HASTINGS HIGH SCHOOL

Similar documents
OCR J276 (9-1) GCSE Computer Science

Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2. networks. environmental concerns. Knowledge and skills covered: Knowledge and skills covered:

OCR GCSE (9-1) Computer Science J276 Accompanying Instructional Document

GCSE Computer Science for OCR Overview Scheme of Work

Computing 1: Computer Systems

Year 10 OCR GCSE Computer Science (9-1)

Switching to AQA from OCR

AQA GCSE Computer Science PLC

Switching to AQA from Edexcel

2c. Content of Computer systems (Component 01)

Learning objectives. Computer principles The characteristics of contemporary processors, input, output and storage devices

Edexcel GCSE in Computer Science Microsoft IT Academy Mapping

OCR J276 GCSE Computer Science

COMPUTING SUBJECT KNOWLEDGE AUDIT

COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12: 2019 UNIT 3 AND UNIT 4

ICT & Computing Progress Grid

SAMPLE COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12

OCR J276 GCSE Computer Science

OCR GCSE Computing Learning Grids H/W

Systems Architecture. Systems Architecture. Memory. Memory. Memory. Memory. The Purpose and Function. The Purpose and Function

GCSE Computer Science Revision and Workbook

OCR Level 3 Advanced GCE in Computer Science (H446)

SAMPLE CURRICULUM GUIDE June 2014

Department Curriculum and Assessment Outline

GCSE Subject Level Conditions and Requirements for Computer Science May 2015

GCSE Computer Science Component 02

Unit 2: Technology Systems

OHIO ASSESSMENTS FOR EDUCATORS (OAE) FIELD 010: COMPUTER INFORMATION SCIENCE

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam

DUMBARTON ACADEMY NATIONAL 5 COMPUTING SCIENCE REVISION

COMPUTER SYSTEM. COMPUTER SYSTEM IB DP Computer science Standard Level ICS3U. COMPUTER SYSTEM IB DP Computer science Standard Level ICS3U

OCR J276 GCSE Computer Science

Southam College Computing & ICT Department. Summer Project

N5 Computing Science - Revision

IB Computer Science Topic.2-

N5 Computing Science - Solutions

COMPUTER SCIENCE UNIT 1: Understanding Computer Science

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7

Resources to support the National 5 Computing Science course

Computer Science Curriculum Content, KS5

elc International School

Computing Science: National 5 and Higher skills, knowledge and understanding

Solve only 2 out of 3 questions

Explain why data is represented in computer systems in binary form

GUIDANCE FOR TEACHING

National 5 Computing Science Software Design & Development

GCSE Computing. Revision Pack TWO. Data Representation Questions. Name: /113. Attempt One % Attempt Two % Attempt Three %

Syllabus for Computer Science General Part I

UNIT 1 USING LOGIC. UPGRADE 8 Write a detailed report on how logic gates would be used to add up two nibbles using examples and explanations

Information Science 1

Stonelaw High School. Computing Science. BGE - Computer Systems

Angel International School - Manipay 2 nd Term Examination March, 2016 Computing

Spellings and Abbreviations

Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level

Autumn 1 Autumn 2. An Introduction to Idsall s Network & esafety. Programming with Scratch. Spring 1 Spring 2

Higher Grade Computing Homework Answers Units 1 & 2

OCR A Level GCE Computer Science

ST. MARY S COLLEGE FORM 4

understand the need for input and output devices describe suitable output devices for a wide range of computer controlled situations

COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY GENERAL YEAR 12: 2018 UNIT 3 AND UNIT 4

Computer Science General Course Year 12. Selected Unit 3 syllabus content for the. Externally set task 2019

Dawood Public School Course Outline Computer Science

AQA GCSE (9-1) Computer Science. S Robson and PM Heathcote

«Computer Science» Requirements for applicants by Innopolis University

Dawood Public School Course Outline Computer Science Class XI

The CPU and Memory. How does a computer work? How does a computer interact with data? How are instructions performed? Recall schematic diagram:

Computer Systems. IGCSE OCR AQA Edexcel Understand the term. embedded system and how an Purpose of embedded system

Hardware and Software - Revision Summary

User. Application program. Interfaces. Operating system. Hardware

N.B. These pastpapers may rely on the knowledge gained from the previous chapters.

8. A is approximately one billion bytes a. Kilobyte b. Bit c. Gigabyte d. Megabyte 9. SMPT, FTP and DNS are applications of the layer a. Data link b.

Defining Computers. Defining Computers. Understanding Essential Computer Concepts

Dawood Public School Course Outline Computer Science Class XI

Electricity: Voltage. Gate: A signal enters the gate at a certain voltage. The gate performs operations on it, and sends it out was a new signal.

Computer Science. Pre-Exam. Revision

Fundamentals of Computing and Digital Literacy. Sample. Marking Scheme

Cambridge International Examinations Cambridge International General Certificate of Secondary Education

CMSC 1513 Lecture 1.2

SAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 11

This paper consists of 27 pages and the instructions for the completion of a mark-reading sheet.

Teddington School Sixth Form

Revision of GCSE Specifications. Draft Proposal. Digital Technology

GCSE (9-1) Computer Science Teacher's Workbook 4th Edition James Franklin

I1100 E Introduction to computer.

Advanced Diploma in Computer Science (907) Computer Systems Architecture

Q1. Describe the characteristic features of input and output devices of a computer system. [10]

Specimen. Date Morning/Afternoon Time allowed: 1 hour 30 minutes. GCSE (9 1) Computer Science J276/01 Computer Systems Sample Question Paper

GCSE Computer Science

William Paterson University of New Jersey Department of Computer Science College of Science and Health Course Outline

5. The result of dividing the 8 bit value by the 8 bit value is:

KS3 Computing - Life Without Levels

INTRODUCTION TO COMPUTERS

This document contains additional questions; it is not intended to be treated as a complete paper.

Year 12 Computer Science Learning Cycle 2 Overview

Introduction to Computers. Joslyn A. Smith

Cambridge International Examinations Cambridge Ordinary Level

ก ก Information Technology II

GIRLS SECONDARY, L-IMRIEĦEL HALF YEARLY EXAMINATIONS 2015/2016

Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level. Published

Transcription:

HASTINGS HIGH SCHOOL EXAMINATION GUIDE 2017-19 Subject Course code Website address Provisional examination dates Computer Science Computer Science (9-1) - J276 https://www.ocr.org.uk/qualifications/gcse/computerscience-j276-from-2016/ Paper 1: J276/01 Computer Systems 50%: Monday 13 th May 2019 Paper 2: J276 / 02 Computational thinking, algorithms and programming 50%: Thursday 16 th May 2019 GCSE grade type awarded NEA Controlled Assessment Revision books 9-1 20 hour programming project to be completed in class during year 11 Feeds into Paper 2 questions. Pearson Revise OCR GCSE (9-1) Computer Science Revision Guide Pearson Revise OCR GCSE (9-1) Computer Science Revision Workbook Useful websites https://student.craigndave.org/ https://quizlet.com/321187375/j276-computerscience-all-definitions-flash-cards/ https://courses.exa.foundation pg. 1

1.1 Computer Systems Computer Architecture I can explain the purpose of the CPU Von Neumann architecture: I can explain the MAR (Memory Address Register) I can explain the purpose and function of the MDR (Memory Data Register) I can explain the purpose and function of the Program Counter I can explain the purpose and function of the Accumulator common CPU components and their function: I can explain the purpose and function of the ALU (Arithmetic Logic Unit) I can explain the purpose and function of the CU (Control Unit) I can explain the purpose and function of the Cache I can explain how the CPU fetches and execute instructions stored in memory I can explain how the clock speed of the CPU affects performance I can explain how the cache size of the CPU affects performance I can explain how the number of cores on the CPU affects performance I can explain the purpose of embedded systems I can describe examples of embedded systems 1.2 Computer Systems Memory I can explain the difference between RAM and ROM pg. 2

I can explain the purpose of ROM in a computer system I can explain the purpose of RAM in a computer system I can explain the need for virtual memory I can identify types of flash memory and explain how data is stored 1.3 Computer Systems Storage I can explain the need for secondary storage I can calculate data capacity requirements I can identify optical storage and explain its advantages and disadvantages I can identify magnetic storage and explain its advantages and disadvantages I can identify solid state storage and explain its advantages and disadvantages I can compare the characteristics of storage media, including the capacity, speed, portability, durability, reliability, and cost. 1.4 Computer Systems Wired & Wireless Networks I can describe the characteristics of a LAN (Local Area Network) I can describe the characteristics of a WAN (Wide Area Network) I can explain the factors that affect the performance of networks pg. 3

I can explain the different roles of computers in a client-server and a peer-to-peer network I can identify and explain the hardware needed to connect stand-alone computers in a Local Area Network: wireless access points routers/switches NIC (Network Interface Controller/Card) transmission media I can explain the internet as a worldwide collection of computer networks I can explain how the DNS (Domain Name Server) works I can explain the purpose of hosting data and content and how this enables the use of the cloud I can explain the concept of virtual networks 1.5 Computer Systems Network Topologies, protocols & layers I can explain the difference between star and mesh network topologies I can explain the impact of Wifi frequency and channels I can explain the purpose of WiFi encryption I can explain what the Ethernet protocol is and how it is used to connect networks I can explain how IP addressing works I can explain what a MAC address is pg. 4

I can explain the purpose of the TCP/IP (Transmission Control Protocol/Internet Protocol) and how they work I can explain the purpose of the HTTP (Hyper Text Transfer Protocol) HTTPS (Hyper Text Transfer Protocol Secure) and how they work I can explain the purpose of the FTP (File Transfer Protocol) and how it works I can explain the differences between the email protocols: POP (Post Office Protocol), IMAP (Internet Message Access Protocol) and SMTP (Simple Mail Transfer Protocol) I can explain the concept of layers I can explain how packet switching works 1.6 Computer Systems System Security I can identify the different forms of attack I can describe the threat posed by malware on a network I can describe the threat posed by phishing on a network I can describe the threat posed by people as the weak point in secure systems (social engineering) pg. 5

I can describe the threat posed by brute force attacks on a network I can describe the threat posed by denial of service (DoS) attacks on a network I can describe the threat posed by data interception and theft on networks I can describe the threat posed the concept of SQL injection on networks I can describe the threat posed by a poor network policy identifying and preventing vulnerabilities: I can explain why penetration testing is used to identify and prevent vulnerabilities I can explain the need for network forensics in order to identify and prevent vulnerabilities I can explain the need for network policies to prevent vulnerabilities I can explain the need for anti-malware software to prevent vulnerabilities I can explain the need for firewalls to prevent vulnerabilities pg. 6

I can explain the need for user access levels to prevent vulnerabilities I can explain the need for passwords to prevent vulnerabilities I can explain the need for encryption to prevent vulnerabilities 1.7 Computer Systems Systems Software I can explain the purpose and functionality of systems software operating systems: I can explain the purpose and function of the operating systems user interface I can explain how the operating system performs memory management I can explain how the operating system performs multitasking I can explain how the operating system performs peripheral management I can explain how the operating system manages software drivers I can explain how the operating system performs user management I can explain how the operating system performs file management pg. 7

I can explain the purpose of utility system software for encryption I can explain the purpose of utility system software for defragmentation I can explain the different methods of backup (full and incremental) 1.8 Computer Systems Ethical, cultural & environmental concerns I can investigate and discuss Computer Science technologies considering ethical issues I can investigate and discuss Computer Science technologies considering privacy issues I can explain how key stakeholders are affected by computer science technologies I can explain and argue the environmental impact of Computer Science I can explain and argue the cultural implications of Computer Science I can explain the difference between open source vs proprietary software I can explain the legal implications of the The Data Protection Act 1998 and understand how to comply with this law I can explain the legal implications of the Computer Misuse Act 1990 and understand how to comply with this law I can explain the implications of the legal implications of the Copyright Designs and Patents Act 1988 and understand how to comply with this law pg. 8

I can explain the legal implications of Creative Commons Licensing and understand how to comply with this law I can explain the implications of the Freedom of Information Act 2000 and understand how to comply with this law 2.1 Computational Thinking Algorithms I can explain the meaning of computational thinking I can explain what abstraction is and give examples I can explain what decomposition is and give examples I can explain what algorithmic thinking is and give examples standard searching algorithms I can explain how a binary search works and compare it to other search algorithms I can explain how a linear search works and compare it to other search algorithms standard sorting algorithms I can explain how a bubble sort works and compare it to other sorting algorithms I can explain how a merge sort works and compare it to other sorting algorithms I can explain how a insertion sort works and compare it to other sorting algorithms I can effectively produce algorithms using pseudocode pg. 9

I can effectively produce algorithms using flow diagrams I can effectively interpret, correct or complete algorithms 2.2 Computational Thinking Programming Techniques I can program making use of variables, constants, operators, inputs, outputs and assignments I can explain and use the programming construct sequence and use this to program instructions in a specific order I can explain and use the programming construct selection and use this to program IF statements I can explain and use the programming construct iteration (count and condition controlled loops) and use this to program WHILE and FOR loops I can identify and use of basic string manipulation I can identify and use basic file handling operations (open, read, write, close) I can identify and use records to store data I can identify and use SQL to search for data I can identify and use arrays (tuples, lists, dictionaries) when solving problems, including both one and two dimensional arrays I can identify and use sub programs (functions and procedures) to produce structured code I can identify and use the data types (integer, real, Boolean, character and string, casting) I can identify and use the common arithmetic operators ( +, -, *, /, DIV, MOD) I can identify and use the common Boolean operators (True, False) pg. 10

2.3 Computational Thinking Producing Robust Programs defensive design considerations I can explain what input sanitisation/validation is and why it is used in software programs I can explain why it is important to plan for contingencies when developing a software program I can explain why it is important to anticipate misuse when developing a software program I can explain why it is important to consider authentication when developing a software program I can explain how program maintainability can be used by using effective comments in the program code I can explain how program maintainability can be used by using indentation in the program code I can explain the purpose of testing I can explain what iterative testing means and why it is important I can explain what final/terminal testing means and why it is important I can identify syntax and logic errors in program code I can select and using suitable test data (valid, invalid, borderline, extreme) 2.4 Computational Thinking Computational Logic I can explain why data is represented in computer systems in binary form pg. 11

I can work out and create simple logic diagrams using the operations AND, OR and NOT I can understand and create truth tables to identify all possible outcomes from a logic diagram I can create logic diagrams combining Boolean operators using AND, OR and NOT to two levels I can apply logical operators in appropriate truth tables to solve problems I understand and can use addition (+) in my programs I understand and can use subtraction (- ) in my programs I understand and can use division (/) in my programs I understand and can use multiplication (*) in my programs I understand and can use exponentiation ^ (**) in my programs I understand and can use MOD (%) in my programs I understand and can use DIV (//) in my programs 2.5 Computational Thinking Translators & Facilities of Languages I can identify characteristics and explain the purpose of different levels of programming language, including low level languages I can explain the purpose of translators pg. 12

I can identify the characteristics of an assembler, a compiler and an interpreter common tools and facilities available in an integrated development environment (IDE): I can explain the use of the editor in an IDE I can explain the use of error diagnostics in an IDE I can explain the use of the run-time environment in an IDE I can explain the use of the translator in an IDE 2.6 Computational Thinking Data Representation I can identify and explain what the computing units bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte, petabyte are I can explain why data needs to be converted into a binary format to be processed by a computer I can convert positive denary whole numbers (0 255) into 8 bit binary numbers and vice versa pg. 13

I can add two 8 bit binary integers and explain overflow errors which may occur I can perform left and right binary shifts I can convert positive denary whole numbers (0 255) into 2 digit hexadecimal numbers and vice versa I can explain the purpose of check digits and how they work I can explain the use of binary codes to represent characters I can explain the term character-set I can explain the relationship between the number of bits per character in a character set and the number of characters which can be represented (for example ASCII, extended ASCII and Unicode). Images I can explain how an image is represented as a series of pixels represented in binary I can explain the purpose of metadata and the kind of information included in the file I can explain the effect of colour depth and resolution on the size of an image file. Sound I can explain how sound can be sampled and stored in digital form pg. 14

I can explain how sampling intervals and other factors affect the size of a sound file and the quality of its playback: sample size bit rate sampling frequency Compression I can explain the need for compression I can explain the difference between lossy and lossless compression pg. 15