0% found this document useful (0 votes)
16 views

Computer Science Paper 1 and 2 Lessons 1

Computer Science Paper 1 and 2 Lessons 1 revison

Uploaded by

desav05582
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Computer Science Paper 1 and 2 Lessons 1

Computer Science Paper 1 and 2 Lessons 1 revison

Uploaded by

desav05582
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 359

Skill needed: Recall

Class Starter: Recall is the ability to remember something that has


happened in the past or the act of remembering it.

1. What is a computer? British Value:


Individual Liberty:
You may choose the
questions you would
2. Write three parts that made up the CPU. like to answer.

3. Differentiate between the hardware and software.


4. Outline and explain factors that can affects the CPU
performance.
5. Evaluate the importance of the registers and how they are
used in the FDE cycle.
Cognition needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.

Revision Lesson
Mock Exam/GCSE is Coming
Title: Components of computer Systems
British Value: Mutual
respect- we treat others the
way we would like to be
treated
LO: Be able to understand the different components
of a computer systems and their functions.

Steps to success:

• I can identify the different components that made up the CPU.

• I can outline and explain the purpose of each registers.

• I can evaluate the different factors that affects the performance


of the CPU.
Start of Lesson (SOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


Objective: Be
know what is compare and explain the importance
able to
understand anything meant by and contrast the different of the CPU
the different about the hardware. between the parts that and how the
components computer. CPU and made up the main parts
of a computer the CU. CPU. work together
systems and to process data
their
functions.
and
communicate
with the user.
Complete Task in pairs British Value:
Individual Liberty:
You may choose the
Fish and Hook/Pre learning Task questions you would
like to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can I can I can outline IEvaluate


can evaluate
the the
Objective: Be
know explain compare and explainand
Compare the importance
importance ofof the
using
able to
understand the anything Explain
what is and
Outline and different
contrast parts CPU and how the
an embedded
different Listabout
three the meant by contrast
explain the that madethe
between up main
systemparts
over awork
what is
examples
components of computer. hardware. between the
purpose of thegeneral
CPU. together to
general purpose
meant by
a computer of general CPU and
general purpose software. data
process Outline
and
systems and purpose general two advantages of
purpose
the CU.
purpose software and communicate
their software. using the
an embedded
functions. software.
software. embedded with user.
systems. system.
Skill needed: Resourcefulness:
Start at your most
exploring a variety of creative
challenging question.
strategies to overcome challenges
Paper 1 Revision: Things you MUST know.
Components of a computer system
1. A computer is a machine that processes data.
2. The purpose of a computer is to take data, process it, then output it.
3. A computer system consists of hardware and software that work together to process data/complete tasks.
4. Hardware is the physical components of the computer: motherboard, keyboard, mouse.
5. Software are the programs or applications that a computer system runs: an OS, a word processor or video
game.
Embedded Systems are computers built into other devices, like dishwashers, microwaves and TVs.
Its purpose is to control the device and to allow a user to interact with it. Embedded systems tend to have one, or a limited
number of tasks that they can perform.
Embedded systems are usually easier to design, cheaper to produce and more efficient at their task than
general purpose systems.

Some Computer
Components
Paper 1 Revision: Things you MUST
know.
The Central Processing Unit/The Processor
The CPU is mega-important – it is the main component of a computer
The CPU is:
The brain of the computer.
Processes all of the data and instructions that make the system work
The processing power of the CPU depends on it clock speed, number of cores and cache size.
The CPU has three main parts:
 The control Unit (CU)
Other parts of the CPU are:
 The arithmetic Logic Unit (ALU)  Registers
 Buses
 The cache  Clocks
Paper 1 Revision: Things you MUST know.
The Central Processing Unit Components
 The Control Unit (CU)
 The CU is in overall control of the CPU. Its main job is to execute program instructions by following the Fetch-decode-execute cycle.
 It control the flow of data inside the CPU(register, ALU, cache) and outside the CPU (to main memory and input/output devices).

 The Arithmetic Logic Unit (ALU)


 The ALU does all the Calculations.
 It completes the simple addition, subtraction, multiplication and division.
 It performs logic operations such as AND, OR and NOT and binary shifts.
 It contains the accumulator- stores results of calculations in the ALU.

 The Cache
 Very fast memory in the CPU. It is slower than the registers(MAR, MDR, program counter and accumulator) but faster than RAM.
 It stores regularly used data so that the CPU can access it quickly the next time needed.
 It has very low capacity and are expensive compared to RAM and secondary storage.
 There are different levels of cache memory – L1, L2 and L3. L1 is quickest but has the lowest capacity, L2 is slower than L1 but can
Paper 1 Revision: Things you MUST know.
Clock -The CPU contains a clock which is used to coordinate all of the computer's components. The clock sends out
a regular electrical pulse which keeps in time all the components. The frequency of the pulses is known as the clock
speed. Clock speed is measured in hertz. The higher the frequency, the more instructions can be performed in any
given moment of time.

 Buses- A bus is a high-speed internal connection. Buses are used to send control signals and data between the processor
and other components.
Three types of bus are used:
• Address bus - carries memory addresses from the processor to other components such as primary memory and
input/output devices.
• Data bus - carries the actual data between the processor and other components.
• Control bus - carries control signals from the processor to other components. The control bus also carries the clock's
pulses.
What is the Von Neumann architecture?
Von Neumann architecture is the design upon which many general purpose computers are based.
The key elements of Von Neumann architecture are:

 data and instructions are both stored as binary digits


 data and instructions are both stored in primary memory
 instructions are fetched from memory one at a time and in order (serially)
 the processor decodes and executes an instruction, before cycling around to fetch the next
instruction
 the cycle continues until no more instructions are available
Paper 1 Revision: Things you MUST know.
The CPU contains various registers which temporarily hold tiny bits of data needed by the CPU.
They are super-quick to read/write to data to.

Accumulator- stores the


Current instruction Register results of calculation in the
(CIR)- holds the current ALU.
instruction to be executed.

Program counter (PC)- holds


The Memory Address any memory address of the
Register (MAR)- holds any instruction for each cycle.
memory address about the be
used by the CPU.
The Memory Data Register Memory- holds the program
(MDR)- holds the actual data instructions and the program
or instruction. This may have data.
been fetched from memory, or
be waiting to be written to
memory.
Paper 1 Revision: Things you MUST
know.
CPU follows the Fetch-Decode-Execute Cycle
Fetch Instruction:

1. Copy memory address from the program counter to


the MAR.
2. Copy the instruction stored in the MAR address to the
MDR.
3. Increment the program counter to point to the address
of the next instruction, ready for the next cycle.

Execute Instruction:
Decode Instructions:
The instruction is performed. This could be:
The instruction in the MDR is decoded by the CU. The
Load data from memory, write data to memory, do a
CU may then prepare for the next step. E.g. by loading
calculation, or logic operation, change in the PC or stops
values into the MAR or MDR.
the program.
Paper 1 Revision: Things you MUST
know.
Disadvantages of using quad core processors:
• they are more expensive to design and make
• use more power than single or dual core processors.
• instructions have to be split up to decide which core
will execute them and the results have to be merged
together again at the end, which slows the processor
down a little.
Main task British Value:
Individual Liberty:
You may choose the

Complete ONE of the following task questions you would like


to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I know one I can I can outline I can evaluate the
Objective: Be know thing, compare and different functions importance of flash
able to anything Example: I contrast of Random Access memory and outline
understand the about the can explain between Memory (RAM) ways how it is
Complete page
two main memory. Complete
whatpage
a 5 volatile
5 andand
6 on the different from flash
categories of Complete the
on thecomputer
worksheet non-worksheet
volatile Read Only Memory
chip-based worksheet (ROM).
on pages
whichmemory
consists is.
of memory.
which consists
memory and 5 and 6 past paper
past paper of past paper
their questions.
questions questions
functions.
Skill needed: Resourcefulness:
Start at your most exploring a variety of creative
challenging question. strategies to overcome challenges
Plenary
Create a concept map that will summarise
the main points from today’s lesson.

Skill needed: Recall


Recall is the ability to remember
something that has happened in the
past or the act of remembering it.
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


Objective: Be
know what is compare and explain the importance
able to
understand anything meant by and contrast the different of the CPU
the different about the hardware. between the parts that and how the
components computer. CPU and made up the main parts
of a computer the CU. CPU. work together
systems and to process data
their
functions.
and
communicate
with the user.
Skill needed: Reflectiveness:
thinking about what we are good
at and what we need to do to
improve to become better
learners

LO: be able to understand and explain the purpose of the CPU.


Cognition needed: Recall British Value:

Class Starter: Recall is the ability to remember something that has


happened in the past or the act of remembering it.
Individual
Liberty: You
may choose the
questions you
would like to
answer.
1. State two types of logic gates.

2. What is meant by a logic gate?

3. Explain the OR gates and its truth table.

4. Differentiate between the AND gate and the NOT gate.

5. Outline and explain the purpose of a truth table. Draw the truth

table for the AND, OR and NOT gate.


Cognition needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.

Revision Lesson

Mock Exam/GCSE is Coming


Memory British Value:
Mutual respect- we
Slide 12 - treat others the way
we would like to be
treated
LO: Be able to understand the different types of
memory used in the computer.
Steps to success:
I can differentiate between RAM and ROM.

 I can outline and explain the purpose of RAM in a computer


system.
I can evaluate the importance Virtual Memory Flash Memory.
Start of Lesson (SOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


Objective: Be
know what a compare different the importance
able to
understand anything computer and contrast functions of of flash
the different about memory is. between Random memory and
types of primary volatile and Access outline ways
memory used and non- Memory how it is
in the secondary volatile (RAM) different from
computer.
memory. memory. flash Read
Only Memory
(ROM).
Complete Task in British Value:
Individual Liberty:
pairs You may choose the
questions you would

Fish and Hook like to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I know one I can I can outline I can evaluate the
Objective: Be know thing, compare and different functions importance of flash
able to anything Example: I contrast of Random Access memory
Outline and Compare and Evaluate and
the outline
understand the about the can explain between Memory (RAM) ways how it is
two main Describe explainand
two contrast importance of
memory. what a volatile different from flash
categories ofDefine the what is
computer reason
non- why
volatile between flash memory.
Read Only Memory
chip-based term meant
memoryby is. memory.
virtual primary Explain how it
(ROM).
memory andmemory. primary memory are memory and works and why
their memory. used. secondary will it be needed
functions. storage. by the computer.
Start at your most Skill needed: Recall
Recall is the ability to remember something that has happened in
challenging question.
the past or the act of remembering it.
Paper 1 Revision: Things you MUST
know.
Memory
 Random Access Memory (RAM) is used as the main memory in a computer. It can be read and written to.
RAM in volatile.
 Read Only Memory is non-volatile memory. It can only be read, not written to.
Paper 1 Revision: Things you MUST
know.
• Virtual memory is secondary storage used as extra RAM.
• Flash memory is an electronic non-volatile computer memory storage medium
that can be electrically erased and reprogrammed.
Paper 1 Revision: Things you MUST
know.
Storage
Secondary storage is needed to store our files and programs when they are not in use. Secondary storage is long term, non-
volatile storage
These commonly fall into three categories: Optical, Magnetic and Solid State.
Paper 1 Revision: Things you MUST
know.
Secondary Storage
Characteristics of Secondary storage:
• Capacity
- how much data can it store?
• Speed
- how fast can it access the data?
• Portability
- how easy is it to move it from one place to another
• Durability
- how well does it last e.g. if it is dropped
• Reliability
- how consistently does it perform
• Cost
Paper 1 Revision: Things you MUST
know.
Secondary Storage- Comparison
Main task British Value:
Individual Liberty:
You may choose the

Complete ONE of the following task questions you would like


to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I know one I can I can outline I can evaluate the
Objective: Be know thing, compare and different functions importance of flash
able to anything Example: I contrast of Random Access memory and outline
understand the about the can explain between Memory (RAM) ways how it is
two main memory. what a volatile and different from flash
categories of computer non-Complete
volatile quiz Read Only Memory
chip-based Complete page 8 Complete quiz 2 on
memory is. memory.
1 on the (ROM).
memory and on the worksheet the worksheet.
worksheet.
their
functions.
Start at your most Skill needed: Recall
Recall is the ability to remember something that has happened in
challenging question.
the past or the act of remembering it.
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


Objective: Be
know what a compare different the importance
able to
understand anything computer and contrast functions of of flash
the different about memory is. between Random memory and
types of primary volatile and Access outline ways
memory used and non- Memory how it is
in the secondary volatile (RAM) different from
computer.
memory. memory. flash Read
Only Memory
(ROM).
LO: be able to understand and explain the purpose of the CPU.
Cognition needed: Recall
Class Starter: Recall is the ability to remember something that has
happened in the past or the act of remembering it.

1. What are two types of computer memory. British Value:


Individual Liberty:
You may choose the
2. Write two functions of RAM. questions you would
like to answer.

3. Differentiate between primary memory and secondary


storage.
4. Outline and explain the purpose of virtual memory.
5. Evaluate three characteristics that must be considered when
choosing a secondary storage device.
Cognition needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.

Revision Lesson

Mock Exam/GCSE is Coming


Types of networks British Value:
Mutual respect- we
Starts at Slide 25 treat others the way
we would like to be
treated
LO: Be able to understand the different types of networks and
how communication takes placed using wired and wireless
network.

Steps to success:
I can differentiate between wired and wireless network.

 I can outline and explain the purpose of the different types of


networks and network topologies.
I can evaluate the importance of the different hardware needed to
Start of Lesson (SOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


Objective: Be
know what is meant compare and explain the importance
able to
understand anything by a network. and contrast different of the different
the different about between functions a types of
types of networks. wired and client networks and
networks and wireless network. how
how networks. communication
communicatio
n takes placed
takes place
using wired using wired or
and wireless wireless
network. . connections.
Complete Task in British Value:
Individual Liberty:
pairs You may choose the
questions you would

Fish and Hook like to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can I can I can outline I can evaluate the


Objective: Be
know explain compare and explain importance of the
able to
understand the anything what is and
Outline and different
Compare and
different types of
different types about meant by a contrast
Describe explain two functions
contrast
a networks and
of networks Define the
networks. network. between
hardware client network. Draw a LAN
how
what is between the
and how term wired and
needed to network using the
communication
meant by twisted pair
communicatio network. wireless
connect to a necessary
takes devices.
place using
LAN. cable and the
n takes placed
using wired
networks.
network. coaxial cable. wired or wireless
and wireless connections.
Start at your most Skill needed: Recall
network. .
challenging question.
Recall is the ability to remember something that has happened in
the past or the act of remembering it.
Paper 1 Revision: Things you MUST
know.
Paper 1 Revision: Things you MUST
know.
Types of Networks:
• Local Area Network (LAN)- is a
network that is geographically confined
to one building or site. Examples:
schools, colleges, universities and in
homes.
• LANs are owned and maintained by the
organisation.
Paper 1 Revision: Things you MUST
know.
A wide area network (WAN) is a network that is
spread over a wide geographical area. It can cover
more than one site, or be spread across a country,
or even the world.

Organisations that have more than one office or


branch, such as banks, tend to use a WAN. The
WAN allows the head office to communicate and
share data with the sub-offices and branches.

The internet is essentially a huge, international


WAN.
Paper 1 Revision: Things A hub broadcasts messages to all devices
on the network. A switch sends the
you MUST know. message to the intended recipient only.
Hardware needed to connect to a network:
Network Interface Controller/card (NIC) is an internal piece of hardware that allows a
device to connect to a network. These are now built on the motherboard.
Switches connect devices on a LAN. Switches receive data in units called frames from one
device and transmit this data to the device on the network with the correct MAC address.
Routers are responsible for transmitting data between networks-they are always connected to
at least two different networks.
Routers have crucial role on the internet, directing data in units called packets to their
destinations.
Routers are used in homes and offices to connect the LAN to the internet.
Wireless Access Point (WAP)- allows wireless devices to be connected to a network.
Transmission Media - Transmission media carry data signals from one computer to another.
Media are either wired or wireless.
Paper 1 Revision: Things you MUST
know.
Transmission Media/Ethernet Cables
The most common Ethernet cables are CAT 5 and CAT 6. They are twisted pair cables,
containing four pairs of copper wires which are twisted together to reduce internal
interference. They are cheap compared to Fibre Optic cables.
Coaxial cables are made of a single copper wire surrounded by a plastic layer for
insulation and a metallic mesh which provides shielding from outside interference.
Fibre optic cables transmit data as light. They are high performance and therefore
expensive cables. They don’t suffer interference and can transmit over a very large
distance without loss of signal quality.
Paper 1 Revision: Things you MUST
know.
CAT 6 Cable Coaxial Cable

Twisted Pair

Fibre optic cable


Paper 1 Revision: Things you MUST
know.
Factors affecting the performance of a network
Bandwidth-the amount of data that can be transferred in a given time.
Too many users/heavy usages- may cause congestion and slow the
network.
Wired connection are generally faster and more reliable than
wireless.
Fibre optic cables can give better performance than copper cables.
The type of network topology used. (Ring, Bus, Star, mesh)
Paper 1 Revision: Things you MUST
know.
Wireless uses Radio Waves to transmit data.
1. Like mobile phones and TVs, wireless network use radio waves to
transmit data.
2. To set up a wireless network, you need a Wireless Access Point
(WAP) device. The WAP is basically a switch that allows devices to
connect wirelessly.
3. Don’t confuse WAP with hotspots-locations where you can connect
to a WAP.
Paper 1 Revision: Things you MUST
know.
Wi-Fi is the standard for wireless network. Wi-Fi uses to radio frequency bands-
2.4GHz and 5GHz.
These bands are split into numbered channels that each cover a small frequency
range. Note that the channels overlap.
Wi-Fi performance is affected by interference between network using adjacent
channels. To avoid problems, only certain channels that are spread apart are
used.
Paper 1 Revision: Things you MUST
know.
There are two main ways that networks can be organised (Client server Network and
Peer-to-Peer Network). One involves a server and the other does not.

A server is essentially a more powerful computer that manages a network and provide
services to the clients. Some of the functions of the server are:
 To share files
 Provide security
 Provide access to programs
 Backup files.
Paper 1 Revision: Things you MUST
know.
Client Server Networks.
• A client server network is managed by a server. These devices connected to the server are
clients.
• Files and folders are usually stored centrally on the server rather than on individual client
devices.
Advantages Disadvantages
Easier to keep track of files as they are stored Expensive to set up.
electronically.
Easier to perform back-up Servers dependences- if the server goes down all
clients lose access to their work.
Easier to install and update software. The server may become overload if too many
clients are accessing it all at once.
Easier to manage network security.
Servers are reliable and always on.
A school client-server
Bubble, merge and insertion sort
Unit 5 Algorithms
•file servers - hold and maintain user files
•applications servers - allow programs to be run over a
setup network
•web servers - hold and share web pages
•print servers - manage printing across a network
•mail servers - handle emails between users

Mail Web
File Print Application
Server Server
Server Server Server
Paper 1 Revision: Things you MUST
know.
Peer to Peer Network don’t use servers.
• In Peer-to-Peer (P2P) networks all devices are equal, connecting directly to each other without a
server.
• You store files on individual devices and share them with others.
• P2P network may use at home to share files between devices, or connect devices to a printer.
Advantages Disadvantages
Easy to maintain- you don’t need any expertise No central management- devices need their
or expensive hardware. updates and security installed.
No dependence on server- if one device fails the Copying files between devices causes duplicated
whole network isn’t lost. files. Lose track of where files are stored.
Peer machines are less reliable and data may be
lost or fail.
Machine are prone to slow down when other devices
access them
Main task British Value:
Individual Liberty:
You may choose the

Complete ONE of the following task questions you would like


to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I know one I can I can outline I can evaluate the
Objective: Be know thing, compare and different functions importance of flash
able to anything Example: I contrast of Random Access memory and outline
understand the about the can explain between Memory (RAM) ways how it is
two main memory. what a volatile and different from flash
categories of computer non-Complete
volatile quiz Read Only Memory
chip-based Complete page 8 Complete quiz 2 on
memory is. memory.
1 on the (ROM).
memory and on the worksheet the worksheet.
worksheet.
their
functions.
Start at your most Skill needed: Recall
Recall is the ability to remember something that has happened in
challenging question.
the past or the act of remembering it.
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


Objective: Be
know what is meant compare and explain the importance
able to
understand anything by a network. and contrast different of the different
the different about between functions a types of
types of networks. wired and client networks and
networks and wireless network. how
how networks. communication
communicatio
n takes placed
takes place
using wired using wired or
and wireless wireless
network. . connections.
LO: be able to understand and explain the purpose of the CPU.
Cognition needed: Recall
Class Starter: Recall is the ability to remember something that has
happened in the past or the act of remembering it.
British
Value:
1. What are two types of networks? Individual
Liberty: You
may choose
the questions
2. Explain two hardware needed to connect to a LAN. you would
like to
answer.

3. Differentiate between a client server network and a peer- to-


peer network.
4. Outline and explain the purpose of a server.
5. Evaluate three advantages and three disadvantages of using a
client server network over a peer- to-peer network.
Cognition needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.

Revision Lesson

Mock Exam/GCSE is Coming


Network- The internet British Value:
Mutual respect- we
Starts at Slide 52 treat others the way
we would like to be
treated
LO: Be able to understand how the internet works and the
different protocols that allows communication over the internet
to be effective.

Steps to success:
I can differentiate the internet and the WWW.

 I can outline and explain the purposes of using a virtual network.

I can evaluate the importance of The Cloud and provide


advantages and disadvantages of using The Cloud.
Start of Lesson (SOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


Objective: Be
know what is meant compare and explain the importance
able to
understand anything by the and contrast the purpose of virtual
how the about the internet. between the of The Cloud. network and its
internet works internet internet and Explain two functions when
and the the WWW. advantages communicating
different and two over the
protocols that
allows
disadvantages Internet.
communicatio of using The
n over the Cloud.
internet to be
effective.
Complete Task in British Value:
Individual Liberty:
pairs You may choose the
questions you would

Fish and Hook like to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can I can I can outline I can evaluate the


Objective: Be
know explain compare and explain importance of the
able to
understand the anything what is and different
Compare and
different types of
about meant by a Outline and
contrast functions a networks and
Write an example
different types Describe contrast
Define the
networks.what
network. explain the
between client network. of a DNS. Label
how
of networks Virtual
term is purpose of the different parts
and how wired and memory and communication
meant by hosting on that makes
communicatio internet
WWW.
wireless
the internet. virtual takes placeupusing
a
n takes placed DNS.
using wired
networks. network. wired or wireless
and wireless connections.
Start at your most Skill needed: Recall
network. .
challenging question.
Recall is the ability to remember something that has happened in
the past or the act of remembering it.
Paper 1 Revision: Things you MUST know.
1. The internet is a worldwide collection of computer networks:
DNS, Hosting, The Cloud, Web servers and Clients.
The Internet is a network of networks. It’s a WAN which connects devices and networks
from all over the world. It is based around the protocol TCP/IP.
The World Wide Web (www) is a collection of websites that are hosted on web servers and
accessed through the HTTP protocol.
Hosting is the storing of files and data on a web server. The web server is
referred to as a host.
URLs are addresses used to access web servers and resources on them.
Domain Name Server (DNS) translates a website’s domain name into its IP address.
Paper 1 Revision: Things you MUST
know.
The internet largely works on the client-server model. For example:
• web servers store and maintain web content, which is downloaded
upon request to client computers
• mail servers handle web-based email
• media servers allow clients to stream music and videos
Paper 1 Revision: Things you MUST
know.
The cloud is a generic term for remotely accessed storage. This storage is accessed
through the internet. Users do not actually know where their data is stored .
Advantages of using Cloud storage:
the ability to access files from any location or any device, so long as an internet
connection exists
similarly, access can be granted to another user so they can remotely access your data
reduced need to make backups - cloud storage services back up the data for you
Disadvantages to using the cloud:
there is no guarantee that someone else is not accessing your data
there is no guarantee that your data is being backed-up
access to data is only possible with an internet connection - no connection means no
access to data
Paper 1 Revision: Things you MUST
know.
A virtual network is a network that can securely connect geographically unrelated computers
via the internet.

Virtual networks form their connections through the internet. Virtual network servers create a
network that has no direct physical connection, but one that allows file sharing and
communication.
Paper 1 Revision: Things you MUST
know.
IP addresses- unique 32 or 128-bit identifiers given to devices when they access a network. E.g.
37.153.62.136 (This is in denary)
MAC addresses – unique 48 or 64 bit identifiers given to network devices by the manufacturer.
Example: 00-B0-D0-63-C2-26
IP address and the format of an IP addressing (IPv4 and IPv6)
IPv4- 69.89.31.226

The above IP-address is in the dotted decimal number format. An IP address is in


the format of 4 sets of decimal numbers separated by dots. The decimal number in
each and every set is in the range 0 to 255. Each and every set is called octet. So,
there are 4 octets in an IP address.
Paper 1 Revision: Things you MUST
know.
An IPv6 (Normal) address has the following format: y : y : y : y : y : y : y : y where y is called
a segment and can be any hexadecimal value between 0 and FFFF. The segments are
separated by colons - not periods
Main task British Value:
Individual Liberty:
You may choose the

Complete ONE of the following task questions you would like


to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I know one I can I can outline I can evaluate the
Objective: Be know thing, compare and different functions importance of flash
able to anything Example: I contrast of Random Access memory and outline
understand the about the can explain between Memory (RAM) ways how it is
two main memory. what a volatile and different from flash
categories of computer non-Complete
volatile quiz Read Only Memory
chip-based Complete page 8 Complete quiz 2 on
memory is. memory.
1 on the (ROM).
memory and on the worksheet the worksheet.
worksheet.
their
functions. Skill needed: Resilience:
believing in ourselves and viewing challenges as opportunities
Start at your most
for better learning.
challenging question.
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


Objective: Be
know what is meant compare and explain the importance
able to
understand anything by the and contrast the purpose of virtual
how the about the internet. between the of The Cloud. network and its
internet works internet internet and Explain two functions when
and the the WWW. advantages communicating
different and two over the
protocols that
allows
disadvantages Internet.
communicatio of using The
n over the Cloud.
internet to be
effective.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners

LO: be able to understand and explain the purpose of the CPU.


Cognition needed: Recall
Class Starter: Recall is the ability to remember something that has
happened in the past or the act of remembering it.
British
Value:
1. What is hosting? Individual
Liberty: You
may choose
the questions
2. Explain two servers that the internet works on. you would
like to
answer.

3. Differentiate between an IPv4 and an IPv6.


4. Outline and explain the purpose of a URL.
5. Evaluate the importance of network topologies and why are
they needed in a network.
Cognition needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.

Revision Lesson

Mock Exam/GCSE is Coming


Topologies, Protocols and LayerBritish Value:
Starts at Slide 66 Mutual respect- we
treat others the way
we would like to be
treated
LO: Be able to understand the importance of encryption over the
internet and the different types of encryption.

Steps to success:
I can explain the term encryption.

I can outline and explain two types of topologies.

I can evaluate the importance of protocols and how they are


used in communication over the internet.
Start of Lesson (SOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


Objective: Be
know what is meant compare and explain the importance
able to
understand anything by and contrast the purpose of packet
the about encryption. between the of protocols switching and
importance of encryption star and how each how data
encryption . topology protocol are packets are sent
over the and the used in over the
internet and
the different
mesh communicati internet.
types of topology. ng the
encryption. internet.
Complete Task in British Value:
Individual Liberty:
pairs You may choose the
questions you would

Fish and Hook like to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can I can I can outline I can evaluate the


Objective: Be
know explain compare and explain importance of the
able to
understand the anything what is and
Outline and different different
Outline and
types of
different types about meant by a contrast
explain three functions
Compareaand networks and
explain three
of networks Define the
networks.Describe
network. between
types of contrast
client a star
network. how
types of protocols
and how term two types of wired and
protocols topology and communication
that are used
communicatio encryption. encryption. wireless
and their a mesh takes place using
when sending and
n takes placed topology.
using wired
networks.
functions. wired or email.
receiving wireless
and wireless connections.
Start at your most Skill needed: Recall
network. .
challenging question.
Recall is the ability to remember something that has happened in
the past or the act of remembering it.
Paper 1 Revision: Things you MUST
know.
Paper 1 Revision: Things you MUST
know.
• Encryption is the process of disguising a message so that it cannot be
understood by anyone but its intended recipient. Encryption requires
the use of a key. The key is secret as to how the message has been
disguised.
Common types of encryptions
Paper 1 Revision: Things you MUST
know.
A network topology the physical layout of a
network.
Any device connected to a network is referred to as
a node. All nodes are connected to the network either by
wire or wirelessly.
STAR TOPOLOGY
Star topologies are used in many networks, large and
small.
In a star topology all nodes indirectly connect to each
other through one or more switches/hub. The
switch/hub acts as a central point through which all
communications are passed.
Paper 1 Revision: Things you MUST
know.
Advantages of the Star Topology:
• new nodes can be added to the network simply by connecting them to the
switch.
• star networks tend to have higher performance as a message is passed on to its
intended recipient only.
Disadvantages of the Star Topology:
• the whole network fails if the switch fails as no node can communicate.
• a wired star topology requires plenty of cable - in a large network this can be
expensive.
Paper 1 Revision: Things you MUST
know.
MESH TOPOLOGY
In a mesh topology there is no central
connection point. Instead, each node is
connected to at least one other node and
usually to more than one.

Organisations that uses Mesh Topology


Military organisations often use mesh topologies to
avoid breakdowns in communication.
Emergency services, such as police and fire services,
also use wireless mesh networks to ensure that
communication is reliable
Paper 1 Revision: Things you MUST
know.
Advantages of the Mesh Topology:
• messages can be received more quickly if the route to the intended recipient is
short
• messages should always get through as they have many possible routes on
which to travel
• multiple connections mean (in theory) that no node should be isolated
Disadvantages of the Mesh Topology:
• full mesh networks can be impractical to set up because of the high number of
connections needed
• many connections require a lot of maintenance
Paper 1 Revision: Things you MUST know.
• A protocol is a set of rules that governs transmission of data.
Many other protocols exist. Some of the more common protocols are:
• TCP/IP - Transmission Control Protocol/Internet Protocol - enables communication over the
internet.
• HTTP and HTTPS - Hypertext Transfer Protocol - governs communication between a
webserver and a client. HTTPS (secure) includes secure encryption to allow transactions to be
made over the internet.
• FTP - File Transfer Protocol - governs the transmission of files across a network and the
internet.
• SMTP - Simple Mail Transfer Protocol – sends and transfer emails between servers.
• POP - Post Office Protocol retrieved emails from a server. Servers deletes the email after you
download it.
• Instant Messaging Access Protocol (IMAP)- Retrieves emails from a server. Servers holds it
until you delete it.
Main task British Value:
Individual Liberty:
You may choose the

Complete ONE of the following task questions you would like


to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I know one I can I can outline I can evaluate the
Objective: Be know thing, compare and different functions importance of flash
able to anything Example: I contrast of Random Access memory and outline
understand the about the can explain between Memory (RAM) ways how it is
two main memory. what a volatile and different from flash
categories of computer non-Complete
volatile quiz Read Only Memory
chip-based Complete page 8 Complete quiz 2 on
memory is. memory.
1 on the (ROM).
memory and on the worksheet the worksheet.
worksheet.
their
functions. Skill needed: Resilience:
believing in ourselves and viewing challenges as opportunities
Start at your most
for better learning.
challenging question.
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


Objective: Be
know what is meant compare and explain the importance
able to
understand anything by and contrast the purpose of packet
the about encryption. between the of protocols switching and
importance of encryption star and how each how data
encryption . topology protocol are packets are sent
over the and the used in over the
internet and
the different
mesh communicati internet.
types of topology. ng the
encryption. internet.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners

LO: be able to understand and explain the purpose of the CPU.


Cognition needed: Recall
Class Starter: Recall is the ability to remember something that has
happened in the past or the act of remembering it.

1. What is a mesh topology? British Value:


Individual Liberty: You
may choose the

2. Explain two types of topologies. questions you would like


to answer.

3. Differentiate between a mesh topology and a start topology.


4. Outline and explain the purpose of protocols.
5. Evaluate the importance of the IMAP and the SMTP
protocols.
6. Extension: Explain the purpose of the POP3 protocol.
Cognition needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.

Revision Lesson

Mock Exam/GCSE is Coming


Topologies, Protocols and LayerBritish Value:
Starts at Slide 82 Mutual respect- we
treat others the way
we would like to be
LO: Be able to understand the steps in send packets across the
internet and the different layers involved.

Steps to success:
I can explain the term packet switching.

I can outline and explain the steps involved in send packets across
the Internet.
I can evaluate the importance of layers and how they are used in
Start of Lesson (SOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


Objective: Be
know what is meant compare and explain the importance
able to
understand anything by packet and contrast the purposes of packet
the steps in about switching. between of the switching and
send packets packet packet different how data
across the switching. switching types of packets are sent
internet and and layers. layers. over the
the different
layers
internet using
involved the different
types of layers.
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
like to answer.
Fish and Hook/Pre-Learning Task.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can I can I can outline I can evaluate the


Objective: Be
know explain compare and explain the importance of
able to
understand the anything what is and purposes of the
Compare and
packet switching
Outline and
steps in send about Describemeanttheby contrast different
contrast
types and
Writehow data
the steps
Define the
packet purpose
packet explain the
between ofbetween
layers. packets
packets across of four aspects involved are
in sent
term layers,
the internet in
switching. switching. packet over thepackets
internet
packet of the TCP layers and sending
and the networking. switching using
switching. layer model. packet across the
a network.
different
layers
and layers. switching. different types of
involved layers.
Start at your most Skill needed: Recall
Recall is the ability to remember something that has happened in
challenging question.
the past or the act of remembering it.
Careers Section: Culture Curriculum: Learning about the
different jobs available within the career
area of Computer Science.

1. Name one computer programmer?

2. Outline and explain one role of a computer programmer.

3. Evaluate the history of Python and who was the first to


programmed using Python.

Cognition needed: Resourcefulness


Resourcefulness the ability to find quick
and clever ways to overcome difficulties
What are layers?
Layers are a group of protocols with similar functions.
Standards are the set of rules for data communication that are needed for
exchange of information among devices.
Layering allows standards to be put in place and simply adapted as new
hardware and software is developed.
Example: different software packages (applications) may use the same
transport, network and link layers but have their own application layer.
The way the program encodes the message changes - the rest of communication
method remains the same.
Did you know that Ethernet is a
protocol?
 Ethernet is a protocol.
 It is within the TCP/IP model.
 It governs the connection of devices.
 Governs the transmission of data between devices.
 Uses cables to transmit data between devices in a LAN.
There are four layers TCP/IP model to
be considered:
Layer Name Task Examples of
Protocol in Layer
4. Application HTTP, FTP, SMTP
encodes/decodes the message in a form that is understood by the sender

A 3. Transport
and the recipient.

breaks down the message into small chunks (packets). Each packet is
TCP

T
given a packet number and the total number of packets. The recipient
uses this information to assemble the packets together in the correct
order. It also allows the recipient to see if there are any missing packets.

N 2. Network adds the sender’s IP address and that of the recipient. The network then
knows where to send the message, and where it came from.
IP

D 1. Data Link enables the transfer of packets between nodes on a network, and between
one network and another.
Ethernet
Benefits of using Layers
 Self – contained which allows them to function without affecting
the other layers.
 They can be changed without affecting the other layers.
 It allows network communication to be broken down into
manageable pieces.
 Having set rules(protocols) ensures that companies make
compatible hardware and software.
What is packet switching?
Packet switching is where messages are broken up into very small pieces, called
packets.
Each packet consists of three parts:
header - this includes the sender's and recipient's IP addresses, the packet number,
the total number of packets the message contains, plus the details of
any protocols used
payload - this is part of the actual message itself.
Footer – This checks for error. Example, ensures the correct number of packets
merges. Otherwise, a request is sent to the server for the resending of the packet. .

The packets are sent individually across the network and put back
together to reform the message at the other end.
Summary on Packet switching
https://www.bbc.co.uk/bitesize/guides/zr3yb82/revision/7
Main task British Value:
Individual Liberty:
You may choose the

Complete ONE of the following task questions you would like


to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can I can I can outline I can evaluate the


Objective: Be
know explain compare and explain the importance of
able to
understand the anything what past
Complete is and Complete past
purposes Complete
of the packet switching
past paper
steps in send about papermeant by
Questions contrastpaper different types
Questionsandpage
how 32data
packets across packet packet
page 32- Questions page
between of layers. and 33- packets
“Network are sent
the internet switching. switching.
“Network 33- Network-
packet Protocols andthe
over Theinternet
and the the Internet Internet”
Protocols” switching using the
different
layers
and layers. different types of
Skill needed: Resilience:
layers.
involved believing in ourselves and viewing challenges as opportunities
Start at your most
challenging question. for better learning.
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


Objective: Be
know what is meant compare and explain the importance
able to
understand anything by packet and contrast the purposes of packet
the steps in about switching. between of the switching and
send packets packet packet different how data
across the switching. switching types of packets are sent
internet and and layers. layers. over the
the different
layers
internet using
involved the different
types of layers.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners

LO: be able to understand and explain the purpose of the CPU.


Cognition needed: Recall
Class Starter: Recall is the ability to remember something that has
happened in the past or the act of remembering it.

1. What is packet switching? British Value:


Individual Liberty: You
may choose the
2. Explain two layers in the TCP/IP model. questions you would like
to answer.

3. Differentiate between the Data link layer and Application layer.


4. Outline and explain the purpose of layers.
5. Evaluate the importance layers and outline how they worked
together with protocols to allow communication over the Internet.
6. Extension Task: Outline and explain three form of network attacks.
Cognition needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.

Revision Lesson

Mock Exam/GCSE is Coming


Network Security British Value:
Starts at Slide 97 Mutual respect- we
treat others the way
we would like to be
LO: Be able to understand the different forms of attacks and how
these attacks can be prevented.

Steps to success:
I can explain the term malware.

I can outline and explain the different types of network attacks.

I can evaluate the importance of protecting your networks and


ways how networks can be protected from different form of
Start of Lesson (SOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


Objective: Be
know what is meant compare and explain the importance
able to
understand anything by network and contrast different of using the
the different about attacks. between preventions internet safely
forms of network network and that can be and identify
attacks and attacks. attacks and used to ways to protect
how these network protect a a network from
attacks can be
prevented.
threats network from attacks and
attacks and threats.
threats.
SQL statements

S
Sub-topics you have mastered in the core curriculum..

I
Sub-topics you need to improve on in order to move on to the
next aspect of the core curriculum.

R
Answer the question(s) from the I aspect of your SIR.

Skill needed: Resilience: Skill needed: Resourcefulness:


believing in ourselves and viewing challenges as exploring a variety of creative
opportunities for better learning. strategies to overcome challenges
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
like to answer.
Fish and Hook/Pre-Learning Task.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can I can I can outline I can evaluate the


Objective: Be
know explain compare and explain importance of
able to
understand the anything what is and different
Compare and
using
Outlinethe andinternet
different forms about Describe
meantthe
by contrast preventions
contrast
that safely
explainand two types
Define networkdifferent Complete of network
of attacks and the network between can be
network used to identify ways to
your threats. Explain
how these attacks. forms
term “network of
attacks. network protect
attacks a and protect a network
attack”.
attacks can be network Assessment. measures that can
and attacks networknetwork from from attacks and
prevented. attacks. be used to prevent
and attacks
threats. and threats.
these threats.
network threats.
Skill needed: Recall
Start at your most threats Recall is the ability to remember something that has happened in
challenging question.
the past or the act of remembering it.
Careers Section: Culture Curriculum: Learning about the
different jobs available within the career
area of Computer Science.

1. Who is a data analyst?

2. Outline and explain one role of a data analyst.

3. Describe how data used to be stored and analyse before the


development of technology.

Cognition needed: Resourcefulness


Resourcefulness the ability to find quick
and clever ways to overcome difficulties
What is a network attack?
A network attack is an attempt to gain access to, steal, modify or delete data on a
network.
Such attacks take several forms:
• Active - where the hacker attempts to modify or delete data, or to prevent a
network from operating correctly. Example: Denial Of Service (DOS) attack
• Eavesdropping (passive) - where the hacker monitors a network in order to gain
information. An example of this is wiretapping, where communications are
monitored.
• External - where someone outside of an organisation attempts to hack its
network.
• Internal - where someone within an organisation attempts to hack its network.
What are network Threats?
Network threats are unlawful or malicious activities that intend to take advantage
of network vulnerabilities.
These threats are:
malware
phishing
brute force
denial of service
data interception and theft
structured query language injection
poor network policy
people
What are malwares?
Malware is
malicious software that
is designed to hack a
system. Malware can
take many different
forms.
Malware threat Description

Programs embedded (hidden) within other files. They replicate themselves and become part
Viruses
of other programs. Viruses often cause damage by deleting or modifying data.

Programs similar to viruses except that they are not hidden within other files. Worms often
Worms
spread through emails.

Programs which pretend to be legitimate but in reality are malware. They are often
Trojans disguised as email attachments. Trojans cannot spread by themselves - instead they deceive
a user into installing the program.

Programs that monitor user activities (such as websites visited, usernames and passwords
Spyware
used) and send the information back to a hacker.

Programs that attempt to blackmail a user into making a payment to a hacker. Some types
Ransomware of ransomware do little but try to scare users into paying, while others go further - they
Other threats Description
Emails that try to trick users into giving away personal details. The phishing email pretends to be a genuine
message and tries to deceive the user into following a link to a website that looks like the real company, for
Phishing
example, a bank. However, it is a fake website designed to catch data such as bank account numbers and
security codes.

Where a program is used to find a password by trying all possible combinations of characters until the
Brute force
correct one is obtained.

Where a computer (or many computers) is used to prevent a server from performing its tasks. This is done by
Denial of service (DOS) bombarding the server over and over again with requests. Eventually the server is tied up trying to handle all
the DOS requests, making it very difficult for it to respond to legitimate requests.

Where data is intercepted during transmission. This is done using software called a packet sniffer, which
Data interception and theft examines data packets as they are sent around a network, or across the internet. The information gathered is
sent back to a hacker.

Structured query language (SQL) Where SQL code is entered as a data input. Many databases use SQL code to interrogate the data and
injection maintain the structure. SQL code can be inputted as data, which can cause errors or unintended operations.

Poor network policy Where a network does not have security rules in place for users to follow.

Where users do not adhere to network policy. People frequently ignore rules, or accidentally or deliberately
break them. For example, many users choose easy to guess passwords, or send and receive personal emails
People
which may contain viruses. This behaviour increases the chances of a network being compromised and its
data being accessed by unauthorised users. This is sometimes called social engineering.
Identifying and preventing vulnerabilities
Main task British Value:
Individual Liberty:
You may choose the

Complete ONE of the following task questions you would like


to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can I can I can outline I can evaluate the


Objective: Be
know explain compare and explain the importance of
able to
understand the anything what is and purposes of the packet switching
steps in send about meant by contrast different types and how data
packets across packet packet between
Complete quiz of layers. packets are sent
the internet Complete page 8 Complete quiz 2the
on internet
switching. switching. packet
1 on the over
and the on the worksheet the worksheet.
switching
worksheet. using the
different
layers
and layers. different types of
Skill needed: Resilience:
involved layers.
believing in ourselves and viewing challenges as opportunities
Start at your most
for better learning.
challenging question.
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


Objective: Be
know what is meant compare and explain the importance
able to
understand anything by network and contrast different of using the
the different about attacks. between preventions internet safely
forms of network network and that can be and identify
attacks and attacks. attacks and used to ways to protect
how these network protect a a network from
attacks can be
prevented.
threats network from attacks and
attacks and threats.
threats.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners

LO: be able to understand and explain the purpose of the CPU.


Cognition needed: Recall British Value:

Class Starter: Recall is the ability to remember something that has


happened in the past or the act of remembering it.
Individual
Liberty: You
may choose the
questions you

1. What is cyberbullying? would like to


answer.

2. Explain what is an internet troll.


3. Outline and explain two reasons why cyberbullying and
trolling have become so common.
4. Describe three examples of how technology and the Internet
have shaped our culture.
5. Does new technology affects social well-being? Explain
your answer.
Extension Task: Outline and explain the computer legislation.
Cognition needed: Recall
Class Starter: Recall is the ability to remember something that has
happened in the past or the act of remembering it.

1. What is network attack? British Value:


Individual Liberty: You
may choose the
2. Explain two types of network attacks. questions you would like
to answer.

3. Differentiate between the internal and the external attacks.


4. Outline and explain the purpose antiviruses.
5. Evaluate the importance of doing penetration testing on your
network.
6. Extension Task: Outline and explain three features of the OS.
Cognition needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.

Revision Lesson

Mock Exam/GCSE is Coming British Value:


Mutual
System Software respect- we
treat others the
Starts at Slide 111 way we would
like to be
treated
LO: Be able to understand the different types of system software
and their functionalities.

Steps to success:
I can explain the term system software.

I can outline and explain the different functions of the OS.

I can evaluate the importance of system software and how they


are used to improve the efficiency of our devices.
Start of Lesson (SOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


Objective: Be
know what is meant compare and explain the importance
able to
understand anything by system and contrast different of utility
the different about software. system functions of software and
types of system software the OS. how they
system software and helped in
software and application improving the
their
functionalities
software. overall
. performance of
our devices.
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
like to answer.
Fish and Hook/Pre-Learning Task.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can I can I can outline I can evaluate the


Objective: Be
know explain compare and explain importance of
able to Compare and different
understand the anything what is and utility software
contrast
different types about Describe
meanttwo
by contrast functions
Outline
of the
and
and
Writehow they
the names
Define the
system types
system between
system OS. of two types
helped in of
of system of explain three
softwareterm
and “system system utilities software
softwaresystem
software. software improving the
their software” software and functions of and explain their
software. and
application the OS. overall
functionalities. functions.
application
software. performance of
software. our devices.
Start at your most Skill needed: Recall
Recall is the ability to remember something that has happened in
challenging question.
the past or the act of remembering it.
What is System Software?
Systems software is software that governs the computer system.
It:
controls the hardware, including any peripherals.
allows other programs (applications) to run.
provides an interface for the user to interact with the computer
maintains the system
There are two kinds of systems software to consider:
operating systems- Controls the hardware and software/ provides a user
interface.
Utilities software- help to maintain the computer.
Types of Software
What is the operation system?
An operating system is a collection of programs that manages and controls the
computer’s hardware and software. Operating systems have many functions:
controlling hardware components
providing a platform for software to run on
providing a user interface
multitasking facilities
managing the computer's memory
managing peripherals
managing files
managing users
What is a user Interface?
A user interface is a program, or suite of programs that allows a user to
interact with a computer.
There are three types of interface to be considered:
graphical user interface (GUI) - sometimes known as WIMP (Windows, Icons,
Menus, Pointers) interface.
mobile user interface (Mobile UI)
command line interface (CLI)
 A graphical user interface is familiar to most users of PCs
and laptops. GUIs feature a desktop where everything is
displayed. They are powerful and easy to use, but requires a
lot of processing power.

 Mobile UIs are similar in many ways to GUIs, except that they
respond to touch. Fingers are used to open programs and interact
with them. Gestures such as swiping are used to scroll within
documents. Pinching and stretching are used to re-size images.
Mobile UIs are found on smartphones and tablets.

 Command line interfaces are text-based. Users control the


computer by typing in commands. CLIs require little processing
power and are extremely powerful, but are difficult to use.
Example command prompt app in Windows, and Terminal in OS X.
Names Functions
Multitasking Multitasking means to be able to run more than one program simultaneously.
Multitasking is possible only if:
the operating system can support multitasking and
the computer has enough memory to hold more than one program in primary memory
at the same time.

Memory management
Allocates memory to applications- can run more than one piece of software at a time.
Removes data no longer needed- Frees up space for other programs.
Moves data between RAM and virtual memory- allows more programs to run
File Management/handling
File handling and file maintenance is one of the most important tasks of an operating system. The
file handling software allows users to:
• create, modify and delete files and folders
• copy and duplicate files and folders
• move files and folders
• rename files and folders
• sort items into different orders, according to name, file type, date created and more
• search for particular files and folders
• restore deleted files
User Management Operating systems also manage users.
They allow:
• individual users to be created and deleted
• access levels to be given to users, such as administrator
rights or standard user rights
• auditing (keeping a log) of files a user creates, accesses,
edits and deletes

Peripheral management and drivers Peripherals are hardware devices connected to a computer,
such as a monitor, printer, scanner or camera.

To operate a peripheral, the operating system uses a program


called a device driver.
Device drivers contain instructions on how to control a
device.
Each connected device has its own driver.
Using device drivers brings two advantages:
• any device can be used with the operating system, as long
as a driver is available for it
• drivers can be updated, usually to give better performance
or to remove a bug
Utility programs
Cognition needed: Resilience:

Class Activity believing in ourselves and viewing


challenges as opportunities for better
learning.

Steps to Not sure​ One idea​ Multiple Linking Applying


success​ ideas​ ideas​ ideas​
Learning I don’t know I can explain I can I can outlineTitle:
I can Elonopen
Musk
Objective: Be
anything
Title: Bill Gates what is compare
Title: and and explain
Mark Zuckerberg 1. Whoand write
is Elon Musk?at
able to
1. Who isabout
Bill Gates? meant by1. Whocontrast different2. Explain
is Mark Zuckerberg? leastwhatthree
is meant
understand the
2. What is Bill Gates famous for? by SpaceX.
Python. Python. 2. When did Mark the
between Zuckerberg
features of lines of
history3.andOutline
the and explain how Bill learnt how to code? 3. Describe how Elon
purpose ofGates started his computing interactive
3. Describe what leads to the
the IDE. codes
Musk careerin
started.
Python. . journey. mode
launch and
of Facebook. Python.
4. Outline and explain
4. Outline the net worth of Bill thetwo
4. Outline script
famous quotes three famous quotes
Gates. from Mark Zuckerberg from Elon Musk.
5. Identify three facts/quotes from mode in
5. What is the net worth for 5. What is the net worth
Bill Gates. MarkPython.
Zuckerberg? for Elon Musk?
Cognition needed: Resourcefulness
Resourcefulness the ability to find quick and clever ways to overcome difficulties
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


Objective: Be
know what is meant compare and explain the importance
able to
understand anything by network and contrast different of using the
the different about attacks. between preventions internet safely
forms of network network and that can be and identify
attacks and attacks. attacks and used to ways to protect
how these network protect a a network from
attacks can be
prevented.
threats network from attacks and
attacks and threats.
threats.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners

LO: be able to understand and explain the purpose of the CPU.


Cognition needed: Recall British Value:

Class Starter: Recall is the ability to remember something that has


happened in the past or the act of remembering it.
Individual
Liberty: You
may choose the
questions you

1. What is cyberbullying? would like to


answer.

2. Explain what is an internet troll.


3. Outline and explain two reasons why cyberbullying and
trolling have become so common.
4. Describe three examples of how technology and the Internet
have shaped our culture.
5. Does new technology affects social well-being? Explain
your answer.
Extension Task: Outline and explain the computer legislation.
Cognition needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.

Revision Lesson
British
Value:
Mutual
Mock Exam/GCSE is Coming respect-
we treat
Ethical, legal, cultural and environmental issues. others the
way we
Starts at Slide 128 would
like to be
treated
LO: Be able to understand different ethical, legal,
environmental and cultural issues that take places daily.

Steps to success:
I can differentiate between ethics and laws.

I can describe the benefit of stakeholders in an organization along with their


roles and responsibilities.
I can explain factors that affects digital division.

I can analyse the different social and cultural issues that are faced on a daily
Start of Lesson (SOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t know I can explain the I can outline I can compare I can evaluate the
Objective: Be anything different and explain the and contrast different cultural
able to ethics and between ethics different between open and environmental
understand laws. and laws computer source software issues that are
different legislations. and proprietary faced on a daily
ethical, legal, software. basis.
environmental
and cultural
issues that
take places
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
like to answer.
Fish and Hook/Pre-Learning Task.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t know I can explain I can outline and I can compare and I can evaluate the
Objective: Be anything the different explain the contrast between open different cultural and
able to ethics and Explain
between ethics different source software and environmental issues
Outline and Compare and Evaluate two
understand laws. different roles
and laws computer
explain the proprietary software. that are faced on a daily
List three contrast open cultural and
different ethical, and legislations.
Data basis.
examples of source and environmental
legal, responsibilities Protection
ethical issues? proprietary issues that are
of a Act 2018.
environmental software. faced daily.
stakeholder.
and cultural
issuesStart
that take
at your most Skill needed: Recall
Recall is the ability to remember something that has happened in
challenging question.
places daily. the past or the act of remembering it.
What is Proprietary Software?
What is Open Software?
Benefits of having open and proprietary
software
Data Protection Act 2018
Key principles in the Data Protection Act 1998 and 2018
Data Protection Act 1998 Data Protection Act 2018
Personal data must be fairly and lawfully processed Personal data must be fairly and lawfully processed
Personal data must be obtained for specified, explicit and legitimate
Personal data must be obtained for specified and lawful purposes
purposes

Personal data must be adequate, relevant and not excessive Personal data must be adequate, relevant and not excessive

Personal data must be accurate and up to date Personal data must be accurate and up to date
Personal data must not be kept for longer than is necessary Personal data must not be kept for longer than is necessary

Personal data must be processed in line with your rights Personal data must be handled in a way that ensures security

Personal data must be held securely

Personal data must not be transferred to other countries outside the


European Economic Area
Data Legislations
Cognition needed: Recall British Value:

Class Starter: Recall is the ability to remember something that has


happened in the past or the act of remembering it.
Individual
Liberty: You
may choose the
questions you

1. What is meant by an ethical issue? would like to


answer.

2. Explain how the use of technology can contribute to health


problems.
3. Outline and explain benefits and drawbacks of internet
censorships.
4. Describe three ways how E-waste had impacted our
environment.
5. More and more automation is being introduced into the workplace
such as in retail or manufacturing. Evaluate the ethical,
environmental and cultural impacts of this.
Cognition needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.

Revision Lesson
British
Value:
Mutual
Mock Exam/GCSE is Coming respect-
we treat
Ethical, legal, cultural and environmental issues. others the
way we
Starts at Slide 140 would
like to be
treated
LO: Be able to understand different ethical, legal,
environmental and cultural issues that take places daily.

Steps to success:
I can differentiate between ethics and laws.

I can describe the benefit of stakeholders in an organization along with their


roles and responsibilities.
I can explain factors that affects digital division.

I can analyse the different social and cultural issues that are faced on a daily
Start of Lesson (SOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t know I can explain the I can outline I can compare I can evaluate the
Objective: Be anything different and explain the and contrast different cultural
able to ethics and between ethics different between open and environmental
understand laws. and laws computer source software issues that are
different legislations. and proprietary faced on a daily
ethical, legal, software. basis.
environmental
and cultural
issues that
take places
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
like to answer.
Fish and Hook/Pre-Learning Task.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t know I can explain I can outline and I can compare and I can evaluate the
Objective: Be anything the different explain the contrast between open different cultural and
able to ethics and Explain
between ethics different source software and environmental issues
Outline and Compare and Evaluate two
understand laws. different roles
and laws computer
explain the proprietary software. that are faced on a daily
List three contrast open cultural and
different ethical, and legislations.
Data basis.
examples of source and environmental
legal, responsibilities Protection
ethical issues? proprietary issues that are
of a Act 2018.
environmental software. faced daily.
stakeholder.
and cultural
issuesStart
that take
at your most Skill needed: Recall
Recall is the ability to remember something that has happened in
challenging question.
places daily. the past or the act of remembering it.
British Value: Culture Curriculum: Learning about the
Careers Section: Individual Liberty: You
may choose the questions
different jobs available within the career
area of Computer Science.
you would like to answer.

1. Explain two devices that can be used in by search team when looking for missing
people or animal.
2. Outline and explain the effects of using technology when doing searches of
missing people and animals.
3. Evaluate the benefits of technology and how it contributes to the field of
investigations.

Cognition needed: Resourcefulness


Resourcefulness the ability to find quick
and clever ways to overcome difficulties
Who is a stakeholder?
A stakeholder is an individual or a group of people who have
an interest in an organisation.
Ethical issues
Cultural issues
Environmental issues
Privacy issues
Guided Question 8 Marks

Past paper question (Sample)


People often want to buy the most up-to-date smartphones, even though the
smartphone they
own still works.
Discuss the impact of people wanting to upgrade to the latest smartphone.
In your answer, you might consider the impact on:
 smartphone users
Skill needed: Resilience:
 cultural issues believing in ourselves and viewing challenges as opportunities
for better learning.
 ethical issues
 environmental issues. Skill needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.
Task 2 8 Marks

Past paper question 2022


Social networking websites use artificial intelligence (AI) to monitor
posts from users. Discuss the positive and negative uses of AI by social
networking websites including:
• Legal issues
• Ethical issues
• Privacy issues Skill needed: Resilience:
believing in ourselves and viewing challenges as opportunities
for better learning.

Skill needed: Recall


Recall is the ability to remember something that has
happened in the past or the act of remembering it.
Task 1 8 Marks

Past paper question 2018


A small island has 100 people living on it. The island has just been connected to
the Internet, after previously having no Internet or mobile phone signal.
Discuss the impact on the island’s inhabitants and businesses of getting access to
the Internet.
In your answer you might consider the impact on:
• inhabitants
Skill needed: Resilience:
• businesses believing in ourselves and viewing challenges as opportunities
for better learning.
• ethical issues
• privacy issues Skill needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.
Task 3 8 Marks

Past paper question 2022


A school asks its students to bring in their own electronic devices (e.g.,
tablets, laptops, mobile phones) to use in lessons instead of purchasing
new equipment.
Discuss the issues surrounding students bringing their own devices.
Include in your discussion:
• ethical issues Skill needed: Resilience:
• legal issues believing in ourselves and viewing challenges as opportunities
for better learning.
• privacy issues.
Skill needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t know I can explain the I can outline and I can compare and I can evaluate the
Objective: Be anything ethics different between explain the contrast between different cultural and
able to and laws. ethics and laws different open source environmental issues
understand computer software and that are faced on a
different ethical, legislations. proprietary daily basis.
legal, software.
environmental
and cultural
issues that take
places daily.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners

LO: be able to understand and explain the purpose of the CPU.


Cognition needed: Recall British Value:

Class Starter: Recall is the ability to remember something that has


happened in the past or the act of remembering it.
Individual
Liberty: You
may choose the
questions you
would like to
answer.
1. State the bit true colour for a black and white image.

2. What is meant by a bitmap.

3. Explain how an image is stored in a computer.

4. Differentiate between resolution and colour depth.

5. Convert the file size of an image with a resolution of 25000 and a

colour depth of 24.


Cognition needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.

Revision Lesson
British
Value:
Mutual
GCSE is Coming respect-
we treat
Character Set, Images, Sound and compression others the
way we
Starts at Slide 147 would
like to be
treated
LO: Be able to understand the different character sets and how
data is convert from ASCII to binary.

Steps to success:

• I can differentiate between analogue and digital sounds.

• I can explain the different types of character sets.

• I can calculate the file size of an audio and an image file.


Start of Lesson (SOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Lesson I don’t I can list two I can explain I can compare I can calculate the
objective: be know types of sounds the different and contrast size of an audio
able to anything character sets. between bit rate file using the bit
explain and about a and colour rate and time.
calculate how sounds depth.
sound is
stored in the
computer.
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
Fish and Hook/Pre-Learning Task. like to answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Lesson I don’t I can list I can explain I can compare I can calculate the
objective: be know two types the different and contrast size of an audio file
able to anything of soundscharacter between bit rate using the the
Outline bit rate
Differentiate Compare and formula
explain and about a sets. and colour depth. and time. used to:
List three types between contrast  Calculate the
calculate how sounds Explain the ASCII and
of character between file size of an
term metadata. extended
sound is set. colour depth image file
ASCII. and bit rate.  file size of an
stored in the
audio file.
computer. Skill needed: Recall
Start at your most
Recall is the ability to remember something that has happened in
challenging question.
the past or the act of remembering it.
GCSE Preparation
 Personalised Learning Checklist (PLC)
 Revision Guides and websites (OCR BBC Bitesize, GCSEPOD, links on PLC and revision guide
textbooks)
 Grade Boundaries (know your targets and the minimum points that you are aiming for.)

Skill needed: Resourcefulness


Resourcefulness is the ability to use the resources available(Google,
classmates) to assist in gathering solutions for your problems.
British Value: Culture Curriculum: Learning about the
Careers Section: Individual Liberty: You
may choose the questions
different jobs available within the career
area of Computer Science.
you would like to answer.

1. Explain two devices that can be used in by search team when looking for missing
people or animal.
2. Outline and explain the effects of using technology when doing searches of
missing people and animals.
3. Evaluate the benefits of technology and how it contributes to the field of
investigations.

Cognition needed: Resourcefulness


Resourcefulness the ability to find quick
and clever ways to overcome difficulties
Paper 1 Revision: Things you MUST
know.
Tables for converting

Converting from base 2 Converting from base 2


Converting from base 16 to
to base 10 and vice to base 16 and vice
base 10 and vice versa.
versa. versa.

256 16 1 8 4 2 1
128 64 32 16 8 4 2 1
Paper 1 Revision: Things you MUST
know.
Character Sets
Computers work in binary. As a result, all characters, whether they are
letters, punctuation or digits are stored as binary numbers. All of the
characters that a computer can use are called a character set.
Three examples of character sets are:
 American Standard Code for Information Interchange (ASCII)
 Extended ASCII
 Unicode
Paper 1 Revision: Things you MUST
know.
Character Sets
ASCII uses seven bits, giving a character set of 128 characters.
Extended ASCII
• Extended ASCII uses eight bits, giving a character set of 256 characters. This
allows for special characters such as those with accents in languages such as
French and Spanish.
Unicode
• Unicode uses 16 bits, giving a range of over 65,000 characters. 256 characters is
far too small to hold every character in other languages, such as Chinese or
Arabic
Images
Pixel  A pixel(Short for picture element) is one specific colour.
 Each pixel is stored as a binary value.
Colour depth  The number of bits used for each pixel determines how many colours we can use.
 The more bit per pixel the greater the colour depth and more bits we need to store the image.
 2 raised to the number of bits determines the amount of possible colours.

Resolution  The resolution is the concentration of pixels, usually measure in dots per inch(DPI). The more
pixel the better the resolution but the file size will be larger.

Metadata  Data about data. Extra information stored about the image. Metadata includes: Width, height,
colour depth, file size, data, time etc.

The effect of colour depth and resolution on the size of Calculating the size of an image file:
an image file.
 A larger colour depth and resolution = higher quality
Size = resolution x colour depth (in bits)
+ larger file size.
• A smaller colour depth and resolution = lower quality
To get the number of bytes divide your answer by 8.
image + smaller file size.
Example of Calculating an image file size.
Example - an image of height 200, width 400, colour depth 16 bits
200 × 400 = 80,000
80,000 × 16 = 1,280,000 bits
1,280,000 bits ÷ 8 = 160,000 bytes
160,000 ÷ 1000 = 160 kilobytes
• Result: 160KB
An analogue-to-digital converter will capture a sound wave at

Sounds regular time intervals. This recording is known as a sample.


Bit depth refers to the number of bits used to record each Bit depth refers to the number of bits used to
sample. Just as with images, the higher the bit depth, the record each sample. Bit rate is a measure of how
more accurately a sound can be recorded, but the larger much data is processed for each second of sound.
the file size. Typical bit depths are 16 bit and 24 bit.
Compressions
• Lossy compression, some data is removed and discarded, thereby reducing the
overall amount of data and the size of the file.
Example of Lossy Compression:
• the JPEG file format works on this principle, which is why JPEG files tend to be
smaller in size
• the MPEG file format compresses audio and video, making it more suitable for
streaming media
• MP3 is a lossy format for audio, including music
Compressions
• Lossless compression, files are reduced in size without the loss of data.
However, lossless compression does not usually achieve the same file size
reduction as lossy compression.
Example of Lossy Compression:
• PDF allows lossless compression of text documents
• GIF is a lossless image file format
Main task British Value:
Individual Liberty:
You may choose the

Complete ONE of the following task questions you would like


to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Lesson I don’t I can list I can explain I can compare I can calculate the
objective: be know two types the different and contrast size of an audio file
able to anything of sounds character between bit rate using the bit rate
explain and about a sets.Complete quiz
and colour depth. and time.
Complete page 8 Complete quiz 2 on
calculate how soundson the worksheet 1 on the the worksheet.
worksheet.
sound is
Skill needed: Resilience:
stored in the
believing in ourselves and viewing challenges as opportunities
Start at your most
computer.
challenging question.
for better learning.
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Lesson I don’t I can list two I can explain I can compare I can calculate
objective: be know types of sounds the different and contrast the size of an
able to anything character sets. between bit audio file using
explain and about a rate and colour the bit rate and
calculate how sounds depth. time.
sound is
stored in the
computer.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners

LO: be able to understand and explain the purpose of the CPU.


Skill needed: Recall
Class Starter Recall is the ability to remember something that has
happened in the past or the act of remembering it.
1. Explain how an analogue sound wave is converted into a binary sample. [2]​

2. What is a sample rate? [2]​

3. Explain two ways an audio file will be affected if the sample rate is increased.
[4]​

4. Explain what is meant by bit depth? [2]​

5. Explain two ways an audio file will be affected if the bit depth is increased.
[4]
Cognition needed: Recall British Value:

Class Starter: Recall is the ability to remember something that has


happened in the past or the act of remembering it.
Individual
Liberty: You
may choose the
questions you
would like to
answer.
1. State two programming data types.

2. What is meant by a algorithmic thinking.

3. Explain the steps to do a linear search.

4. Differentiate between decomposition and abstraction.

5. Calculate the value of 2^3 and 19 MOD 4.


Cognition needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.

Revision Lesson
British
Value:
Mutual
Mock Exam/GCSE is Coming respect-
Computational thinking & Algorithm Production we treat
others the
Starts at Slide 164 way we
would
like to be
treated
LO: Be able to understand how to produce algorithms using
pseudocode and flowcharts.

Steps to success:

• I can differentiate between a variable and a constant.

• I can use the three program constructs in an algorithm and show


the flow in a program.

• I can interpret, correct and complete algorithms and programs.


Start of Lesson (SOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success

Lesson I don’t know I can list the I can explain I can draw and I can evaluate the
objective:
anything about three the different explain the principles of
Be able to
computational computational between a different computational
understand
how to thinking thinking flowchart and flowchart thinking.
produce principles. a pseudocode. symbols.
algorithms
using
pseudocode
and
flowcharts.
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
Fish and Hook/Pre-Learning Task. like to answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Lesson I don’t I can list I can explain I can compare I can evaluate the
objective: Be
know the three the different and contrast principles of
able to
anything program data types between IF-else computational
understand how
Compare and
to produce about constructs.
Explain the used in statements and Write an
thinking.
List the three Outline three contrast algorithm using a
algorithms using programmi computational programmin CASE
features of an statements.
between an
computational flowchart and a
thinking pseudocode and
pseudocodeprinciples.
and ng g. algorithm. pseudocode.
principles. a flowchart.
flowcharts.
techniques.

Start at your most Skill needed: Recall


Recall is the ability to remember something that has happened in
challenging question.
the past or the act of remembering it.
Culture Curriculum: Learning about the
Careers Section: different jobs available within the career
area of Computer Science.

1. List three ways how computer science helps in the retail


sector.
2. Outline and explain how life was before these new inventions from
technology.

Cognition needed: Resourcefulness


Resourcefulness the ability to find quick
and clever ways to overcome difficulties
Principles of Programming techniques
Computational thinking - involves the examining, understanding, formulating
and solving of problems.
Computational thinking principles:
Decomposition - involves breaking down a complex problem or system into
smaller parts that are more manageable and easier to understand.
Abstraction- is the process of filtering out - essentially ignoring - the
characteristics of problems that are not needed in order to concentrate on
those that are needed.
Algorithmic Thinking- Coming up with a series of logical steps to get from
a problem to a solution.
Pattern Recognition: Looking for trends and/or patterns in a problem.
Algorithms
 Algorithm is a set of instructions for solving a problem.
Algorithms are normally written as one of the following:
pseudocode
a flow diagram
 Pseudocode is a simple way of writing algorithm without using a specific
programming language.
There are no exact rules, but good pseudocode will be:
Readable and easy to interpret.
Not too vague.
Structured like a piece of code.
Easy to convert into any language.
Features of Algorithms:
1. What are the inputs into the problem?
2. What will be the outputs of the problem?
3. In what order do instructions need to be carried
out?
4. What decisions need to be made in the problem?
5. Are any areas of the problem repeated?
Pseudocode/OCR Reference language
Question 1:
Example: This simple pseudocode
algorithm asks a user to input what their Design an algorithm
favourite subject is:
(pseudocode/OCR reference
language) that allows user to enter
the day of the week. If the day
entered falls between Monday –
Friday, print the day entered
otherwise, print it is weekend.
Flowchart
A flow diagram is a diagram
that shows an overview of
a program. Flow diagrams
normally use standard symbols
to represent the different types
of instruction.
Flowchart

Example: This simple flow diagram


maps out an algorithm for a program
that prints the numbers 1 to 10.

Task 1: Design a flowchart to


calculate the perimeter and the area of
a rectangle.
Advantages of a binary search Disadvantages of a binary search

Binary Search 


Efficient at searching a large list
List is sorted
It is quicker on a smaller list.
• List must be sorted.

1. Find the middle item for n items. Do (n +1)/2


2. If this is the item you want stop search
3. If not, compare the two item. If the item you want comes after the middle
item, cur the 1st half of the list. Otherwise cut the 2nd half.
4. Repeat steps 1-3 on the half of the list you’re left with until you find the
item you want or run out of item.

Question: find the item 52 for the list below:


a. 10, 15, 25, 33, 52, 78, 88
b. Use a binary search to find the number 32 in this list: 4, 7, 13, 18, 28, 32,
35
Advantages of a linear Disadvantages of a linear

Linear Search
search search

 Simple  Inefficient at searching


 Works on unordered lists large lists.
1. Look at the first item in the list.
2. If this is the item you want, then stop the search.
3. If not, look at the next item along in the list.
4. Repeat steps 2-3 until you find your item or you reach the end of the list.

Question: find the item 52 for the list below:


a. 15, 10, 25, 78, 22, 52
b. Use the a linear search to find the number 32 in this list: 4, 7, 13, 32, 35,
18, 28
Advantages of a bubble & Insertion Disadvantages of a bubble &

Insertion sort search


 Simple and easy to implement.
Insertion search
 Inefficient at large large lists.
 Quick to check if a list is already
1. Look at the second item in the list. sorted.

2. Compare it to all items before it


and insert the item into the right
place.
3. Repeat step 2 for each remaining
item until the last item in the list
has been inserted in the correct
place.

• A is the array that we want to sort with insertion


Example: Use an insertion sort to sort
order these numbers from smallest to • n is the length of the array,
largest: 6, 2, 7, 3, 1, 4 • key is the current element (temporary variable to
store current element).
• i is the variable that holds the index of the
element before the current element gets sorted.
Bubble Sort

The purpose of temp in the algorithm


is used to swap between the two
arrays. Temp is used to temporarily
hold a value.
Advantages of a merge sort Disadvantages of a merge sort

Merge sort 
.
Efficient on large list. 

Slower on small lists
Goes through the whole process even if
the list is sorted.
 Uses more memory to create sub-lists.

1. Split the list into two sub-lists- start the second sub-list at the middle item.
2. Repeat step 1 on each sub-list until all sub-list only contain one item.
3. Merge pairs of sub-lists back together. Each time you merge two sub-lists,
sort the items into the right order.
4. Repeat step 3 until you’ve merged all the sub-lists together.

Example: Use a merge sort to order these numbers from smallest to largest: 9,
4 , 1, 5, 3, 6, 8, 7
b. Use an insertion sort to order these numbers from largest to smallest: 9, 4 , 1,
5, 3, 6, 8, 7
https://www.bbc.co.uk/bitesize/guides/zjdkw6f/revision/5
Main Task:
Design a pseudocode and a flowchart for each of the following
questions.
A program needs to perform the following tasks:
• Input two numbers from the user.
• Compare both numbers and output the largest number.
A program needs to perform the following task:
• Input a number from the user.
• Double the number input and print the result.
• Repeat bullets 1 and 2 until the user enters a number less than 0.
The area of a circle is calculated using the formula where is equal to 3.142 and r is the
radius.
Design an algorithm that allows a user to enter the radius of a circle as a whole number
between 1 and 30, the calculate and output the area of the circle.
Num1 = input(“enter first number”)
Num2 = input (“Enter second number)
If nun1 > num2
4 marks
print (num1)
else
print (num2)
endif

while number >= 0


5 marks
number = input()
output(number * 2)
radius = input("Enter radius")
if radius < 1 OR radius > 30 then
print("Sorry, that radius is invalid")
else 5 marks
area = 3.142 * (radius ^ 2)
print (area)
endif
End of Lesson (EOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success

Lesson I don’t know I can list the I can explain I can draw and I can evaluate the
objective:
anything about three the different explain the principles of
Be able to
computational computational between a different computational
understand
how to thinking thinking flowchart and flowchart thinking.
produce principles. a pseudocode. symbols.
algorithms
using
pseudocode
and
flowcharts.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Cognition needed: Recall British Value:

Class Starter: Recall is the ability to remember something that has


happened in the past or the act of remembering it.
Individual
Liberty: You
may choose the
questions you
would like to
answer.
1. State two arithmetic operators.

2. What is meant by comparison operators.

3. Explain what is meant by casting in programming.

4. Differentiate between casting and concatenation in programming.

5. Evaluate the importance of string manipulation and explain two of

its features.
Cognition needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.

Revision Lesson
British
Value:
Mutual
GCSE is Coming respect-
we treat
Programming Fundamentals others the
way we
Slide: 188 would
like to be
treated
LO: Be able to understand how to produce algorithms using
pseudocode and flowcharts.

Steps to success:

• I can use variables, constants, operators, input, outputs and


assignment.

• I can write algorithms/python code using the three basic


programming constructs.

• I can interpret, correct and complete algorithms and programs.


Start of Lesson (SOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success

Lesson I don’t know I can list the I can I can outline I can write
objective:
anything about three program differentiate and explain the programs using
Be able to
programming constructs. between a basic file 1Dimensional
understand
how to fundamentals. variable and handling and a
produce constant. procedure. 2Dimensional
algorithms array
using
pseudocode
and
flowcharts.
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
Fish and Hook/Pre-Learning Task. like to answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Lesson I don’t I can list I can I can outline and I can write
objective: Be
know the three differentiate explain the basic
programs using
able to
anything program between a file Outline
handlingand 1. Evaluate the
1Dimensional and a
understand how importance of
about Explain the Write and
constructs. variable explain the
three procedure. 2Dimensional array
to produce List and using array.
difference features of syntax for
explainprogrammi
algorithms using the constant. 2. Differentiate
between a string open, write,
three program between a 1D
pseudocode and ng variable and a manipulation. read and close a
constructs. and a 2D
flowcharts. constant. text file.
fundament array.
als. Skill needed: Recall
Start at your most
Recall is the ability to remember something that has happened in
challenging question.
the past or the act of remembering it.
Culture Curriculum: Learning about the
Careers Section: different jobs available within the career
area of Computer Science.

1. Who is Ada Lovelace?


2. Outline and explain how Ada contributed to Computer
Science.
3. Name the sector that you would like to contribute to.

Cognition needed: Resourcefulness


Resourcefulness the ability to find quick
and clever ways to overcome difficulties
Variable and Constant
 A variable is a named memory location which stores a value. The value stored in
this space can be used and change while the program is running. There is usually
no value set when declared.
Example:
f_name = str(input(“Enter your First Name”))

A Constant is a named memory location which stores a value that will not change
in the program. Its value is set when declared.
Example:
f_name == “Mary”:
Data Types and Operators
Program Constructs
Sequence is the order in which instructions occur and are processed. Selection determines which
path a program takes when it is running.
https://www.bbc.co.uk/bitesize/guides/znh6pbk/revision/2
Identify the error:
average = number1/number2
number1 = int(input("Enter the first number: “))
number2 = int(input("Enter the second number: "))
print("The average is ", average)

This version has the instructions in the correct sequence:


number1 = int(input("Enter the first number: “))
number2 = int(input("Enter the second number: "))
average = number1/number2
Program Constructs

• Selection is the process of making a decision. The result of the decision decides which path
the program will take next.

In programming, selection is implemented using if, elif and else statements:


https://www.bbc.co.uk/bitesize/guides/znh6pbk/revision/3
age = int(input("How old are you? ")

if age > 16 then

print("You are old enough to drive a car!")

else

print("Come back when you are older!")

endif
Program Constructs

• Selection is the process of making a decision. The result of the decision decides
which path the program will take next.
Program Constructs

• Iteration is also often referred to as looping, since the program ‘loops’ back to an
earlier line of code. Sections of codes that are iterated are called loops.

• Count-controlled iteration/For loop repeatedly executes a section of code a fixed


number of predetermined times. It uses the statements for or next to determine what
code is repeatedly executed and how many times.
words= ("Coding is cool")
for i in range (6):
for count = 1 to 6 print (words)

print(“Coding is cool”)
https://www.bbc.co.uk/bitesize/guides/znh6pbk/revision/4
Program Constructs

Condition-controlled iteration repeatedly executes a section of code until a


condition is met - or no longer met. There are two types of condition-controlled
iteration:

• while loops - uses the statements while and endwhile

• repeat loops - uses the statements repeat/do and until


Program Constructs
WHILE loop (Condition-controlled) – while and endwhile
while answer != "Correct" print("Coding is cool")
count = 6
answer = input("New answer") while count > 0:
print (count)
endwhile count = count - 1
print ("Well Done")

Will loop until the user inputs the string “Correct”. Check condition is carried out before entering loop.
do
mark = int(input("Mark Entry"))
answer = input("New answer")
while not (0 <= mark <= 100):
until answer == "Correct“ print ("mark is invalid")
mark = int(input("Mark Entry")) # this allows user to re-enter
the mark.

Will loop until the user inputs the string “Correct”. Loop iterates once before a check is carried out.
Summary
Summary
Main task British Value:
Individual Liberty:
You may choose the

Complete ONE of the following task questions you would like


to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Lesson I don’t I can list I can I can outline and I can write
objective: Be
know the three differentiate explain the basic programs using
able to
anything program between a file handling 1Dimensional and a
understand how
about constructs. variable and procedure.Complete page 56
2Dimensional array
to produce Complete page 49 Complete page and 57 on the
and
algorithms using programmi 50 on the 51 and 52 on
constant. worksheet
worksheet the worksheet
pseudocode and ng .
flowcharts. Skill needed: Resilience:
fundament
believing in ourselves and viewing challenges as opportunities
Start at your most
als.
challenging question.
for better learning.
End of Lesson (EOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success

Lesson I don’t know I can list the I can I can outline I can write
objective:
anything about three program differentiate and explain the programs using
Be able to
programming constructs. between a basic file 1Dimensional
understand
how to fundamentals. variable and handling and a
produce constant. procedure. 2Dimensional
algorithms array
using
pseudocode
and
flowcharts.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners

LO: be able to understand and explain the purpose of the CPU.


Skill needed: Recall
Class Starter Recall is the ability to remember
something that has happened in the
past or the act of remembering it.

1. Name three features of string manipulation. British


Value:
Individual
2. Explain what is meant by string concatenation. Liberty:
You may
choose the

3. Describe what is meant by program constructs. questions


you would
like to
Explain the three types of program constructs. answer.

4. Write a python code using string manipulation and


include any TWO of its features
LO: Understand the importance of the different file handling features
and how to create 1D and 2D arrays.

Steps to Success:
I can identify the three string features.
I can open, read, write and close a text file.
I can create at least two types of arrays.
Start of Lesson (SOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Learning I don’t know I can list the I can I can outline I can write
Objective:
anything about three features differentiate and explain the programs using
Understand
the string of string read and write purpose of an 1Dimensional
importance manipulation. manipulation. in relation to array and a
of the a text file. 2Dimensional
different file
array
handling
features and
how to
create 1D
and 2D
arrays.
Complete Task in pairs British Value: Individual
Liberty: You may choose the
questions you would like to
Fish and Hook/Pre learning answer.
Task

Steps to Not sure One idea Multiple Linking ideas Applying ideas
Success ideas
Learning I don’t I can list I can I can outline and I can write
Objective:
know the three differentiate explain the and
Outline programs using
Understand the Write a python
importance of anything features of read and
Differentiate purpose of an
explain the 1Dimensional andthe
code to check a
about Explain
string the between
write in difference
upperarray user’s age. array
2Dimensional If they
the different file
What is meant purpose of a string and between string are under 9, ask
handling byfeatures
an string? string manipulatio relation to a
string. lower string. concatenation them to multiply
and how to and string their age by 7 and
manipulati n. text file.
create
Skill 1D and
needed: Recall slicing. check the answer.
on.
Recall is the ability to remember
2D arrays.
something that has happened in the
past or the act of remembering it.
Culture Curriculum: Learning about the
Careers Section: different jobs available within the career
area of Computer Science.

1. Who is Charles Babbage?


2. Outline and explain how Charles contributed to Computer
Science.
3. Name the sector that you would like to contribute to.

Cognition needed: Resourcefulness


Resourcefulness the ability to find quick
and clever ways to overcome difficulties
String Manipulation

A string is a variable that holds a sequence of one or more alphanumeric


characters.
Casting is changing from one data type to another.
Example: str(“3”) to int (3)

Concatenation is joining two or more strings together.


word1 = "Hello" Strings are usually written in double
quotes ( “ ”). Use the + operators to
word2 = "World" concatenate (join) strings.
final_word = a + " " + b
print(c)
Strings are indexed from 0:
Manipulating/Slicing Strings 0 1 2
M a g
3 4
i c

Functions Returns Example : (s = “Magic”) Results


Upper Upper case s.upper MAGIC
Lower Lower case s.lower magic
Length No. of characters s.lengths 5
Left (n) First n characters s.left(3) Mag
Right (n) Last n characters s.right(2) ic
Substring(a,b) String starting at index a, s.Substring(1,3) agi
length b
In python:
name = "Vanilla Carr"
print (name.upper())
Main task British Value:
Individual Liberty:
You may choose the

Complete ONE of the following task questions you would like


to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Lesson I don’t I can list I can I can outline and I can write
objective: Be
know the three differentiate explain the basic programs using
able to
anything program between a file handling 1Dimensional and a
understand how
about constructs. variable and procedure.Complete page 56
2Dimensional array
to produce Complete page 49 Complete page and 57 on the
and
algorithms using programmi 50 on the 51 and 52 on
constant. worksheet
worksheet the worksheet
pseudocode and ng .
flowcharts. Skill needed: Resilience:
fundament
believing in ourselves and viewing challenges as opportunities
Start at your most
als.
challenging question.
for better learning.
End of Lesson (EOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Learning I don’t know I can list the I can I can outline I can write
Objective:
anything about three features differentiate and explain the programs using
Understand
the string of string read and write purpose of an 1Dimensional
importance manipulation. manipulation. in relation to array and a
of the a text file. 2Dimensional
different file
array
handling
features and
how to
create 1D
and 2D
arrays.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners

LO: be able to understand and explain the purpose of the CPU.


Skill needed: Recall
Class Starter Recall is the ability to remember
something that has happened in the
past or the act of remembering it.

1. Name the purpose of the import random


function. British
Value:
Individual

2. Explain what is meant a function. Liberty:


You may
choose the
questions
3. Describe what is meant by casting in you would
like to

Computer Science and give two examples. answer.

4. Outline and explain the syntax to generate


random numbers.
LO: Understand the importance of the different file handling features
and how to create 1D and 2D arrays.

Steps to Success:
I can identify the three string features.
I can create at least two types of arrays.
I can open, read, write and close a text file.
Start of Lesson (SOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Learning I don’t know I can list the I can outline I can write I can open, read,
Objective:
anything about three features and explain programs using write and close a
Understand
the string of string the purpose of 1Dimensional text file.
importance manipulation. manipulation. an array and a
of the 2Dimensional
different file
array.
handling
features and
how to
create 1D
and 2D
arrays.
Video on Array
Complete Task in pairs British Value: Individual
Liberty: You may choose the
questions you would like to
Fish and Hook/Pre learning answer.
Task

Steps to Not sure One idea Multiple Linking ideas Applying ideas
Success ideas
Learning I don’t I can list I can I can outline and I can write
Objective:
know the three differentiate explain the programs using
Understand the
Explain the Differentiate
importance of anything features of read and purpose of an 1Dimensional and a
What is meant purpose of between a Outline and
about string
random write in integer
array Write the syntax
2Dimensional array
the different
by afile random random explain the
number to generate
handling features string
number manipulatio and a random
relation to a function
generator in a random numbers.
and how to real number. random(x, y)
generator. manipulati computer.
n. text file.
create
Skill 1D and
needed: Recall
on.
Recall is the ability to remember
2D arrays.
something that has happened in the
past or the act of remembering it.
Complete Task in pairs British Value: Individual
Liberty: You may choose the
questions you would like to
Fish and Hook/Pre learning answer.
Task

Steps to Not sure One idea Multiple Linking ideas Applying ideas
Success ideas
Learning I don’t I can list I can I can outline and I can write
Objective:
know the three differentiate explain the programs using
Understand the
importance of anythingfeatures of read and
Differentiate purpose of an 1Dimensional and a
Outline and
about Explain
string the between
write in a 1D array Write the syntax
2Dimensional array
the different
What fileis meant explain file
purpose of a array and a 2D handling to open and close
handlingbyfeatures string manipulatio relation
an array? 1D array. array to a features.
a text file.
and how to
manipulati n. text file.
create
Skill 1D and
needed: Recall
on.
Recall is the ability to remember
2D arrays.
something that has happened in the
past or the act of remembering it.
Culture Curriculum: Learning about the
Careers Section: different jobs available within the career
area of Computer Science.

Guess the career


1. Random students will be asked to come to the front,
select a job from the bag and act out/mime that job.
2. The remaining students will try and guess what job it is.

Cognition needed: Resourcefulness


Resourcefulness the ability to find quick
and clever ways to overcome difficulties
Random number Generator
• Generate random numbers by using the function random (x, y). X and y can be
integers or reals.
• Random(10, 99) – A random integer between 10 and 99 (including 10 and 99).
• Random(3.0, 7.0 ) – A random integer between 3.0 and 7.0 (including 3.0 and
7.0).
• Random numbers can be used to make unknown things happen in your
program. Example: to make choices and set attributes randomly.
Exam question: write a pseudocode to generate a random number
between 5 and 25. Print the number generated.
random_num = random(5, 25)
OUTPUT random_num
What is an Array?
An array is a data structure that stores a collection of values with the same data type.
Each value is called an element.
Elements are accessed by position (index), starting at position 0.
A fixed array/Static Array- is an array for which the size or length is determined
when the array is created and/or allocated.
Before an array can be used, it must be declared. To declare an array it must be given at
least two properties:
an identifier
a size (the number of elements it will hold)
For example:
array score[9] - would declare an array with ten elements (zero to nine)
One-Dimensional Array
• A 1D array is like a list.
You can either create arrays by setting their size, then assigning values…
Array friends [3] Can contain 3 elements (position 0, 1 and 2)
friends[0] = “Mary” Retrieve elements by position in an array.
friends[1] = “John” print (friends[0])
The name Mary will be printed
friends[2] = “Bob”
OR do it in one step by giving initial values: Change elements by assigning new values:
friends[1] = “Johnny”
Array friends = [“Mary”, “John”, “Bob”] Replaces element at position 1 (“John”) with
Johnny
One-Dimensional Array
Combining array functions with FOR loops allows you to change all of the
elements in an array. FOR loops can be used to search for specific elements, or
make a similar change to lots of elements.

Example: The number below are stored in an array called scores. Write an
algorithm that will add 3 to each number of the score array.
4 12 32 18 21 11 9 14 24

for k = 0 to 8
score[k] + 3 Adds 3 to the element in
For loop will run on each next k position k of the array.
element of the array.
Summary of Array/lists
https://www.bbc.co.uk/bitesize/guides/zb3yb82/revision/4
Two dimensional Array
A two-dimensional array is declared using two values - the number of rows and
the number of columns. For example:

array score = [1,9] - would give an array with two rows and ten columns

Data is assigned or retrieved by referring to an element's row and column


number. For example:

score[0,1] = 110

print(score[1,4]) - would display the score 78


Two dimensional Array
 A 2D array is like a table. You can also think of them as a 1D where
each element is a 1D array.
 Position of elements are written like [a,b] or [a][b].
[a= represents the position of the one-dimensional list that the element is in.]
[b= represents its position within that one-dimensional list.]
 trees = [[“oak”, “ash”], [“beech”, “cedar”], [“pine”, “elm”]]
OR 0 1
0 oak ash print (“Nessa’s favourite tree is” + trees[0, 0]
print (“Luke’s favourite tree is” + trees[2, 1]
1 beech cedar
What will be printed?
2 pine elm
Pupils
Two-Dimensional Array 0
0
15
1
5
2
13
3
12
4
7

Tests
1 2 14 11 14 9
The ‘score’ array has been used to store four test scores for five 2 5 4 12 7 13
pupils, as shown. 3 6 8 18 19 15

Example: score[2, 0] will return the test 2 score for pupil 0 which is
5.
What will each of these return?
1. score[1, 3] 14
2. Score[3, 2] / score[1, 0] 3. 18 / 2 = 9
3. Write an algorithm to count the total score of any given pupil.
total= 0
pupil = input(“Enter the number of the pupil”)
for i = 0 to 3
total = total + score[i, pupil]
next i
print(total)
Example of a two dimensional Array
 The 2D array ‘runs’ is used to store the number of runs
scored by two cricketers in their last four matches. E.g.
runs[2,0] returns 65. Write an algorithm to set all values in
the array back to 0. Cricketer
for i = 0 to 3
0 1
The i FOR loop goes for j = 0 to 1
runs[i , j] = 0 0 54 14
through the 4 rows.
The j FOR goes through next j 1 83 22
the 2 columns next i 2 65 37
3 58 26
match
Main task British Value:
Individual Liberty:
You may choose the

Complete ONE of the following task questions you would like


to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can list I can I can outline and I can write
Objective:
know the three differentiate explain the programs using
Understand the
importance of anything features of read and purpose of an 1Dimensional and a
the different file about Complete
stringpage 49 write in array Complete page 56
2Dimensional array
Complete page and 57 on the
handling features string and 50manipulatio
on the 51 and
relation to a52 on worksheet
and how to worksheet the worksheet
manipulati n. text file. .
create 1D and Skill needed: Resilience:
on.
2D arrays. believing in ourselves and viewing challenges as opportunities
Start at your most
for better learning.
challenging question.
Past paper Question
End of Lesson (EOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Learning I don’t know I can list the I can outline I can write I can open, read,
Objective:
anything about three features and explain programs using write and close a
Understand
the string of string the purpose of 1Dimensional text file.
importance manipulation. manipulation. an array and a
of the 2Dimensional
different file
array.
handling
features and
how to
create 1D
and 2D
arrays.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Skill needed: Recall
Class Starter Recall is the ability to remember
something that has happened in the
past or the act of remembering it.

1. Name the purpose of an array. British


Value:
Individual
2. Explain what is meant by an array. Liberty:
You may
choose the

3. Differentiate between a 1D array and a 2D array. questions


you would
like to
answer.
4. Outline and explain three features used in string
manipulation/slicing.
5. Write the syntax to open and close a text file.
LO: Understand the importance of the different file handling features
and how to create 1D and 2D arrays.

Steps to Success:
I can identify the three string features.
I can create at least two types of arrays.
I can open, read, write and close a text file.
Start of Lesson (SOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Learning I don’t know I can list the I can outline I can write I can open, read,
Objective:
anything about three features and explain programs using write and close a
Understand
the string of string the purpose of 1Dimensional text file.
importance manipulation. manipulation. an array and a
of the 2Dimensional
different file
array.
handling
features and
how to
create 1D
and 2D
arrays.
Complete Task in pairs British Value: Individual
Liberty: You may choose the
questions you would like to
Fish and Hook/Pre learning answer.
Task

Steps to Not sure One idea Multiple Linking ideas Applying ideas
Success ideas
Learning I don’t I can list I can I can outline and I can write
Objective:
know the three differentiate explain the programs using
Understand the
importance of anything features of read and
Differentiate purpose of an 1Dimensional and a
Name the six Outline and
What
the different fileis meant
about (6)string
file between
write in the array explain file
Write the syntax
2Dimensional array
byfeatures
file string handling readline() and to open and close
handling manipulatio relation to a handling
the writeline() operations. a text file.
and howhandling.
to operations.
manipulati n. text file.
create
Skill 1D and
needed: Recall
on.
Recall is the ability to remember
2D arrays.
something that has happened in the
past or the act of remembering it.
Culture Curriculum: Learning about the
Careers Section: different jobs available within the career
area of Computer Science.

1. What is your career path?


2. How will technology/computer science help in your
career path?

Cognition needed: Resourcefulness


Resourcefulness the ability to find quick
and clever ways to overcome difficulties
Files
• Allows programs to access data that is not written directly in the
code.
• Can store data so that it is not lost when a program in closed.
Files have two modes of operation:
• Read from - the file is opened so that data can be read from it
• Write to - the file is opened so that data can be written to it
• Each item of data written to or from a file is called a record.
Six File Operations
1. newFile(“scores.txt”) – Creates a new file with the given name(or
path)
2. file = openRead("scores.txt") - This would open the file scores.txt and allow
its contents to be read.
3. file = openWrite("scores.txt") - This would open the file scores.txt and allow
it to have data written to it.
4. file.readLine() – Returns the next line of the file starting from the beginning.
5. file.writeLine(“text”) – Write a new line at the end of the file.
6. file.close()- End of file command- The endOfFile() statement checks to see if
the last record has already been read
Creating a text file
Read from a text file
Six File Operations
Reading from a file: End of a file:
file = openRead("scores.txt") file = openRead("scores.txt")
score = myFile.readLine() while NOT file.endOfFile()
file.close() scores[x]=myFile.readLine()
Writing to a file: x=x+1
file = openWrite("scores.txt") endwhile
for x = 0 to 9 file.close()
file.writeLine(scores[x])
next x
file.close()
Main task British Value:
Individual Liberty:
You may choose the

Complete ONE of the following task questions you would like


to answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can list I can I can outline and I can write
Objective:
know the three differentiate explain the programs using
Understand the
importance of anything features of read and purpose of an 1Dimensional and a
the different file about Complete
stringpage 49 write in array Complete page 56
2Dimensional array
Complete page and 57 on the
handling features string and 50manipulatio
on the 51 and
relation to a52 on worksheet
and how to worksheet the worksheet
manipulati n. text file. .
create 1D and Skill needed: Resilience:
on.
2D arrays. believing in ourselves and viewing challenges as opportunities
Start at your most
for better learning.
challenging question.
End of Lesson (EOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Learning I don’t know I can list the I can outline I can write I can open, read,
Objective:
anything about three features and explain programs using write and close a
Understand
the string of string the purpose of 1Dimensional text file.
importance manipulation. manipulation. an array and a
of the 2Dimensional
different file
array.
handling
features and
how to
create 1D
and 2D
arrays.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Cognition needed: Recall
Class Starter: Recall is the ability to remember something that has
happened in the past or the act of remembering it. British
Value:
Individual
1. List two validation used in a database. Liberty: You
may choose
the questions
2. Explain what is meant by validation. you would
like to
answer.

3. Differentiate between the WHERE clause and the FROM clause used in SQL
statements. .

4. Outline and explain the difference between the _ and the % in an SQL
statement.

5. Evaluate the purpose of using LIKE in a SQL statement rather than using the =

sign. Give an example of a LIKE statement and an equal to SQL statement.


Learning Objective: Be able to understand how data is held in a database so that
information can be easily added, deleted, amended and retrieved.

Steps to Success:
I can identify a database properties.

I can explain the terms database, table and record.

I can write SQL statement to create a database table and add, update or delete in
the table
I can write SQL statements to query a database
Pseudocode

Start of Lesson
Unit 5 Algorithms

Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success

Learning Objective: I don’t know I can I can I can write I can write SQL
Be able to
anything explain the differentiate different SQL statements to
understand how
data is held in a
about term among fields, statements query a database.
database so that database. database. records and such as
information can be tables. update, delete
easily added, and insert a
deleted, amended
table in
and retrieved.
database.
Complete Task in pairs British Value: Individual
Liberty: You may choose the
questions you would like to
Fish and Hook/Pre Learning Task answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can write I can write SQL
Objective: Be able
know the term differentiate different SQL statements to query a
to understand
how data is held
anything database. among fields, statements such as database.
in a database so about 1. Explain the records and update, delete and Briefly discuss
Explain Compare and
What isdatabase.
that information meant term field tables. insert a tablerecords
in the importance of
SELECT, contrast
can be easily 2. Give two validations in
by the term examples of a
FROM and database.
and fields and
database. Explain
added, deleted,
database? WHERE clause give an example
field in a any two
amended and in SQL. of each.
database. validations.
retrieved.
Skill needed: Recall
Recall is the ability to remember Start at the most
something that has happened in the
past or the act of remembering it.
challenging question.
Culture Curriculum: Learning about the
Careers Section: different jobs available within the career
area of Computer Science.

Guess the student’s career


1. Students will come the front and act out/mime the student name that will be
placed on a piece of paper from the bag.
2. The remaining students will try and guess who the student is.
3. The student’s name that was selected will state his/her/they career path and
why.
4. We will do 4 students per lessons.

Cognition needed: Resourcefulness


Resourcefulness the ability to find quick
and clever ways to overcome difficulties
What is a database?
A database is an organised collection of data, generally stored and accessed
electronically from a computer system.
Database allows you to:
Create tables/entities
Create fields/attributes/columns
Create primary keys- A primary key is a special relational database table column (or
combination of columns) designated to uniquely identify each table record.
Create validation rules
A record- is a data structure that stores related values of different data types.
A field- is an element of a record used to store one piece of data.
Data types
£5
Currency

Text
Joe Brown Date/Time
10/05/1984

Image Number

22
Database Components - Field

Field
• A field is a single item of information in a record

• Each field is a single column. The fields in the


above example are in columns under field names
such as Fname, Sname, Gender etc.
Learning Objective: Be able to understand how data is held in a database so that information can be easily added, deleted, amended and retrieved.
Database Components - Record

Record
• Each set of fields is known as a record
• Each record is a complete set of information
about one pupil

Learning Objective: Be able to understand how data is held in a database so that information can be easily added, deleted, amended and retrieved.
Database Components - File

File
• Each set of records is called a file
• The example above is a collection of information about pupils
• The information is set up in the same format for each item in the
collection
Learning Objective: Be able to understand how data is held in a database so that information can be easily added, deleted, amended and retrieved.
SELECT SELECT-ing data
SELECT
first_name
Column names FROM
students

FROM Table SELECT *


from
students

Name
Learning Objective: Be able to understand how data is held in a database so that information can be easily added, deleted, amended and retrieved.
The WHERE clause
SELECT *
FROM
students
WHERE
group =
‘9AB’
Some Criteria for running queries in
Database
LIKE the letter followed by */ %- Returns
Key all the elements that starts with the
Points
letter you mentioned. Example: LIKE Y*
There are two wildcards often used in
conjunction
Both elementswithhavethe LIKE
trueoperator:
AND to be for the output
to be true. Example: Favourite fruit Apple
AND
% month
- The in which
percent you
sign were bornzero,
represents May.one,
or multiple characters.
OR Only one element has to be true for the output
to be true. Example: Favourite fruit Apple OR
_month
- Theinunderscore represents
which you were a single
born May.
character
* or the wildcard- Returns all the elements under the given field.
Note: MS Access uses an asterisk (*)
_/? - underscore Represents a single character.
instead of the percent sign (%), and a
question mark (?) instead of the
underscore (_).

Learning Objective: Be able to understand how data is held in a database so that information can be easily added, deleted, amended and retrieved.
British Value: Individual

Class Activity
Liberty: You may choose the
questions you would like to
answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t know I can explain I can I can write I can write
Objective: Be able
anything about the term differentiate different SQL SQL
to understand
how data is held
database. database. among fields, statements statements to
Complete
records and Task Complete
such as update, queryTask
a on
inComplete
a database soTask 1 Complete Task
3 on Revision Revision
on Revision
that information 2 on Revision tables. delete and Worksheet
database.
Worksheet Worksheet
can be easily Worksheet insert a table in .
added, deleted,
database.
amended and
Skill needed: Resourcefulness: Skill needed: Resilience:
retrieved.
exploring a variety of creative believing in ourselves and viewing challenges as
Learning Objective:
strategies Be able challenges
to overcome to understand how data is held in a database so that informationopportunities
can be easily added, deleted,learning.
for better amended and retrieved.
Pseudocode

End of Lesson (EOL)


Unit 5 Algorithms

Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success

Learning Objective: I don’t know I can I can I can write I can write SQL
Be able to
anything explain the differentiate different SQL statements to
understand how
data is held in a
about term among fields, statements query a database.
database so that database. database. records and such as
information can be tables. update, delete
easily added, and insert a
deleted, amended
table in
and retrieved.
database.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Cognition needed: Recall
Class Starter: Recall is the ability to remember something that has
happened in the past or the act of remembering it.
British Value:

1. What are two types of networks? Individual


Liberty: You
may choose the
questions you

2. Explain two hardware needed to connect to a LAN. would like to


answer.

3. Differentiate between a client server network and a peer- to-


peer network.
4. Outline and explain the purpose of a server.
5. Evaluate three advantages and three disadvantages of using a
client server network over a peer- to-peer network.
Learning Objective: Be able to understand how subprograms works and their
importance in a program.

Steps to Success:

I can identify sub programs within a program.

I can explain the terms the purposes of using


subprograms in a program.
I can write codes using functions and procedures.
Pseudocode

Start of Lesson
Unit 5 Algorithms

Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success

Learning Objective: I don’t know I can I can I can write I can write codes
Be able to
anything explain the differentiate codes using using different
understand how
subprograms
about sub term sub between a global and sub programs.
works and their programs. programs. function and a local
importance in a procedure. variables.
program.
Complete Task in pairs British Value: Individual
Liberty: You may choose the
questions you would like to
Fish and Hook/Pre Learning Task answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can write I can write SQL
Objective: Be able
know the term differentiate different SQL statements to query a
to understand
anything database. 1. Evaluate the
among fields, statements such as database.
how data is held purpose of
in a database so about records and update, delete and using
Differentiate
that information database. Explain what tables. Outline
insert a tableand
in functions.
List
can be easily types of between a explain two 2. Differentiate
is meant by database.
subprograms
added, deleted, function and a
benefits of using between a
subprograms. subprograms. local variable
amended and
procedure. and a global
retrieved.
Skill needed: Recall
Recall is the ability to remember Start at the most challenging variable.
something that has happened in the
past or the act of remembering it. question.
Careers Section: Culture Curriculum: Learning about the
different jobs available within the career
area of Computer Science.
1. How does Computer Science helps in marketing?
2. What are the advantages and disadvantages of using
technology in marketing.
3. Before the development of computers, how was products and
services used to be advertised?

Cognition needed: Resourcefulness


Resourcefulness the ability to find quick
and clever ways to overcome difficulties
Video on Sub programs.
Key definitions
There are two types of sub programs: Functions and procedures.

• Sub program- is a set of instructions stored under one name that are executed
when called.

Benefits of sub programs:


Subprograms are usually small in size, which means they are easier to write, test
and debug than programs. They are also easy for someone else to understand.

A subprogram may be used repeatedly at various points in the main program.


However, the code only has to be written once, resulting in shorter programs.
Key definitions
• Parameters- A variables used to pass data into a sub program. Can be any data type.

• Argument- The value a parameter takes when the sub program is called.

• Local Variables- Can only be used within the structure/function they are declared in.

Benefits of local variable:


• The same name of a local variable can be used in different functions as it is only recognized by the function in which it is
declared.
• Local variables use memory only for the limited time when the function is executed; after that same memory location can be
reused.
• Global variables- are declared are outside of the function.

Benefits of global variable:


 Global variables can be accessed by all the functions present in the program.
 Only a single declaration is required.
Procedure
Procedures are sets of instructions stored under one name (identifier). They don’t
return a value to the main program. A procedure is created using the following pseudo-code
syntax:
• Example PROCEDURE identifier ( parameter(s) )
BEGIN PROCEDURE
Procedure name() procedure code
END PROCEDURE
name = input(“What is your name?”)
PROCEDURE add2numbers(number1, number2)
print(“Hello ” + name) BEGIN PROCEDURE
SET total TO number1 + number2
End Procedure OUTPUT total
END PROCEDURE

• e.g. if we call name() and input Jon it would output:


• Hello Jon
Function
Functions are similar to procedures but always return a value to the main
program.
Example
Function Hello(FirstName As String, SecondName As String)
Return “Hello” + “ “ + FirstName +” “+ SecondName
End Function
Name = Hello(“Jonathan”, “Weir”)
Print(Name)
• Hello Jonathan Weir
Parameters and Arguments
Example
Function Hello(FirstName As String, SecondName As String)
Return “Hello” + “ “ + FirstName +” “+ SecondName
End Function
Name=Hello(“Jonathan”, “Weir”)
Print(Name)

A Parameter is a special name given to a variable that is passed into a sub function.
It is worth noting that both procedures and functions can take in parameters.
An argument is the name given to the actual values when the sub program is called.
British Value: Individual

Class Activity
Liberty: You may choose the
questions you would like to
answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t know I can explain I can I can write I can write
Objective: Be able
anything about the term differentiate different SQL SQL
to understand
how data is held
database. database. among fields, statements statements to
Complete
records and Task Complete
such as update, queryTask
a on
inComplete
a database soTask 1 Complete Task
3 on Revision Revision
on Revision
that information 2 on Revision tables. delete and Worksheet
database.
Worksheet Worksheet
can be easily Worksheet insert a table in .
added, deleted,
database.
amended and
Skill needed: Resourcefulness: Skill needed: Resilience:
retrieved.
exploring a variety of creative believing in ourselves and viewing challenges as
Learning Objective:
strategies Be able challenges
to overcome to understand how data is held in a database so that informationopportunities
can be easily added, deleted,learning.
for better amended and retrieved.
Pseudocode

End of Lesson
Unit 5 Algorithms

Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success

Learning Objective: I don’t know I can I can I can write I can write codes
Be able to
anything explain the differentiate codes using using different
understand how
subprograms
about sub term sub between a global and sub programs.
works and their programs. programs. function and a local
importance in a procedure. variables.
program.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Cognition needed: Recall British Value:

Class Starter: Recall is the ability to remember something that has


happened in the past or the act of remembering it.
Individual
Liberty: You
may choose the
questions you
would like to
answer.
1. State two ways to improve maintainability in a program.

2. What is meant validation checks?

3. Explain two ways you can improve the robustness of your program.

4. Differentiate between iterative testing and final testing.

5. Outline and explain the four types of test data.


LO: Be able to understand how to produce a robust program and
how to apply different defensive designs to your program.

Steps to success:

• I can differentiate between iterative testing and final testing.

• I can outline and explain the four types of test data.

• I can complete a trace table using different steps in a block of


code.
Start of Lesson (SOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Lesson I don’t know I can list the three I can explain the I can outline and I can evaluate the
objective: Be anything about ways to improve difference explain the importance of
able to
defensive designs. the maintainability between iterative different validation defensive designs
understand
of a program. testing and final checks. and how they help to
how to
testing. improved the
produce a
robust
robustness of a
program and program.
how to apply
different
defensive
designs to
your program.
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
Fish and Hook/Pre-Learning Task. like to answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Lesson objective: I don’t know I can list the I can explain I can outline and I can evaluate the
Be able to anything three ways to the difference explain the different importance of
understand how to
about improve the between validation checks. defensive designs and
produce a robust Evaluate the
defensive maintainabilit iterative testing
Outline and how they help
benefits of tohaving
program and how Differentiate improved the
List three
designs. Explain
y of a what isandexplain
final the a robust programs
to apply different between types
features of a meant by a
program. five
testing. and explain
robustness of a ways
defensive designs of testing and
strong structured validation you can improve
program.
to your program.
password. diagram. test data.
checks. the robustness of
your program.
Start at your most Skill needed: Resourcefulness
challenging question. Resourcefulness is the ability to use the resources available(Google,
classmates) to assist in gathering solutions for your problems.
Careers Section: Culture Curriculum: Learning about the
different jobs available within the career
area of Computer Science.

1. How does Computer Science helps in marketing?


2. What are the advantages and disadvantages of using technology in
marketing.
3. Before the development of computers, how was products and services
used to be advertised?

Cognition needed: Resourcefulness


Resourcefulness the ability to find quick
and clever ways to overcome difficulties
Structured Programming
Structure diagram is a tool you can use to help design and create programs.
Advantages of using a structured diagram: Main Problem
Written independently
Tested individually Each module can be
Reused elsewhere a feature of the
program.

Each module can be


broken done in
individual tasks.
Four ways to improve Maintainability
Well- maintained code is easier for other programmers to understand. They can
change parts of the code without causing problems elsewhere.
Ways to improve the maintainability of the code:
Write comments to explain what the code does.
Use indentation to make program flow clear to see
Use descriptive names for variables, sub programs and parameters so it is easier
to keep track of them.
Use sub programs to separate parts of the program.
Robust programming
Programs that function correctly shouldn’t break or produce errors.
Avoid these problems by:
Anticipate and prevent misuse by user.
Keep code well-maintained
Reduce errors by testing
Five Validation Checks
Input validation checks if the data meets certain criteria before passing it into a
program.
Validation Checks What it does
Range check Check the data is within a specific range.
Presence check Checks the data has actually been entered
Format Check Checks the data has the correct format.
Look-up table Checks the data against a table of acceptable values
Length check Checks the data is the correct length
Authentication
Authentication- confirming the identify of a user before allowing access.
Password or biometrics are usually associated with a username.
Four ways to make password more secure:
Force strong password- long with mix of letters, numbers and symbols.
Limit the number of failed authentication attempts.
Require that passwords are changed regularly.
Ask for a random selection of characters from the password on each attempt.
British Value: Individual

Class Activity
Liberty: You may choose the
questions you would like to
answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t know I can explain I can I can write I can write
Objective: Be able
anything about the term differentiate different SQL SQL
to understand
how data is held
database. database. among fields, statements statements to
Complete Task Complete Task
inComplete
a database soTask 1 Complete Task records and such as update, query a 4 on
3 on past past paper
thaton past paper
information 2 on past tables. paper delete and Worksheet
database.
Worksheet paper
can be easily Worksheetinsert a table in .
Worksheet
added, deleted,
database.
amended and
Skill needed: Resourcefulness: Skill needed: Resilience:
retrieved.
exploring a variety of creative believing in ourselves and viewing challenges as
Learning Objective:
strategies Be able challenges
to overcome to understand how data is held in a database so that informationopportunities
can be easily added, deleted,learning.
for better amended and retrieved.
End of Lesson (EOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Lesson I don’t know I can list the three I can explain the I can outline and I can evaluate the
objective: Be anything about ways to improve difference explain the importance of
able to
defensive designs. the maintainability between iterative different validation defensive designs
understand
of a program. testing and final checks. and how they help to
how to
testing. improved the
produce a
robust
robustness of a
program and program.
how to apply
different
defensive
designs to
your program.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Class Starter:
1.For each letter of the Alphabet write down one test that begins
with that letter. For example: Skill needed: Recall
Recall is the ability to remember
•D Driving Test something that has happened in the
past or the act of remembering it.
•G GCSE exam
2. Explain why do you think testing is important?
3. Compare and contrast between iterative testing and final
testing.
4. Write a code that display the two types of programming
errors.
LO: be able to understand the importance of the different types
of testing when writing programs.

Steps to Success
I can explain the different types of testing.
I can compare and contrast between final testing and
iterative testing.
I can use a trace table to solve different algorithms.
I can evaluate the importance of the different types of
test data.
Start of Lesson (SOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


objective: know what iterative compare and the different the importance
be able to anything testing is. contrast purposes of of testing and
understand about between doing the how it helps
the testing. final testing different types when write
importance and iterative of testing. programs.
of the testing.
different
types of
testing when
writing
programs.
Keywords
Iterative testing British Value:
Final testing Democracy
A culture built upon
Normal data freedom and equality,
where everyone is aware
Boundary Data of their rights and
responsibilities.
Invalid Data
Erroneous Data
Careers Section: Culture Curriculum: Learning about the
different jobs available within the career
area of Computer Science.

1. How does Computer Science helps in cancer research?


2. What are the advantages and disadvantages of using technology in
researching about the cancers.
3. Before the development of technology, how was cancer patient
treated for their illness?

Cognition needed: Resourcefulness


Resourcefulness the ability to find quick
and clever ways to overcome difficulties
Types of testing
Iterative testing is testing the code as you create it.
This could be completed line by line or a section at a time.
Once tested and feedback is received you then alter your code
as required.
You could consider this type of testing similar to tuning a
guitar.
• You keep playing the string and adjusting the tension until the note is the correct
pitch.
Types of testing
Final or Terminal testing is carried out at the end of the program when it
has been written.
This is more similar to a GCSE.
It is used as a final check to make sure a program is working properly.

Think:
• What is the difference between iterative and final testing?
• Would you use different test data for each?
Program Errors

Syntax error- when the compiler or interpreter doesn’t understand something you have
typed because it doesn’t follow the rules or grammar of the programming language.

Logic Error- when the compiler or interpreter is able to run the program but the program
does something unexpected.

Runtime errors are errors which will cause the program or computer to crash even if there
appears to be nothing wrong with the program code. Running out of memory will often cause
a runtime error.
What is a test plan?

• A test plan will outline exactly what you are going to test and how you are
going to test it.
• A good test plan will anticipate all of the potential issues with the program
and select appropriate test data to test for these issues.
The test data you need for your test plan
falls into one of four categories:

Normal – Data that is correct . (Inputs users are likely to enter)

Boundary – The minimum/maximum values of the data that could be entered.


Example for teenagers 13 and 19.
Invalid– Values higher or lower than the expected range, for teenagers greater
than 19 (Correct data type but should be rejected).
Erroneous - incorrect values that the program should not accept such as entering
‘Dave’ in an age field (as an incorrect data type).
The table below shows an example of a test plan for
setting an alarm system.
Type of Data Test Data Reason for testing Expected Outcome

Normal 2476 To see how the alarm copes with normal usage Code accepted

Normal No input To see if the alarm prompts an input Prompt to enter code.

Boundary OOO To see if the smallest code is accepted. Code accepted

Boundary 99999 To see if the largest code is accepted. Code accepted

Invalid 12 To see if the alarm accepts inputs shorter than 3 digits. Error: The code is too short

Invalid 632191 To see if the alarm accepts inputs larger than 5 digits. Error: The code is too long

Erroneous 23aY To see if the system accepts non-digits. Error: the code contains non-
numeric data.
British Value: Individual

Class Activity
Liberty: You may choose the
questions you would like to
answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t know I can explain I can I can write I can write
Objective: Be able
anything about the term differentiate different SQL SQL
to understand
how data is held
database. database. among fields, statements statements to
Complete Task Complete Task
inComplete
a database soTask 1 Complete Task records and such as update, query a 4 on
3 on past past paper
thaton past paper
information 2 on past tables. paper delete and Worksheet
database.
Worksheet paper
can be easily Worksheetinsert a table in .
Worksheet
added, deleted,
database.
amended and
Skill needed: Resourcefulness: Skill needed: Resilience:
retrieved.
exploring a variety of creative believing in ourselves and viewing challenges as
Learning Objective:
strategies Be able challenges
to overcome to understand how data is held in a database so that informationopportunities
can be easily added, deleted,learning.
for better amended and retrieved.
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t I can explain I can I can outline I can evaluate


objective: know what iterative compare and the different the importance
be able to anything testing is. contrast purposes of of testing and
understand about between doing the how it helps
the testing. final testing different types when write
importance and iterative of testing. programs.
of the testing.
different
types of
testing when
writing
programs.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Cognition needed: Recall British Value:

Class Starter: Recall is the ability to remember something that has


happened in the past or the act of remembering it.
Individual
Liberty: You
may choose the
questions you
would like to
answer.
1. State two types of translators.

2. What is meant by high-level languages?

3. Explain two benefits of high level languages.

4. Differentiate between high level languages and low level

languages..

5. Outline and explain the two features of the IDEs.


LO: Be able to understand high and low level languages and the
purposes of using translators.

Steps to success:
I can differentiate between high and low level languages.

I can outline and explain the functions of the different types of


compilers .
I can evaluate the importance of IDE and explain at least three of
Start of Lesson (SOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Lesson I don’t know I can list the two I can explain the I can outline and I can evaluate the
objective: Be anything about main types of difference explain the importance of using
able to
languages, translators. between high functions of the IDEs and explain it
understand
translators and level language different types of main features.
high and low
IDEs. and low level translators.
level
languages and
languages.
the purposes
of using
translators.
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
Fish and Hook/Pre-Learning Task. like to answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Lesson objective: I don’t know I can list the I can explain I can outline and I can evaluate the
Be able to anything two main the difference explain the functions importance of using
understand high
about types of between high of the different types IDEs and explain it
and low level
languages, translators. Outline
level and of translators.
language
Differentiate main features.the
Evaluate
languages and the
translators andexplain
low two
level between high purpose of IDE.
List
purposes of using two Explain what is
andofIDEs.
features of
languages. level languages Outline and
translators. features meant by a
writing codes and low level explain three
IDE. translator.
in high level languages. features of IDE.
languages.

Start at your most Skill needed: Resourcefulness


challenging question. Resourcefulness is the ability to use the resources available(Google,
classmates) to assist in gathering solutions for your problems.
Careers Section: Culture Curriculum: Learning about the
different jobs available within the career
area of Computer Science.

1. How does Computer Science helps in healthy lifestyle?


2. What are the advantages and disadvantages of technology when
developing a healthy lifestyle.
3. Before the development of technology, how would people promote
healthy lifestyle?

Cognition needed: Resourcefulness


Resourcefulness the ability to find quick
and clever ways to overcome difficulties
Languages
Low-Level Language- is the language understood by
the computer or closest to the computer’s language(if code is
High-Level Language- is the language
understands by the programmer.
written in assembly language)

Machine code/Binary/Object Code  0000 0000 0000 The majority of code is written in high-level languages,
e.g. Python.
Assembly Language(needs an assembler to translate
to binary)  ADD, R4, r2, R3  One instruction represents many instructions of
machine code.
 One instruction of assembly code can represent one of
machine code.  Same code works on different machines and
processors.
 Code usually only works for one machine or processor.
 Code is easy to read and write.
 Code is hard to read and write.
 Done need to know about the processor or memory
 Needs to know internal structure of the CPU and how structure.
it manages memory.
 Must be translated or interpreted before it can be
 Machine code can be executed directly, without being executed.
translated.  Slower and less memory efficient.
 Faster and more memory efficient.
Translators
Compilers Interpreter

 Translates all code at once into machine code,  Translates and runs instruction line by line.
creating an executable file.  Used every tmie code is run.
 Only needed for initial translation.  Stops and returns first error found.
 Return a list of errors for whole program when  Programs run more slowly.
compiling is complete.
 Compiling can take a long time, but program runs
quickly once compiled.
Integrated Development Environment (IDE)
IDE is a software to help develop programs.

Five common features of the IDE.


Code Editor Where code is written. Can often automatically colour, indent, correct
and complete codes.
Run-time environment Allow codes to be run and tested within the IDE.

Error Diagnostics Debugged tool to show information about detected errors.

Breakpoints Pause the program at certain lines. Values can be checked to help diagnose
logic errors.
Translators A compiler or interpreter to allow sources to be executed.
British Value: Individual

Class Activity
Liberty: You may choose the
questions you would like to
answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t know I can explain I can I can write I can write
Objective: Be able
anything about the term differentiate different SQL SQL
to understand
how data is held
database. database. among fields, statements statements to
Complete Task Complete Task
inComplete
a database soTask 1 Complete Task records and such as update, query a 4 on
3 on past past paper
thaton past paper
information 2 on past tables. paper delete and Worksheet
database.
Worksheet paper
can be easily Worksheetinsert a table in .
Worksheet
added, deleted,
database.
amended and
Skill needed: Resourcefulness: Skill needed: Resilience:
retrieved.
exploring a variety of creative believing in ourselves and viewing challenges as
Learning Objective:
strategies Be able challenges
to overcome to understand how data is held in a database so that informationopportunities
can be easily added, deleted,learning.
for better amended and retrieved.
End of Lesson (EOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Lesson I don’t know I can list the two I can explain the I can outline and I can evaluate the
objective: Be anything about main types of difference explain the importance of using
able to
languages, translators. between high functions of the IDEs and explain it
understand
translators and level language different types of main features.
high and low
IDEs. and low level translators.
level
languages and
languages.
the purposes
of using
translators.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Cognition needed: Recall British Value:

Class Starter: Recall is the ability to remember something that has


happened in the past or the act of remembering it.
Individual
Liberty: You
may choose the
questions you
would like to
answer.
1. State two types of logic gates.

2. What is meant by a logic gate?

3. Explain the OR gates and its truth table.

4. Differentiate between the AND gate and the NOT gate.

5. Outline and explain the purpose of a truth table. Draw the truth

table for the AND, OR and NOT gate.


LO: Be able to understand the different types of logic gates and
how they work based on their inputs.

Steps to success:
I can differentiate between the AND gate and the OR gate.

I can draw and explain the three main types of logic gates.

I can create the truth tables for the different types of logic
gates.
Start of Lesson (SOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Lesson I don’t know I can list the three I can explain the I can draw the I can create the truth
objective: Be anything about main types of difference three main types of tables for the three
able to
logic gates. logic gates. between the logic gates. main types of logic
understand
AND gate and gates.
the different
the OR gate.
types of logic
gates and how
they work
based on their
inputs.
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
Fish and Hook/Pre-Learning Task. like to answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Lesson objective: I don’t know I can list the I can explain I can draw the three I can create the truth
Be able to anything three main the difference main types of logic tables for the three
understand the
about logic types of logic between the gates. main types of logic
different types of
gates. gates. Draw
AND gate the
and gates.
logic gates and Draw and
notation Draw the truth
how they work Explain what is OR gate.
the
symbols of
explain the
tables for the
List the three meant by a three main
based on their
logic gates. each of the three main logic
truth table. types of logic
inputs. main logic gates.
gates.
gates.

Start at your most Skill needed: Recall


Recall is the ability to remember something that has happened in
challenging question.
the past or the act of remembering it.
Careers Section: Culture Curriculum: Learning about the
different jobs available within the career
area of Computer Science.

1. How does Computer Science helps in healthy lifestyle?


2. What are the advantages and disadvantages of technology when
developing a healthy lifestyle.
3. Before the development of technology, how would people promote
healthy lifestyle?

Cognition needed: Resourcefulness


Resourcefulness the ability to find quick
and clever ways to overcome difficulties
Logic gates
Boolean algebra
Boolean algebra is a notation used to represent logic.
For example:
• Q = A AND B
• Q = A OR B
• Q = NOT A
This notation can also be represented using
symbols:
• Q = A /\ B, or as A.B
• Q = A \/ B, or as A+B
• Q=¬A
Truth Table
Input Output
• NOT gate
1 0 A truth table shows, for each combination
0 1 of inputs, what the output will be.

Input A Input B Output The purpose id to list all the possible output
• AND Gate 0 0 0 for each data that has been inputted.
0 1 0
1 0 0
1 1 1

Input A Input B Output


• OR Gate 0 0 0
0 1 1
1 0 1
1 1 1
How to determine the

Combined Logic gates number of rows based on


a logic gate?

• Logic gates can be combined into circuits. For example, AND followed by a NOT.
Written as X = NOT (A and B). Remember: Operations in brackets are done first.
Input A Input B A AND B NOT (A AND B)
0 0 0 1
0 1 0 1
1 0 0 1
1 1 1 0

X = (NOT A) OR (B AND C) Input Input B Input NOT A B AND C (NOT A) OR (B AND C)


A C

How many rows will this


truth table has?
British Value: Individual

Class Activity
Liberty: You may choose the
questions you would like to
answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

Learning I don’t know I can explain I can I can write I can write
Objective: Be able
anything about the term differentiate different SQL SQL
to understand
how data is held
database. database. among fields, statements statements to
Complete Task Complete Task
inComplete
a database soTask 1 Complete Task records and such as update, query a 4 on
3 on past past paper
thaton past paper
information 2 on past tables. paper delete and Worksheet
database.
Worksheet paper
can be easily Worksheetinsert a table in .
Worksheet
added, deleted,
database.
amended and
Skill needed: Resourcefulness: Skill needed: Resilience:
retrieved.
exploring a variety of creative believing in ourselves and viewing challenges as
Learning Objective:
strategies Be able challenges
to overcome to understand how data is held in a database so that informationopportunities
can be easily added, deleted,learning.
for better amended and retrieved.
End of Lesson (EOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Lesson I don’t know I can list the three I can explain the I can draw the I can create the truth
objective: Be anything about main types of difference three main types of tables for the three
able to
logic gates. logic gates. between the logic gates. main types of logic
understand
AND gate and gates.
the different
the OR gate.
types of logic
gates and how
they work
based on their
inputs.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Cognition needed: Recall
CLASS Starter: Recall is the ability to remember something that has happened in the
past or the act of remembering it.

1.What is the difference between a virus and a worm? British


Value:
Individual
2.Explain ways how shoulder surfing be avoided Liberty:
You may
choose the
3.Describe baiting in regard to social engineering. questions
you would
like to
4.Analyse how phishing can be recognised. answer.

5.Create a mind map of all the different social engineering


methods you now know of.
Social Engineering
LO: Be able to understand the concept of social engineering and
different social engineering techniques.

Steps to success…
• I can identify social engineering.
• I can describe social engineering.
• I can compare the different types of social engineering.
• I can analyze the methods of social engineering.
SOL: Start of Lesson
Steps to success​ Not sure​ One idea​ Multiple ideas​ Linking ideas​ Applying ideas​

LO: Be able to I don’t know I can explain I can outline I I can


understand the anything about what is meant by and explain at can differentiate analyze ways
concept of social social least three between social to identify
social engineering. engineering. social engineering and social
engineering and engineering malwares. engineering
different social features. and the
engineering different
techniques. preventions
that can be
applied.
Complete Task in pairs British Value: Individual
Liberty: You may choose the
questions you would like to
Pre-Learning Task answer.

Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas

LO: Be able I don’t I can I can outline I can differentiate I can analyze ways
to understand know explain and explain between social to identify social
the concept of anything what is at least three engineering and engineering and the
social about meant by social malwares. different
engineering social social Describe
engineering preventions that can
andList three engineerin
different What is
engineering what is
features. be applied.
examples g.of
social meant
. by meant by Compare
Evaluate the
engineering Quid Pro importance of
social
techniques.
social between Quid
engineering. engineer. Quo social security
Pro Quo and
and how it helps
piggybacking.
Cognition needed: Resourcefulness to keep you safe.
Resourcefulness the ability to find
quick and clever ways to overcome
difficulties.
Culture Curriculum: Learning about the
different jobs available within the career area
Careers Section of Computer Science.

• Explain what a software engineer does.


• Name two famous software engineers.
• Describe ways how people with very poor sight can
use computers.

Cognition needed: Resourcefulness


Resourcefulness the ability to find quick
and clever ways to overcome difficulties
What is social Engineering?

Social Engineering is the act of manipulating humans

so that they give up private information or their money.


https://www.youtube.com/watch?v=Vo1urF6S4u0

• Many attacks require technical skills, but


social engineering relies on
psychological skills
Pretexting
• …Using an invented scenario (the pretext) to
trick the victim into giving up information

• This usually involves the attacker impersonating


someone else, who may be real or made up

• E.g. a ‘police officer’ might call you up,


claiming a family member has been in a car
collision
• They will try and get personal
information, e.g. home address and
national insurance number, but will be
Phishing
• Disguising yourself as a trustworthy person or
organisation to obtain personal information from a
victim
• Phishing is usually done over email, and
many emails will often be blindly sent
• Only one person needs to
be ‘hooked’ for the attack
to have worked
Baiting
• This involves tempting
someone with an offer
which is hiding the true
consequences
• E.g. Fake promotions: “Download
the latest video game for 60% off”

• E.g. leaving USB memory sticks


lying around which contain
malware
Quid Pro Quo
• Latin for “something for something”

• The attacker will offer something, like a


favour, in exchange for access to some
personal information
• E.g. An I.T. support technician might
offer to remove a suspected virus, in
return for remote access to your
computer
• They help initially, but the trick
comes later
Tailgating/Piggybacking
• When people who are authorised are
followed by an attacker to gain access to a
secure area
• E.g. an authorised person
might use a swipe card to open
a secure door, but hold it open
for someone behind them who
is unauthorised
• Pretexting might be used to make
the tailgating less suspicious, like
having a fake lanyard or
Shoulder Surfing
• Directly observing a person entering their
private information, often by looking over
their shoulder
• E.g. when someone is using an
ATM, the person behind them
shoulder surfs to observe their
PIN number
• E.g. looking at a colleague’s
keyboard as they enter their
password for their account
Pharming
• Creating a fake website which impersonates a
trusted one
• Victims are tricked to
enter their
information, thinking
the website is real
• Sophisticated pharming
attacks involve
redirecting the victim
from the legitimate
website to the fake
website
CLASS ACTIVITY: CHOOSE TWO
basedBASED ON TARGET OR ABILITY.
Choose
on
target or
ability.
Steps to Not sure​ One idea​ Multiple Linking ideas​ Applying
success​ ideas​ ideas​
Lesson objective: I do not know I can I can describe I can compare
Create a quiz ofI can
tenanalyse
To what is hacker. identify the how data can be barcodes and QR
questions data
based onstorage
1. Describe one difference
understand different collected.
1. What is meant by the term codes.
malware, socialmethods.
engineering
between
what is baiting and quid pro ‘weak
types of password’? [2 marks]. and data vulnerabilities.
quo. [4 marks].
meant by 2. Describe one problem with
hackers. Your quiz must be done on
2. Describe the actions that
hacking. using the manual update Microsoft Quiz and contain
could be taken to mitigate the method of security software. multiple choices and true
risk of a rootkit. [4 marks]. [2 marks]. false questions. Your
3. Explain the motivation of a 3. Explain one impact of an questions can range from
black hat hacker. [3 marks]. unsecured router. [3 marks]. easy to hard in knowledge
base.
Plenary

1. List three forms of attacks.


2. Explain what is meant by passive attack.
3. Differentiate between a SQL injection and a data interception.
4. Outline techniques that can be used to protect a network from
different forms of attacks.
Cognitive plenary
EOL: End of Lesson
Steps to success​ Not sure​ One idea​ Multiple ideas​ Linking ideas​ Applying ideas​

LO: Be able to I don’t know I can explain I can outline I I can


understand the anything about what is meant by and explain at can differentiate analyze ways
concept of social social least three between social to identify
social engineering. engineering. social engineering and social
engineering and engineering malwares. engineering
different social features. and the
engineering different
techniques. preventions
that can be
applied.

You might also like