September 2015 Flying Start AS Computer Science September 2015 Name: To your first AS Computing lesson, you will need to bring: 1. A folder with dividers An A4 ring binder with labelled A4 dividers would be ideal. The

More information

2017 HSC Information and Digital Technology Web and Software Applications Marking Guidelines

2017 HSC Information and Digital Technology Web and Software Applications Marking Guidelines 2017 HSC Information and Digital Technology Web and Software Applications Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 A 3 B 4 D 5 C 6 B 7 D 8 D 9 C 10 A 11 A 12 B 13 D

More information

ICT & Computing Progress Grid

ICT & Computing Progress Grid ICT & Computing Progress Grid Pupil Progress ion 9 Select, Algorithms justify and apply appropriate techniques and principles to develop data structures and algorithms for the solution of problems Programming

More information

N5 Computing Science - Solutions

N5 Computing Science - Solutions Revision 1 1. Convert the following decimal numbers to binary using the table below. 128 64 32 16 8 4 2 1 22 0 0 0 1 0 1 1 0 144 1 0 0 1 0 0 0 0 73 0 1 0 0 1 0 0 1 2. How does a computer represent characters

More information

Year 10 OCR GCSE Computer Science (9-1)

Year 10 OCR GCSE Computer Science (9-1) 01 4 th September 02 11 th September 03 18 th September Half Term 1 04 25 th September 05 2 nd October 06 9 th October 07 16 th October NA Students on in school Thursday PM and Friday Only Unit 1, Lesson

More information

Quantum Encryption Keys

Quantum Encryption Keys Quantum Technology PROGRAMME ACTIVITY SHEETS Quantum Encryption Keys SHARING DECRYPTION KEYS AND DECODING MESSAGES Every time you send an email or you pay for something online, or with your debit card,

More information

IT Curriculum. Key Stage 1. Year 1

IT Curriculum. Key Stage 1. Year 1 IT Curriculum Key Stage 1 Year 1 Students are introduced to logging onto a computer, learning how to retrieve work and save work, how to change text, colour, font size and font, how to use bold and underline

More information

Preview from Notesale.co.uk Page 2 of 88

Preview from Notesale.co.uk Page 2 of 88 Contents About this Guide Information for Students... Be Revise-Wise How to Use this Guide to Do Well in Your Exams... Revision Checklist... 4 1 Data and Quality of Data... 5 1.1 Encoding and Storing Data...7

More information

WJEC (Eduqas) GCSE ICT to Pearson Certificate in Digital Applications (CiDA) Mapping Document

WJEC (Eduqas) GCSE ICT to Pearson Certificate in Digital Applications (CiDA) Mapping Document WJEC (Eduqas) GCSE ICT to Pearson Certificate in Digital Applications (CiDA) Mapping Document Introduction If you are thinking of switching from WJEC (Eduqas) GCSE ICT to the Pearson Edexcel Certificate

More information

Unit 2: Technology Systems

Unit 2: Technology Systems Unit 2: Technology Systems Level: 1 and 2 Unit type: Core Guided learning hours: 30 Assessment type: External Unit introduction Technology systems are involved in many of the objects we use every day,

More information

Cambridge Ordinary Level 2210 Computer Science November 2016 Principal Examiner Report for Teachers

Cambridge Ordinary Level 2210 Computer Science November 2016 Principal Examiner Report for Teachers COMPUTER SCIENCE Paper 2210/12 Paper 1 Key messages If a candidate writes the answer to a question on an additional page they must indicate very clearly to the Examiner where the revised answer can be

More information

Colour and Number Representation. From Hex to Binary and Back. Colour and Number Representation. Colour and Number Representation

Colour and Number Representation. From Hex to Binary and Back. Colour and Number Representation. Colour and Number Representation Colour and Number Representation From Hex to Binary and Back summary: colour representation easy: replace each hexadecimal "digit" with the corresponding four binary digits using the conversion table examples:

More information

GCSE ICT AQA Specification A (Full Course) Summary

GCSE ICT AQA Specification A (Full Course) Summary GCSE ICT AQA Specification A (Full Course) Summary Areas not covered by the short course are shown in red. 9.1 The general Understand that information systems may be 1 structure of information systems

More information

Functional Skills. bksb Resources for ICT Functional Skills. West Nottinghamshire College

Functional Skills. bksb Resources for ICT Functional Skills. West Nottinghamshire College Functional Skills Skills ICT bksb Resources for ICT Functional Skills Microsoft product screen shot(s) reprinted with permission from Microsoft Corporation. West Nottinghamshire College Contents Introduction

More information

Unit title: Computing: Website Design and Development (SCQF level 5)

Unit title: Computing: Website Design and Development (SCQF level 5) National Unit Specification General information Unit code: HW52 45 Superclass: CB Publication date: February 2018 Source: Scottish Qualifications Authority Version: 02 Unit purpose The purpose of this

More information

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we

More information

Assignment front sheet

Assignment front sheet Assignment front sheet Learning Outcome LO 2 Learning Outcome Be able to design interactive websites Assessment Criteria In this assessment you will have the opportunity to present evidence that shows

More information

Highly Secure Translation Editor

Highly Secure Translation Editor Highly Secure Translation Editor secure translation editor thebigword Highly Secure Translation Editor (HSTE) is the only solution to protect your content throughout every stage of the translation process.

More information

Key Stage 1: Computing

Key Stage 1: Computing Weaving Computing Knowledge, Skills and Understanding into the new National Curriculum Key Stage 1: Computing 1 National Curriculum Requirements of Computing at Key Stage 1 Pupils should be taught to:

More information

Designing Posters TIDI Development Research Week

Designing Posters TIDI Development Research Week Designing Posters TIDI Development Research Week Derina Johnson PhD Candidate, School of Social Work and Social Policy DSAI Steering Committee Postgraduate Representative Date 1 st November 2017 Today

More information

ECE2049: Homework 1. Due: Thursday, 25 May 2017 by 7pm

ECE2049: Homework 1. Due: Thursday, 25 May 2017 by 7pm Due: Thursday, 25 May 2017 by 7pm Submission notes: For full credit, please show your work and denote your answers with a circle or a box. Always write and draw your diagrams neatly! We cannot be expected

More information

CMPSCI 105 Midterm Exam Solution Spring 2005 March 24, 2005 Professor William T. Verts

CMPSCI 105 Midterm Exam Solution Spring 2005 March 24, 2005 Professor William T. Verts CMPSCI 105 Midterm Exam Solution Spring 2005 March 24, 2005 Professor William T. Verts GENERAL KNOWLEDGE 8 Points Fill in your answer into the box at the left side of each question. Show your work

More information

COMPUTER SCIENCE UNIT 1: Understanding Computer Science

COMPUTER SCIENCE UNIT 1: Understanding Computer Science Surname Centre Number Candidate Number Other Names 0 GCSE 4341/01 S15-4341-01 COMPUTER SCIENCE UNIT 1: Understanding Computer Science A.M. WEDNESDAY, 3 June 2015 1 hour 30 minutes For s use Total 4341

More information

PowerPoint Basics: Create a Photo Slide Show

PowerPoint Basics: Create a Photo Slide Show PowerPoint Basics: Create a Photo Slide Show P 570 / 1 Here s an Enjoyable Way to Learn How to Use Microsoft PowerPoint Microsoft PowerPoint is a program included with all versions of Microsoft Office.

More information

Practice. A Level Computer Science H446/01 Computer systems. Practice paper - Set 1. Time allowed: 2 hours 30 minutes

Practice. A Level Computer Science H446/01 Computer systems. Practice paper - Set 1. Time allowed: 2 hours 30 minutes A Level Computer Science H446/01 Computer systems paper - Set 1 Time allowed: 2 hours 30 minutes Do not use: a calculator First name Last name Centre number Candidate number INSTRUCTIONS Use black ink.

More information

Stonelaw High School. Computing Science. BGE - Computer Systems

Stonelaw High School. Computing Science. BGE - Computer Systems Stonelaw High School Computing Science BGE - Computer Systems Contents Computer Systems... 3 Computer Systems... 3 Hardware & Software... 3 Data Representation... 3 Representing Positive Integers... 3

More information

Fundamentals of Digital Media Lesson Objectives

Fundamentals of Digital Media Lesson Objectives Fundamentals of Digital Media Lesson Unit 1: INTRODUCTION TO DIGITAL AND ONLINE MEDIA TYPES Digital Camera Basics Discuss mode, compression, and storage in a camera. Explain the basic components and functionality

More information

Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level

Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level COMPUTER SCIENCE 9608/01 Paper 1 Theory Fundamentals For Examination from 2015 SPECIMEN PAPER 1 hour

More information

2016 Suite. Cambridge TECHNICALS LEVEL 3. Unit 21 Web design and prototyping. Northbound Events assignment M/507/5024. Version 1 September 2017

2016 Suite. Cambridge TECHNICALS LEVEL 3. Unit 21 Web design and prototyping. Northbound Events assignment M/507/5024. Version 1 September 2017 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 21 Web design and prototyping Northbound Events assignment M/507/5024 Version 1 September 2017 1 Contents Scenario... 3 Part A Training... 3 Part B Designing

More information

Computing 1: Computer Systems

Computing 1: Computer Systems U1 U2 U3 1 2 3 Computing 1: Computer Systems G: I know how to create strong passwords G: I know how to stay safe online and how to alert an adult if I am worried about anything G: I can list a range of

More information

CORPORATE IDENTITY 2017 For internal use.

CORPORATE IDENTITY 2017 For internal use. CORPORATE IDENTITY 2017 For internal use www.rivacase.com CONTENTS Introduction RIVACASE positioning Four key elements of the corporate identity 1. Logo 2. Colours 3. Imagery 4. Elements at work Profile

More information

Unit title: Mobile Technology: Architecture (SCQF level 6)

Unit title: Mobile Technology: Architecture (SCQF level 6) National Unit specification: general information Unit code: H2P9 12 Superclass: CB Publication date: October 2012 Source: Scottish Qualifications Authority Version: 01 Summary This Unit develops candidates

More information

Standard File Formats

Standard File Formats Standard File Formats Introduction:... 2 Text: TXT and RTF... 4 Grapics: BMP, GIF, JPG and PNG... 5 Audio: WAV and MP3... 8 Video: AVI and MPG... 11 Page 1 Introduction You can store many different types

More information

CORPORATE IDENTITY 2017 For internal use.

CORPORATE IDENTITY 2017 For internal use. CORPORATE IDENTITY 2017 For internal use www.rivacase.com PAGE 2 DESIGN BY RIVACASE GERMANY CONTENTS Introduction RIVACASE positioning Four key elements of the corporate identity 1. Logo 2. Colours 3.

More information

Section 1. System Technologies and Implications. Modules. Introduction to computers. File management. ICT in perspective. Extended software concepts

Section 1. System Technologies and Implications. Modules. Introduction to computers. File management. ICT in perspective. Extended software concepts Section 1 System Technologies and Implications Modules 1.1 Introduction to computers 1.2 Software 1.3 Hardware 1.4 File management 1.5 ICT in perspective 1.6 Extended software concepts 1.7 Extended hardware

More information

GCSE Computer Science for OCR Overview Scheme of Work

GCSE Computer Science for OCR Overview Scheme of Work GCSE Computer Science for OCR Overview Scheme of Work The following assumes a two-year model. During the course, the final challenges can be used for practice in computational thinking, algorithm design

More information

Example: Resolution of 1024X 768 (1024 screens dots going across and 768 from top to bottom)

Example: Resolution of 1024X 768 (1024 screens dots going across and 768 from top to bottom) Monitors Monitors, commonly called as Visual Display Unit (VDU), are the main output device of a computer. It forms images from tiny dots, called pixels or picture elements that are arranged in a rectangular

More information

Computing Science: National 5 and Higher skills, knowledge and understanding

Computing Science: National 5 and Higher skills, knowledge and understanding Software design and development Development methodologies Analysis Design Describe and implement the phases of an iterative development process: analysis, design, implementation, testing, documentation,

More information

Resources to support the National 5 Computing Science course

Resources to support the National 5 Computing Science course Resources to support the National 5 Computing Science course The following table shows which past examination paper questions would be suitable for the revised National 5 course. Software design and development

More information

MINI MOCK (MIMO) Computer Science 2210

MINI MOCK (MIMO) Computer Science 2210 MINI MOCK (MIMO) Computer Science 2210 For Class 9th Abstract The Mini Mock examination paper for Final Term 2016-17 INSTRUCTIONS This Mini Mock paper is designed to test your preparation for Final-Term

More information

1.1 Data representation

1.1 Data representation 1.1.2 HEXADECIMAL NUMBER SYSTEM The one main disadvantage of binary numbers is that the binary string equivalent of a large decimal base-10 number can be quite long. When working with large digital systems,

More information

Example 1: Denary = 1. Answer: Binary = (1 * 1) = 1. Example 2: Denary = 3. Answer: Binary = (1 * 1) + (2 * 1) = 3

Example 1: Denary = 1. Answer: Binary = (1 * 1) = 1. Example 2: Denary = 3. Answer: Binary = (1 * 1) + (2 * 1) = 3 1.1.1 Binary systems In mathematics and digital electronics, a binary number is a number expressed in the binary numeral system, or base-2 numeral system, which represents numeric values using two different

More information

Paper 1 Theory For Examination from 2016 SPECIMEN PAPER 1 hour 45 minutes

Paper 1 Theory For Examination from 2016 SPECIMEN PAPER 1 hour 45 minutes Cambridge International Examinations Cambridge Ordinary Level *0123456789* COMPUTER SCIENCE 2210/01 Paper 1 Theory For Examination from 2016 SPECIMEN PAPER 1 hour 45 minutes Candidates answer on the Question

More information

Choose a title that captures the interest of an audience and orients the audience to the poster s content.

Choose a title that captures the interest of an audience and orients the audience to the poster s content. Poster presentations are a fun way to discuss research with interested parties. The audience at a conference moves through the poster displays to inquire and learn about the information presented on the

More information

JNTUWORLD. 1. Discuss in detail inter processor arbitration logics and procedures with necessary diagrams? [15]

JNTUWORLD. 1. Discuss in detail inter processor arbitration logics and procedures with necessary diagrams? [15] Code No: 09A50402 R09 Set No. 2 1. Discuss in detail inter processor arbitration logics and procedures with necessary diagrams? [15] 2. (a) Discuss asynchronous serial transfer concept? (b) Explain in

More information

Year 8 Computing New Levels (Progress Pathways) Content and Concepts (depth of understanding and application) Computational Thinking

Year 8 Computing New Levels (Progress Pathways) Content and Concepts (depth of understanding and application) Computational Thinking Year 8 Computing New Levels (Progress s) Progression Computer Systems, etc 7 9 Can explain clearly and in detail; - several laws that apply to computer use, including copyright and the Data Protection

More information

Data Representation From 0s and 1s to images CPSC 101

Data Representation From 0s and 1s to images CPSC 101 Data Representation From 0s and 1s to images CPSC 101 Learning Goals After the Data Representation: Images unit, you will be able to: Recognize and translate between binary and decimal numbers Define bit,

More information

Belfairs Academy Computer Science Fundamentals

Belfairs Academy Computer Science Fundamentals Computer Science Fundamentals Year 7 T1 E safety and Cybercrime I understand how and why to stay safe online. I understand the meaning of cybercrime. Digital Publishing (Word Processing, DTP, Digital Presentations)

More information

Principles of Managing Information and Producing Documents

Principles of Managing Information and Producing Documents Unit 3: Unit code: QCF Level 2: Principles of Managing Information and Producing Documents J/601/7640 BTEC Specialist Credit value: 3 Guided learning hours: 24 Unit aim This unit is about the knowledge

More information

7.1 Analysis 7.2 Design 7.3 Development and Testing 7.4 Implementation 7.5 Documentation 7.6 Evaluation

7.1 Analysis 7.2 Design 7.3 Development and Testing 7.4 Implementation 7.5 Documentation 7.6 Evaluation 7.1 Analysis 7.2 Design 7.3 Development and Testing 7.4 Implementation 7.5 Documentation 7.6 Evaluation Systems Analysts will review an existing system which is currently not meeting expectations. The

More information

Worksheet - Reading Guide for Keys and Passwords

Worksheet - Reading Guide for Keys and Passwords Unit 2 Lesson 15 Name(s) Period Date Worksheet - Reading Guide for Keys and Passwords Background Algorithms vs. Keys. An algorithm is how to execute the encryption and decryption and key is the secret

More information

Identity Management as a Service

Identity Management as a Service Identity Management as a Service The Challenge Today s technological landscape is one of permanent change. While connections to digital services and mobile devices grow, securing the data generated by

More information

HOW TO SECURE YOUR FACEBOOK ACCOUNT.

HOW TO SECURE YOUR FACEBOOK ACCOUNT. HOW TO SECURE YOUR FACEBOOK ACCOUNT. How secure is your Facebook account? The Yorkshire and Humber Regional Cyber Crime Unit (RCCU) protect team have produced this documentation regarding public Facebook

More information

Computing. Curriculum booklet. enquiries:

Computing. Curriculum booklet.   enquiries: Computing Curriculum booklet www.bba.bristol.sch.uk enquiries: info@bba.bristol.sch.uk Tel: 0117 3772700 fax: 0117 3772701 Speedwell Road, Bristol, BS15 1NU IT is all around us and is embedded in everything

More information

Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level

Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level *3413631885* COMPUTER SCIENCE 9608/13 Paper 1 Theory Fundamentals October/November 2018 1 hour 30 minutes

More information

Stratford School Academy Schemes of Work

Stratford School Academy Schemes of Work Number of weeks (between 6&8) Content of the unit Assumed prior learning (tested at the beginning of the unit) 6 This is a theoretical unit covering the basic principles and architecture of local and wide

More information

SAMPLE. ICT Level 1. Functional Skills. Mark Scheme. Assessment Code: FSIL1SA/P. The following documents are included in this assessment pack:

SAMPLE. ICT Level 1. Functional Skills. Mark Scheme. Assessment Code: FSIL1SA/P. The following documents are included in this assessment pack: Functional Skills ICT Level Scheme The following documents are included in this assessment pack: scheme Coverage grid. Assessment Code: FSILSA/P October 07 FS ICT L - Scheme - Sample P a g e Part A Q Criteria

More information

Lesson 1 - Getting Started

Lesson 1 - Getting Started Expected Time: 45-60 minutes Lesson 1 - Getting Started Aspect of National Curriculum Programme of Study covered: KS2 objective a - Design, write and debug programs that accomplish specific goals, including

More information

COPY/PASTE: Allows any item within a document to be copied and pasted within the same document or within compatible software applications.

COPY/PASTE: Allows any item within a document to be copied and pasted within the same document or within compatible software applications. You will need to understand basic terms and techniques used in DTP, as well as file types used within DTP and their advantages and disadvantages. This is separate from Elements and Principles of DTP which

More information

GCSE Computing. Revision Pack TWO. Data Representation Questions. Name: /113. Attempt One % Attempt Two % Attempt Three %

GCSE Computing. Revision Pack TWO. Data Representation Questions. Name: /113. Attempt One % Attempt Two % Attempt Three % GCSE Computing Revision Pack TWO Data Representation Questions Name: /113 Attempt One % Attempt Two % Attempt Three % Areas of Strength Areas for Development 1. Explain how ASCII is used to represent text

More information

AQ A G C S E 9-1 C O M P U T E R S C I E N C E R E V I S I O N G U I D E M U R P H Y V I A A M A Z O N

AQ A G C S E 9-1 C O M P U T E R S C I E N C E R E V I S I O N G U I D E M U R P H Y V I A A M A Z O N AQ A G C S E 9-1 C O M P U T E R S C I E N C E R E V I S I O N G U I D E M U R P H Y 2 0 1 6 V I A A M A Z O N ABOUT THIS RESOURCE This resource is in no way endorsed by AQA and will not facilitate the

More information

Cambridge International Examinations Cambridge International General Certificate of Secondary Education

Cambridge International Examinations Cambridge International General Certificate of Secondary Education Cambridge International Examinations Cambridge International General Certificate of Secondary Education *4170308148* COMPUTER SCIENCE 0478/11 Paper 1 Theory October/November 2016 1 hour 45 minutes Candidates

More information

Cambridge International Examinations Cambridge International Advanced Level

Cambridge International Examinations Cambridge International Advanced Level Cambridge International Examinations Cambridge International Advanced Level *6550085963* COMPUTER SCIENCE 9608/32 Paper 3 Advanced Theory October/November 2015 1 hour 30 minutes Candidates answer on the

More information

ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon. Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS

ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon. Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS Website: http:// ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS Important note on English as a Second Language (ESL) and International

More information

Cambridge International Examinations Cambridge International General Certificate of Secondary Education

Cambridge International Examinations Cambridge International General Certificate of Secondary Education Cambridge International Examinations Cambridge International General Certificate of Secondary Education *7518664861* COMPUTER SCIENCE 0478/12 Paper 1 Theory May/June 2015 1 hour 45 minutes Candidates answer

More information

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS General Certificate of Education Advanced Level. Paper 3 October/November hours

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS General Certificate of Education Advanced Level. Paper 3 October/November hours *2685241834* UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS General Certificate of Education Advanced Level COMPUTING 9691/32 Paper 3 October/November 2013 2 hours Candidates answer on the Question

More information

Name Duration Start. MAJOR PROJECT - page1

Name Duration Start. MAJOR PROJECT - page1 Name Duration Start 1 Unit 13- D2 Compare a range of hardware & software troubleshooting tools 0.25 days 03/04/14 07:00 2 Unit 17 -M1 Explain why project fail 0.25 days 31/03/14 07:00 3 Unit 17-M3 Monitoring

More information

Cryptography. Cryptography is much more than. What is Cryptography, exactly? Why Cryptography? (cont d) Straight encoding and decoding

Cryptography. Cryptography is much more than. What is Cryptography, exactly? Why Cryptography? (cont d) Straight encoding and decoding Copyright 2000-2001, University of Washington Cryptography is much more than Cryptography Cryptography systems allow 2 parties to communicate securely. The intent is to give privacy, integrity and security

More information