OCR GCSE (9-1) Computer Science J276 Accompanying Instructional Document

Similar documents
OCR J276 (9-1) GCSE Computer Science

Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2. networks. environmental concerns. Knowledge and skills covered: Knowledge and skills covered:

HASTINGS HIGH SCHOOL

GCSE Computer Science for OCR Overview Scheme of Work

Computing 1: Computer Systems

Year 10 OCR GCSE Computer Science (9-1)

Switching to AQA from OCR

AQA GCSE Computer Science PLC

Switching to AQA from Edexcel

Learning objectives. Computer principles The characteristics of contemporary processors, input, output and storage devices

2c. Content of Computer systems (Component 01)

Edexcel GCSE in Computer Science Microsoft IT Academy Mapping

OCR J276 GCSE Computer Science

COMPUTING SUBJECT KNOWLEDGE AUDIT

COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12: 2019 UNIT 3 AND UNIT 4

SAMPLE COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12

OCR GCSE Computing Learning Grids H/W

Systems Architecture. Systems Architecture. Memory. Memory. Memory. Memory. The Purpose and Function. The Purpose and Function

ICT & Computing Progress Grid

OCR Level 3 Advanced GCE in Computer Science (H446)

GCSE Computer Science Revision and Workbook

SAMPLE CURRICULUM GUIDE June 2014

OCR J276 GCSE Computer Science

Department Curriculum and Assessment Outline

IB Computer Science Topic.2-

COMPUTER SYSTEM. COMPUTER SYSTEM IB DP Computer science Standard Level ICS3U. COMPUTER SYSTEM IB DP Computer science Standard Level ICS3U

Southam College Computing & ICT Department. Summer Project

GCSE Computer Science Component 02

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam

elc International School

DUMBARTON ACADEMY NATIONAL 5 COMPUTING SCIENCE REVISION

OHIO ASSESSMENTS FOR EDUCATORS (OAE) FIELD 010: COMPUTER INFORMATION SCIENCE

Computer Science Curriculum Content, KS5

Unit 2: Technology Systems

Explain why data is represented in computer systems in binary form

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7

Spellings and Abbreviations

Information Science 1

GCSE Subject Level Conditions and Requirements for Computer Science May 2015

N5 Computing Science - Solutions

COMPUTER SCIENCE UNIT 1: Understanding Computer Science

«Computer Science» Requirements for applicants by Innopolis University

Syllabus for Computer Science General Part I

ST. MARY S COLLEGE FORM 4

N5 Computing Science - Revision

GUIDANCE FOR TEACHING

OCR J276 GCSE Computer Science

Stonelaw High School. Computing Science. BGE - Computer Systems

GCSE Computing. Revision Pack TWO. Data Representation Questions. Name: /113. Attempt One % Attempt Two % Attempt Three %

Higher Grade Computing Homework Answers Units 1 & 2

Year 12 Computer Science Learning Cycle 2 Overview

Computing Science: National 5 and Higher skills, knowledge and understanding

N.B. These pastpapers may rely on the knowledge gained from the previous chapters.

Autumn 1 Autumn 2. An Introduction to Idsall s Network & esafety. Programming with Scratch. Spring 1 Spring 2

AS/A Level Computing Syllabus 2011

The CPU and Memory. How does a computer work? How does a computer interact with data? How are instructions performed? Recall schematic diagram:

National 5 Computing Science Software Design & Development

Angel International School - Manipay 2 nd Term Examination March, 2016 Computing

Hardware and Software - Revision Summary

Introduction to Computers. Joslyn A. Smith

Computer Science. Pre-Exam. Revision

Electricity: Voltage. Gate: A signal enters the gate at a certain voltage. The gate performs operations on it, and sends it out was a new signal.

OCR A Level GCE Computer Science

Topics. Hardware and Software. Introduction. Main Memory. The CPU 9/21/2014. Introduction to Computers and Programming

Computer Organization

CS 101, Mock Computer Architecture

Computing Science. National 5. Summary Revision Notes

ก ก Information Technology II

Solve only 2 out of 3 questions

GCSE Computer Science

Defining Computers. Defining Computers. Understanding Essential Computer Concepts

GCSE ICT AQA Specification A (Full Course) Summary

GCSE (9-1) Computer Science Teacher's Workbook 4th Edition James Franklin

understand the need for input and output devices describe suitable output devices for a wide range of computer controlled situations

Q1. Describe the characteristic features of input and output devices of a computer system. [10]

Computer Systems. IGCSE OCR AQA Edexcel Understand the term. embedded system and how an Purpose of embedded system

COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY GENERAL YEAR 12: 2018 UNIT 3 AND UNIT 4

Computer Architecture

Dawood Public School Course Outline Computer Science

Networking Applications

UNIT 1 USING LOGIC. UPGRADE 8 Write a detailed report on how logic gates would be used to add up two nibbles using examples and explanations

User. Application program. Interfaces. Operating system. Hardware

INTRODUCTION TO COMPUTERS

Resources to support the National 5 Computing Science course

Cambridge International Examinations Cambridge Ordinary Level

I1100 E Introduction to computer.

Chapter 11: It s a Network. Introduction to Networking

Microprocessors I MICROCOMPUTERS AND MICROPROCESSORS

Chapter 11: Networks

Computer Basics 1/24/13. Computer Organization. Computer systems consist of hardware and software.

Dawood Public School Course Outline Computer Science Class XI

This document contains additional questions; it is not intended to be treated as a complete paper.

C H A P T E R 1. Introduction to Computers and Programming

8. A is approximately one billion bytes a. Kilobyte b. Bit c. Gigabyte d. Megabyte 9. SMPT, FTP and DNS are applications of the layer a. Data link b.

Revision of GCSE Specifications. Draft Proposal. Digital Technology

This paper consists of 27 pages and the instructions for the completion of a mark-reading sheet.

Flying Start AS Computer Science. September 2015

Specimen. Date Morning/Afternoon Time allowed: 1 hour 30 minutes. GCSE (9 1) Computer Science J276/01 Computer Systems Sample Question Paper

What is the typical configuration of a computer sold today? 1-1

Transcription:

OCR GCSE (9-1) Computer Science J276 Accompanying Instructional Document Curriculum area Non-coding theory* 1.1 Systems Architecture Content The purpose of the CPU Von Neumann architecture: MAR (Memory Address Register) MDR (Memory Data Register) Program Counter Accumulator Common CPU components and their function: ALU (Arithmetic Logic Unit) CU (Control Unit) Cache The function of the CPU as fetch and execute instructions stored in memory How common characteristics of CPUs affect their performance: clock speed cache size number of cores Embedded systems: purpose of embedded systems examples of embedded sytems OCR Module 1: The CPU and Von Neumann architecture OCR Module 1: The CPU and Von Neumann architecture OCR Module 1: The CPU and Von Neumann architecture OCR Module 1: The fetch-decode-execute cycle OCR Module 1: How common characteristics of CPUs affect their performance OCR Module 1: Embedded systems 1.2 Memory OCR Module 2: Memory the difference between RAM and ROM the purpose of ROM in a computer system the purpose of RAM in a computer system the need for virtual memory flash memory

1.3 Storage the need for secondary storage OCR Module 3: The need for secondary storage common types of storage: optical OCR Module 3: Optical storage magnetic OCR Module 3: Magnetic storage solid state OCR Module 3: Solid state storage suitable storage devices and storage media for a given application, and the advantages and disadvantages of these, using characteristics: OCR Module 3: Optical storage, Magnetic storage, Solid state storage capacity speed portability durability reliability cost 1.4 Wired and Wireless Networks types of networks: OCR Module 4: Types of networks LAN (Local Area Network) WAN (Wide Area Network) factors that affect the performance of networks OCR Module 4: The hardware needed to connect stand-alone computers into a Local Area Network the different roles of computers in a client-server and a peerto-peer network OCR Module 4: Types of networks the hardware needed to connect stand-alone computers into a Local Area Network: OCR Module 4: The hardware needed to connect stand-alone computers into a Local Area Network wireless access points routers/switches NIC (Network Interface Controller/Card) transmission media the internet as a worldwide collection of computer networks: OCR Module 4: The internet as a worldwide collection of computer networks DNS (Domain Name Server) hosting the cloud the concept of virtual networks OCR Module 4: The internet as a worldwide collection of computer networks

1.5 Network topologies, protocols and layers star and mesh network topologies Wifi: frequency and channels encryption ethernet the uses of IP addressing, MAC addressing, and protocols including: TCP/IP (Transmission Control Protocol/Internet Protocol) HTTP (Hyper Text Transfer Protocol) HTTPS (Hyper Text Transfer Protocol Secure) FTP (File Transfer Protocol) POP (Post Office Protocol) IMAP (Internet Message Access Protocol) SMTP (Simple Mail Transfer Protocol) the concept of layers packet switching OCR Module 5: Network topologies and transmission of data across LANs OCR Module 5: Network topologies and transmission of data across LANs OCR Module 5:Protocols and layers OCR Module 5: Protocols and layers OCR Module 5: Packet switching 1.6 System Security forms of attack threats posed to networks: malware phishing people as the weak point in secure systems (social engineering) brute force attacks denial of service attacks data interception and theft the concept of SQL injection poor network policy Identifying and preventing vulnerabilities: penetration testing network policies anti-malware software firewalls user access levels passwords encryption. OCR Module 6: Forms of Attack and Threats OCR Module 6: Forms of Attack and Threats OCR Module 6: Identifying and preventing vulnerabilities

1.7 Systems Software operating systems: user interface memory management/ multitasking peripheral management and drivers user management file management typical utility system software: encryption software defragmentation data compression the role and methods of backup: full incremental 1.8 Ethical, legal, cultural and environmental concerns how to investigate and discuss Computer Science technologies while considering: ethical issues legal issues cultural issues environmental issues. how key stakeholders are affected by technologies environmental impact of Computer Science cultural implications of Computer Science open source vs proprietary software legislation relevant to Computer Science: The Data Protection Act 1998 Computer Misuse Act 1990 Copyright Designs and Patents Act 1988 Creative Commons Licensing Freedom of Information Act 2000 Theory Totals Coding Theory

2.1 Algorithms* computational thinking: abstraction decomposition algorithmic thinking standard searching algorithms: binary search linear search standard sorting algorithms: bubble sort merge sort insertion sort how to produce algorithms using: pseudocode using flow diagrams interpret, correct or complete algorithms Flode, Crunch Flode, Crunch Flode, Crunch Flode, Crunch Flode or Crunch Flode or Crunch Flode Flode or Crunch

2.2 Programming techniques the use of variables, constants, operators, inputs, outputs and assignments the use of the three basic programming constructs used to control the flow of a program: Expressions, String Expressions, Conditions Crunch: Basics, Branching sequence Expressions, String Expressions Crunch: Basics selection JS, Py, Java: Conditional Statements Flode: Conditions Crunch: Branching iteration (count and condition controlled loops) JS, Py, Java: Loops Flode: Loops Crunch: Iteration the use of basic string manipulation Expressions Flode: String Expressions the use of basic file handling operations: JS, Py, Java: File handling open - read - write - close - the use of records to store data SQL: Creating databases and inserting data the use of SQL to search for data SQL: What is a datanase, Creating databases and inserting data the use of arrays (or equivalent) when solving problems, including both one and two dimensional arrays JS, Py, Java: Arrays, 2D Arrays Flode: Arrays how to use sub programs (functions and procedures) to produce structured code JS, Py, Java: Functions the use of data types: Expressions, String Expressions, Conditions integer - real - Boolean - character and string - Crunch: Basics, Branching the common arithmetic operators Expressions, String Expressions Crunch: Basics the common Boolean operators. Expressions, String Expressions Crunch: Basics

2.3 Producing robust programs* defensive design considerations: input sanitisation/validation planning for contingencies anticipating misuse authentication (file or database) maintainability: comments indentation the purpose of testing types of testing: iterative final/terminal how to identify syntax and logic errors selecting and using suitable test data (extreme or erroneous)

2.4 Computational logic why data is represented in computer systems in binary form JS, Py, Java: File handling simple logic diagrams using the operations AND, OR and Expressions, NOT String Expressions truth tables combining Boolean operators using AND, OR and NOT to two levels. Expressions, String Expressions Crunch: Branching 2.5 Translators and facilities of languages the purpose of translators (interpreters not c<->python) the characteristics of high and low-level languages the characteristics of an assembler, a compiler and an interpreter common tools and facilities available in an integrated development environment (IDE): editors error diagnostics run-time environment translators.

2.6 Data representation* Units define the terms bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte understand that data needs to be converted into a binary format to be processed by a computer Number convert positive denary whole numbers (0-255) into 8-bit binary numbers and vice versa add two 8-bit binary integers and explain overflow errors which may occur convert positive denary whole numbers (0-255) into 2-digit hexadecimal numbers and vice versa convert between binary and hexadecimal equivalents of the same number check digits Character explain the use of binary codes to represent characters explain the term character set describe with examples (for example ASCII and Unicode) the relationship between the number of bits per character in a character set and the number of characters which can be represented Images explain the representation of an image as a series of pixels represented in binary explain the need for metadata to be included in the file such as height, width and colour depth discuss the effect of colour depth and resolution on the size of an image file Sound explain how sound can be sampled and stored in digital form explain how sampling intervals and other considerations affect the size of a sound file and quality of its playback : sample size, bit rate, sampling frequency Compression Need for compressions Types of compression (lossy vs. lossless) Coding Theory Totals Project*