Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2. networks. environmental concerns. Knowledge and skills covered: Knowledge and skills covered:

Similar documents
OCR J276 (9-1) GCSE Computer Science

OCR GCSE (9-1) Computer Science J276 Accompanying Instructional Document

HASTINGS HIGH SCHOOL

GCSE Computer Science for OCR Overview Scheme of Work

Computing 1: Computer Systems

Switching to AQA from OCR

Year 10 OCR GCSE Computer Science (9-1)

AQA GCSE Computer Science PLC

Switching to AQA from Edexcel

Edexcel GCSE in Computer Science Microsoft IT Academy Mapping

OCR J276 GCSE Computer Science

Learning objectives. Computer principles The characteristics of contemporary processors, input, output and storage devices

2c. Content of Computer systems (Component 01)

COMPUTING SUBJECT KNOWLEDGE AUDIT

COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12: 2019 UNIT 3 AND UNIT 4

SAMPLE COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12

OCR J276 GCSE Computer Science

OCR GCSE Computing Learning Grids H/W

Systems Architecture. Systems Architecture. Memory. Memory. Memory. Memory. The Purpose and Function. The Purpose and Function

GCSE Computer Science Revision and Workbook

OCR Level 3 Advanced GCE in Computer Science (H446)

ICT & Computing Progress Grid

GCSE Computer Science Component 02

SAMPLE CURRICULUM GUIDE June 2014

Southam College Computing & ICT Department. Summer Project

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam

COMPUTER SYSTEM. COMPUTER SYSTEM IB DP Computer science Standard Level ICS3U. COMPUTER SYSTEM IB DP Computer science Standard Level ICS3U

Department Curriculum and Assessment Outline

IB Computer Science Topic.2-

Unit 2: Technology Systems

OHIO ASSESSMENTS FOR EDUCATORS (OAE) FIELD 010: COMPUTER INFORMATION SCIENCE

DUMBARTON ACADEMY NATIONAL 5 COMPUTING SCIENCE REVISION

GCSE Subject Level Conditions and Requirements for Computer Science May 2015

elc International School

Computer Science Curriculum Content, KS5

«Computer Science» Requirements for applicants by Innopolis University

Explain why data is represented in computer systems in binary form

N5 Computing Science - Solutions

COMPUTER SCIENCE UNIT 1: Understanding Computer Science

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7

Syllabus for Computer Science General Part I

N5 Computing Science - Revision

Spellings and Abbreviations

GUIDANCE FOR TEACHING

Information Science 1

OCR J276 GCSE Computer Science

National 5 Computing Science Software Design & Development

UNIT 1 USING LOGIC. UPGRADE 8 Write a detailed report on how logic gates would be used to add up two nibbles using examples and explanations

Stonelaw High School. Computing Science. BGE - Computer Systems

Computing Science: National 5 and Higher skills, knowledge and understanding

GCSE Computing. Revision Pack TWO. Data Representation Questions. Name: /113. Attempt One % Attempt Two % Attempt Three %

Angel International School - Manipay 2 nd Term Examination March, 2016 Computing

Higher Grade Computing Homework Answers Units 1 & 2

Solve only 2 out of 3 questions

Dawood Public School Course Outline Computer Science

N.B. These pastpapers may rely on the knowledge gained from the previous chapters.

COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY GENERAL YEAR 12: 2018 UNIT 3 AND UNIT 4

ST. MARY S COLLEGE FORM 4

Defining Computers. Defining Computers. Understanding Essential Computer Concepts

AQA GCSE (9-1) Computer Science. S Robson and PM Heathcote

OCR A Level GCE Computer Science

understand the need for input and output devices describe suitable output devices for a wide range of computer controlled situations

Dawood Public School Course Outline Computer Science Class XI

Hardware and Software - Revision Summary

Electricity: Voltage. Gate: A signal enters the gate at a certain voltage. The gate performs operations on it, and sends it out was a new signal.

ก ก Information Technology II

Computer Science. Pre-Exam. Revision

Year 12 Computer Science Learning Cycle 2 Overview

The CPU and Memory. How does a computer work? How does a computer interact with data? How are instructions performed? Recall schematic diagram:

Revision of GCSE Specifications. Draft Proposal. Digital Technology

GCSE (9-1) Computer Science Teacher's Workbook 4th Edition James Franklin

8. A is approximately one billion bytes a. Kilobyte b. Bit c. Gigabyte d. Megabyte 9. SMPT, FTP and DNS are applications of the layer a. Data link b.

Resources to support the National 5 Computing Science course

Autumn 1 Autumn 2. An Introduction to Idsall s Network & esafety. Programming with Scratch. Spring 1 Spring 2

Networking Applications

This paper consists of 27 pages and the instructions for the completion of a mark-reading sheet.

Computer Science General Course Year 12. Selected Unit 3 syllabus content for the. Externally set task 2019

KS3 Programme of Study Subject: Computing Year group: Y7

Q1. Describe the characteristic features of input and output devices of a computer system. [10]

Computing Science. National 5. Summary Revision Notes

Computer Systems. IGCSE OCR AQA Edexcel Understand the term. embedded system and how an Purpose of embedded system

User. Application program. Interfaces. Operating system. Hardware

This document contains additional questions; it is not intended to be treated as a complete paper.

GCSE Computer Science

INTRODUCTION TO COMPUTERS

Computer Organization

Year 7 Autumn A Autumn B Spring C Spring D Summer E and Summer F

ARIZONA CTE CAREER PREPARATION STANDARDS & MEASUREMENT CRITERIA SOFTWARE DEVELOPMENT,

GCSE ICT AQA Specification A (Full Course) Summary

Dawood Public School Course Outline Computer Science Class XI

Entry Level Assessment Blueprint Computer Networking Fundamentals

The Lester Vaughan School Information Technology (Theory) Unit Plans Year 1 Term 1

Introduction to Computers. Joslyn A. Smith

I1100 E Introduction to computer.

Computer Systems. Communication (networks, radio links) Meatware (people, users don t forget them)

Specimen. Date Morning/Afternoon Time allowed: 1 hour 30 minutes. GCSE (9 1) Computer Science J276/01 Computer Systems Sample Question Paper

AS/A Level Computing Syllabus 2011

Web Foundations Series Internet Business Associate

GIRLS SECONDARY, L-IMRIEĦEL HALF YEARLY EXAMINATIONS 2015/2016

Transcription:

Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2 1.8 Ethical, 1.4 Wired 1.8 Ethical, 1.4 Wired 1.8 Ethical, 1.4 Wired legal, cultural and and wireless legal, cultural and and wireless legal, cultural and and wireless E-safety- how to investigate and discuss Computer technologies while considering: ethical issues legal issues cultural issues issues. privacy issues. types of : LAN (Local Area WAN (Wide Area factors that affect the performance of the different roles of computers in a clientserver and a peer-topeer network the hardware needed to connect stand-alone computers into a Local Area Network: wireless access points routers/switches NIC (Network Interface Controller/Card) transmission media E-safety- how to investigate and discuss Computer technologies while considering: ethical issues legal issues cultural issues issues. privacy issues. types of : LAN (Local Area WAN (Wide Area factors that affect the performance of the different roles of computers in a clientserver and a peer-topeer network the hardware needed to connect stand-alone computers into a Local Area Network: wireless access points routers/switches NIC (Network Interface Controller/Card) transmission media E-safety- how to investigate and discuss Computer technologies while considering: ethical issues legal issues cultural issues issues. privacy issues. types of : LAN (Local Area WAN (Wide Area factors that affect the performance of the different roles of computers in a clientserver and a peer-topeer network the hardware needed to connect stand-alone computers into a Local Area Network: wireless access points routers/switches NIC (Network Interface Controller/Card) transmission media

the internet as a worldwide collection of computer : DNS (Domain Name Server) hosting the cloud the concept of virtual. the internet as a worldwide collection of computer : DNS (Domain Name Server) hosting the cloud the concept of virtual. the internet as a worldwide collection of computer : DNS (Domain Name Server) hosting the cloud the concept of virtual. 1.8 Ethical, legal, 1.4 Wired and 1.8 Ethical, legal, 1.4 Wired and 1.8 Ethical, legal, 1.4 Wired and cultural and wireless. cultural and wireless. cultural and wireless. YEAR 7 *****PLEASE NOTE YEAR 7S AND 8S ARE ON CAROUSEL SO WILL HAVE TWO TERMS ONLY***** End of year (carousel) exam: 1.4 Wired and wireless. 1.8 Ethical, legal, cultural and

YEAR 8S **** PLEASE NOTE THAT YEAR 7 AND YEAR 8 ARE ON A CAROUSEL*****

Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2 1.8 Ethical, legal, cultural and 1.8 Ethical, legal, cultural and 1.8 Ethical, legal, cultural and how key stakeholders are affected by technologies impact of Computer cultural implications of Computer open source vs proprietary software legislation relevant to Computer : The Data Protection Act 1998 Computer Misuse Act 1990 Copyright Designs and Patents Act 1988 Creative Commons Licensing Freedom of Information Act 2000 computational thinking: abstraction decomposition algorithmic thinking standard searching binary search linear search standard sorting bubble sort merge sort insertion sort how to produce algorithms using: pseudocode using flow diagrams how key stakeholders are affected by technologies impact of Computer cultural implications of Computer open source vs proprietary software legislation relevant to Computer : The Data Protection Act 1998 Computer Misuse Act 1990 Copyright Designs and Patents Act 1988 Creative Commons Licensing Freedom of Information Act 2000 computational thinking: abstraction decomposition algorithmic thinking standard searching binary search linear search standard sorting bubble sort merge sort insertion sort how to produce algorithms using: pseudocode using flow diagrams how key stakeholders are affected by technologies impact of Computer cultural implications of Computer open source vs proprietary software legislation relevant to Computer : The Data Protection Act 1998 Computer Misuse Act 1990 Copyright Designs and Patents Act 1988 Creative Commons Licensing Freedom of Information Act 2000 computational thinking: abstraction decomposition algorithmic thinking standard searching binary search linear search standard sorting bubble sort merge sort insertion sort how to produce algorithms using: pseudocode using flow diagrams

1.8 Ethical, legal, cultural and 1.8 Ethical, legal, cultural and 1.8 Ethical, legal, cultural and End of year (carousel) exam 1.8 Ethical, legal, cultural and

Year 9 Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2 1.1 Systems 1.2 Memory architecture 1.3 Storage 1.4 Wired and wireless 1.5 Network topologies, protocols and layers and 2.2 Programming techniques 2.2 Programming techniques 1.1 Systems architecture the purpose of the CPU Von Neumann architecture: MAR (Memory Address Register) MDR (Memory Data Register) Program Counter Accumulator common CPU components and their function: ALU (Arithmetic Logic Unit) CU (Control Unit) Cache the function of the CPU as fetch and execute instructions stored in memory 1.2 Memory the difference between RAM and ROM the purpose of ROM in a computer system the purpose of RAM in a computer system the need for virtual memory flash memory. 1.3 Storage the need for secondary storage data capacity and calculation of data capacity requirements common types of storage: optical magnetic solid state 1.4 Wired and wireless types of : LAN (Local Area WAN (Wide Area factors that affect the performance of the different roles of computers in a clientserver and a peer-topeer network the hardware needed to connect stand-alone computers into a Local Area Network: wireless access points routers/switches 1.5 Network topologies, protocols and layers star and mesh network topologies Wifi: frequency and channels encryption ethernet the uses of IP addressing, MAC addressing, and protocols including: TCP/IP (Transmission Control Protocol/Internet Protocol) HTTP (Hyper Text Transfer Protocol) HTTPS (Hyper Text Transfer Protocol Secure) computational thinking: abstraction decomposition algorithmic thinking standard searching binary search linear search standard sorting bubble sort merge sort insertion sort how to produce algorithms using: pseudocode using flow diagrams 2.2 Programming techniques 2.2 Programming techniques the use of variables, constants, operators, inputs, outputs and assignments the use of the three basic programming constructs used to control the flow of a program: sequence selection iteration (count and condition controlled loops) the use of basic string manipulation the use of basic file handling operations: open read write

how common characteristics of CPUs affect their performance: clock speed cache size number of cores embedded systems: purpose of embedded systems examples of embedded sytems. suitable storage devices and storage media for a given application, and the advantages and disadvantages of these, using characteristics: capacity speed portability durability reliability cost. NIC (Network Interface Controller/Card) transmission media SMTP (Simple Mail Transfer Protocol) the concept of layers packet switching FTP (File Transfer Protocol) POP (Post Office Protocol) the use of variables, constants, operators, inputs, outputs and assignments the use of the three basic programming constructs used to control the flow of a program: sequence selection iteration (count and condition controlled loops) the use of basic string manipulation the use of basic file handling operations: open read write close the use of records to store data the use of SQL to search for data the use of arrays (or equivalent) when solving problems, including both one and two dimensional arrays close the use of records to store data the use of SQL to search for data the use of arrays (or equivalent) when solving problems, including both one and two dimensional arrays how to use sub programs (functions and procedures) to produce structured code the use of data types: integer real Boolean character and string casting the common arithmetic operators the common Boolean operators.

1.1 Systems architecture 1.2 Memory; 1.3 Storage 1.4 Wired and wireless 1.5 Network topologies, protocols and layers Taken from OCR exam builder for GCSE Computer how to use sub programs (functions and procedures) to produce structured code the use of data types: integer real Boolean character and string casting the common arithmetic operators the common Boolean operators. and 2.2 Programming techniques 2.2 Programming techniques End of Year Exam: 1.1 Systems architecture; 1.2 Memory; 1.3 Storage; 1.4 Wired and wireless ; 1.5 Network topologies, protocols and layers; and 2.2 Programming techniques 2.2 Programming techniques

Year 10 Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2 1.6 System security 1.7 Systems software 2.3 Producing robust programs 2.4 Computational logic 2.5 Translators and facilities of languages 2.6 Data representation 1.6 System security forms of attack threats posed to : malware phishing people as the weak point in secure systems (social engineering) brute force attacks denial of service attacks data interception and theft the concept of SQL injection poor network policy identifying and preventing vulnerabilities: 1.7 Systems software the purpose and functionality of systems software operating systems: user interface memory management/multitasking peripheral management and drivers user management file management utility system software: encryption software defragmentation data compression the role and methods of backup: n full n incremental. 2.3 Producing robust programs defensive design considerations: input sanitisation/validation planning for contingencies anticipating misuse authentication maintainability: comments indentation the purpose of testing types of testing: iterative final/terminal how to identify syntax and logic errors selecting and using suitable test data. 2.4 Computational logic why data is represented in computer systems in binary form simple logic diagrams using the operations AND, OR and NOT truth tables combining Boolean operators using AND, OR and NOT to two levels applying logical operators in appropriate truth tables to solve problems applying computingrelated mathematics: + 2.5 Translators and facilities of languages characteristics and purpose of different levels of programming language, including low level languages the purpose of translators the characteristics of an assembler, a compiler and an interpreter common tools and facilities available in an integrated development environment (IDE): editors error diagnostics run-time environment translators. 2.6 Data representation Units bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte, petabyte how data needs to be converted into a binary format to be processed by a computer. Numbers how to convert positive denary whole numbers (0 255) into 8 bit binary numbers and vice versa how to add two 8 bit binary integers and explain overflow errors which may occur

penetration testing network forensics network policies anti-malware software firewalls user access levels passwords encryption. / * Exponentiation (^) MOD DIV binary shifts how to convert positive denary whole numbers (0 255) into 2 digit hexadecimal numbers and vice versa how to convert from binary to hexadecimal equivalents and vice versa check digits. Characters the use of binary codes to represent characters the term characterset the relationship between the number of bits per character in a character set and the number of characters which can be represented (for example ASCII, extended ASCII and Unicode). Images how an image is represented as a series of pixels represented in binary

metadata included in the file the effect of colour depth and resolution on the size of an image file. Sound how sound can be sampled and stored in digital form how sampling intervals and other factors affect the size of a sound file and the quality of its playback: sample size bit rate sampling frequency. Compression need for compression types of compression: lossy lossless.

1.6 System security End of year exam: 1.7 Systems software exam builder for GCSE Computer 2.3 Producing robust programs 2.4 Computational logic 2.5 Translators and facilities of languages Taken from OCR exam builder for GCSE Computer 2.6 Data representation 1.6 System security; 1.7 Systems software; 2.3 Producing robust programs; 2.4 Computational logic; 2.5 Translators and facilities of languages; 2.6 Data representation -