KS3 COMPUTING

 

Learning Journey Computing

 

WHO’S WHO?

Progress Leader: Mr R Birchall

Teaching Staff: Mrs J Charlton, Mr D Hurst

Link Governor:

OUR AIMS

The Computing Faculty at Up Holland High School aims to ensure all students are proficient in the use of Computers to allow them to access a variety of resources across the whole school curriculum. Students should be able to make informed choices for their future pathway having experienced a breadth of IT and Computer Science related topics and link these to real world situations and careers.

Up Holland High School offers students a range of learning activities that develop their understanding and appreciation of different approaches to Computing that develops both their knowledge and digital skills. 

Students are encouraged to enrich their cultural capital by reflecting on the context of Computing work and its place in society both historically and currently.  This is achieved by understanding the work of many real-world companies and individuals who have been, and continue to be, influential in the way we operate in today’s digital age.

 

YEAR 7

TERM

UNIT OF STUDY

KEY SKILLS / LEARNING

Autumn

e-Safety

 

 

 

 

 

Block Programming

Students learn about a number of elements linked to e-Safety and evidence their research using presentation software to develop their skills.

Main concepts include: Cyber Bullying, Computer Legislation, Copyright, Sexting, Cat-Fishing and Identity Theft.

Students learn about the fundamental programming techniques using Code.org Accelerated course.

Main concepts include: Algorithms, Sequence, Selection, Iteration, Operators, Constants & Variables and Boolean Operators.

Spring

Programming Basics (Python)

 

 

 

Spreadsheet Basics

Students learn about command line programming using Python. The basic concepts from the block programming are revisited with students shown how to write code using the correct syntax.

Students learn about the basics of spreadsheets which includes development of knowledge and skills.

Main concepts include: Cells, Active Cells, Rows, Columns, Cell references, Worksheets, Workbooks, Formulas and Functions.

Summer

Digital Imaging

Students learn how to use digital imaging software to manipulate and create images for a specified purpose.

Main concepts include: layers, composition, duplicate, adjustment, grouping, selection tools

 

YEAR 8

TERM

UNIT OF STUDY

KEY SKILLS / LEARNING

Autumn

Binary & Logic

 

 

 

 

 

Programming Development

Students learn what Binary is and why it is so important to the way that our digital lives are made possible.

Main concepts include: Binary, Converting from and to Binary, Character sets, images and sounds and binary logic.

Students learn how to further develop their programming skills by examining the use of iteration and selection.

Main concepts include: Syntax, Interface, Syntax Error, Logic Error, While Loop, For Loop, Iteration and Conditional Statements.

Spring

Spreadsheet Development

 

 

 

 

 

Computer Networks

Students learn how to apply the basic spreadsheet skills they have previously learned to a specific scenario whilst developing more advanced skills.

Main concepts: Cell Ranges, Functions, Fill Handle, Conditional Formatting, IF Statements, CountIFs, Validation, and Charts & Graphs

Students learn how data is transferred around networks to enable the modern online communication methods.

Main concepts include: The Internet, Connectivity, topologies, Client-Server Networks and Encryption.

Summer

Cyphers & Cryptography

Students learn what ciphers are and focuses on how digital content can be protected and

displayed in many ways.

Main concepts include: Cryptography, Plain Text, Cypher Text, Encryption Key, Symmetric and Asymmetric, End-To-End Encryption, Caesar Cypher and Brute Force Attacks.

 

YEAR 9

TERM

UNIT OF STUDY

KEY SKILLS / LEARNING

Autumn

Cyber Security

 

 

 

 

 

 

 

 

 

Interactive Multimedia

 

 

 

 

Students learn about the importance of Cyber Security which links to both IT & CS KS4 courses. Revisiting e-Safety with a focus on malware & social engineering threats that exist online and prevention methods.

Main concepts include: Cyber Security, Malware, Social engineering, Hacking, Distributed denial of service (DDoS), System and Physical Vulnerabilities, Cyber Security, SWOT Analysis, Prevention Measures, Legislation.

Students learn about effective ways to communicate information using a variety of multimedia aspects. Students will develop an interactive presentation on a given theme.

Main concepts include: Assets, house style, master slides, slide navigation, animations & transitions.

Spring

Advanced Programming

 

 

 

 

Website Development

Students learn about more advanced features of command line programming with a focus on solving specific scenario-based tasks to promote computational thinking.

Main concepts include: Libraries and Lists

Students learn how to design and create a website to display information.

Main concepts include: Navigation bars, website layout & combining different media.

Summer

History of Computing

Students learn about famous figures from the history of Computing and Codebreaking.

Main concepts include: Encryption, The World Wide Web, Logic, Problem Solving, Revision Techniques and Computing Timeline.

 

ENRICHMENT OPPORTUNITIES

Key stage 3 ACE Computing challenge through Seneca Learning.

Film Club on Tuesday lunchtime in Co1.

Coding Club/Robotics on Thursday lunchtime in Co1.

Future developments: STEM Leaders programme, UK Bebras competition, Cyber First competition.

 

HOW TO SUPPORT YOUR CHILD'S LEARNING

Ask them what they think about Computing related items? Why was the device/app created? What purpose does it serve? What new technology is being talked about?

Encourage them to follow official profiles of famous people related to Computing on social media (Elon Musk, Mark Zuckerburg).

 

WHERE TO GO:

Visit Bletchley Park in Milton Keynes or Museum of Science and Industry in Manchester.

 

WHAT TO WATCH:

Computing documentaries – The Social Dilemma, The Secret Rules of Modern Living: Algorithms, The Code, We Are Legion: The Story of the Hacktivists

Films/TV Series about technological breakthroughs

Wall-E, Wreck It Ralph, Ralph Breaks the Internet, Tron, Tron Legacy, Iron Man, The Martian.

 

WHAT TO READ:

Biographies about Alan Turing, Elon Musk, Steve Jobs, Bill Gates, Ava Lovelace, Charles Babbage, Mark Zuckerberg

Historical articles Ava Lovelace, Charles Babbage, George Boole, Konrad Zuse, Gordon Moore, Alan Turing, Grace Hopper, Philip Don Estridge, Margaret Hamilton, Arthur C Clarke, Ted Codd, Tim Berners-Lee, Bill Gates, Steve Jobs, Sergey Brin & Larry Page, Marissa Mayer, Mark Zuckerberg.

 

ONLINE:

BBC Bitesize KS3 Computing - https://www.bbc.co.uk/bitesize/subjects/zvc9q6f

Code.org – Computational Thinking problems and games for students – http://code.org

Teach Computer Science - https://teachcomputerscience.com/ks3/

The Oak Academy KS3 Computing - https://classroom.thenational.academy/subjects-by-key-stage/key-stage-3/subjects/computing

Seneca Learning – Free courses for students to follow relating to Computing, Computer Science and Programming - https://senecalearning.com/en-GB/

 

FUTURE CAREERS:

Programmers work in many settings, including corporate information technology ("IT") departments, big software companies, small service firms and government entities of all sizes. Many professional programmers also work for consulting companies at client sites as contractors.

Systems architects are hired by all types of companies, since any company that relies on its own computer network needs someone to ensure infrastructure is properly designed. Companies also need systems architects on staff to make ongoing improvements and troubleshoot problems.

Cyber security careers are complex and many roles like:

Security specialist - An entry-level role with huge potential.

Security administrator -Keep security systems running smoothly every day.

Cryptographer -Write the code that hackers can’t crack.

Security architect -Outsmart online criminals by designing tough-to-crack security.

Forensic expert -Protect the cyber world and assist law enforcement.

Penetration tester -Hack and protect computer systems for good reasons.