Computer Science Paper 1 and 2 Lessons 1
Computer Science Paper 1 and 2 Lessons 1
Revision Lesson
Mock Exam/GCSE is Coming
Title: Components of computer Systems
British Value: Mutual
respect- we treat others the
way we would like to be
treated
LO: Be able to understand the different components
of a computer systems and their functions.
Steps to success:
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Some Computer
Components
Paper 1 Revision: Things you MUST
know.
The Central Processing Unit/The Processor
The CPU is mega-important – it is the main component of a computer
The CPU is:
The brain of the computer.
Processes all of the data and instructions that make the system work
The processing power of the CPU depends on it clock speed, number of cores and cache size.
The CPU has three main parts:
The control Unit (CU)
Other parts of the CPU are:
The arithmetic Logic Unit (ALU) Registers
Buses
The cache Clocks
Paper 1 Revision: Things you MUST know.
The Central Processing Unit Components
The Control Unit (CU)
The CU is in overall control of the CPU. Its main job is to execute program instructions by following the Fetch-decode-execute cycle.
It control the flow of data inside the CPU(register, ALU, cache) and outside the CPU (to main memory and input/output devices).
The Cache
Very fast memory in the CPU. It is slower than the registers(MAR, MDR, program counter and accumulator) but faster than RAM.
It stores regularly used data so that the CPU can access it quickly the next time needed.
It has very low capacity and are expensive compared to RAM and secondary storage.
There are different levels of cache memory – L1, L2 and L3. L1 is quickest but has the lowest capacity, L2 is slower than L1 but can
Paper 1 Revision: Things you MUST know.
Clock -The CPU contains a clock which is used to coordinate all of the computer's components. The clock sends out
a regular electrical pulse which keeps in time all the components. The frequency of the pulses is known as the clock
speed. Clock speed is measured in hertz. The higher the frequency, the more instructions can be performed in any
given moment of time.
Buses- A bus is a high-speed internal connection. Buses are used to send control signals and data between the processor
and other components.
Three types of bus are used:
• Address bus - carries memory addresses from the processor to other components such as primary memory and
input/output devices.
• Data bus - carries the actual data between the processor and other components.
• Control bus - carries control signals from the processor to other components. The control bus also carries the clock's
pulses.
What is the Von Neumann architecture?
Von Neumann architecture is the design upon which many general purpose computers are based.
The key elements of Von Neumann architecture are:
Execute Instruction:
Decode Instructions:
The instruction is performed. This could be:
The instruction in the MDR is decoded by the CU. The
Load data from memory, write data to memory, do a
CU may then prepare for the next step. E.g. by loading
calculation, or logic operation, change in the PC or stops
values into the MAR or MDR.
the program.
Paper 1 Revision: Things you MUST
know.
Disadvantages of using quad core processors:
• they are more expensive to design and make
• use more power than single or dual core processors.
• instructions have to be split up to decide which core
will execute them and the results have to be merged
together again at the end, which slows the processor
down a little.
Main task British Value:
Individual Liberty:
You may choose the
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t I know one I can I can outline I can evaluate the
Objective: Be know thing, compare and different functions importance of flash
able to anything Example: I contrast of Random Access memory and outline
understand the about the can explain between Memory (RAM) ways how it is
Complete page
two main memory. Complete
whatpage
a 5 volatile
5 andand
6 on the different from flash
categories of Complete the
on thecomputer
worksheet non-worksheet
volatile Read Only Memory
chip-based worksheet (ROM).
on pages
whichmemory
consists is.
of memory.
which consists
memory and 5 and 6 past paper
past paper of past paper
their questions.
questions questions
functions.
Skill needed: Resourcefulness:
Start at your most exploring a variety of creative
challenging question. strategies to overcome challenges
Plenary
Create a concept map that will summarise
the main points from today’s lesson.
5. Outline and explain the purpose of a truth table. Draw the truth
Revision Lesson
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t I know one I can I can outline I can evaluate the
Objective: Be know thing, compare and different functions importance of flash
able to anything Example: I contrast of Random Access memory
Outline and Compare and Evaluate and
the outline
understand the about the can explain between Memory (RAM) ways how it is
two main Describe explainand
two contrast importance of
memory. what a volatile different from flash
categories ofDefine the what is
computer reason
non- why
volatile between flash memory.
Read Only Memory
chip-based term meant
memoryby is. memory.
virtual primary Explain how it
(ROM).
memory andmemory. primary memory are memory and works and why
their memory. used. secondary will it be needed
functions. storage. by the computer.
Start at your most Skill needed: Recall
Recall is the ability to remember something that has happened in
challenging question.
the past or the act of remembering it.
Paper 1 Revision: Things you MUST
know.
Memory
Random Access Memory (RAM) is used as the main memory in a computer. It can be read and written to.
RAM in volatile.
Read Only Memory is non-volatile memory. It can only be read, not written to.
Paper 1 Revision: Things you MUST
know.
• Virtual memory is secondary storage used as extra RAM.
• Flash memory is an electronic non-volatile computer memory storage medium
that can be electrically erased and reprogrammed.
Paper 1 Revision: Things you MUST
know.
Storage
Secondary storage is needed to store our files and programs when they are not in use. Secondary storage is long term, non-
volatile storage
These commonly fall into three categories: Optical, Magnetic and Solid State.
Paper 1 Revision: Things you MUST
know.
Secondary Storage
Characteristics of Secondary storage:
• Capacity
- how much data can it store?
• Speed
- how fast can it access the data?
• Portability
- how easy is it to move it from one place to another
• Durability
- how well does it last e.g. if it is dropped
• Reliability
- how consistently does it perform
• Cost
Paper 1 Revision: Things you MUST
know.
Secondary Storage- Comparison
Main task British Value:
Individual Liberty:
You may choose the
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t I know one I can I can outline I can evaluate the
Objective: Be know thing, compare and different functions importance of flash
able to anything Example: I contrast of Random Access memory and outline
understand the about the can explain between Memory (RAM) ways how it is
two main memory. what a volatile and different from flash
categories of computer non-Complete
volatile quiz Read Only Memory
chip-based Complete page 8 Complete quiz 2 on
memory is. memory.
1 on the (ROM).
memory and on the worksheet the worksheet.
worksheet.
their
functions.
Start at your most Skill needed: Recall
Recall is the ability to remember something that has happened in
challenging question.
the past or the act of remembering it.
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Revision Lesson
Steps to success:
I can differentiate between wired and wireless network.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Twisted Pair
A server is essentially a more powerful computer that manages a network and provide
services to the clients. Some of the functions of the server are:
To share files
Provide security
Provide access to programs
Backup files.
Paper 1 Revision: Things you MUST
know.
Client Server Networks.
• A client server network is managed by a server. These devices connected to the server are
clients.
• Files and folders are usually stored centrally on the server rather than on individual client
devices.
Advantages Disadvantages
Easier to keep track of files as they are stored Expensive to set up.
electronically.
Easier to perform back-up Servers dependences- if the server goes down all
clients lose access to their work.
Easier to install and update software. The server may become overload if too many
clients are accessing it all at once.
Easier to manage network security.
Servers are reliable and always on.
A school client-server
Bubble, merge and insertion sort
Unit 5 Algorithms
•file servers - hold and maintain user files
•applications servers - allow programs to be run over a
setup network
•web servers - hold and share web pages
•print servers - manage printing across a network
•mail servers - handle emails between users
Mail Web
File Print Application
Server Server
Server Server Server
Paper 1 Revision: Things you MUST
know.
Peer to Peer Network don’t use servers.
• In Peer-to-Peer (P2P) networks all devices are equal, connecting directly to each other without a
server.
• You store files on individual devices and share them with others.
• P2P network may use at home to share files between devices, or connect devices to a printer.
Advantages Disadvantages
Easy to maintain- you don’t need any expertise No central management- devices need their
or expensive hardware. updates and security installed.
No dependence on server- if one device fails the Copying files between devices causes duplicated
whole network isn’t lost. files. Lose track of where files are stored.
Peer machines are less reliable and data may be
lost or fail.
Machine are prone to slow down when other devices
access them
Main task British Value:
Individual Liberty:
You may choose the
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t I know one I can I can outline I can evaluate the
Objective: Be know thing, compare and different functions importance of flash
able to anything Example: I contrast of Random Access memory and outline
understand the about the can explain between Memory (RAM) ways how it is
two main memory. what a volatile and different from flash
categories of computer non-Complete
volatile quiz Read Only Memory
chip-based Complete page 8 Complete quiz 2 on
memory is. memory.
1 on the (ROM).
memory and on the worksheet the worksheet.
worksheet.
their
functions.
Start at your most Skill needed: Recall
Recall is the ability to remember something that has happened in
challenging question.
the past or the act of remembering it.
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Revision Lesson
Steps to success:
I can differentiate the internet and the WWW.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Virtual networks form their connections through the internet. Virtual network servers create a
network that has no direct physical connection, but one that allows file sharing and
communication.
Paper 1 Revision: Things you MUST
know.
IP addresses- unique 32 or 128-bit identifiers given to devices when they access a network. E.g.
37.153.62.136 (This is in denary)
MAC addresses – unique 48 or 64 bit identifiers given to network devices by the manufacturer.
Example: 00-B0-D0-63-C2-26
IP address and the format of an IP addressing (IPv4 and IPv6)
IPv4- 69.89.31.226
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t I know one I can I can outline I can evaluate the
Objective: Be know thing, compare and different functions importance of flash
able to anything Example: I contrast of Random Access memory and outline
understand the about the can explain between Memory (RAM) ways how it is
two main memory. what a volatile and different from flash
categories of computer non-Complete
volatile quiz Read Only Memory
chip-based Complete page 8 Complete quiz 2 on
memory is. memory.
1 on the (ROM).
memory and on the worksheet the worksheet.
worksheet.
their
functions. Skill needed: Resilience:
believing in ourselves and viewing challenges as opportunities
Start at your most
for better learning.
challenging question.
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Revision Lesson
Steps to success:
I can explain the term encryption.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t I know one I can I can outline I can evaluate the
Objective: Be know thing, compare and different functions importance of flash
able to anything Example: I contrast of Random Access memory and outline
understand the about the can explain between Memory (RAM) ways how it is
two main memory. what a volatile and different from flash
categories of computer non-Complete
volatile quiz Read Only Memory
chip-based Complete page 8 Complete quiz 2 on
memory is. memory.
1 on the (ROM).
memory and on the worksheet the worksheet.
worksheet.
their
functions. Skill needed: Resilience:
believing in ourselves and viewing challenges as opportunities
Start at your most
for better learning.
challenging question.
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Revision Lesson
Steps to success:
I can explain the term packet switching.
I can outline and explain the steps involved in send packets across
the Internet.
I can evaluate the importance of layers and how they are used in
Start of Lesson (SOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
A 3. Transport
and the recipient.
breaks down the message into small chunks (packets). Each packet is
TCP
T
given a packet number and the total number of packets. The recipient
uses this information to assemble the packets together in the correct
order. It also allows the recipient to see if there are any missing packets.
N 2. Network adds the sender’s IP address and that of the recipient. The network then
knows where to send the message, and where it came from.
IP
D 1. Data Link enables the transfer of packets between nodes on a network, and between
one network and another.
Ethernet
Benefits of using Layers
Self – contained which allows them to function without affecting
the other layers.
They can be changed without affecting the other layers.
It allows network communication to be broken down into
manageable pieces.
Having set rules(protocols) ensures that companies make
compatible hardware and software.
What is packet switching?
Packet switching is where messages are broken up into very small pieces, called
packets.
Each packet consists of three parts:
header - this includes the sender's and recipient's IP addresses, the packet number,
the total number of packets the message contains, plus the details of
any protocols used
payload - this is part of the actual message itself.
Footer – This checks for error. Example, ensures the correct number of packets
merges. Otherwise, a request is sent to the server for the resending of the packet. .
The packets are sent individually across the network and put back
together to reform the message at the other end.
Summary on Packet switching
https://www.bbc.co.uk/bitesize/guides/zr3yb82/revision/7
Main task British Value:
Individual Liberty:
You may choose the
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Revision Lesson
Steps to success:
I can explain the term malware.
S
Sub-topics you have mastered in the core curriculum..
I
Sub-topics you need to improve on in order to move on to the
next aspect of the core curriculum.
R
Answer the question(s) from the I aspect of your SIR.
Programs embedded (hidden) within other files. They replicate themselves and become part
Viruses
of other programs. Viruses often cause damage by deleting or modifying data.
Programs similar to viruses except that they are not hidden within other files. Worms often
Worms
spread through emails.
Programs which pretend to be legitimate but in reality are malware. They are often
Trojans disguised as email attachments. Trojans cannot spread by themselves - instead they deceive
a user into installing the program.
Programs that monitor user activities (such as websites visited, usernames and passwords
Spyware
used) and send the information back to a hacker.
Programs that attempt to blackmail a user into making a payment to a hacker. Some types
Ransomware of ransomware do little but try to scare users into paying, while others go further - they
Other threats Description
Emails that try to trick users into giving away personal details. The phishing email pretends to be a genuine
message and tries to deceive the user into following a link to a website that looks like the real company, for
Phishing
example, a bank. However, it is a fake website designed to catch data such as bank account numbers and
security codes.
Where a program is used to find a password by trying all possible combinations of characters until the
Brute force
correct one is obtained.
Where a computer (or many computers) is used to prevent a server from performing its tasks. This is done by
Denial of service (DOS) bombarding the server over and over again with requests. Eventually the server is tied up trying to handle all
the DOS requests, making it very difficult for it to respond to legitimate requests.
Where data is intercepted during transmission. This is done using software called a packet sniffer, which
Data interception and theft examines data packets as they are sent around a network, or across the internet. The information gathered is
sent back to a hacker.
Structured query language (SQL) Where SQL code is entered as a data input. Many databases use SQL code to interrogate the data and
injection maintain the structure. SQL code can be inputted as data, which can cause errors or unintended operations.
Poor network policy Where a network does not have security rules in place for users to follow.
Where users do not adhere to network policy. People frequently ignore rules, or accidentally or deliberately
break them. For example, many users choose easy to guess passwords, or send and receive personal emails
People
which may contain viruses. This behaviour increases the chances of a network being compromised and its
data being accessed by unauthorised users. This is sometimes called social engineering.
Identifying and preventing vulnerabilities
Main task British Value:
Individual Liberty:
You may choose the
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Revision Lesson
Steps to success:
I can explain the term system software.
Mobile UIs are similar in many ways to GUIs, except that they
respond to touch. Fingers are used to open programs and interact
with them. Gestures such as swiping are used to scroll within
documents. Pinching and stretching are used to re-size images.
Mobile UIs are found on smartphones and tablets.
Memory management
Allocates memory to applications- can run more than one piece of software at a time.
Removes data no longer needed- Frees up space for other programs.
Moves data between RAM and virtual memory- allows more programs to run
File Management/handling
File handling and file maintenance is one of the most important tasks of an operating system. The
file handling software allows users to:
• create, modify and delete files and folders
• copy and duplicate files and folders
• move files and folders
• rename files and folders
• sort items into different orders, according to name, file type, date created and more
• search for particular files and folders
• restore deleted files
User Management Operating systems also manage users.
They allow:
• individual users to be created and deleted
• access levels to be given to users, such as administrator
rights or standard user rights
• auditing (keeping a log) of files a user creates, accesses,
edits and deletes
Peripheral management and drivers Peripherals are hardware devices connected to a computer,
such as a monitor, printer, scanner or camera.
Revision Lesson
British
Value:
Mutual
Mock Exam/GCSE is Coming respect-
we treat
Ethical, legal, cultural and environmental issues. others the
way we
Starts at Slide 128 would
like to be
treated
LO: Be able to understand different ethical, legal,
environmental and cultural issues that take places daily.
Steps to success:
I can differentiate between ethics and laws.
I can analyse the different social and cultural issues that are faced on a daily
Start of Lesson (SOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t know I can explain the I can outline I can compare I can evaluate the
Objective: Be anything different and explain the and contrast different cultural
able to ethics and between ethics different between open and environmental
understand laws. and laws computer source software issues that are
different legislations. and proprietary faced on a daily
ethical, legal, software. basis.
environmental
and cultural
issues that
take places
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
like to answer.
Fish and Hook/Pre-Learning Task.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t know I can explain I can outline and I can compare and I can evaluate the
Objective: Be anything the different explain the contrast between open different cultural and
able to ethics and Explain
between ethics different source software and environmental issues
Outline and Compare and Evaluate two
understand laws. different roles
and laws computer
explain the proprietary software. that are faced on a daily
List three contrast open cultural and
different ethical, and legislations.
Data basis.
examples of source and environmental
legal, responsibilities Protection
ethical issues? proprietary issues that are
of a Act 2018.
environmental software. faced daily.
stakeholder.
and cultural
issuesStart
that take
at your most Skill needed: Recall
Recall is the ability to remember something that has happened in
challenging question.
places daily. the past or the act of remembering it.
What is Proprietary Software?
What is Open Software?
Benefits of having open and proprietary
software
Data Protection Act 2018
Key principles in the Data Protection Act 1998 and 2018
Data Protection Act 1998 Data Protection Act 2018
Personal data must be fairly and lawfully processed Personal data must be fairly and lawfully processed
Personal data must be obtained for specified, explicit and legitimate
Personal data must be obtained for specified and lawful purposes
purposes
Personal data must be adequate, relevant and not excessive Personal data must be adequate, relevant and not excessive
Personal data must be accurate and up to date Personal data must be accurate and up to date
Personal data must not be kept for longer than is necessary Personal data must not be kept for longer than is necessary
Personal data must be processed in line with your rights Personal data must be handled in a way that ensures security
Revision Lesson
British
Value:
Mutual
Mock Exam/GCSE is Coming respect-
we treat
Ethical, legal, cultural and environmental issues. others the
way we
Starts at Slide 140 would
like to be
treated
LO: Be able to understand different ethical, legal,
environmental and cultural issues that take places daily.
Steps to success:
I can differentiate between ethics and laws.
I can analyse the different social and cultural issues that are faced on a daily
Start of Lesson (SOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t know I can explain the I can outline I can compare I can evaluate the
Objective: Be anything different and explain the and contrast different cultural
able to ethics and between ethics different between open and environmental
understand laws. and laws computer source software issues that are
different legislations. and proprietary faced on a daily
ethical, legal, software. basis.
environmental
and cultural
issues that
take places
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
like to answer.
Fish and Hook/Pre-Learning Task.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t know I can explain I can outline and I can compare and I can evaluate the
Objective: Be anything the different explain the contrast between open different cultural and
able to ethics and Explain
between ethics different source software and environmental issues
Outline and Compare and Evaluate two
understand laws. different roles
and laws computer
explain the proprietary software. that are faced on a daily
List three contrast open cultural and
different ethical, and legislations.
Data basis.
examples of source and environmental
legal, responsibilities Protection
ethical issues? proprietary issues that are
of a Act 2018.
environmental software. faced daily.
stakeholder.
and cultural
issuesStart
that take
at your most Skill needed: Recall
Recall is the ability to remember something that has happened in
challenging question.
places daily. the past or the act of remembering it.
British Value: Culture Curriculum: Learning about the
Careers Section: Individual Liberty: You
may choose the questions
different jobs available within the career
area of Computer Science.
you would like to answer.
1. Explain two devices that can be used in by search team when looking for missing
people or animal.
2. Outline and explain the effects of using technology when doing searches of
missing people and animals.
3. Evaluate the benefits of technology and how it contributes to the field of
investigations.
Learning I don’t know I can explain the I can outline and I can compare and I can evaluate the
Objective: Be anything ethics different between explain the contrast between different cultural and
able to and laws. ethics and laws different open source environmental issues
understand computer software and that are faced on a
different ethical, legislations. proprietary daily basis.
legal, software.
environmental
and cultural
issues that take
places daily.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Revision Lesson
British
Value:
Mutual
GCSE is Coming respect-
we treat
Character Set, Images, Sound and compression others the
way we
Starts at Slide 147 would
like to be
treated
LO: Be able to understand the different character sets and how
data is convert from ASCII to binary.
Steps to success:
Lesson I don’t I can list two I can explain I can compare I can calculate the
objective: be know types of sounds the different and contrast size of an audio
able to anything character sets. between bit rate file using the bit
explain and about a and colour rate and time.
calculate how sounds depth.
sound is
stored in the
computer.
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
Fish and Hook/Pre-Learning Task. like to answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Lesson I don’t I can list I can explain I can compare I can calculate the
objective: be know two types the different and contrast size of an audio file
able to anything of soundscharacter between bit rate using the the
Outline bit rate
Differentiate Compare and formula
explain and about a sets. and colour depth. and time. used to:
List three types between contrast Calculate the
calculate how sounds Explain the ASCII and
of character between file size of an
term metadata. extended
sound is set. colour depth image file
ASCII. and bit rate. file size of an
stored in the
audio file.
computer. Skill needed: Recall
Start at your most
Recall is the ability to remember something that has happened in
challenging question.
the past or the act of remembering it.
GCSE Preparation
Personalised Learning Checklist (PLC)
Revision Guides and websites (OCR BBC Bitesize, GCSEPOD, links on PLC and revision guide
textbooks)
Grade Boundaries (know your targets and the minimum points that you are aiming for.)
1. Explain two devices that can be used in by search team when looking for missing
people or animal.
2. Outline and explain the effects of using technology when doing searches of
missing people and animals.
3. Evaluate the benefits of technology and how it contributes to the field of
investigations.
256 16 1 8 4 2 1
128 64 32 16 8 4 2 1
Paper 1 Revision: Things you MUST
know.
Character Sets
Computers work in binary. As a result, all characters, whether they are
letters, punctuation or digits are stored as binary numbers. All of the
characters that a computer can use are called a character set.
Three examples of character sets are:
American Standard Code for Information Interchange (ASCII)
Extended ASCII
Unicode
Paper 1 Revision: Things you MUST
know.
Character Sets
ASCII uses seven bits, giving a character set of 128 characters.
Extended ASCII
• Extended ASCII uses eight bits, giving a character set of 256 characters. This
allows for special characters such as those with accents in languages such as
French and Spanish.
Unicode
• Unicode uses 16 bits, giving a range of over 65,000 characters. 256 characters is
far too small to hold every character in other languages, such as Chinese or
Arabic
Images
Pixel A pixel(Short for picture element) is one specific colour.
Each pixel is stored as a binary value.
Colour depth The number of bits used for each pixel determines how many colours we can use.
The more bit per pixel the greater the colour depth and more bits we need to store the image.
2 raised to the number of bits determines the amount of possible colours.
Resolution The resolution is the concentration of pixels, usually measure in dots per inch(DPI). The more
pixel the better the resolution but the file size will be larger.
Metadata Data about data. Extra information stored about the image. Metadata includes: Width, height,
colour depth, file size, data, time etc.
The effect of colour depth and resolution on the size of Calculating the size of an image file:
an image file.
A larger colour depth and resolution = higher quality
Size = resolution x colour depth (in bits)
+ larger file size.
• A smaller colour depth and resolution = lower quality
To get the number of bytes divide your answer by 8.
image + smaller file size.
Example of Calculating an image file size.
Example - an image of height 200, width 400, colour depth 16 bits
200 × 400 = 80,000
80,000 × 16 = 1,280,000 bits
1,280,000 bits ÷ 8 = 160,000 bytes
160,000 ÷ 1000 = 160 kilobytes
• Result: 160KB
An analogue-to-digital converter will capture a sound wave at
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Lesson I don’t I can list I can explain I can compare I can calculate the
objective: be know two types the different and contrast size of an audio file
able to anything of sounds character between bit rate using the bit rate
explain and about a sets.Complete quiz
and colour depth. and time.
Complete page 8 Complete quiz 2 on
calculate how soundson the worksheet 1 on the the worksheet.
worksheet.
sound is
Skill needed: Resilience:
stored in the
believing in ourselves and viewing challenges as opportunities
Start at your most
computer.
challenging question.
for better learning.
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Lesson I don’t I can list two I can explain I can compare I can calculate
objective: be know types of sounds the different and contrast the size of an
able to anything character sets. between bit audio file using
explain and about a rate and colour the bit rate and
calculate how sounds depth. time.
sound is
stored in the
computer.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
3. Explain two ways an audio file will be affected if the sample rate is increased.
[4]
5. Explain two ways an audio file will be affected if the bit depth is increased.
[4]
Cognition needed: Recall British Value:
Revision Lesson
British
Value:
Mutual
Mock Exam/GCSE is Coming respect-
Computational thinking & Algorithm Production we treat
others the
Starts at Slide 164 way we
would
like to be
treated
LO: Be able to understand how to produce algorithms using
pseudocode and flowcharts.
Steps to success:
Lesson I don’t know I can list the I can explain I can draw and I can evaluate the
objective:
anything about three the different explain the principles of
Be able to
computational computational between a different computational
understand
how to thinking thinking flowchart and flowchart thinking.
produce principles. a pseudocode. symbols.
algorithms
using
pseudocode
and
flowcharts.
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
Fish and Hook/Pre-Learning Task. like to answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Lesson I don’t I can list I can explain I can compare I can evaluate the
objective: Be
know the three the different and contrast principles of
able to
anything program data types between IF-else computational
understand how
Compare and
to produce about constructs.
Explain the used in statements and Write an
thinking.
List the three Outline three contrast algorithm using a
algorithms using programmi computational programmin CASE
features of an statements.
between an
computational flowchart and a
thinking pseudocode and
pseudocodeprinciples.
and ng g. algorithm. pseudocode.
principles. a flowchart.
flowcharts.
techniques.
Binary Search
Efficient at searching a large list
List is sorted
It is quicker on a smaller list.
• List must be sorted.
Linear Search
search search
Merge sort
.
Efficient on large list.
Slower on small lists
Goes through the whole process even if
the list is sorted.
Uses more memory to create sub-lists.
1. Split the list into two sub-lists- start the second sub-list at the middle item.
2. Repeat step 1 on each sub-list until all sub-list only contain one item.
3. Merge pairs of sub-lists back together. Each time you merge two sub-lists,
sort the items into the right order.
4. Repeat step 3 until you’ve merged all the sub-lists together.
Example: Use a merge sort to order these numbers from smallest to largest: 9,
4 , 1, 5, 3, 6, 8, 7
b. Use an insertion sort to order these numbers from largest to smallest: 9, 4 , 1,
5, 3, 6, 8, 7
https://www.bbc.co.uk/bitesize/guides/zjdkw6f/revision/5
Main Task:
Design a pseudocode and a flowchart for each of the following
questions.
A program needs to perform the following tasks:
• Input two numbers from the user.
• Compare both numbers and output the largest number.
A program needs to perform the following task:
• Input a number from the user.
• Double the number input and print the result.
• Repeat bullets 1 and 2 until the user enters a number less than 0.
The area of a circle is calculated using the formula where is equal to 3.142 and r is the
radius.
Design an algorithm that allows a user to enter the radius of a circle as a whole number
between 1 and 30, the calculate and output the area of the circle.
Num1 = input(“enter first number”)
Num2 = input (“Enter second number)
If nun1 > num2
4 marks
print (num1)
else
print (num2)
endif
Lesson I don’t know I can list the I can explain I can draw and I can evaluate the
objective:
anything about three the different explain the principles of
Be able to
computational computational between a different computational
understand
how to thinking thinking flowchart and flowchart thinking.
produce principles. a pseudocode. symbols.
algorithms
using
pseudocode
and
flowcharts.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Cognition needed: Recall British Value:
its features.
Cognition needed: Recall
Recall is the ability to remember something that has
happened in the past or the act of remembering it.
Revision Lesson
British
Value:
Mutual
GCSE is Coming respect-
we treat
Programming Fundamentals others the
way we
Slide: 188 would
like to be
treated
LO: Be able to understand how to produce algorithms using
pseudocode and flowcharts.
Steps to success:
Lesson I don’t know I can list the I can I can outline I can write
objective:
anything about three program differentiate and explain the programs using
Be able to
programming constructs. between a basic file 1Dimensional
understand
how to fundamentals. variable and handling and a
produce constant. procedure. 2Dimensional
algorithms array
using
pseudocode
and
flowcharts.
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
Fish and Hook/Pre-Learning Task. like to answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Lesson I don’t I can list I can I can outline and I can write
objective: Be
know the three differentiate explain the basic
programs using
able to
anything program between a file Outline
handlingand 1. Evaluate the
1Dimensional and a
understand how importance of
about Explain the Write and
constructs. variable explain the
three procedure. 2Dimensional array
to produce List and using array.
difference features of syntax for
explainprogrammi
algorithms using the constant. 2. Differentiate
between a string open, write,
three program between a 1D
pseudocode and ng variable and a manipulation. read and close a
constructs. and a 2D
flowcharts. constant. text file.
fundament array.
als. Skill needed: Recall
Start at your most
Recall is the ability to remember something that has happened in
challenging question.
the past or the act of remembering it.
Culture Curriculum: Learning about the
Careers Section: different jobs available within the career
area of Computer Science.
A Constant is a named memory location which stores a value that will not change
in the program. Its value is set when declared.
Example:
f_name == “Mary”:
Data Types and Operators
Program Constructs
Sequence is the order in which instructions occur and are processed. Selection determines which
path a program takes when it is running.
https://www.bbc.co.uk/bitesize/guides/znh6pbk/revision/2
Identify the error:
average = number1/number2
number1 = int(input("Enter the first number: “))
number2 = int(input("Enter the second number: "))
print("The average is ", average)
• Selection is the process of making a decision. The result of the decision decides which path
the program will take next.
else
endif
Program Constructs
• Selection is the process of making a decision. The result of the decision decides
which path the program will take next.
Program Constructs
• Iteration is also often referred to as looping, since the program ‘loops’ back to an
earlier line of code. Sections of codes that are iterated are called loops.
print(“Coding is cool”)
https://www.bbc.co.uk/bitesize/guides/znh6pbk/revision/4
Program Constructs
Will loop until the user inputs the string “Correct”. Check condition is carried out before entering loop.
do
mark = int(input("Mark Entry"))
answer = input("New answer")
while not (0 <= mark <= 100):
until answer == "Correct“ print ("mark is invalid")
mark = int(input("Mark Entry")) # this allows user to re-enter
the mark.
Will loop until the user inputs the string “Correct”. Loop iterates once before a check is carried out.
Summary
Summary
Main task British Value:
Individual Liberty:
You may choose the
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Lesson I don’t I can list I can I can outline and I can write
objective: Be
know the three differentiate explain the basic programs using
able to
anything program between a file handling 1Dimensional and a
understand how
about constructs. variable and procedure.Complete page 56
2Dimensional array
to produce Complete page 49 Complete page and 57 on the
and
algorithms using programmi 50 on the 51 and 52 on
constant. worksheet
worksheet the worksheet
pseudocode and ng .
flowcharts. Skill needed: Resilience:
fundament
believing in ourselves and viewing challenges as opportunities
Start at your most
als.
challenging question.
for better learning.
End of Lesson (EOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Lesson I don’t know I can list the I can I can outline I can write
objective:
anything about three program differentiate and explain the programs using
Be able to
programming constructs. between a basic file 1Dimensional
understand
how to fundamentals. variable and handling and a
produce constant. procedure. 2Dimensional
algorithms array
using
pseudocode
and
flowcharts.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Steps to Success:
I can identify the three string features.
I can open, read, write and close a text file.
I can create at least two types of arrays.
Start of Lesson (SOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Learning I don’t know I can list the I can I can outline I can write
Objective:
anything about three features differentiate and explain the programs using
Understand
the string of string read and write purpose of an 1Dimensional
importance manipulation. manipulation. in relation to array and a
of the a text file. 2Dimensional
different file
array
handling
features and
how to
create 1D
and 2D
arrays.
Complete Task in pairs British Value: Individual
Liberty: You may choose the
questions you would like to
Fish and Hook/Pre learning answer.
Task
Steps to Not sure One idea Multiple Linking ideas Applying ideas
Success ideas
Learning I don’t I can list I can I can outline and I can write
Objective:
know the three differentiate explain the and
Outline programs using
Understand the Write a python
importance of anything features of read and
Differentiate purpose of an
explain the 1Dimensional andthe
code to check a
about Explain
string the between
write in difference
upperarray user’s age. array
2Dimensional If they
the different file
What is meant purpose of a string and between string are under 9, ask
handling byfeatures
an string? string manipulatio relation to a
string. lower string. concatenation them to multiply
and how to and string their age by 7 and
manipulati n. text file.
create
Skill 1D and
needed: Recall slicing. check the answer.
on.
Recall is the ability to remember
2D arrays.
something that has happened in the
past or the act of remembering it.
Culture Curriculum: Learning about the
Careers Section: different jobs available within the career
area of Computer Science.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Lesson I don’t I can list I can I can outline and I can write
objective: Be
know the three differentiate explain the basic programs using
able to
anything program between a file handling 1Dimensional and a
understand how
about constructs. variable and procedure.Complete page 56
2Dimensional array
to produce Complete page 49 Complete page and 57 on the
and
algorithms using programmi 50 on the 51 and 52 on
constant. worksheet
worksheet the worksheet
pseudocode and ng .
flowcharts. Skill needed: Resilience:
fundament
believing in ourselves and viewing challenges as opportunities
Start at your most
als.
challenging question.
for better learning.
End of Lesson (EOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Learning I don’t know I can list the I can I can outline I can write
Objective:
anything about three features differentiate and explain the programs using
Understand
the string of string read and write purpose of an 1Dimensional
importance manipulation. manipulation. in relation to array and a
of the a text file. 2Dimensional
different file
array
handling
features and
how to
create 1D
and 2D
arrays.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Steps to Success:
I can identify the three string features.
I can create at least two types of arrays.
I can open, read, write and close a text file.
Start of Lesson (SOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Learning I don’t know I can list the I can outline I can write I can open, read,
Objective:
anything about three features and explain programs using write and close a
Understand
the string of string the purpose of 1Dimensional text file.
importance manipulation. manipulation. an array and a
of the 2Dimensional
different file
array.
handling
features and
how to
create 1D
and 2D
arrays.
Video on Array
Complete Task in pairs British Value: Individual
Liberty: You may choose the
questions you would like to
Fish and Hook/Pre learning answer.
Task
Steps to Not sure One idea Multiple Linking ideas Applying ideas
Success ideas
Learning I don’t I can list I can I can outline and I can write
Objective:
know the three differentiate explain the programs using
Understand the
Explain the Differentiate
importance of anything features of read and purpose of an 1Dimensional and a
What is meant purpose of between a Outline and
about string
random write in integer
array Write the syntax
2Dimensional array
the different
by afile random random explain the
number to generate
handling features string
number manipulatio and a random
relation to a function
generator in a random numbers.
and how to real number. random(x, y)
generator. manipulati computer.
n. text file.
create
Skill 1D and
needed: Recall
on.
Recall is the ability to remember
2D arrays.
something that has happened in the
past or the act of remembering it.
Complete Task in pairs British Value: Individual
Liberty: You may choose the
questions you would like to
Fish and Hook/Pre learning answer.
Task
Steps to Not sure One idea Multiple Linking ideas Applying ideas
Success ideas
Learning I don’t I can list I can I can outline and I can write
Objective:
know the three differentiate explain the programs using
Understand the
importance of anythingfeatures of read and
Differentiate purpose of an 1Dimensional and a
Outline and
about Explain
string the between
write in a 1D array Write the syntax
2Dimensional array
the different
What fileis meant explain file
purpose of a array and a 2D handling to open and close
handlingbyfeatures string manipulatio relation
an array? 1D array. array to a features.
a text file.
and how to
manipulati n. text file.
create
Skill 1D and
needed: Recall
on.
Recall is the ability to remember
2D arrays.
something that has happened in the
past or the act of remembering it.
Culture Curriculum: Learning about the
Careers Section: different jobs available within the career
area of Computer Science.
Example: The number below are stored in an array called scores. Write an
algorithm that will add 3 to each number of the score array.
4 12 32 18 21 11 9 14 24
for k = 0 to 8
score[k] + 3 Adds 3 to the element in
For loop will run on each next k position k of the array.
element of the array.
Summary of Array/lists
https://www.bbc.co.uk/bitesize/guides/zb3yb82/revision/4
Two dimensional Array
A two-dimensional array is declared using two values - the number of rows and
the number of columns. For example:
array score = [1,9] - would give an array with two rows and ten columns
score[0,1] = 110
Tests
1 2 14 11 14 9
The ‘score’ array has been used to store four test scores for five 2 5 4 12 7 13
pupils, as shown. 3 6 8 18 19 15
Example: score[2, 0] will return the test 2 score for pupil 0 which is
5.
What will each of these return?
1. score[1, 3] 14
2. Score[3, 2] / score[1, 0] 3. 18 / 2 = 9
3. Write an algorithm to count the total score of any given pupil.
total= 0
pupil = input(“Enter the number of the pupil”)
for i = 0 to 3
total = total + score[i, pupil]
next i
print(total)
Example of a two dimensional Array
The 2D array ‘runs’ is used to store the number of runs
scored by two cricketers in their last four matches. E.g.
runs[2,0] returns 65. Write an algorithm to set all values in
the array back to 0. Cricketer
for i = 0 to 3
0 1
The i FOR loop goes for j = 0 to 1
runs[i , j] = 0 0 54 14
through the 4 rows.
The j FOR goes through next j 1 83 22
the 2 columns next i 2 65 37
3 58 26
match
Main task British Value:
Individual Liberty:
You may choose the
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t I can list I can I can outline and I can write
Objective:
know the three differentiate explain the programs using
Understand the
importance of anything features of read and purpose of an 1Dimensional and a
the different file about Complete
stringpage 49 write in array Complete page 56
2Dimensional array
Complete page and 57 on the
handling features string and 50manipulatio
on the 51 and
relation to a52 on worksheet
and how to worksheet the worksheet
manipulati n. text file. .
create 1D and Skill needed: Resilience:
on.
2D arrays. believing in ourselves and viewing challenges as opportunities
Start at your most
for better learning.
challenging question.
Past paper Question
End of Lesson (EOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Learning I don’t know I can list the I can outline I can write I can open, read,
Objective:
anything about three features and explain programs using write and close a
Understand
the string of string the purpose of 1Dimensional text file.
importance manipulation. manipulation. an array and a
of the 2Dimensional
different file
array.
handling
features and
how to
create 1D
and 2D
arrays.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Skill needed: Recall
Class Starter Recall is the ability to remember
something that has happened in the
past or the act of remembering it.
Steps to Success:
I can identify the three string features.
I can create at least two types of arrays.
I can open, read, write and close a text file.
Start of Lesson (SOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Learning I don’t know I can list the I can outline I can write I can open, read,
Objective:
anything about three features and explain programs using write and close a
Understand
the string of string the purpose of 1Dimensional text file.
importance manipulation. manipulation. an array and a
of the 2Dimensional
different file
array.
handling
features and
how to
create 1D
and 2D
arrays.
Complete Task in pairs British Value: Individual
Liberty: You may choose the
questions you would like to
Fish and Hook/Pre learning answer.
Task
Steps to Not sure One idea Multiple Linking ideas Applying ideas
Success ideas
Learning I don’t I can list I can I can outline and I can write
Objective:
know the three differentiate explain the programs using
Understand the
importance of anything features of read and
Differentiate purpose of an 1Dimensional and a
Name the six Outline and
What
the different fileis meant
about (6)string
file between
write in the array explain file
Write the syntax
2Dimensional array
byfeatures
file string handling readline() and to open and close
handling manipulatio relation to a handling
the writeline() operations. a text file.
and howhandling.
to operations.
manipulati n. text file.
create
Skill 1D and
needed: Recall
on.
Recall is the ability to remember
2D arrays.
something that has happened in the
past or the act of remembering it.
Culture Curriculum: Learning about the
Careers Section: different jobs available within the career
area of Computer Science.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t I can list I can I can outline and I can write
Objective:
know the three differentiate explain the programs using
Understand the
importance of anything features of read and purpose of an 1Dimensional and a
the different file about Complete
stringpage 49 write in array Complete page 56
2Dimensional array
Complete page and 57 on the
handling features string and 50manipulatio
on the 51 and
relation to a52 on worksheet
and how to worksheet the worksheet
manipulati n. text file. .
create 1D and Skill needed: Resilience:
on.
2D arrays. believing in ourselves and viewing challenges as opportunities
Start at your most
for better learning.
challenging question.
End of Lesson (EOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Learning I don’t know I can list the I can outline I can write I can open, read,
Objective:
anything about three features and explain programs using write and close a
Understand
the string of string the purpose of 1Dimensional text file.
importance manipulation. manipulation. an array and a
of the 2Dimensional
different file
array.
handling
features and
how to
create 1D
and 2D
arrays.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Cognition needed: Recall
Class Starter: Recall is the ability to remember something that has
happened in the past or the act of remembering it. British
Value:
Individual
1. List two validation used in a database. Liberty: You
may choose
the questions
2. Explain what is meant by validation. you would
like to
answer.
3. Differentiate between the WHERE clause and the FROM clause used in SQL
statements. .
4. Outline and explain the difference between the _ and the % in an SQL
statement.
5. Evaluate the purpose of using LIKE in a SQL statement rather than using the =
Steps to Success:
I can identify a database properties.
I can write SQL statement to create a database table and add, update or delete in
the table
I can write SQL statements to query a database
Pseudocode
Start of Lesson
Unit 5 Algorithms
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Learning Objective: I don’t know I can I can I can write I can write SQL
Be able to
anything explain the differentiate different SQL statements to
understand how
data is held in a
about term among fields, statements query a database.
database so that database. database. records and such as
information can be tables. update, delete
easily added, and insert a
deleted, amended
table in
and retrieved.
database.
Complete Task in pairs British Value: Individual
Liberty: You may choose the
questions you would like to
Fish and Hook/Pre Learning Task answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t I can explain I can I can write I can write SQL
Objective: Be able
know the term differentiate different SQL statements to query a
to understand
how data is held
anything database. among fields, statements such as database.
in a database so about 1. Explain the records and update, delete and Briefly discuss
Explain Compare and
What isdatabase.
that information meant term field tables. insert a tablerecords
in the importance of
SELECT, contrast
can be easily 2. Give two validations in
by the term examples of a
FROM and database.
and fields and
database. Explain
added, deleted,
database? WHERE clause give an example
field in a any two
amended and in SQL. of each.
database. validations.
retrieved.
Skill needed: Recall
Recall is the ability to remember Start at the most
something that has happened in the
past or the act of remembering it.
challenging question.
Culture Curriculum: Learning about the
Careers Section: different jobs available within the career
area of Computer Science.
Text
Joe Brown Date/Time
10/05/1984
Image Number
22
Database Components - Field
Field
• A field is a single item of information in a record
Record
• Each set of fields is known as a record
• Each record is a complete set of information
about one pupil
Learning Objective: Be able to understand how data is held in a database so that information can be easily added, deleted, amended and retrieved.
Database Components - File
File
• Each set of records is called a file
• The example above is a collection of information about pupils
• The information is set up in the same format for each item in the
collection
Learning Objective: Be able to understand how data is held in a database so that information can be easily added, deleted, amended and retrieved.
SELECT SELECT-ing data
SELECT
first_name
Column names FROM
students
Name
Learning Objective: Be able to understand how data is held in a database so that information can be easily added, deleted, amended and retrieved.
The WHERE clause
SELECT *
FROM
students
WHERE
group =
‘9AB’
Some Criteria for running queries in
Database
LIKE the letter followed by */ %- Returns
Key all the elements that starts with the
Points
letter you mentioned. Example: LIKE Y*
There are two wildcards often used in
conjunction
Both elementswithhavethe LIKE
trueoperator:
AND to be for the output
to be true. Example: Favourite fruit Apple
AND
% month
- The in which
percent you
sign were bornzero,
represents May.one,
or multiple characters.
OR Only one element has to be true for the output
to be true. Example: Favourite fruit Apple OR
_month
- Theinunderscore represents
which you were a single
born May.
character
* or the wildcard- Returns all the elements under the given field.
Note: MS Access uses an asterisk (*)
_/? - underscore Represents a single character.
instead of the percent sign (%), and a
question mark (?) instead of the
underscore (_).
Learning Objective: Be able to understand how data is held in a database so that information can be easily added, deleted, amended and retrieved.
British Value: Individual
Class Activity
Liberty: You may choose the
questions you would like to
answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t know I can explain I can I can write I can write
Objective: Be able
anything about the term differentiate different SQL SQL
to understand
how data is held
database. database. among fields, statements statements to
Complete
records and Task Complete
such as update, queryTask
a on
inComplete
a database soTask 1 Complete Task
3 on Revision Revision
on Revision
that information 2 on Revision tables. delete and Worksheet
database.
Worksheet Worksheet
can be easily Worksheet insert a table in .
added, deleted,
database.
amended and
Skill needed: Resourcefulness: Skill needed: Resilience:
retrieved.
exploring a variety of creative believing in ourselves and viewing challenges as
Learning Objective:
strategies Be able challenges
to overcome to understand how data is held in a database so that informationopportunities
can be easily added, deleted,learning.
for better amended and retrieved.
Pseudocode
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Learning Objective: I don’t know I can I can I can write I can write SQL
Be able to
anything explain the differentiate different SQL statements to
understand how
data is held in a
about term among fields, statements query a database.
database so that database. database. records and such as
information can be tables. update, delete
easily added, and insert a
deleted, amended
table in
and retrieved.
database.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Cognition needed: Recall
Class Starter: Recall is the ability to remember something that has
happened in the past or the act of remembering it.
British Value:
Steps to Success:
Start of Lesson
Unit 5 Algorithms
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Learning Objective: I don’t know I can I can I can write I can write codes
Be able to
anything explain the differentiate codes using using different
understand how
subprograms
about sub term sub between a global and sub programs.
works and their programs. programs. function and a local
importance in a procedure. variables.
program.
Complete Task in pairs British Value: Individual
Liberty: You may choose the
questions you would like to
Fish and Hook/Pre Learning Task answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t I can explain I can I can write I can write SQL
Objective: Be able
know the term differentiate different SQL statements to query a
to understand
anything database. 1. Evaluate the
among fields, statements such as database.
how data is held purpose of
in a database so about records and update, delete and using
Differentiate
that information database. Explain what tables. Outline
insert a tableand
in functions.
List
can be easily types of between a explain two 2. Differentiate
is meant by database.
subprograms
added, deleted, function and a
benefits of using between a
subprograms. subprograms. local variable
amended and
procedure. and a global
retrieved.
Skill needed: Recall
Recall is the ability to remember Start at the most challenging variable.
something that has happened in the
past or the act of remembering it. question.
Careers Section: Culture Curriculum: Learning about the
different jobs available within the career
area of Computer Science.
1. How does Computer Science helps in marketing?
2. What are the advantages and disadvantages of using
technology in marketing.
3. Before the development of computers, how was products and
services used to be advertised?
• Sub program- is a set of instructions stored under one name that are executed
when called.
• Argument- The value a parameter takes when the sub program is called.
• Local Variables- Can only be used within the structure/function they are declared in.
A Parameter is a special name given to a variable that is passed into a sub function.
It is worth noting that both procedures and functions can take in parameters.
An argument is the name given to the actual values when the sub program is called.
British Value: Individual
Class Activity
Liberty: You may choose the
questions you would like to
answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t know I can explain I can I can write I can write
Objective: Be able
anything about the term differentiate different SQL SQL
to understand
how data is held
database. database. among fields, statements statements to
Complete
records and Task Complete
such as update, queryTask
a on
inComplete
a database soTask 1 Complete Task
3 on Revision Revision
on Revision
that information 2 on Revision tables. delete and Worksheet
database.
Worksheet Worksheet
can be easily Worksheet insert a table in .
added, deleted,
database.
amended and
Skill needed: Resourcefulness: Skill needed: Resilience:
retrieved.
exploring a variety of creative believing in ourselves and viewing challenges as
Learning Objective:
strategies Be able challenges
to overcome to understand how data is held in a database so that informationopportunities
can be easily added, deleted,learning.
for better amended and retrieved.
Pseudocode
End of Lesson
Unit 5 Algorithms
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Learning Objective: I don’t know I can I can I can write I can write codes
Be able to
anything explain the differentiate codes using using different
understand how
subprograms
about sub term sub between a global and sub programs.
works and their programs. programs. function and a local
importance in a procedure. variables.
program.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Cognition needed: Recall British Value:
3. Explain two ways you can improve the robustness of your program.
Steps to success:
Lesson objective: I don’t know I can list the I can explain I can outline and I can evaluate the
Be able to anything three ways to the difference explain the different importance of
understand how to
about improve the between validation checks. defensive designs and
produce a robust Evaluate the
defensive maintainabilit iterative testing
Outline and how they help
benefits of tohaving
program and how Differentiate improved the
List three
designs. Explain
y of a what isandexplain
final the a robust programs
to apply different between types
features of a meant by a
program. five
testing. and explain
robustness of a ways
defensive designs of testing and
strong structured validation you can improve
program.
to your program.
password. diagram. test data.
checks. the robustness of
your program.
Start at your most Skill needed: Resourcefulness
challenging question. Resourcefulness is the ability to use the resources available(Google,
classmates) to assist in gathering solutions for your problems.
Careers Section: Culture Curriculum: Learning about the
different jobs available within the career
area of Computer Science.
Class Activity
Liberty: You may choose the
questions you would like to
answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t know I can explain I can I can write I can write
Objective: Be able
anything about the term differentiate different SQL SQL
to understand
how data is held
database. database. among fields, statements statements to
Complete Task Complete Task
inComplete
a database soTask 1 Complete Task records and such as update, query a 4 on
3 on past past paper
thaton past paper
information 2 on past tables. paper delete and Worksheet
database.
Worksheet paper
can be easily Worksheetinsert a table in .
Worksheet
added, deleted,
database.
amended and
Skill needed: Resourcefulness: Skill needed: Resilience:
retrieved.
exploring a variety of creative believing in ourselves and viewing challenges as
Learning Objective:
strategies Be able challenges
to overcome to understand how data is held in a database so that informationopportunities
can be easily added, deleted,learning.
for better amended and retrieved.
End of Lesson (EOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Lesson I don’t know I can list the three I can explain the I can outline and I can evaluate the
objective: Be anything about ways to improve difference explain the importance of
able to
defensive designs. the maintainability between iterative different validation defensive designs
understand
of a program. testing and final checks. and how they help to
how to
testing. improved the
produce a
robust
robustness of a
program and program.
how to apply
different
defensive
designs to
your program.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Class Starter:
1.For each letter of the Alphabet write down one test that begins
with that letter. For example: Skill needed: Recall
Recall is the ability to remember
•D Driving Test something that has happened in the
past or the act of remembering it.
•G GCSE exam
2. Explain why do you think testing is important?
3. Compare and contrast between iterative testing and final
testing.
4. Write a code that display the two types of programming
errors.
LO: be able to understand the importance of the different types
of testing when writing programs.
Steps to Success
I can explain the different types of testing.
I can compare and contrast between final testing and
iterative testing.
I can use a trace table to solve different algorithms.
I can evaluate the importance of the different types of
test data.
Start of Lesson (SOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Think:
• What is the difference between iterative and final testing?
• Would you use different test data for each?
Program Errors
Syntax error- when the compiler or interpreter doesn’t understand something you have
typed because it doesn’t follow the rules or grammar of the programming language.
Logic Error- when the compiler or interpreter is able to run the program but the program
does something unexpected.
Runtime errors are errors which will cause the program or computer to crash even if there
appears to be nothing wrong with the program code. Running out of memory will often cause
a runtime error.
What is a test plan?
• A test plan will outline exactly what you are going to test and how you are
going to test it.
• A good test plan will anticipate all of the potential issues with the program
and select appropriate test data to test for these issues.
The test data you need for your test plan
falls into one of four categories:
Normal 2476 To see how the alarm copes with normal usage Code accepted
Normal No input To see if the alarm prompts an input Prompt to enter code.
Invalid 12 To see if the alarm accepts inputs shorter than 3 digits. Error: The code is too short
Invalid 632191 To see if the alarm accepts inputs larger than 5 digits. Error: The code is too long
Erroneous 23aY To see if the system accepts non-digits. Error: the code contains non-
numeric data.
British Value: Individual
Class Activity
Liberty: You may choose the
questions you would like to
answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t know I can explain I can I can write I can write
Objective: Be able
anything about the term differentiate different SQL SQL
to understand
how data is held
database. database. among fields, statements statements to
Complete Task Complete Task
inComplete
a database soTask 1 Complete Task records and such as update, query a 4 on
3 on past past paper
thaton past paper
information 2 on past tables. paper delete and Worksheet
database.
Worksheet paper
can be easily Worksheetinsert a table in .
Worksheet
added, deleted,
database.
amended and
Skill needed: Resourcefulness: Skill needed: Resilience:
retrieved.
exploring a variety of creative believing in ourselves and viewing challenges as
Learning Objective:
strategies Be able challenges
to overcome to understand how data is held in a database so that informationopportunities
can be easily added, deleted,learning.
for better amended and retrieved.
End of Lesson (EOL)
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
languages..
Steps to success:
I can differentiate between high and low level languages.
Lesson objective: I don’t know I can list the I can explain I can outline and I can evaluate the
Be able to anything two main the difference explain the functions importance of using
understand high
about types of between high of the different types IDEs and explain it
and low level
languages, translators. Outline
level and of translators.
language
Differentiate main features.the
Evaluate
languages and the
translators andexplain
low two
level between high purpose of IDE.
List
purposes of using two Explain what is
andofIDEs.
features of
languages. level languages Outline and
translators. features meant by a
writing codes and low level explain three
IDE. translator.
in high level languages. features of IDE.
languages.
Machine code/Binary/Object Code 0000 0000 0000 The majority of code is written in high-level languages,
e.g. Python.
Assembly Language(needs an assembler to translate
to binary) ADD, R4, r2, R3 One instruction represents many instructions of
machine code.
One instruction of assembly code can represent one of
machine code. Same code works on different machines and
processors.
Code usually only works for one machine or processor.
Code is easy to read and write.
Code is hard to read and write.
Done need to know about the processor or memory
Needs to know internal structure of the CPU and how structure.
it manages memory.
Must be translated or interpreted before it can be
Machine code can be executed directly, without being executed.
translated. Slower and less memory efficient.
Faster and more memory efficient.
Translators
Compilers Interpreter
Translates all code at once into machine code, Translates and runs instruction line by line.
creating an executable file. Used every tmie code is run.
Only needed for initial translation. Stops and returns first error found.
Return a list of errors for whole program when Programs run more slowly.
compiling is complete.
Compiling can take a long time, but program runs
quickly once compiled.
Integrated Development Environment (IDE)
IDE is a software to help develop programs.
Breakpoints Pause the program at certain lines. Values can be checked to help diagnose
logic errors.
Translators A compiler or interpreter to allow sources to be executed.
British Value: Individual
Class Activity
Liberty: You may choose the
questions you would like to
answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t know I can explain I can I can write I can write
Objective: Be able
anything about the term differentiate different SQL SQL
to understand
how data is held
database. database. among fields, statements statements to
Complete Task Complete Task
inComplete
a database soTask 1 Complete Task records and such as update, query a 4 on
3 on past past paper
thaton past paper
information 2 on past tables. paper delete and Worksheet
database.
Worksheet paper
can be easily Worksheetinsert a table in .
Worksheet
added, deleted,
database.
amended and
Skill needed: Resourcefulness: Skill needed: Resilience:
retrieved.
exploring a variety of creative believing in ourselves and viewing challenges as
Learning Objective:
strategies Be able challenges
to overcome to understand how data is held in a database so that informationopportunities
can be easily added, deleted,learning.
for better amended and retrieved.
End of Lesson (EOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Lesson I don’t know I can list the two I can explain the I can outline and I can evaluate the
objective: Be anything about main types of difference explain the importance of using
able to
languages, translators. between high functions of the IDEs and explain it
understand
translators and level language different types of main features.
high and low
IDEs. and low level translators.
level
languages and
languages.
the purposes
of using
translators.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Cognition needed: Recall British Value:
5. Outline and explain the purpose of a truth table. Draw the truth
Steps to success:
I can differentiate between the AND gate and the OR gate.
I can draw and explain the three main types of logic gates.
I can create the truth tables for the different types of logic
gates.
Start of Lesson (SOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Lesson I don’t know I can list the three I can explain the I can draw the I can create the truth
objective: Be anything about main types of difference three main types of tables for the three
able to
logic gates. logic gates. between the logic gates. main types of logic
understand
AND gate and gates.
the different
the OR gate.
types of logic
gates and how
they work
based on their
inputs.
Complete Task in pairs British Value: Individual
Liberty: You may choose
the questions you would
Fish and Hook/Pre-Learning Task. like to answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Lesson objective: I don’t know I can list the I can explain I can draw the three I can create the truth
Be able to anything three main the difference main types of logic tables for the three
understand the
about logic types of logic between the gates. main types of logic
different types of
gates. gates. Draw
AND gate the
and gates.
logic gates and Draw and
notation Draw the truth
how they work Explain what is OR gate.
the
symbols of
explain the
tables for the
List the three meant by a three main
based on their
logic gates. each of the three main logic
truth table. types of logic
inputs. main logic gates.
gates.
gates.
Input A Input B Output The purpose id to list all the possible output
• AND Gate 0 0 0 for each data that has been inputted.
0 1 0
1 0 0
1 1 1
• Logic gates can be combined into circuits. For example, AND followed by a NOT.
Written as X = NOT (A and B). Remember: Operations in brackets are done first.
Input A Input B A AND B NOT (A AND B)
0 0 0 1
0 1 0 1
1 0 0 1
1 1 1 0
Class Activity
Liberty: You may choose the
questions you would like to
answer.
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
Learning I don’t know I can explain I can I can write I can write
Objective: Be able
anything about the term differentiate different SQL SQL
to understand
how data is held
database. database. among fields, statements statements to
Complete Task Complete Task
inComplete
a database soTask 1 Complete Task records and such as update, query a 4 on
3 on past past paper
thaton past paper
information 2 on past tables. paper delete and Worksheet
database.
Worksheet paper
can be easily Worksheetinsert a table in .
Worksheet
added, deleted,
database.
amended and
Skill needed: Resourcefulness: Skill needed: Resilience:
retrieved.
exploring a variety of creative believing in ourselves and viewing challenges as
Learning Objective:
strategies Be able challenges
to overcome to understand how data is held in a database so that informationopportunities
can be easily added, deleted,learning.
for better amended and retrieved.
End of Lesson (EOL)
Steps to Not sure One idea Multiple ideas Linking ideas Applying ideas
Success
Lesson I don’t know I can list the three I can explain the I can draw the I can create the truth
objective: Be anything about main types of difference three main types of tables for the three
able to
logic gates. logic gates. between the logic gates. main types of logic
understand
AND gate and gates.
the different
the OR gate.
types of logic
gates and how
they work
based on their
inputs.
Skill needed:
Reflectiveness:
thinking about what
we are good at and
what we need to do to
improve to become
better learners
Cognition needed: Recall
CLASS Starter: Recall is the ability to remember something that has happened in the
past or the act of remembering it.
Steps to success…
• I can identify social engineering.
• I can describe social engineering.
• I can compare the different types of social engineering.
• I can analyze the methods of social engineering.
SOL: Start of Lesson
Steps to success Not sure One idea Multiple ideas Linking ideas Applying ideas
Steps to Success Not sure One idea Multiple ideas Linking ideas Applying ideas
LO: Be able I don’t I can I can outline I can differentiate I can analyze ways
to understand know explain and explain between social to identify social
the concept of anything what is at least three engineering and engineering and the
social about meant by social malwares. different
engineering social social Describe
engineering preventions that can
andList three engineerin
different What is
engineering what is
features. be applied.
examples g.of
social meant
. by meant by Compare
Evaluate the
engineering Quid Pro importance of
social
techniques.
social between Quid
engineering. engineer. Quo social security
Pro Quo and
and how it helps
piggybacking.
Cognition needed: Resourcefulness to keep you safe.
Resourcefulness the ability to find
quick and clever ways to overcome
difficulties.
Culture Curriculum: Learning about the
different jobs available within the career area
Careers Section of Computer Science.