Curriculum Overview

 

Key Stage 3 Key Stage 4 Sixth Form

Term 1: Systems Architecture, Memory and Storage and Data Storage

Learn about the Von Neumann computer architecture and the role of the CPU. Learn about the role of primary ('main memory') and secondary storage. Explore how computers store information and how everything you experience on a computer system is either a 0 or a 1.

End of unit tests

Von Neumann Architecture
The Von Neumann arch, is a design of computer system where there essentially three different entities, a processing unit, an i/o unit and an storage unit.

Accumulator
An accumulator is a register for short-term, intermediate storage of arithmetic and logic data in a computer's CPU (central processing unit). The term "accumulator" is rarely used in reference to contemporary CPUs, having been replaced around the turn of

Arithmetic
In mathematics, modular arithmetic is a system of arithmetic for integers, where numbers "wrap around" upon reaching a certain value—the modulus (plural moduli). The modern approach to modular arithmetic was developed by Carl Friedrich Gauss in his book D

Execute
To carry out a task

Cache
Disk caching works under the same principle as memory caching, but instead of using high-speed SRAM, a disk cache uses conventional main memory. The most recently accessed data from the disk (as well as adjacent sectors) is stored in a memory buffer.

CPU
A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions.

Embedded systems
An embedded system is some combination of computer hardware and software, either fixed in capability or programmable, that is specifically designed for a particular function. Industrial machines, automobiles, medical equipment, cameras, household applianc

Performance
The speed at which a computer operates, either theoretically (for example, using a formula for calculating Mtops - millions of theoretical instructions per second) or by counting operations or instructions performed (for example, ( MIPS ) - millions of in

  • Spiritual
  • Moral
  • Social
  • Cultural

Develop the individual:
Develop digital literacy and awareness of digital spaces.

Create a supportive community:

Term 2: Data Storage and Networks

Explore how computers store information and how everything you experience on a computer system is either a 0 or a 1. Learn how networks are used to enable computers to share data with each other.

End of unit tests

Independently
Functioning alone, in isolation.

Magnetic Tapes
Magnetic tape is a medium for magnetic recording, made of a thin, magnetisable coating on a long, narrow strip of plastic film. It was developed in Germany, based on magnetic wire recording. Devices that record and play back audio and video using magnetic

Archiving
To copy files to a long-term storage medium for backup. Large computer systems often have two layers of backup, the first of which is a disk drive. Periodically, the computer operator will archive files on the disk to a second storage device, usually a ta

Reliability
Reliability is an attribute of any computer-related component (software, or hardware, or a network, for example) that consistently performs according to its specifications. It has long been considered one of three related attributes that must be considere

High Capacity
The ability to process speedily or store vast amounts of information.

Optical Discs
In computing and optical disc recording technologies, an optical disc (OD) is a flat, usually circular disc which encodes binary data (bits) in the form of pits (binary value of 0 or off, due to lack of reflection when read) and lands (binary value of 1 o

OP or OS
The operating system (OS) is the most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs and applications. Computer operating systems perform basic tasks, such as recognizing input

GUI
In computer science, a graphical user interface(GUI /ɡuːiː/), is a type of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, instead of text-based user interfaces

Mainframe
Mainframe computers(colloquially referred to as "big iron") are computers used primarily by large organisations for critical applications, bulk data processing such as census, industry and consumer statistics, enterprise resource planning, and transaction

Simultaneous Access
When two or more programs or people access the same information at the same time.

  • Spiritual
  • Moral
  • Social
  • Cultural

Develop the individual:
Develop digital literacy and awareness of digital spaces.

Create a supportive community:

Term 3: Network Security, Software and Ethics

Learn about the threats to networks and the prevention methods. Learn about the purpose and functionality of systems software.

Students will sit a written End of Unit assessment and complete a programming challenge including a written report.

Encryption software
Encryption software is software that can encrypt and decrypt data, often in the form of files on a hard drive or packets sent over a network.

Defragmentation
Defragmentation is the process of locating the non-contiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.

Data Compression
The process of reducing the size of a data file is referred to as data compression. In the context of data transmission, it is called source coding (encoding done at the source of the data before it is stored or transmitted) in opposition to channel codin

NIC
Network Interface Card (NIC): Types, Function & Definition. To connect to a network, a computer uses a network interface card (NIC). A NIC controls the wired and wireless connections of a computer to exchange information with other computers and the Inter

WAN
Wide Area Network. A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs). Computers connected to a wide-area network are often connected through public networks, such as the

LAN
A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building and has its network equipment and interconnects locally managed.

Wireless
Wireless is a term used to describe telecommunications in which electromagnetic waves (rather than some form of wire) carry the signal over part or all of the communication path. Some monitoring devices, such as intrusion alarms, employ acoustic waves at

Router
A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.

Switch
A switch is used to network multiple computers together. Switches made for the consumer market are typically small, flat boxes with 4 to 8 Ethernet ports. These ports can connect to computers, cable or DSL modems, and other switches. High-end switches can

Network
A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link.

  • Spiritual
  • Moral
  • Social
  • Cultural

Develop the individual:
Develop digital literacy and awareness of digital spaces.

Create a supportive community:

Term 4: Algorithms and Boolean Logic

Learn common algorithms used by computers to perform basic tasks such as sorting and searching. Explore logic circuits and learn how to write Boolean Algebra.

Students will sit a written End of Unit assessment.

DNS
Short for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses.

Virtual Network
Virtual network computing (VNC) is a type of remote-control software that makes it possible to control another computer over a network connection. Keystrokes and mouse clicks are transmitted from one computer to another, allowing technical support staff t

Hosting
A network host may offer information resources, services, and applications to users or other nodes on the network. A network host is a network node that is assigned a network layer host address. Computers participating in networks that use the Internet Pr

Encryption
The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ;e

Frequency
For an oscillating or varying current, frequency is the number of complete cycles per second in alternating current direction. The standard unit of frequency is the hertz, abbreviated Hz. If a current completes one cycle per second, then the frequency is

Ethernet
Ethernet, pronounced "E-thernet" (with a long "e"), is the standard way to connect computers on a network over a wired connection. It provides a simple interface and for connecting multiple devices, such computers, routers, and switches. With a single rou

Malware
Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system. In Spanish, "mal" is a prefix that means "bad," making the term "badware," which is a good way to remember it (even i

Phishing
Phishing is a form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels.

SQL
SQL or Structured Query Language is a special-purpose programming language designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS).

Secure systems
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they pro

  • Spiritual
  • Moral
  • Social
  • Cultural

Develop the individual:
Develop digital literacy and awareness of digital spaces.

Create a supportive community:

Term 5: Exam Practice and Revision

Practice for the GCSEs with exam practice and revision. Learn skills that will help you achieve better in exam situations.

Mock Exam

Vulnerabilities
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capabi

Anti-malware Software
Antimalware (anti-malware) is a type of software program designed to prevent, detect and remediate malicious programming on individual computing devices and IT systems.

Penetration testing
Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.

Environmental issues
Problems related to the environment or people who live in the environment. Environmental studies incorporates more of the social sciences for understanding human relationships, perceptions and policies towards the environment. Environmental engineering fo

Legal Issues
Relating to the law, problems that may arise if the law can be broken.

Privacy
Keeping personal information private.

Cultural Implications
The results of actions on different cultures or races.

Open Source
Open-source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose.

Proprietary Software
Proprietary software is computer software for which the software's publisher or another person retains intellectual property rights—usually copyright of the source code, but sometimes patent rights.

Stakeholders
The definition of a stakeholder is a person who has an interest in or investment in something and who is impacted by and cares about how it turns out. Read more at http://www.yourdictionary.com/stakeholder#wb2eX9ggSlViv5Jw.99

  • Spiritual
  • Moral
  • Social
  • Cultural

Develop the individual:
Develop digital literacy and awareness of digital spaces.

Create a supportive community:

Term 6: Python Project

Select a project and follow a brief to create your own solution.

Non Examined Assessment

Legislation
The law and acts passed in parliament that relate to a topic.

Computer Misuse Act
The Computer Misuse Act is designed to protect computer users against wilful attacks and theft of information. Offences under the act include hacking, unauthorised access to computer systems and purposefully spreading malicious and damaging software (malw

Data Protection Act
The Data Protection Act 1998 (DPA) is an Act of Parliament of the United Kingdom of Great Britain and Northern Ireland which defines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs the prote

Copyright Design and Patents Ac
The Copyright, Designs and Patents Act 1988, is the current UK copyright law. It gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used.

Creative Commons Licence
A Creative Commons (CC) license is one of several public copyright licenses that enable the free distribution of an otherwise copyrighted work. A CC license is used when an author wants to give people the right to share, use, and build upon a work that th

Freedom of Information Act
The Freedom of Information Act 2000 provides public access to information held by public authorities. It does this in two ways: public authorities are obliged to publish certain information about their activities; and. members of the public are entitled t

Binary
All computer data is represented using binary, a number system that uses 0s and 1s. Binary digits can be grouped together into bytes. There are two popular methods for converting binary to denary.

Denary
Converting a denary number into a binary number. Base 10 number system (denary) In our everyday lives we use a 'Denary' number system which has the number digits 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9. This is called a 'base-10' number system.

  • Spiritual
  • Moral
  • Social
  • Cultural

Develop the individual:
Develop digital literacy and awareness of digital spaces.

Create a supportive community: