Computing Key Stage 4

Year 10

Year 10 Curriculum Overview Topics
Term 1 SLR 1.1 Systems architecture
1.1 Introduction lesson – About the course
SLR 1.1 – Lesson 1, Architecture of the CPU
SLR 1.1 – Lesson 2, Architecture of the CPU
SLR 1.1 – Lesson 3, How common characteristics of CPUs affect their performance
SLR 1.1 – Lesson 4, Embedded systems
_
Dedicated independent programming
Gain experience in practical programming
_
SLR 1.2 Memory and storage
SLR 1.2 – Lesson 1, RAM and ROM
SLR 1.2 – Lesson 2, Virtual memory
SLR 1.2 – Lesson 3, Common types of storage
SLR 1.2 – Lesson 4, Common types of storage
SLR 1.2 Memory and storage
SLR 1.2 – Lesson 5, Application storage
_
SLR 1.2 Memory and storage
SLR 1.2 – Lesson 6, Units
SLR 1.2 – Lesson 7, Data capacity and calculation of requirements
SLR 1.2 – Lesson 8, Binary conversion and addition
SLR 1.2 – Lesson 9, Binary shift and hexadecimal
SLR 1.2 – Lesson 10, Catch-up lesson
SLR 1.2 – Lesson 11, Character sets
SLR 1.2 – Lesson 12, Bitmaps
SLR 1.2 – Lesson 13, Sound
SLR 1.2 – Lesson 14, Compression
SLR 1.2 – Lesson 15, Compression
_
Dedicated independent programming
Gain experience in practical programming
Term 2 SLR 1.3 Computer networks, connections and protocols
SLR 1.3 – Lesson 1, Types of networks
SLR 1.3 – Lesson 2, Factors that affect the performance of networks
SLR 1.3 – Lesson 3, Client-server and peer-to-peer
SLR 1.3 – Lesson 4, Hardware for a LAN
SLR 1.3 – Lesson 5, the internet
SLR 1.3 Computer networks, connections and protocols
SLR 1.3 – Lesson 6, Catch up lesson
SLR 1.3 – Lesson 7, Star and mesh network topologies
SLR 1.3 – Lesson 8, Modes of connection
SLR 1.3 – Lesson 9, Wi-Fi encryption
SLR 1.3 – Lesson 10, IP and MAC addressing
SLR 1.3 – Lesson 11, Standards and common protocols
SLR 1.3 – Lesson 12, The concept of layers
_
Dedicated independent programming
Gain experience in practical programming
Term 3 SLR 1.4 Network security
SLR 1.4 – Lesson 1, Forms of attack
SLR 1.4 – Lesson 2, Threats posed to networks (malware)
SLR 1.4 – Lesson 3, Threats posed to networks (phishing) 1
SLR 1.4 – Lesson 4, Threats posed to networks (phishing) 2
SLR 1.4 – Lesson 5, Threats posed to networks (brute force attack)
SLR 1.4 – Lesson 6, Threats posed to networks (denial of service)
SLR 1.4 – Lesson 7, Threats posed to networks (data interception and theft)
SLR 1.4 – Lesson 8, Threats posed to networks (SQL injection)
SLR 1.4 – Lesson 9, Identifying and preventing vulnerabilities
SLR 1.4 – Lesson 10, Identifying and preventing vulnerabilities
SLR 1.5 System software
SLR 1.5 – Lesson 1, The purpose and functionality of operating systems
SLR 1.5 – Lesson 2, Operating systems part 1
SLR 1.5 – Lesson 3, Operating systems part 2
SLR 1.5 – Lesson 4, Utility system software
_
SLR 1.6 Ethical, legal, cultural and environmental issues with technology
SLR 1.6 – Lesson 1, Ethical issues
SLR 1.6 – Lesson 2, Privacy issues
SLR 1.6 – Lesson 3, Legal issues
SLR 1.6 – Lesson 4, Cultural issues
SLR 1.6 – Lesson 5, Environmental issues
SLR 1.6 – Lesson 6, How digital technology impacts society
SLR 1.6 – Lesson 7, Open source vs proprietary software

 

Year 11

Year 11 Curriculum Overview Unit content
Term 1 SLR 1.3 Computer networks, connections and protocols
SLR 1.3 – Lesson 1, Types of networks
SLR 1.3 – Lesson 2, Factors that affect the performance of networks
SLR 1.3 – Lesson 3, Client-server and peer-to-peer
SLR 1.3 – Lesson 4, Hardware for a LAN
SLR 1.3 – Lesson 5, the internet
SLR 1.3 – Lesson 6, Catch up lesson
SLR 1.3 – Lesson 7, Star and mesh network topologies
SLR 1.3 – Lesson 8, Modes of connection
SLR 1.3 – Lesson 9, Wi-Fi encryption
SLR 1.3 – Lesson 10, IP and MAC addressing
SLR 1.3 – Lesson 11, Standards and common protocols
SLR 1.3 – Lesson 12, The concept of layers
_
SLR 1.4 Network security
SLR 1.4 – Lesson 1, Forms of attack
SLR 1.4 – Lesson 2, Threats posed to networks (malware)
SLR 1.4 Network security
SLR 1.4 – Lesson 1, Forms of attack
SLR 1.4 – Lesson 2, Threats posed to networks (malware)
SLR 1.4 – Lesson 3, Threats posed to networks (phishing) 1
SLR 1.4 – Lesson 4, Threats posed to networks (phishing) 2
SLR 1.4 – Lesson 5, Threats posed to networks (brute force attack)
SLR 1.4 – Lesson 6, Threats posed to networks (denial of service)
SLR 1.4 – Lesson 7, Threats posed to networks (data interception and theft)
SLR 1.4 – Lesson 8, Threats posed to networks (SQL injection)
SLR 1.4 – Lesson 9, Identifying and preventing vulnerabilities
SLR 1.4 – Lesson 10, Identifying and preventing vulnerabilities
_
SLR 1.5 System software
SLR 1.5 – Lesson 1, The purpose and functionality of operating systems
SLR 1.5 – Lesson 2, Operating systems part 1
SLR 1.5 – Lesson 3, Operating systems part 2
SLR 1.5 – Lesson 4, Utility system software
_
Dedicated paper 2 exam revision lesson
Gain experience answering computational thinking, algorithms and programming questions for component J277/02 using our dedicated exam revision unit.
Term 2 SLR 1.6 Ethical, legal, cultural and environmental concerns
SLR 1.6 – Lesson 1, Ethical issues
SLR 1.6 – Lesson 2, Privacy issues
SLR 1.6 – Lesson 3, Legal issues
SLR 1.6 – Lesson 4, Cultural issues
SLR 1.6 – Lesson 5, Environmental issues
SLR 1.6 – Lesson 6, How digital technology impacts society
SLR 1.6 – Lesson 7, Open source vs proprietary software
_
Dedicated paper 2 exam revision lesson
Gain experience answering computational thinking, algorithms and programming questions for component J277/02 using our dedicated exam revision unit.
SLR 2.3 Producing robust programs
SLR 2.3 – Lesson 1, Input validation
SLR 2.3 – Lesson 2, Defensive design consideration
SLR 2.3 – Lesson 3, Maintainability and refining algorithms
SLR 2.3 – Lesson 4, Types of testing and errors
SLR 2.3 – Lesson 5, Suitable test data
SLR 2.3 – Lesson 6, Complete outstanding programs
_
SLR 2.5 Programming languages and IDEs
SLR 2.5 – Lesson 1, Characteristics of languages
SLR 2.5 – Lesson 2, Low level programming
SLR 2.5 – Lesson 3, Compilers and interpreters for translation
SLR 2.5 – Lesson 4, IDEs
_
Dedicated paper 2 exam revision lesson
Gain experience answering computational thinking, algorithms and programming questions for component J277/02 using our dedicated exam revision unit.
Term 3 Revision
Revision