Curriculum Overview

 

Key Stage 3 Key Stage 4 Sixth Form

Term 1: Algorithms: Designing, creating, refining, searching and sorting.

In this unit students will learn what an algorithm is and be able to design and create algorithms to solve specific problems using sequence, selection and iteration. Students will learn how to express algorithms using flow diagrams and pseudocode, using suitable variables and arithmetic, relational and Boolean operators. They will also be able to analyse, assess and compare different algorithms for given scenarios. In this unit, students will learn what is meant by iteration and be able to explain the difference between definite and indefinite iteration. Students will learn about different types of loops (for while, do....until, nested) and how to use when designing algorithms and implement them into programs.

Students will sit a written End of Unit assessment and complete a programming challenge including a written report.

Von Neumann Architecture
The Von Neumann arch, is a design of computer system where there essentially three different entities, a processing unit, an i/o unit and an storage unit.

Accumulator
An accumulator is a register for short-term, intermediate storage of arithmetic and logic data in a computer's CPU (central processing unit). The term "accumulator" is rarely used in reference to contemporary CPUs, having been replaced around the turn of

Arithmetic
In mathematics, modular arithmetic is a system of arithmetic for integers, where numbers "wrap around" upon reaching a certain value—the modulus (plural moduli). The modern approach to modular arithmetic was developed by Carl Friedrich Gauss in his book D

Execute
To carry out a task

Cache
Disk caching works under the same principle as memory caching, but instead of using high-speed SRAM, a disk cache uses conventional main memory. The most recently accessed data from the disk (as well as adjacent sectors) is stored in a memory buffer.

CPU
A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions.

Embedded systems
An embedded system is some combination of computer hardware and software, either fixed in capability or programmable, that is specifically designed for a particular function. Industrial machines, automobiles, medical equipment, cameras, household applianc

Performance
The speed at which a computer operates, either theoretically (for example, using a formula for calculating Mtops - millions of theoretical instructions per second) or by counting operations or instructions performed (for example, ( MIPS ) - millions of in

  • Spiritual
  • Moral
  • Social
  • Cultural

Develop the individual:

Create a supportive community:

Term 2: Programming Fundamentals

In this unit, students will learn about common data types and be able to use the correct data type in algorithms and programs they have produced. Students will learn how to carry out various manipulations to data such as finding the length, slicing and concatenation. Students will be able to create and work with simple array data structures and two dimensional arrays. During the unit students will learn:

- The use of variables, constants, operators, inputs, outputs and assignments

- The use of the three basic programming constructs used to control the flow of a program: Sequence, Selection and Iteration (count- and condition- controlled loops)

- The common arithmetic operators

- The common Boolean operators AND, OR, NOT

Students will sit a written End of Unit assessment and complete a programming challenge including a written report.

Independently
Functioning alone, in isolation.

Magnetic Tapes
Magnetic tape is a medium for magnetic recording, made of a thin, magnetisable coating on a long, narrow strip of plastic film. It was developed in Germany, based on magnetic wire recording. Devices that record and play back audio and video using magnetic

Archiving
To copy files to a long-term storage medium for backup. Large computer systems often have two layers of backup, the first of which is a disk drive. Periodically, the computer operator will archive files on the disk to a second storage device, usually a ta

Reliability
Reliability is an attribute of any computer-related component (software, or hardware, or a network, for example) that consistently performs according to its specifications. It has long been considered one of three related attributes that must be considere

High Capacity
The ability to process speedily or store vast amounts of information.

Optical Discs
In computing and optical disc recording technologies, an optical disc (OD) is a flat, usually circular disc which encodes binary data (bits) in the form of pits (binary value of 0 or off, due to lack of reflection when read) and lands (binary value of 1 o

OP or OS
The operating system (OS) is the most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs and applications. Computer operating systems perform basic tasks, such as recognizing input

GUI
In computer science, a graphical user interface(GUI /ɡuːiː/), is a type of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, instead of text-based user interfaces

Mainframe
Mainframe computers(colloquially referred to as "big iron") are computers used primarily by large organisations for critical applications, bulk data processing such as census, industry and consumer statistics, enterprise resource planning, and transaction

Simultaneous Access
When two or more programs or people access the same information at the same time.

  • Spiritual
  • Moral
  • Social
  • Cultural

Develop the individual:

Create a supportive community:

Term 3: Producing robust programs and Boolean Logic

In this unit students will learn additional programming techniques including basic string manipulation and file handling operations. They will learn how to use sub programs (functions and procedures) to produce structured code as well as the use of arrays. this unit also includes defensive design, types of testing and how to refine algorithms. When learning about Boolean logic students will:

Create simple logic diagrams using the operations AND, OR and NOT

Produce Truth tables

Combine Boolean operators using AND, OR and NOT

Aapply logical operators in truth tables to solve problems

Students will sit a written End of Unit assessment and complete a programming challenge including a written report.

Encryption software
Encryption software is software that can encrypt and decrypt data, often in the form of files on a hard drive or packets sent over a network.

Defragmentation
Defragmentation is the process of locating the non-contiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.

Data Compression
The process of reducing the size of a data file is referred to as data compression. In the context of data transmission, it is called source coding (encoding done at the source of the data before it is stored or transmitted) in opposition to channel codin

NIC
Network Interface Card (NIC): Types, Function & Definition. To connect to a network, a computer uses a network interface card (NIC). A NIC controls the wired and wireless connections of a computer to exchange information with other computers and the Inter

WAN
Wide Area Network. A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs). Computers connected to a wide-area network are often connected through public networks, such as the

LAN
A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building and has its network equipment and interconnects locally managed.

Wireless
Wireless is a term used to describe telecommunications in which electromagnetic waves (rather than some form of wire) carry the signal over part or all of the communication path. Some monitoring devices, such as intrusion alarms, employ acoustic waves at

Router
A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.

Switch
A switch is used to network multiple computers together. Switches made for the consumer market are typically small, flat boxes with 4 to 8 Ethernet ports. These ports can connect to computers, cable or DSL modems, and other switches. High-end switches can

Network
A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link.

  • Spiritual
  • Moral
  • Social
  • Cultural

Develop the individual:

Create a supportive community:

Term 4: Programming languages and integrated development environments and system architecture

Students will learn about programming languages and integrated development environments as well as system architecture. Students will learn C# Programming Techniques, Python Programming Techniques. The unit will include the use of variables, constants, operators, inputs, outputs and assignments

The use of the three basic programming constructs used to control the flow of a program: Sequence, Selection and Iteration (count- and condition- controlled loops)

As well as the common arithmetic operators, the common Boolean operators AND, OR, NOT and will complete Coding Challenges in order to practice what they have learnt. Students will be taught the characteristics and purpose of different levels of programming language as well as the purpose of translators.

Students will sit a written End of Unit assessment.

DNS
Short for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses.

Virtual Network
Virtual network computing (VNC) is a type of remote-control software that makes it possible to control another computer over a network connection. Keystrokes and mouse clicks are transmitted from one computer to another, allowing technical support staff t

Hosting
A network host may offer information resources, services, and applications to users or other nodes on the network. A network host is a network node that is assigned a network layer host address. Computers participating in networks that use the Internet Pr

Encryption
The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ;e

Frequency
For an oscillating or varying current, frequency is the number of complete cycles per second in alternating current direction. The standard unit of frequency is the hertz, abbreviated Hz. If a current completes one cycle per second, then the frequency is

Ethernet
Ethernet, pronounced "E-thernet" (with a long "e"), is the standard way to connect computers on a network over a wired connection. It provides a simple interface and for connecting multiple devices, such computers, routers, and switches. With a single rou

Malware
Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system. In Spanish, "mal" is a prefix that means "bad," making the term "badware," which is a good way to remember it (even i

Phishing
Phishing is a form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels.

SQL
SQL or Structured Query Language is a special-purpose programming language designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS).

Secure systems
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they pro

  • Spiritual
  • Moral
  • Social
  • Cultural

Develop the individual:

Create a supportive community:

Term 5: Memory and Storage

In this unit there will be a focus on Primary and Secondary storage. Students will need to understand the need and purpose of primary storage and the difference between RAM and ROM as well as understanding virtual memory. Students will also learn about the need for secondary storage and units of data storage. They will also be taught the advantages and disadvantages of different storage devices and storage media relating to these characteristics:

o    Capacity

o    Speed

o    Portability

o    Durability

o    Reliability

o    Cost

Students will sit a written End of Unit assessment and complete a programming challenge including a written report.

Vulnerabilities
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capabi

Anti-malware Software
Antimalware (anti-malware) is a type of software program designed to prevent, detect and remediate malicious programming on individual computing devices and IT systems.

Penetration testing
Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.

Environmental issues
Problems related to the environment or people who live in the environment. Environmental studies incorporates more of the social sciences for understanding human relationships, perceptions and policies towards the environment. Environmental engineering fo

Legal Issues
Relating to the law, problems that may arise if the law can be broken.

Privacy
Keeping personal information private.

Cultural Implications
The results of actions on different cultures or races.

Open Source
Open-source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose.

Proprietary Software
Proprietary software is computer software for which the software's publisher or another person retains intellectual property rights—usually copyright of the source code, but sometimes patent rights.

Stakeholders
The definition of a stakeholder is a person who has an interest in or investment in something and who is impacted by and cares about how it turns out. Read more at http://www.yourdictionary.com/stakeholder#wb2eX9ggSlViv5Jw.99

  • Spiritual
  • Moral
  • Social
  • Cultural

Develop the individual:

Create a supportive community:

Term 6: Computer networks, connections, protocols and security.

In this unit students will learn about types of networks, factors that affect the performance of networks as well as the different roles of computers in a client-server and a peer-to-peer network. Students will develop their knowledge of networks and the Internet as a worldwide collection of computer networks. Students will learn about encryption, IP addressing the concept of layers of security as well as forms of attack and common prevention methods.

Students will sit a written End of Unit assessment.

Legislation
The law and acts passed in parliament that relate to a topic.

Computer Misuse Act
The Computer Misuse Act is designed to protect computer users against wilful attacks and theft of information. Offences under the act include hacking, unauthorised access to computer systems and purposefully spreading malicious and damaging software (malw

Data Protection Act
The Data Protection Act 1998 (DPA) is an Act of Parliament of the United Kingdom of Great Britain and Northern Ireland which defines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs the prote

Copyright Design and Patents Ac
The Copyright, Designs and Patents Act 1988, is the current UK copyright law. It gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used.

Creative Commons Licence
A Creative Commons (CC) license is one of several public copyright licenses that enable the free distribution of an otherwise copyrighted work. A CC license is used when an author wants to give people the right to share, use, and build upon a work that th

Freedom of Information Act
The Freedom of Information Act 2000 provides public access to information held by public authorities. It does this in two ways: public authorities are obliged to publish certain information about their activities; and. members of the public are entitled t

Binary
All computer data is represented using binary, a number system that uses 0s and 1s. Binary digits can be grouped together into bytes. There are two popular methods for converting binary to denary.

Denary
Converting a denary number into a binary number. Base 10 number system (denary) In our everyday lives we use a 'Denary' number system which has the number digits 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9. This is called a 'base-10' number system.

  • Spiritual
  • Moral
  • Social
  • Cultural

Develop the individual:

Create a supportive community: