Why do we learn computing?
Computer Science is integral to the world we live in today. There is hardly an area of life that is not affected by Computer Science. In Computer Science, pupils not only learn the key principles of the discipline, they also aquire skills that will be useful in all other subjects including problem solving, Internet safety and basic digital literacy.
Head of Department
Mr Nital Patel
Our approach
Pupils are given time to master the basics of digital literacy and key computing principles in KS3. In KS4 and KS5, they select the subject as an option for specialisation where they undertake deeper exploration of the subject leading to GCSEs at KS4 and BTEC Level 3 National Extended Certificate/Diploma in IT at KS5.
Year 7
Autumn 1 | Autumn 2 |
---|---|
Using IT safely and effectively at Ark Elvin - an introduction to our network, core digital tools and platforms, and online safety | Spreadsheets |
Spring 1 | Spring 2 |
---|---|
Data Representation: Numbers and Text |
Data Representation: Image and Sound |
Summer 1 | Summer 2 |
---|---|
Scratch Programming: Part I |
Scratch Programming: Part II |
All Year 7 subjects Next Year 7 Subject - Modern Foreign Languages
Year 8
Autumn 1 | Autumn 2 |
---|---|
Introduction to Python Programming |
Python Programming Extended Project |
Spring 1 | Spring 2 |
---|---|
Hardware | Software |
Summer 1 | Summer 2 |
---|---|
Vector Graphics | 3D Animation |
All Year 8 subjects Next Year 8 Subject - Modern Foreign Languages
Year 9
Autumn 1 | Autumn 2 |
---|---|
Python Programming |
Physical Computing (with Python) |
Spring 1 | Spring 2 |
---|---|
Networks | Cyber Security |
Summer 1 | Summer 2 |
---|---|
Web Development (HTML and CSS) |
Mobile App Development (JavaScript) |
All Year 9 subjects Next Year 9 Subject - Modern Foreign Languages
Year 10
Autumn 1 | Autumn 2 |
---|---|
1.2.3 – Units Units of data storage, Data capacity and Calculation of data capacity requirements 1.2.4 – Data Storage Number base conversions, Binary addition, Overflow errors, Binary shifts, Character sets, ASCII, Unicode, Bitmaps, Metadata, Sound Encoding 1.2.5 – Compression Lossy and Lossless compression 2.4.1 – Boolean Logic Logic gates, Logic diagrams, Truth tables, Boolean operators |
2.1.2 – Designing, Creating, Refining Algorithms Inputs, Processes, Outputs, Pseudocode and High-level language 2.2.1 – Programming Fundamentals Variables, Constants, Operators, Inputs, Outputs, Assignment, Sequence, Selection and Iteration (count and condition-controlled) 2.2.2 – Data Types Integer, Real, Boolean, Character, String and Casting 2.2.3 – Additional Programming Techniques String manipulation, 1D-Arrays and Random number generation |
Spring 1 | Spring 2 |
---|---|
1.1.1 – Architecture of the CPU Fetch-Execute cycle, CPU components: ALU, CU, Cache and Registers and the Von Neuman architecture: MAR, MDR, Program counter and Accumulator. 1.1.2 – CPU Performance Clock speed, Cache size and Number of Cores 1.1.3 – Embedded Systems 1.2.1 – Primary Storage (Memory) RAM, ROM and Virtual Memory 1.2.2 – Secondary Storage Optical storage, Magnetic storage, Solid State storage and Storage characteristics |
2.1.1 – Computational Thinking Abstraction, Decomposition and Algorithmic Thinking 2.1.2 – Designing, Creating, Refining Algorithms Structure diagrams, Flowcharts, Trace tables 2.2.3 – Additional Programming Techniques Sub programs |
Summer 1 | Summer 2 |
---|---|
1.3.1 – Networks and Topologies LANs and WANs, Factors affecting network performance, client-server and P2P networks, Network hardware, The internet and Star and Mesh topologies 1.3.2 – Wired and Wireless Networks, Protocols and Layers Wired and wireless connections, Encryption, IP and MAC addressing, Standards, Protocols and Layers 1.6.1 – Ethical, Legal, Cultural and Environmental Impact Ethical, Privacy, Cultural and Environmental issues surrounding networks and the Internet |
2.1.2 – Designing, Creating, Refining Algorithms Identify common errors, Trace tables 2.1.3 – Searching and Sorting Algorithms Linear and Binary Search 2.3.1 – Defensive Design Considerations, Authentication, Input validation and Maintainability 2.3.2 – Testing Types of testing, Logic and syntax errors, Test data and Refining algorithms |
All Year 10 subjects Next Year 10 Subject - Modern Foreign Languages
Year 11
Autumn 1 | Autumn 2 |
---|---|
1.5.1 – Operating Systems 1.5.2 – Utility Software Encryption, Defragmentation and Data compression software 1.6.1 – Ethical, Legal, Cultural and Environmental Impact Copyright, Open source and Proprietary Software Licences 2.5.1 – Languages HLLs, LLLs and Translators (Compilers and Interpreters) 2.5.2 – The Integrated Development Environment (IDE) |
2.1.3 – Searching and Sorting Algorithms Bubble, Merge and Insertion Sort 2.2.3 – Additional Programming Techniques 2D-Arrays, File handling, Records and SQL |
Spring 1 | Spring 2 |
---|---|
1.4.1 – Threats to Computer Systems and Networks Malware, Social engineering, Bruteforce, DoS, Data interception and theft and SQL injection 1.4.2 – Identifying and Preventing Vulnerabilities Penetration testing, Anti-malware software, Firewalls, User access levels, Passwords, Encryption and Physical security 1.6.1 – Ethical, Legal, Cultural and Environmental Impact Data protection and Misuse |
Revision |
Summer 1 | Summer 2 |
---|---|
Revision | Revision |
All Year 11 subjects Next Year 11 Subject - Modern Foreign Languages