HelloWorld The Big Book of Computing Content
HelloWorld The Big Book of Computing Content
Learn
Learn with
Learnwith
with the
withthe
the
the
Raspberry
Raspberry
Raspberry Pi
RaspberryPi
Pi Foundation
PiFoundation
Foundation
Foundation
Free
Freefor
Free foreveryone
for everyoneanywhere
everyone ininthe
anywherein
anywhere the world
theworld
world
Free for everyone anywhere in the world
Teaching
Teaching resources
resources Project
Projectlibrary
library
Teachingresources
Teaching resources Projectlibrary
Project library
Discover training,
Discover resources,
training, and
resources, and Browse
Browseour
our200+
200+online
onlineproject
project
Discover training, resources, and Browse our 200+ online project
guidance
Discover to help
training,
guidance youyou
resources,
to help teach and
teach guides
Browse ourthat
guides thatinclude
200+ onlinestep-by-
include step-by-
project
guidance to help you teach guides that include step-by-
computing
computing
guidance with
to help confidence.
with
you confidence.
teach guides
step
stepthat include step-by-
instructions
instructions for
forlearners.
learners.
computing with confidence. step instructions for learners.
computing with confidence. step instructions for learners.
teachcomputing.org
teachcomputing.org projects.raspberrypi.org
projects.raspberrypi.org
teachcomputing.org projects.raspberrypi.org
teachcomputing.org projects.raspberrypi.org
Digital
Digital making
making atathome
home Support
Supportfor forparents
parents
Digital making at home Supportfor
Support forparents
parents
Digital
Check making
outout
Check ourour at home
code-along videos
code-along and
videos and Watch
Watchour
oursupport
supporttutorials
tutorials
Check out our code-along videos and Watch
and our support
access
andour
access tutorials
engaging
engaging
take
Check part
take in
ourAstro
outpart Pi Mission
incode-along
Astro Zero
Pi Mission
videos Zero
and Watch support tutorials
take part in Astro Pi Mission Zero and access engaging
from
take home.
from
part home.
in Astro Pi Mission Zero andresources
resources for
for your
access engagingyourchild.
child.
from home. resources for your child.
from home. resources for your child.
raspberrypi.org/learn
raspberrypi.org/learn raspberrypi.org/learn
raspberrypi.org/learn
raspberrypi.org/learn raspberrypi.org/learn
raspberrypi.org/learn raspberrypi.org/learn
Raspberry Pi Foundation,
Raspberry UKUK
Pi Foundation, registered charity
registered 1129409
charity 1129409
Raspberry Pi Foundation, UK registered charity 1129409
Raspberry Pi Foundation, UK registered charity 1129409
HELLO, WORLD!
A
fter the warm reception our first special edition, The Big Book of Computing
Pedagogy, received, we’re pleased to welcome you to our second special edition,
The Big Book of Computing Content. While the first book focused on how we can
teach computing, this new book is about what we can teach within the discipline and really
demonstrates the wide applications of this constantly evolving subject.
We have structured The Big Book of Computing Content around the Raspberry Pi
Foundation’s framework for formal computing education. This framework was originally
developed by the Foundation for the Teach Computing Curriculum, as part of England’s
National Centre for Computing Education, and comprises eleven strands, each consisting of
a range of conceptual and applied knowledge outcomes. It aims to categorise computing
content to both demonstrate the breadth of computing as a discipline and to provide a
common language to describe the different competencies and areas of study.
This book complements our first special edition; as such, it follows the same principle of
introducing you to up-to-date research followed by our favourite stories, from past Hello
World issues, of educators putting a concept into practice. For each of the strands, you’ll find
a table of learning outcomes illustrative of the kinds of knowledge and understanding that
learners could develop at each stage of their formal computing education, from ages 5 to 19.
The second album is always a difficult one, so we’d love to hear your thoughts about this
edition! Last time, we heard of educators setting up Big Book reading groups, of leaders
using the book to support pre-service teachers, and even of a translation into Thai! Please
get in touch to let us know how you’re using The Big Book of Computing Content at
[email protected] or on Twitter at @HelloWorld_Edu. Happy reading, happy learning!
Gemma Coleman
Editor
This magazine is printed on paper Hello World is published by the Raspberry Pi Foundation, 37 Hills Road, Cambridge,
sourced from sustainable forests and CB2 1NT. The publisher, editor, and contributors accept no responsibility in respect of
the printer operates an environmental any omissions or errors relating to skills, products, or services referred to in the magazine.
management system which has been Except where otherwise noted, content in this magazine is licensed under a Creative
assessed as conforming to ISO 14001. Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0).
ARTIFICIAL INTELLIGENCE
DATA AND INFORMATION
COMPUTING SYSTEMS
CREATING MEDIA
PROGRAMMING
NETWORKS
IMPACT OF TECHNOLOGY
44 3D-ANIMATED FILM
16 AND OR NOT Democratising digital culture with
73 TEACHING CHILDREN TO CODE
Hands-on Boolean logic gates 3D-animated film The benefits of coding
20 QUANTUM COMPUTING
Introducing the world of 78 PROGRAMMING ASSESSMENT
A comprehensive approach to
ALGORITHMS
quantum information
assessing a program
AND DATA
NETWORKS STRUCTURES DATA AND
INFORMATION
24 NETWORKS, IN SUMMARY 50 ALGORITHMS AND DATA
STRUCTURES, IN SUMMARY
82 DATA AND INFORMATION,
IN SUMMARY
26 TEACHING APPROACHES 52 IN DEFENCE OF PSEUDOCODE
84 DATA LITERACY
The themes and tiers model The power of pseudocode
Fostering data literacy competencies
98 BIG IDEAS 131 ONE DESIGN, THREE WAYS 160 SUPPORTING SEND STUDENTS
Big ideas in AI education Design in the primary classroom Key digital skills for SEND learners
student; understanding how a computer system works allows ■ What the research says:
learners to write instructions for computers, as well as to what is a computer?
create artefacts with them. Knowing how a system stores ■ The input–process–output model
images in memory, for example, might influence how students ■ Hands-on Boolean logic gates
create and save images for a specific purpose. ■ Logic gates in Minecraft
Within this concept, students will focus on hardware and
■ Introducing the world of
software, and the further they explore these themes, the more quantum information
granular their focus will become. With hardware, for example,
learners will gradually shift their focus from thinking about the
system as a whole, to the individual devices, to how individual
components (for example, the central processing unit or
memory) work, and eventually, to the physical processes on
which the system is built. Similarly, learners will
typically begin by unpacking the difference
between hardware and software, before
coming to understand the different types
of software, and finally, how hardware and
software work together in a computer system.
IN SUMMARY
COMPUTING
SYSTEMS
Understand what a computer is, and
how its constituent parts function
together as a whole
STAGE 1 STAGE 2
■ Identify familiar examples of computing systems in ■ Examine how computers process input data in
the local environment order to produce outputs (IPO)
■ Name types of computing device, such as ■ Explain that computers require input to
laptop, desktop, tablet, etc. perform a task
■ Recognise key features of computing systems ■ Explain that computers produce useful output
from a task
■ Describe the features and uses of different
computing systems ■ Identify the inputs, processes, and outputs
of specific computing systems
■ Explain some capabilities and limitations of
computing systems ■ Classify a broad range of input/output devices
In the table below, you will find learning outcomes associated with
the ‘Computing systems’ strand of the Raspberry Pi Foundation’s
computing taxonomy. These learning outcomes are illustrative of the
kinds of knowledge and understanding that learners could develop in
this area of computing. They are not prescriptive, but instead aim to
illustrate the wide applications of the discipline.
These learning outcomes were originally developed to complement
the English national curriculum for computing, and as such, stage 1
roughly corresponds to ages 5–7, stage 2 to ages 7–11, stage 3 to
ages 11–14, stage 4 to ages 14–16, and stage 5 to ages 16–19.
■ Compare general-purpose, purpose-built, ■ Describe each stage of the fetch–decode– ■ Describe the function, application, and
and embedded devices execute cycle principle of operation of specialist hardware
and software
■ Identify the purpose of a computing system’s core ■ Compare different types of memory and storage
internal components (CPU, memory, storage) including cache, RAM, and secondary storage ■ Explain the role of registers and buses in the fetch–
decode–execute cycle
■ Define an operating system and summarise ■ Describe different methods and media
its role used to store data ■ Explain the role of the BIOS in configuring
and booting hardware
■ Identify simple logic gates (AND, OR, NOT) ■ Describe the functions performed by the
operating system ■ Explain how resourcing and scheduling are managed
■ Convert between binary and denary by the operating system
representations of numbers ■ Explain the function of internal CPU
components and their effect on performance ■ Create and convert between Boolean
■ Explain the purpose of compression and provide expressions, circuit diagrams, and
examples of its use ■ Identify common logic gates and circuit diagrams truth tables
and explain their function
■ Build and program systems using physical ■ Apply the rules of Boolean algebra to manipulate
computing components such as buttons, ■ Construct truth tables and simple Boolean logical expressions
LEDs, and sensors expressions to represent logic
■ Apply bitwise operations on pairs of
■ Solve problems by using calculations binary numbers
and conversions with binary, denary, and
hexadecimal numbers ■ Explain the difference between high- and low-level
languages and the need for program translators
■ Describe how some common compression
techniques work
hen I first started teaching study to compare a tangible user interface This simple question highlighted a wealth of
W programming and algorithms to for controlling a robot with a graphical user alternate conceptions about programming
five-year-olds, I began by using Bee-Bots, interface (helloworld.cc/sapounidis2013). and computing systems. Many children
small floor robots you can program by In interviews with the participating identified that a computer needed a
pressing directional arrows on their backs. children, they initially preferred the tangible, keyboard. Many also believed that the
The theory behind using such devices suggesting that it seemed more fun and terms ‘machine’, ‘technology’, ‘electrical
is that they are more concrete than engaging. Younger children got on better device’, and ‘computer’ were all synonyms.
programming on-screen, and therefore with the tangible system, although this could The other commonality was describing the
more accessible for younger learners. be more to do with their developing mouse- computer’s function, as if we just need to
However, I kept coming unstuck. How do control skills. Other research on physical know what it does to define it. This view of a
learners connect what they’re doing on computing also finds increased engagement definition leads to a reduced understanding
a Bee-Bot with the computer systems all with hands-on tools, and greater problem- of what computers are capable of.
around them? Here is the research I read solving skills, so there is definitely support Here’s a useful activity to explore this
and the tasks I tried on my quest to find for this approach — but this is where things question with younger children. First, get a
an answer! started to unravel for me. piece of paper folded into quarters. In the
I found that learners could explain what first quarter, learners have two minutes to
Manipulatives an algorithm was, and that a program was draw a picture of a computer. Nearly all of
Let’s take a minute to go back to some ‘a set of instructions that runs on a computer them will draw a laptop. Discuss what they
of our favourite learning theorists: Jean to tell it what to do’. Both met the curriculum drew — did their laptops include a keyboard
Piaget and Jerome Bruner (helloworld. needs, but I wasn’t convinced they could and a mouse? What about a screen? By
cc/piaget1952 and helloworld.cc/ link these two facts together. Could they acknowledging the parts of a computer, you
bruner1964). Piaget believed learners connect what they were doing on the Bee- can later explore which parts are necessary
couldn’t even begin abstract thinking until Bot to the computing systems around them? for a computer to work. Now move on to
they were eleven, and Bruner recognised Did they understand what a computer was? the second quarter. This time, ask learners
that learners needed to do repeated actions to draw a different type of computer;
first (action-based thinking) before they What is a computer? you will usually get a mixture of desktop
could represent those actions on paper According to my class of nine- to eleven- computers or games consoles connected to
(image-based thinking). Both theorists year-olds, a computer is: a TV. Again, talk about the parts. Now you
support the idea that we need to work on a can have a discussion about there being
learner’s concrete understanding and that, nA piece of technology no keyboard on a games console. Repeat
as a learner progresses, they will transfer nA keyboard and a screen this process, but change the question to
this to more abstract contexts. n A search engine ‘What objects do you think have a computer
This application of learning theory n A machine used for work inside them?’ Each drawing they do leads to
supports what many educators have n A metal brain interesting discussions, from traffic lights, to
found when using manipulatives such n A machine with a keyboard remote control cars, to iPads.
as Bee-Bots. For example, researchers n An information device My learners now had two discrete
Sapounidis and Demetriadis conducted a n Electric chunks of knowledge: how to program
a Bee-Bot, and that laptops were a home button and a touchscreen, or we can I found similar benefits when teaching
computers. However, without a bridge talk to it using Siri. What code runs when we programming, where learners could tell me
to connect them, this learning began to press the home button? Something like ‘when that a wide range of devices ran programs,
seem disjointed. If it’s not a computer, button pressed, show home screen’. And then including Bee-Bots and beyond! Since
it can’t run a program, so what are the output? We can see it on the touchscreen. these early discoveries, I ensure that each
they learning from playing with it? The This simple model allows us to test different September, I start teaching with an age-
answer took me back to the research machines or items of technology and tell if appropriate introduction to computing
about manipulatives and those early- they’re computers or not. systems and make regular links back to this
learning theories I introduced at the start One misconception I regularly hear learning when I teach programming later
of the article. Learners needed to have is children referring to a monitor as a on. The Bee-Bot discussed here was one
a concrete, conceptual understanding computer. Using this model, we can test example of a manipulative, but there are
of what a computer is before they this alternate conception. What’s the input? many more examples, from floor robots, to
could start comprehending the more There are buttons. What happens when Raspberry Pis, to microcontrollers. There are
abstract role of a program in that system. we press them? It says ‘no input’. What’s many ways for you to challenge learners’
We needed to spend more time teaching the program it’s running? It’s not doing concepts of what a computer is, including
computing systems. anything, because there’s no laptop plugged embedded systems where you can find
computers in washing machines, traffic
lights, or automatic doors.
ometimes, when you ask a magical at best, and sentient at worst. This output is how the computer finally presents
S question of young learners, you are article will explore some common alternate the results of the process. It can return the
pretty sure you know what their response conceptions that learners hold about results to the user in many ways, such as
will be. Other times, they take you by computing systems, and how you can use displaying text on a screen, creating printed
surprise: you blink, try to keep calm, the input–process–output (IPO) model to materials, or playing a sound from a speaker.
and begin unpicking exactly where that support learners in making sense of the IT In today’s connected world, it’s easy
answer came from. This is what happened around them. to overlook the processes taking place in
when Sway asked a class of seven- to devices that learners don’t immediately
eight-year-olds how automatic doors The IPO model recognise as computer systems, such as
worked. One child rationally explained All computers work with inputs, processes, pedestrian crossings or washing machines.
that a person was watching the door on a and outputs (see Figure 1). All computers This can lead to learners developing
camera, and when someone approached accept inputs, which are entered into alternate conceptions about what is
the door, they pressed a button and the or received by a computer. They can be happening, making it harder for them to
doors opened. Simple. generated in many ways, including by a apply their understanding of programming
While this is a perfectly reasonable user pressing a key on a keyboard, or a or input and output devices as they gain
explanation, it is not the correct one. computer receiving a signal from another more knowledge. We can’t build knowledge
Instead, it highlights that our learners often device. The process then determines what on insecure foundations, so the sooner we
have no idea how information technology the computer does with that input. It can identify these misconceptions, the better.
(IT) actually works, what it does, or why process the same input in different ways,
something is happening. This makes it seem depending on the program running. The Does a lamp have a computer inside it?
As we start to pay attention to the world
around us, we begin to recognise different
groups of objects that have similar
properties, such as natural or manufactured,
mechanical or electrical. However, as these
objects become more complex, it can be
hard to tell which groups they belong
to. This ambiguity can make learners
overgeneralise their understanding of how
something works. Taking time to break this
down with the IPO model allows learners to
reflect on their assumptions.
Let’s imagine a desk lamp. Does it
have an input? Yes — I press a button to
trigger what I want to happen. Does it
have an output? Yes — the light turns on.
Now comes the important part: is there
a process? No — there is no program
n F igure 1 A simple example of the IPO model receiving data that the button has been
FURTHER RESOURCES
The Raspberry Pi Foundation’s free online
pressed. Instead, the switch on the when we begin considering personal courses:
lamp creates a circuit for the electricity data, what’s stored locally on the device n Teach Computing Systems and Networks
to 5- to 11-year-olds: helloworld.cc/
to flow through, allowing the bulb to you are using, and what’s uploaded to the
systemscourse
light. Therefore, most lights do not have internet. I’ve found that this is particularly
n Get Started Teaching Computing in
computers inside of them. challenging with certain apps on tablets
Primary Schools: Preparing to teach 5–11
that may also back up online.
year olds: helloworld.cc/primarycourse
Computers are really clever To unpick this, it’s important to start
The feeling we have that computers are considering larger and more complex
Free lessons and activities in the Teach
magical, before we start to understand systems, such as ATMs. The input (data from
Computing Curriculum:
how they work, is often reinforced when the keypad) and the output (the information n Connecting computers (ages seven to
the device can do something we do not displayed on the screen) are clear. However, eight): helloworld.cc/tccsystems1
know how to do ourselves. One of the most much of the process is not happening on the n Systems and searching (ages nine to
prevalent and early alternate conceptions computer within the ATM — it’s using the ten): helloworld.cc/tccsystems2
that learners hold about computers is that internet. The computer in the ATM sends the
they are ‘really clever’. input data through the internet to the server IPO Model overview document:
To address this, let’s consider looking at the cardholder’s bank, to check it’s correct. n helloworld.cc/IPOsheet
for information on a website to answer This is the process. Then the server sends
a question. What is the input? Using the back the output data to show the outcome
keyboard to type in keywords that tell on the screen. The first data processed will
the computer what I’d like to know. The check whether the PIN number is accurate,
EXPLORING LOGIC
GATES IN MINECRAFT
Martin O’Hanlon shares how you can introduce logic
gates to students by creating circuits in Minecraft
A REDSTONE COMPUTER
Fully functional computers have been created using redstone in Minecraft by building on top of
logic circuits like those introduced in this article.
There are some very impressive builds, including this quad-core computer with user interfaces
and displays (helloworld.cc/minecraftcomputer).
A practical example of the use of a NOT You can also create OR, AND, and XOR
gate is to create a night light. You can do gates using redstone torches, dust, and
this by connecting a daylight detector blocks (Figure 4):
(which is powered when the sun is up) to a
lamp via a NOT gate (Figure 3). At night, the n An OR gate is simply the connection
daylight detector will be off; the NOT gate between two inputs. When either or both
will invert this signal and turn the lamp on. inputs are on, the output is also on.
n An AND gate’s output is on when both
© MIKHAIL/stock.adobe.com
gate’s operation and act as an engaging concrete (see the diagram in the top left
introduction to truth tables. of Figure 5).
Multiple logic gates and circuits can also
Connecting the Minecraft world be linked together to create more complex
Using these logic gates and different devices. Take some time to look through
input and output devices in Minecraft, you the different input and output blocks and
can create realistic devices, for example, components in Minecraft, and let your
a door that can only be opened by two imagination guide what you create. You may
n Figure 6 You can create more complex circuits, such as this
players at the same time by using two also find it useful to create a logic circuit automatic sheep alarm, by linking multiple gates together
QUANTUM COMPUTING:
AS EASY AS A PENNY FLIP
Andreas J. C. Woitzik and Stefan Seegerer introduce the world of
quantum information through a quantum penny flip game
uantum computing has become solved was highly artificial and not useful In the game, two people, let’s say
Q one of the hot topics in new at all, but it showed us that quantum Alice and Bob, compete in predictions
technologies over the last few years. technologies are progressing fast. With about the outcome of a penny flip. In the
Put simply, a quantum computer many players from industry investing a classical world, if we spin a coin, there
is “a machine that harnesses some lot of money and time in this technology, is a 50 percent chance of it landing on
of the unique properties of quantum it cannot hurt for students to learn a little either side, heads (0) or tails (1). When it is
physics to solve problems that are too more about the topic. spinning, we can consider the coin to be in
complex for regular computers and So let us start you off. We are all used a superposition of heads and tails. In this
even supercomputers” (helloworld.cc/ to traditional computers with their bits and version of the game, Alice would prepare
quantumc). There are strong promises of a bytes. Their power stems from being able the penny as either heads or tails, put it in a
possible quantum speed-up of computers, to very quickly and efficiently manipulate box, and give the box to Bob. He would then
though there are still many obstacles to those bits, which we interpret as either 0 decide whether to flip the box, and return it
overcome. In 2019, researchers claimed or 1. Quantum computing is different: the to Alice. Alice could also choose to flip the
they had achieved quantum supremacy, fundamental bit of information is a qubit box again before opening it with Bob. If the
a situation in which a quantum computer (quantum bit). Qubits are used to store coin showed heads, Alice would win.
can solve a specific task much faster than quantum information. A qubit can take the In the quantum version, Alice gets a
any classical computer could (helloworld. values 0 or 1, but more than that, it can also special quantum coin which she can prepare
cc/arute2019). The specific task they store a superposition of them both. Being in as either heads, tails, or in a superposition
a superposition means that the qubit can be of both. The superposition is visualised by
partially regarded as a 0 and partially as a 1 a spinning coin. If Alice decides to prepare
at the same time. the coin in a superposition, Bob’s flip of
the box does not alter the state of the coin.
Quantum penny flip game Since Alice can also revert the superposition
Students can find quantum computing hard and Bob cannot change it, she now has
to grasp. To make it more approachable, full knowledge of the state of the coin and
we can describe superpositions, one of the therefore can always win the game.
core concepts, with a quantum penny flip
game. David Meyer originally proposed Further discussions
this game in a 1998 paper, but we have This game functions as a motivating entry
created an online version of the game at point to the world of quantum computing.
helloworld.cc/quantumpenny. Before you While the classical coin behaves like
continue reading, give the game a go — it a bit, the quantum coin behaves like a
n A quantum coin can be in a state of heads, tails, or a is intended to be played by two people qubit. A subsequent discussion in class
superposition of them both on a mobile phone. allows students to transfer the principle
© Annemarie Woeste
n Students can explore the game, searching for a reliable strategy
to computational ideas. For example, it is more). This is useful in a lot of problems that
easy to see that a bit can be represented involve an unstructured search.
by a qubit, as the quantum coin has the The penny flip activity can also lead to a
states of heads, tails, and the superposition discussion about the fragility of quantum
of heads and tails. With that in mind, it information and from there, to quantum
can be argued that a quantum computer cryptography. Once a superposition state is
can perform every computation a classical observed, it collapses, and from there, the
computer can do, as long as they both have coin can show only either heads or tails.
the same number of bits and qubits. But This feature, an obstacle for those wanting
networks is about understanding how they work together. In ■ What the research says:
our interconnected world, understanding how networks work the themes and tiers model
Many learners will develop experience of using networks ■ The history of networking
before they explore how they work, which gives them an ■ Using Packet Tracer
understanding of their value and some of their applications.
Learners are likely to begin thinking in broad terms about what a
network is and some common components, before exploring the
role of addresses, protocols, and so on. Later, they will explore
how different networks are physically connected, and how data
is transmitted through different layers and across a network.
One challenge this topic presents is that it is very theoretical
in nature, as hands-on activities can be impractical in school.
However, educators can make the area more concrete by using
network simulation tools (such as Packet Tracer)
and relating to learners’ direct experiences of
being connected. This strand is also rich with
opportunities for exploring other related
strands, including safety and security, and
data and information.
IN SUMMARY
NETWORKS
Understand how networks can be
used to retrieve and share information
and enable global communication
STAGE 1 STAGE 2
■ Describe some uses of the World Wide Web ■ Explain how the internet operates as a global
network of networks
■ Make use of online tools for searching,
authoring, and communicating ■ Identify internet services other than the
World Wide Web
■ Explain that computers can work together
■ Describe how search engines find, select, and
rank results
In the table below, you will find learning outcomes associated with
the ‘Networks’ strand of the Raspberry Pi Foundation’s computing
taxonomy. These learning outcomes are illustrative of the kinds of
knowledge and understanding that learners could develop in this
area of computing. They are not prescriptive, but instead aim to
illustrate the wide applications of the discipline.
These learning outcomes were originally developed to complement
the English national curriculum for computing, and as such stage 1
roughly corresponds to ages 5–7, stage 2 to ages 7–11, stage 3 to
ages 11–14, stage 4 to ages 14–16, and stage 5 to ages 16–19.
■ Describe and give examples of networking ■ Explain how physical networks can host ■ Explain the domain name hierarchy and how
protocols used to provide different services multiple associated logical networks domain name servers resolve IP addresses
■ Describe some of the technical vulnerabilities ■ Make use of simulations to explore the ■ Compare client/server with peer-to-peer
associated with computer networks transmission of data through a network communications systems and understand how
client/server systems communicate
■ Explain the role of a firewall in protecting ■ Describe how DNS servers translate URLs
a network into IP addresses ■ Describe the purpose and function of a
comprehensive range of network hardware
■ Outline the journey of a message sent ■ Outline how wired and wireless networks can be
across a network configured for performance and security ■ Describe each layer within the TCP/IP and OSI
models and how data passes between them during
■ Identify scenarios where wired or wireless ■ Describe how a network can be represented transmission
networks are more suitable as layers using the TCP/IP model
■ Describe a wide range of protocols
■ Explain how data passes through each network and standards used across a layered
layer as it is transmitted and received network model
APPROACHES TO
TEACHING NETWORKING
STORY BY Katharine Childs, James Robinson, and Andy Bush
e can see the use and application concepts can be mapped to each of the drivers), and assembly/machine-code
W of computing devices in many resulting 16 areas as a themes and tiers language. Learners begin by understanding
areas of our world, from the personal model (Figure 1). software that is visible to them, such as
devices we use on a daily basis to the the operating system on their computer,
systems that control and automate The themes and tiers model before moving onto more abstract
industrial processes. Through these The four key themes are as follows: software concepts.
devices, we are almost always connected
to a wider network in some form or HARDWARE NETWORK ARCHITECTURE
another. An understanding of how our This covers the physical devices and This includes an understanding of the
networks, systems, and devices work is components that work together to form different types of computer network, the
therefore foundational knowledge for all a computer system. The deeper learners components that make up a network, and
students of computing. explore this theme, the more they focus on how these components are connected
Teach Computing and the Raspberry how different components work, as well as together. As learning in this theme
Pi Foundation propose that we can the logical concepts and physical processes progresses, learners can design and
organise the knowledge and skills within on which the system is built. build their own simple network to a
the teaching and learning of networks given specification.
and computer systems into four broad SOFTWARE
themes (helloworld.cc/rpf2021). In turn, This encompasses internet services DATA TRANSMISSION
we can then divide these themes into four (including cloud computing), operating This theme focuses on how data moves
tiers of detail/abstraction, and the relevant systems, applications, utilities (such as around networks. Students begin by
learning about common protocols for
transferring data across networks, and then
move on to understanding methods to make
sure data is transmitted securely, reliably,
and rapidly.
SYSTEM/ ■ Purposes of systems ■ Web services ■ What a network is ■ How and why we use networks
NETWORK ■ Benefits of ■ Cloud computing ■ Purpose, uses, and risks ■ Data can be routed across
computer systems ■ Software as a service ■ The internet a network
■ Monitoring and ■ Control systems software ■ WAN, LAN, and PAN ■ Network performance,
controlling systems bandwidth, and latency
■ Virtual machines ■ Network topologies
■ Remote storage
DEVICE ■ General purpose vs purpose- ■ Operating systems ■ Devices within the network ■ Connectivity
built embedded devices ■ Application software ■ Client–server and peer-to- ■ Role of protocols
■ Common device features ■ Open/closed source peer networking ■ Application layer protocols
■ Peripherals ■ Human–computing ■ Thin and thick clients ■ DNS and IP addressing
interaction ■ Portable devices ■ Servers, email, web, etc.
■ User interfaces
COMPONENT ■ Role of common ■ Utility software ■ Wired and wireless ■ Transport layer protocols
components: ■ Controlling IO devices connections ■ DHCP
• Storage ■ Hierarchy of programming ■ Switches, access points, ■ Network address translation
• CPU languages routers, gateways,
■ WebSockets
bridges, etc.
• RAM, ROM, and cache
■ NICs and WNICs
• Sensors
IMPLEMENTATION ■ CPU architecture(s) ■ Device drivers and BIOS ■ MAC addressing ■ Network layered model(s)
■ Fetch–decode–execute cycle ■ Program translators ■ Characteristics of ■ Collision detection
■ Logic gates/circuits ■ Assembly and machine-code transmission media, and avoidance
language including copper, fibre ■ Multiplexing
■ Buses
optic, radio waves, etc.
■ Interrupts ■ Libraries, linkers, and ■ Circuit and packet
loaders switching
■ Storage media
n F igure 2 Networks and computer systems content organised by themes and tiers
MAKE NETWORKS
INTERESTING WITH FILIUS
Paul Powell shares how you can liven up your lessons on networking
THE JOURNEY
OF NETWORKING
To help our young learners understand the internet better, we need to follow
the development of networking from the first connected computers
he power of a single computer is The electrical signals are referred to as ‘layer ring can remove it if it returns. But how do we
T well understood. The speed and 1’ or the ‘physical layer’ because they’re the ensure the data only goes to the computer
accuracy with which it can run through closest to the physical connections. we want to send it to, as it now goes through
an algorithm or solve the most complex Three computers can be connected with all the computers?
problems is outstanding. However, it’s three connections. Four computers need six The solution involves giving each computer
only the tip of the iceberg when compared connections, and so on. The advantage of in our ring a unique address. Before we send
to the power of networked computers. this system was that each computer could our data out, we add the destination address
The internet is the biggest worldwide choose where to send the information, just to the front of the data. For the receiving
network of devices, and has truly by selecting the appropriate connection. computer to know who to reply to, we also
transformed almost every aspect of how The downside was the number of add our own address as the source address.
we live, work, and play. Virtually all our This addition of a source address and
infrastructure is reliant on this global destination address to the data forms
connectivity. The ubiquitous nature of a ‘frame’. The process of adding this
its availability and ease of access has additional data is called ‘encapsulation’.
resulted in it replacing costly dedicated It’s similar to placing the data in an
connections and transforming just envelope and putting the destination
about everything. Electrical generation, address on the front and the sender’s
water distribution, transport networks, address on the back. The process that
banks, government, the media, and most encapsulates the data with addresses is
of education would cease to function called ‘layer 2’ or the ‘data link’ layer. The
with no network connectivity. Children n Figure 1 Fully meshed network n Figure 2 A ring topology format of the frame is therefore:
might relate to the idea of losing Facebook
or Snapchat, but fail to realise there would connections and thus connectors on each SOURCE DESTINATION DATA
be no power distribution and little food in the device; a fully meshed network (Figure 1) of ADDRESS ADDRESS
shops if there was no network. six computers would need five connections
The networks we have today and the from each computer and fifteen connections As the frame is passed around the ring, each
rules they follow are partially a legacy of in total. Imagine what 100 connected computer compares the destination address
older technology. If we had a clean slate computers would look like! What was to its own address. If there’s a match, the
and could start again, we wouldn’t build needed was a way of using a single wire computer reads the frame and has received
the internet we have today. Hence, to that all devices could connect to, and a the data. Computers that don’t match the
understand the internet, we need to follow way of somehow sharing usage of the wire address just forward the frame on.
the development of networking from the between them all. Two distinct solutions Ring-type networks are used today
very first connected computers. evolved: the ‘ring’ and ‘bus’ topologies. in synchronous optical networking
(SONET) and synchronous digital
Early connections Ring hierarchy (SDH) networks.
As computers developed, it was recognised Rather than connecting each computer
that they could be connected to share directly to every other computer, they can Bus
information. With two computers, it was be connected in a ring topology (Figure 2). Another option to connect multiple computers
easy to provide a dedicated link between The data passes round the ring, with each together is to connect them all to a common
them and use electrical voltages to represent computer ‘seeing’ the data and also passing wire. Initially, this was a thick coaxial cable,
the binary 1s and 0s of the data to be sent. it on. The computer that puts the data in the similar to a TV cable. Each computer was
THE PRINCIPLES
OF NETWORKING
MADE EASIER WITH PACKET TRACER
Cisco’s powerful simulation tool encourages practice, discovery, and troubleshooting, and lets students
experiment with network behaviour by building complex networks — plus it’s free to schools!
reliable network forms the heart What is Packet Tracer? Key features
A of any technology infrastructure, Packet Tracer simplifies the complexity of Packet Tracer has two workspaces —
and networking is now at the forefront of teaching networking, while giving logical and physical — which you can easily
technology innovation in our increasingly students valuable hands-on experience. switch at the click of a button. The logical
digital world. Teachers must therefore Cisco developed Packet Tracer to help its workspace allows users to build coherent
be equipped to teach networking in Networking Academy students achieve network topologies by placing, connecting,
classrooms, particularly given the skills the best learning experience while gaining and clustering virtual network devices. The
shortages in this area. With many teachers practical networking technology skills. physical workspace provides a graphical
struggling to tackle networking principles, Packet Tracer is a powerful simulation physical dimension of the logical network,
purchasing switchers, routers, and other tool that students can use to build, explore, giving a sense of scale and placement in how
such devices might appear to offer and troubleshoot a variety of network network devices such as routers, switches,
the perfect solution. For most schools, environments as if the hardware were and hosts would look in a real environment.
however, this isn’t a practical or affordable with them in the room. By dragging and The physical view also provides geographic
option, which is why Cisco has created the dropping routers, switches, and various representations of networks, including
next best thing for teaching networking — other types of network devices, they can multiple cities, buildings, and wiring closets.
Packet Tracer (helloworld.cc/packettracer). develop virtual network worlds. This paves Packet Tracer also gives you two
the way for teachers and students to operating modes to visualise the behaviour
explore, experiment, and discover an almost of a network: real-time mode and simulation
unlimited array of networking concepts mode. In real-time mode, the network
CISCO NETWORKING and technologies. behaves as real devices do, with immediate
real-time responses for all network
ACADEMY activities. Simulation mode gives students
a viable alternative to real equipment and
Founded in 1997, Cisco Networking allows them to get configuration practice
Academy (helloworld.cc/ciscoacademy) before working with physical equipment.
is a not-for-profit IT skills and career
building programme that connects millions Supports teaching networking
of students, educators, and employers The Packet Tracer tool contains many
worldwide. As part of this programme, exciting features that offer an extra
Cisco partners with learning institutions dimension to teaching computing. Schools
to deliver technical training and problem- can easily teach and demonstrate complex
solving experiences to individuals studying technical models, as well as networking
networking, security, and IoT technologies.
concepts and protocols, using an
n Solving puzzles collaboratively enables student-led learning interactive environment.
classroom
self-paced learning outside the
YOU TO TEACH
NETWORKING?
n Supporting
social learning processes by
enabling collaboration and competition Packet Tracer allows users to build and
n The physical workspace offers a graphical view of the logical network
configure a functioning computer network
The student experience in a simulated environment. Traffic is
Packet Tracer’s hands-on approach simulated, with web and email servers being
to learning means students will be used by a variety of desktop applications.
better equipped to apply concepts and Simulations work in either real-time
configuration fundamentals when exposed mode, as they would in a physical network
to real equipment. By experimenting with environment, or in simulated mode, where
network behaviour and asking ‘what users can see the actual packets and frames
if’ questions, students will gain a solid moving through the network and decode the
understanding of how devices connect and layers structure of ethernet, IP, and TCP.
communicate in a live network, and how Duncan Maidens, director of computer
n Multiuser games provide fun learning opportunities
for collaboration and competition data flows from one device to another. science at the Raspberry Pi Foundation
The software uses a drag-and-drop
One key feature, the Activity Wizard, user interface, allowing students to add
allows teachers to write their own learning and remove simulated network devices
activities by setting up different scenarios. as they wish, and lets students practise
They can customise these scenarios with using a command-line interface. This is a
instructional text, while creating initial and fundamental component of learning how to
final network topologies and predefined configure routers and switches. Just as the
packets. The Activity Wizard also includes physical equipment allows you to modify
media. Whether developing new media or integrating and ■ What the research says:
combining existing content, learners encounter a range of threshold concepts in creating media
common concepts and skills, including grouping, layering, ■ Art, creativity, and computer science
IN SUMMARY
CREATING MEDIA
Select and create a range of
media including text, images,
sounds, and video
STAGE 1 STAGE 2
■ Identify different forms of media, including text, ■ Distinguish between examples of vector/
images, video, and sounds bitmap images
■ Describe how vector and bitmap images ■ Describe physical factors (such as lighting ■ Propose, design, create, and evaluate digital
are stored or noise) that affect the quality of recorded artefacts using a range of media
or captured media
■ Explain the factors that affect the quality of ■ Describe how both vector and bitmap images
collected or created media ■ Describe the means by which text, images, and are created
sounds are represented using binary numbers
■ Identify ways in which digital artefacts can ■ Describe the process by which sound
be manipulated and the motivations for ■ Apply a wide range of techniques to (analogue) is sampled and stored digitally
doing so compose and enhance digital artefacts
■ Calculate the expected file size of different media
■ Decide from examples what makes specific digital ■ Develop and apply templates to speed up based upon their attributes
artefacts ‘good’ production and improve consistency
■ Describe the impact of changing media
■ Describe how digital artefacts can be made ■ Find and create digital assets that attributes (such as colour depth or sample
more usable and accessible are suitable and compatible with a rate) on quality and storage needs
final product
■ Combine software tools to create digital artefacts ■ Choose appropriate media formats comparing
quality, file size, and performance
■ Create or adapt digital artefacts to make
them suitable for different audiences
© beeboys/stock.adobe.com
n Understanding threshold concepts is vital if learners are
to progress and build subsequent skills and concepts
THRESHOLD CONCEPTS
STORY BY Ben Hall
ven if you have never heard of or (helloworld.cc/davies2006). The first A threshold concept should be revisited
E
n
used the term ‘threshold concepts’, approach includes the engagement of from a teaching and learning perspective
you will be teaching them day in, day two distinct disciplines, and specifically, several times across different ages and
out, both in your computing classes and the views in which these disciplines stages of learning (buildability)
in any other subjects you may teach. examine the same situation. The second
Researchers Meyer and Land introduced approach, which is mostly used in the In some subjects, threshold concepts are
the term to education in 2003, stressing current literature, such as Janet and Nathan easy to identify. Consider young readers,
the importance of the idea as “akin to a Rountree’s 2009 paper (helloworld.cc/ for example. They are initially taught
portal, opening up a new and previously rountree2009), suggests that to identify the threshold concept of phonics, which
inaccessible way of thinking about threshold concepts, the researcher should introduces them to the alphabet and letter
something. It represents a transformed concentrate on people inside and outside sounds, which they can blend into simple
way of understanding, or interpreting, of the community; that is, on the different and then more complex words. They are
or viewing something without which the ways in which students and experts then introduced to the threshold concept
learner cannot progress” (helloworld.cc/ experience the situation. that not all words are spelled as they sound.
meyer2003). This article will explore the The Raspberry Pi Foundation has The same is true in computing, or at
research behind defining and identifying defined threshold concepts within least some elements of it. In programming,
threshold concepts, with a focus on computing education in a similar way. in the Teach Computing Curriculum, we
‘Creating media’ topics, before suggesting When deciding whether or not a concept is introduce four threshold concepts, one
some approaches to introducing them to a threshold concept, we at the Foundation per year group from ages seven to eleven:
your classroom. use the following criteria: sequence, repetition, selection, and variables
(helloworld.cc/tcc). By isolating these
Identifying threshold concepts n A threshold concept should be relevant four concepts, you can introduce each
Researcher Peter Davies suggests two to two or more topic areas within the progressively, and gradually develop an
methods for identifying threshold concepts subject (portability) understanding of each one. We have found
that there is a broad consensus that this areas of the computing curriculum. For ‘Creating media’? Instead of Use, for
order is appropriate at this age range. example, if a student understands layering example, could students ‘consume’ a
In some areas of computing, however, in desktop publishing, they will be at a particular type of media? Take vector
threshold concepts are not as widely agreed significant advantage when they move on drawings as an example. In isolation,
on or accepted. The content and curriculum to creating vector drawings, as the concept many students will not be familiar with
team at the Raspberry Pi Foundation has is fundamentally the same in both types of the concept of vector drawings. To
picked out ‘Creating media’ as an example media. This can deliver significant benefits familiarise them with it, you could ask
of a strand of computing that could to students across all age ranges: learners to edit or adapt a vector graphic
benefit from an approach more based on so that it suits a different audience or
threshold concepts. At a high level, we n he identification of threshold concepts
T purpose (that is, as part of the Modify
have identified a number of commonalities accentuates their importance stage). This could involve changing the
when working with computer-based media. n Skills and concepts can be introduced position, order, or colour of objects, but
Whether you’re creating a presentation systematically in one context before being crucially, not creating anything new.
or producing a video, you will need some applied to others At this point, you could cover threshold
understanding of: n The transition between learning stages concepts associated with layers, objects, and
can be smoother, with less need to recap colours, without the added cognitive load of
n Files n Students learn to apply concepts across students having to think about creating their
n Text different curriculum areas own idea. They could then build upon this
n Images experience to create a new artefact, with the
n Audio/video Pedagogical strategies scaffolding of existing content. It may be that
n Animation Now that we have considered how we you are actually already doing some of this
n Layers define and identify threshold concepts, we in your own practice, but having a structure
n Objects need to look at the best way of teaching could help you to formalise and standardise
n Hyperlinks them to learners and the pedagogical your approach.
n Preview strategies that might be most suitable for It is vital that we know how to define,
n Templates threshold concepts in the ‘Creating media’ identify, and approach the teaching of
strand of computing. In programming, there threshold concepts in the computing
There may be more concepts than this; is a great deal of research into the best classroom, to ensure that learners can
research in this area of computing education ways of teaching new skills and concepts. progress and build subsequent skills and
is underdeveloped, so we aim to narrow Thousands of educators have implemented concepts successfully. Evidently, there is
down to the key concepts. Some of the and iterated strategies such as Use–Modify– still work to be done within this area for
‘Creating media’ topics. How could you
apply these ideas in your classroom, and
ART, CREATIVITY,
AND COMPUTER SCIENCE
Paul Curzon, Jane Waite, and Ged Gast argue that art and computing
have a lot more in common than you might imagine
oth computing and art involve The creative computer scientist Art and the machine
B creativity, innovation, and Programming is obviously creative in the Artists now have new media to play with.
imagination. And people who possess loose sense that it involves constructing By using programs and electronics as
both artistic and computing skills can new things, but it is also creative in a more media, they can create interactive art.
make wonderful things happen. inventive sense. When programming, you For example, Soda Constructor was a
Art involves a creative process, and are not creating things by rote, and not program that implemented a simple 2D
creating an emotionally or intellectually following a fixed plan; you are devising line-drawing program. However, it also
engaging work of art requires more than something that has never existed before. If added in the laws of physics. Points were
just skill with a chisel or paintbrush and you approach opportunities creatively, you masses, and lines were springs with rules
an understanding of the medium. It needs may even completely change the way the based on Newton’s and Hooke’s laws.
innovation, creativity, and imagination. world does things. Springs could also be turned into muscles
To most people, this may sound a million Take the original iPhone keyboard. Before that were given periodic energy boosts,
miles from the stereotype of the computer its launch, Apple
programmer, whose work is based on had a problem: the
logical thinking, but the links are deeper virtual keyboard
than you might imagine. Computer science
also involves great creativity, innovation,
was unusable. The
buttons were just
“ ARTISTS ARE INCREASINGLY
USING DIGITAL MEDIA TO
and imagination. too small. Lots of
On top of these high-level similarities engineers worked on CREATE INTERACTIVE ART
in approach, artists are increasingly the problem, trying
using digital media, and this opens new out different keyboard
opportunities for interactive art for those layouts, but nothing worked. With the launch making them stretch and contract. Users
with programming and electronics skills. looming, the situation looked dire. Without made a digital drawing and then switched
a usable keyboard, the product would flop. on the laws of physics, and their pictures
© NoDenmand/stock.adobe.com
Then someone thought about it differently. would come alive. You could even make
Rather than using a different layout, they creatures, following all kinds of body
had the idea of writing a program that would shapes and means of locomotion, that
predict which letter was most likely to come moved around the screen. The result was
next, based on those that had gone before, an amazing program that won a BAFTA
and making the area of those keys larger. It for interactive art.
worked, and the iPhone went on to become Interactive programs create imagery
one of the company’s biggest ever successes. on a computer screen, but digital art can
It took creativity, innovation, and imagination also escape into the real world. Physical
to come up with this winning solution, and installations can be computer-controlled,
n The original iPhone keyboard represented a breakthrough with
its ability to have the software step in and help the user skill with the medium to make it work. creating, for example, sound and light
n The Photogrowth project simulates the behaviour of artificial ants as they travel on a canvas
Images used with permission of CDV Lab. Source image: Just Be Yourself by Kirsten Sims
shows, where sculptures include light Another example of the use of digital
and sound effects controlled by sensors. creative practice in art is the wonderful PAUL CURZON
Epic-scale examples include the work of sculpture The Hive, at Kew Gardens in Paul is a professor of
artist Leo Villareal, who turned the San London. It is an architectural-scale sculpture computer science at
Francisco Bay Bridge into a pulsating, in the shape of a walk-in beehive. It is Queen Mary University
ever-changing work of art by covering it covered in lights that pulse, controlled by of London and co-
in lights controlled by a computer. Artist the activity of bees in hives in the Gardens. founded both cs4fn (cs4fn.org)
Di Mainstone had a different approach to This kind of art often uses very simple and Teaching London Computing
turning bridges into art. At Tower Bridge in combinations of sensors, lights, and sounds (teachinglondoncomputing.org).
London, she put digital sensors on bridge with simple computer control. The artist is He is author of the book The Power of
cables attached by lines to a performer’s writing programs as an essential part of the Computational Thinking.
clothing. As the bridge vibrated with traffic creative process. As an artistic medium, it
and people, and the performer moved, is now within the reach of school students,
the angle and length of the lines were combining programming, electronics, and JANE WAITE
measured and different sounds produced. art. If you have a creative spark, you can Jane has worked both as
Human and bridge thus became one make similar kinds of art with simple sensor a primary teacher and in
augmented artistic instrument. kits such as Arduinos and Raspberry Pis. industry as a developer.
She worked on the Barefoot
programme, was CAS London manager,
© John Nakata/stock.adobe.com
GED GAST
Ged is a visual arts
specialist, an education
consultant, and a past
president of the National
Society for Education in Art and Design
(NSEAD).
n Artist Leo Villareal covered the San Francisco Bay Bridge with lights controlled by a computer
THE ALGORITHMS
“ THEMSELVES
BECOME THE
MEDIUM THAT
THE ARTIST
WORKS WITH
ART & COMPUTING RESOURCES knows how to follow the steps to create
a painting. For example, it starts with the
background of a new painting, and works
Teaching London Computing: National Society for Education in TechPathways London:
its way forward to the foreground. By
helloworld.cc/londonart Art and Design: nsead.org helloworld.cc/techpath
following these in-built rules that codify
artistic knowledge, AARON creates novel
© Jiri Hera/stock.adobe.com
pictures. Each picture it paints is different,
and it even chooses the subject to paint.
In creating AARON, Cohen made a great
step forward in understanding creativity,
and researchers interested in understanding
computational creativity continue to pursue
that mission. Ultimately, work like Cohen’s
is about writing programs that help us
understand what it means to be human.
DEMOCRATISING DIGITAL
CULTURE WITH
3D-ANIMATED FILM
3D animation still takes serious computing power, but there are
ways to bring it into your classroom
3Dami runs a seven-day camp where team can’t help. Computing concepts such as
teams of nine students create every part modular design and computational efficiency
of an animated short. On the first day, the are natural to 3D animation. One student
students write a story for their team to work might make a character that appears in
to — this means lots of paper and pens, and multiple shots; another might make a bucket
a complete, albeit paper-based, storyboard that’s used in some of the same shots. Once
by the end of the day. Students then work on these assets are linked, we have a film, and
computers to create all the props, characters, if there’s an artistic change to the character’s
sets, animations, and shots that make their hair, it will be immediately updated in all the
film, with the premiere on day seven. Among shots because it’s linked. Learning modular
the nine students, two are given roles as design through programming is much more
director and producer, with the director taking difficult — a buggy module will probably
omputing is a broad discipline, application to bring concepts to life. Which more complex features. In the TCC, this
C rich in concepts and skills, which software application you choose will involves learners progressing from basic
can be taught through many different depend on a number of factors, such as vector drawing applications, such as
technologies and software applications. accessibility for learners; the time it takes Google Drawings in Year 5 (aged 9–10)
As we have developed units of work for to understand how to use it; and whether to more complex applications such as
the Teach Computing Curriculum (TCC) it is a free or a paid-for product. The key Inkscape in Year 8 (aged 12–13). With
(helloworld.cc/tcc), we have reflected thing to recognise is that the application an understanding of key concepts and
on how best to support learners in should be used to scaffold conceptual skills, learners can apply this knowledge
developing lifelong understanding understanding, rather than being an with less support, allowing educators to
and skills. An important aspect of this integral part of the learning. focus on embedding new concepts and
is separating the learning from the understanding instead.
applications used to teach it (such as Benefits
software packages and programs) and By following a more application-agnostic Software variations
instead, leading with concepts. approach to teaching computing, we can Throughout the TCC ‘Creating media’
This principle is of particular relevance achieve several benefits: units, we have chosen software
in the ‘Creating media’ strand of the TCC, applications that are free, accessible, and
where learners select and create a range Transferable knowledge learner-friendly. However, the majority
of media including text, images, sounds, With such a range of digital applications of these applications are web-based, so
and video. It is imperative that learners can available, it is important that learners require the internet. Whether a school
use their knowledge and understanding develop knowledge that can be easily has a strong enough internet connection
more widely, rather than getting lost in the transferred. If educators lead with concepts will be a factor in deciding whether that
nuance of particular applications. rather than tools, learners will be able application is suitable, or whether a locally
to reapply their knowledge to other downloaded application would be more
Scaffolding conceptual understanding applications and technologies in their lives. beneficial. This is a very specific use case,
Leading with concepts is, of course, a A simple example is understanding the copy but developing units of work that aren’t
consideration to make more broadly when and paste function. It is a key concept that, focused on the specifics of a tool makes
teaching. In literacy classes, for example, once understood, can be applied to most it much easier to transfer lessons to other
learners might write a diary entry, using other applications and programs. applications if necessary.
either pencil and paper or a word processor.
The learner may be proficient at using either Learner independence Teacher questioning
medium, but that doesn’t mean they can As learners become familiar with how to The questions we ask as educators are
write a good-quality diary entry! They have accomplish certain tasks, they become arguably one of the most important
to learn how to structure it, as well as the more independent. This enables them to aspects of teaching and learning. When
importance of writing in the first person and traverse different applications more easily teaching learners processes to achieve
the use of appropriate vocabulary. as they progress. When learners need to something within a piece of software,
Similarly, when teaching computing, create more complex media, for example, such as how to draw a line, the only
you generally need a tool or software they will need to use an application with understanding you can ask of those
learners is to repeat the process back How much should we assess a learner’s which they could make use of their layering
to you. This is low-level understanding, ability to use the specific functions of a tool? knowledge. It will be evident from the
relying solely on their memory. If, instead, What if they achieved the correct end goal, learner’s final product where they have used
you teach them to recognise the familiar but in a convoluted way? Having a clear this skill and whether they have understood
line icon, make connections with how they focus on the conceptual understanding the concept, enabling a more focused
apply other tools such as the shape tool, rather than the process of using a tool or assessment of their holistic understanding.
and encourage learners to consider prior application allows greater clarity when As with any subject, we want to
knowledge, your questions can be deeper, assessing learning. maximise learning time and ensure learners
such as: “How can I create a line to add to Throughout the ‘Creating media’ strand can apply concepts and skills to other areas
my drawing?” and “How did you know to of the TCC, we use rubrics as possible of their learning. Removing the specifics of
choose this specific tool?” summative assessment tools for educators the software application allows us to do
The benefits of this approach are to use. We have tried to ensure these this, and ensures the teaching and learning
numerous, but it can be daunting for a rubrics are always focused on the concepts experience is driven by the learner’s needs
teacher initially. If learners are used to and skills introduced in the learning, rather and not by the application used.
IN SUMMARY
ALGORITHMS AND
DATA STRUCTURES
Comprehend, design, create, compare,
and evaluate algorithms
STAGE 1 STAGE 2
■ Identify that algorithms are clear, precise steps to ■ Describe how algorithms relate to program design
complete a task
■ Distinguish between a program and
■ Recognise the role of algorithms as part of an algorithm
program design
■ Recognise that different algorithms can achieve
■ Decompose a simple task into two smaller tasks the same outcome
■ Express algorithms through symbols, simple ■ Follow an algorithm in order to predict the
sketches, and in written form outcome and identify errors
■ Adapt a template or example to plan an ■ Decompose a task into several smaller tasks
algorithmic solution
■ Choose appropriate formats to express
algorithms and designs (sketches,
flowchart symbols, text)
In the table below, you will find learning outcomes associated with
the ‘Algorithms and data structures’ strand of the Raspberry Pi
Foundation’s computing taxonomy. These learning outcomes are
illustrative of the kinds of knowledge and understanding that learners
could develop in this area of computing. They are not prescriptive,
but instead aim to illustrate the wide applications of the discipline.
These learning outcomes were originally developed to complement
the English national curriculum for computing, and as such, stage 1
roughly corresponds to ages 5–7, stage 2 to ages 7–11, stage 3 to
ages 11–14, stage 4 to ages 14–16, and stage 5 to ages 16–19.
■ Distinguish between real-world scenarios ■ Describe how common searching and ■ Describe how the complexity of an
and computational models sorting algorithms work algorithm is measured in terms of time and
space requirements
■ Walk through an algorithm recording the value ■ Use trace tables to walk through algorithms
of variables ■ Distinguish between problems that are tractable,
■ Compare algorithms and select the most intractable, and unsolvable
■ Analyse algorithms and suggest efficient for a given scenario
potential improvements ■ Analyse standard algorithms and express
■ Explain the need for abstraction and their efficiency using big O notation
■ Express algorithms using text and flowcharts decomposition when planning a program
■ Compare the efficiency and suitability of algorithms
■ Independently decompose a task into ■ Use formal flowchart symbols to for different scenarios
smaller tasks, events, and actions communicate algorithms with others
■ Represent and convert algorithms
■ Use abstraction to highlight key parts of a task ■ Use a shared pseudocode to communicate using pseudocode, flowcharts, and
when designing a solution algorithms with others structured English
■ Write algorithms for whole solutions or ■ Write algorithms that manipulate data ■ Use data structures and abstract data types to
individual components structures such as lists, arrays, and records organise and manipulate data effectively
IN DEFENCE OF PSEUDOCODE
STORY BY Eirini Kolaiti
hen I used to teach programming, The case for simple languages problem. The percentage of Python
W it didn’t take me long to realise In 2006, researcher Linda Mannila and programs that ran correctly and fulfilled the
how easily my students could confuse or her colleagues compared 60 programs intended purpose was more than double
even forget basic structural elements of written by students aged 16–19 after that of the Java programs.
a programming language. They would be their first programming course, in either One potential drawback of teaching
tripped up by misusing capitalisation, white Python (a simple language, developed for programming in Python rather than a more
space, or parentheses. Basic syntax errors its readability) or Java (a more advanced complex language, such as Java, is that it
such as these would sidetrack students language). They analysed the assignments, could do students a disservice if they then
from focusing on developing a solution. both in terms of syntax and logic errors needed to relearn aspects of programming
Instead, they would resort to trying out and their overall functionality (helloworld. when moving to a less intuitive language,
every possible instruction they could find cc/mannila2006). like Java. However, the team did not find
online in the hope that it would solve their The results were remarkable. this to be the case: students who had first
errors. It turns out that my experiences Programming in Python not only helped learnt to program with Python were at no
weren’t unique, and are also supported by students avoid making syntax errors, disadvantage when switching to Java.
research in computing education. but also allowed them to solve the given So if choosing a simple language can play
such a positive role in student progression,
why not opt for that option?
PSEUDOCODE AT GCSE
The results demonstrated that a well in programming tasks is not a lack REBECCA FRANKS
pseudocode-based assessment can of ability to problem-solve, but a fragile Learning manager at the Raspberry Pi
accurately determine students’ programming knowledge of fundamental concepts. Foundation
competency, regardless of their Students were unable to hand-trace code
programming background. This means that (where the values of variables are calculated I asked upper-secondary computer
students could transfer their comprehension by hand) because of an insufficient science teachers on Twitter which type
of fundamental programming concepts to command of basic programming tasks, of pseudocode they used for designing
pseudocode notation. Reversing this logic, such as iterating over an array or the use of programs. 38 percent followed their exam-
surely we can use pseudocode to scaffold recursion. These areas are mostly related to board-specific pseudocode and 53 percent
the learning of programming concepts. an ability to read code rather than write it. did not specify a syntax. Several commented
From these pieces of research, one could that it was more important that learners
Walk before you run (a program) argue that as educators we should use could effectively design their own programs
In 2004, an international group of programs in pseudocode to foster these and that the syntax used was less relevant.
researchers, led by Raymond Lister at preliminary skills, so that students benefit
the University of Technology in Sydney, from a reduction in the cognitive load caused
conducted a study regarding programming by language-specific syntax. After all, most
© PaeGAG/stock.adobe.com
n Pseudocode activities can be used in lessons to practise reading and tracing code
n Linear search in Python, Java, and pseudocode from Mannila and colleagues’ 2006 research. Reprinted by permission of the publisher (Taylor & Francis Ltd, tandfonline.com)
Why
subscribe?
• Teaching resources and
ideas used by over 90
percent of our readers
• Exclusive news,
research findings,
and in-depth features
• Delivered to your
door four times a year
FREE
PDF
for anyo
ne
anywhe ,
re
OUR MOS
POPULAR T
How mora
EPISODES
l is your m
computin ach ine? E
g educati thics in
Accessib on
le and in
educatio clu s ive comp
n: where uting
to start?
How can
we get ev
eryone e
about co xcited
de?
RESEARCH
COMPUTATIONAL THINKING,
CONFIDENCE, AND PERSONALITY
STORY BY Lucia Flóriánová
omputational thinking is a topic A positive link between computational programming. It would be especially useful
C that’s widely discussed within thinking and extraversion, on the other to improve children’s self-efficacy in
computing education. It’s a key thinking hand, contradicts most existing research, specific computing tasks, and helping
skill that students need to develop if they and challenges stereotypes. The consensus children see their success through concrete
are to live in a technology-driven society. used to be that brilliant programmers are examples can be one way of making them
Computational thinking is generally usually introverted, but this seems to be learn more. Finally, it is paramount to teach
understood as a type of logical thinking that changing. Computing is becoming less of computing in an environment that
can help students to problem-solve, both a solitary activity, and now involves more welcomes different types of personality
with and without the use of computing social interaction and collaboration. and is freed from stereotypes about a
devices. It relates to children’s cognitive typical computational thinker.
abilities, such as their reasoning, spatial, Improving computational thinking
FURTHER READING
numeracy, and problem-solving abilities. These findings provide new insight into
how we should approach computing
More than cognitive ability education. Although computational
Román-González and his colleagues, thinking is a cognitive psychological Román-González, M., et al. (2018).
however, concluded in their 2017 study process, it is significantly influenced by Extending the nomological network
that cognitive abilities weren’t the only non-cognitive factors. of computational thinking with
link to computational thinking skills: they To make children think computationally, non-cognitive factors. Computers
studied how computational thinking is educators should therefore focus on their in Human Behavior, 80, 441–459.
also linked to the non-cognitive factors of development beyond cognitive abilities, helloworld.cc/gonzalez2018
self-efficacy and personality. Quantitative such as boosting confidence in
analysis suggests that only 27 percent
of computational thinking is explained
© StockPhotoPro/stock.adobe.com
s a resource to help pupils learn to sequence of commands that were most Bee-Bots. Rather than randomly playing
A program, the Bee-Bot floor robot recently entered since the last time ‘Clear’ with the device, pupils were encouraged
has been a success in primary classrooms was pressed. The ‘Clear’ button wipes the to think like scientists and examine what
and clubs in the UK. A present-day device’s memory, and if it’s switched off, the each button did. By doing this more guided
simplified version of Seymour Papert’s memory is also cleared. activity, the students gradually discovered
Logo turtle robot, the plastic device the functionality of the Bee-Bot.
looks like a 20cm bee with a smiling face, The birth of Fakebots As the team from BT developed more
bright colours, and simple buttons on In 2013, Pam Popay and a colleague at BT tasks, they realised that students needed
its back to control its motion. Over three were spending a lot of their time developing a way to record their planned sequence of
quarters of a million units have been sold and trialling resources to support the newly instructions, as it was hard for children to
by the education providers TTS since the proposed computing curriculum in schools debug their intended instructions without it.
product’s launch in the early 2000s, with in Suffolk, UK. When they discovered that all After experimenting with different methods,
other similar products on the market also the schools they were visiting had Bee-Bots, they introduced a set of arrow cards along
being used by educators. it seemed obvious that they should develop with ‘Go’ and ‘Clear’ cards. The children used
Each Bee-Bot has a left and a right button, some resources to be used with the devices the cards to construct a command list, which
and straight on and reverse buttons, which which could support the delivery of the they could then test. Finally, when students
can be combined to write a program which, new intended computing curriculum across thought the sequence was correct, they
when run, causes the robot to move around different year groups. were then given the Bee-Bot to program.
the room. There is also a ‘Clear’ button and The BT team started with ‘having a go’ However, it soon became clear that the
a ‘Go’ button. The ‘Go’ button executes the sessions that introduced children to the physical robot was a distraction from the
© Pam Popay
© BT and BCS Barefoot
ABSTRACTION:
THE IMPORTANT BITS
Matthew Parry discusses the concept of abstraction and shares ideas on how
to teach abstraction using the PRIMM approach and My Blocks in Scratch
he Collins English Dictionary “abstraction is about simplifying things instructions such as ‘switch the kettle on’
T defines abstraction as “the process — identifying what’s important without in order to make our algorithm simpler and
of formulating generalised ideas or worrying too much about detail”, while easier to understand.
concepts by extracting common qualities educational researcher Keith Turvey says
from specific examples” or “something that “abstraction is a process by which Abstraction in Scratch
which exists as a general idea rather than any unnecessary detail is omitted in order The majority of programming languages are
as an actual example”. In other words, it to help us to solve a problem or achieve a abstractions. They hide the complexity and,
is about removing complexity in order to specific outcome”. for us humans, the incomprehensibility of
increase understanding, without losing the One of the aims of England’s National the binary instructions that computers use.
core message. Curriculum for Computing is to ensure that A lot of the keywords and commands within
We encounter abstractions around all pupils “can understand and apply the programming languages, for example the
us every day. They can be shortened fundamental principles and concepts of print and input commands, also abstract
versions of something, to give an example computer science, including abstraction, more complex tasks.
of the whole thing. For example, the logic, algorithms, and data representation”. Within Scratch, there are a number of
British television programme Match of Abstraction allows us, as computer blocks that abstract the processing that is
the Day shows only highlights of football scientists, to concentrate on the important being performed under the hood. Figures 1
matches; music websites allow you to bits of developing a solution by ignoring the and 2 below show two such blocks, and you
stream excerpts of upcoming albums; irrelevant detail — much as pupils do for can see the steps that are hidden from the
and the blurb on the back of a book gives maths word problems. user in their captions.
only an indication of the whole story. For example, we may have been asked to
Abstractions can also be symbols that create an algorithm for making a cup of tea. Abstraction lesson idea using Scratch
are used to convey meaning while reducing In our algorithm, we can ignore some of the Using decomposition and the PRIMM
complexity. Examples are road signs, complexity that this task would entail, such (Predict–Run–Investigate–Modify–Make)
the London Tube map, class timetables, as how to use a kettle, and use (abstract) pedagogical approach to structuring
and infographics.
We also regularly entertain abstract ideas in
our day-to-day living. For example, most of us
have only a conceptual understanding of most
of the machines we use. We use the terms
‘car’, ‘microwave’, and ‘mobile phone’ without
really knowing what they do or having any
concept of how they work. n Figure 1:
1st step: get current direction of the sprite
Word problems in mathematics are a 2nd step: add 15 to the current direction
great example of abstraction. Pupils need to 3rd step: set direction to the new value
solve complex problems, and express ideas. ■ What the research says:
As learners move through school, they will progress their moving from block-based to text-
based programming
understanding and application of programming. Students
■ What the research says:
learn to read and write simple programs from their first year
levels of abstraction
of school, and over time, they develop their understanding
■ Why we should teach children to code
of key programming concepts. Initially, they will focus on
■ Programming and the wider curriculum
sequence, repetition, selection, and variables. Later, students
■ Comprehensive programming
will encounter more complex ideas, such as modularisation,
assessment
recursion, and data structures. This experience usually
culminates with students learning about alternative
programming paradigms, including object-oriented and
functional programming. Throughout this journey, students will
use ever more sophisticated tools and languages.
We can apply programming across a wide range
of contexts to solve a diverse range of problems.
This broad application of the skill, alongside
the increasing pervasiveness of computing
in all areas of our lives, makes programming
an important and relevant skill for all learners.
IN SUMMARY
PROGRAMMING
Read, write, test, and debug computer
programs that provide meaningful
output or solve a problem
STAGE 1 STAGE 2
■ Predict the outcome of a sequence of commands ■ Make predictions about the outcome of programs
containing selection and repetition
■ Recognise that changing a sequence of
commands can have an impact on the output ■ Recognise that evaluating a condition will
result in either true or false
■ Create short sequences of commands for a given
purpose ■ Recognise that repeated sequences of commands
can be replaced with a loop
■ Compare programs and their output to an
algorithm in order to identify issues ■ Write programs that include selection to
alter program flow based on a condition
■ Make changes to programs when they don’t behave
as expected ■ Write programs that include count-controlled,
condition-controlled, and infinite loops
lock-based programming software keyboard. Young learners in particular can ways students engaged with problem-
B is an established part of any become very frustrated by this, as it can solving in these contexts. They discovered
teacher’s toolbox, used to introduce take several minutes to type out even the that it was valuable to think about these
learners to programming. These shortest of programs, and they spend a different media as pedagogical tools,
applications have an engaging user lot of their time learning the basic syntax with different strengths for teaching and
interface with vivid coloured blocks that rules, which leaves little time for them to learning, rather than as stages students
can be quickly snapped together and experiment and be creative. You can use leave behind as they progress.
moved around on the screen to create a software to help correct errors in code, In their research, they outlined a
program. Scratch is a very popular block- but these applications are often quite pathway that used unplugged, block-
based application, but there are several complicated and unsuitable for beginners. based, and text-based approaches to
other similar environments, including
Snap!, Pencil Code, Blockly, and more.
A regular area for debate among
teachers of programming is how best “ YOUNG LEARNERS OFTEN HAVE TO WASTE
TIME LEARNING BASIC SYNTAX RULES,
to support the transition from visual
programming to text-based languages. LEAVING LITTLE TIME FOR CREATIVITY
Visual languages and environments are
a hugely powerful tool for introducing
students to the concepts of programming, This means that learners have become teach the fundamental control structures
allowing them to explore concepts, solve accustomed to not recognising errors, such of programming (sequence, repetition,
problems, and create products through as a missing capital letter, until after they function, selection, and communication).
programming. However, it’s important run their programs. The specific languages used were Logo,
to get the experience of working in There can also be problems relating to Python, and Scratch; all three share
text-based languages, both to cover the a learner’s literacy. Even without learning similarities of sequential processing with
curriculum and to develop the skills for difficulties such as dyslexia and dyscalculia, a sprite or turtle and the reward of the
the next stage. This article will explore many young learners are unable to recognise instant feedback of sprite or turtle activity
common challenges when making the the difference between: on the screen.
transition from blocks to text, and the tools The researchers chose a cross-curricular
you can use to support this. for i in range(5): context (geometric shapes and patterns)
and to teach the background of each of the
Common challenges For I in ragne 5: control structures. By using this approach,
Many learners have access to computers Dorling and White concluded that “there
or mobile devices, or have some experience when they first type the line. Even the is established pedagogy in other subjects
using them. Despite this, when learning best programmers will occasionally make that can be effectively used in a computing
to use a text-based language, there are mistakes, such as typing Flase instead lesson. In turn, it was also evident that
still some major hurdles for students of False. programming could enhance the delivery of
to overcome, many which have little to other curricula topics.”
do with their ability to think logically Rethinking the transition Having a linear transition from blocks
or computationally. Researchers Dorling and White, however, to text without any cross-curricular
Even students who have grown up with suggest that we might want to think context may not be a suitable approach
a games console, laptop, or tablet will often about this transition in a different way to take when learning programming.
struggle in the early days when it comes (helloworld.cc/dorling2015). They When introducing new concepts, such as
to typing — they are often more used to explored approaches including unplugged, local and global variables, learners may
typing with their thumbs on an on-screen visual, and textual programming, and the find using block-based programming
Python code in a way that reduces errors outcomes, and they were asked questions
helloworld.cc/weintrop2018
that could arise when typing code into about their attitudes to programming,
the micro:bit editor specifically their perception of computing
LEVELS OF ABSTRACTION
STORY BY James Robinson, Andy Bush, and Sway Grantham
earning to program is broader than requirements, and may even define the task and trace the execution of their code to
L simply learning to write code. While independently through user research. ensure they understand its behaviour.
coding is a big part of the programming These levels of abstraction do not represent
process, programming also encompasses DESIGN a linear pathway to developing a project.
analysing and understanding the task or The design level includes the algorithm, While learners will often begin at the task
problem being addressed, designing a which outlines the process and logic that level and will generally progress towards
solution, and testing and debugging the will exist within the program. The design running the project, they will frequently need
program. If we try to teach all these things may also contain other aspects, such as to switch back and forth between levels.
to novice programmers at the same time, artwork, sounds, and sketches of what the
the cognitive load overwhelms them. The project will look like, or how it will be put LOA in practice
skill of abstraction — routinely adjusting together. This level contains more detail While expert programmers regularly move
your focus and the level you’re working at than the overall task, but doesn’t yet refer through these different levels without even
while developing a programmed solution to the code or programming languages that realising it, it’s important to scaffold them
— is therefore a vital skill to introduce to will be used. Learners can use a range of for novice learners. This means that when
learners. These different perspectives or tools to represent their design, including you are planning a programming unit of
levels can be modelled by the levels of text, sketches, flowcharts, and diagrams. work, you need to consider which level the
abstraction (LOA) hierarchy. There are lesson is working at, and what support
several variations of this hierarchy, but this CODE/BUILD learners might need at each level. You
article discusses the model outlined by The code level (or build level, for physical should use this approach across different
researcher Jane Waite and her colleagues computing projects) represents a static projects, genres of program, and age
(helloworld.cc/waite18). program that implements the design from the groups. This will ensure that as learners
level above. This could be constructed in any begin to move from novice to expert,
The LOA framework number of programming languages, including progressing through each of the levels
This hierarchy emphasises the critical role that both block- and text-based programs. becomes routine. The rest of this article will
abstraction plays in developing programs. It Learners will be limited to the languages and now exemplify this through a programming
describes four levels, encompassing different tools they are familiar with initially. As their project from the Teach Computing
degrees of abstraction. We can characterise confidence and repertoire increases, they can Curriculum for learners aged ten to eleven
the four levels as follows: be more discerning about choosing the best (helloworld.cc/tccLOA). Learners should
tool to implement their design. complete the project mostly independently
TASK so you can assess their understanding of
The task outlines the problem to be solved, RUN THE PROJECT variables across three one-hour lessons.
or describes what the project should At the lowest level, the programmer is
actually do. concerned with how the program behaves THE TASK
With younger learners, a teacher often when it is run. Does it run? Are there errors? Give students the following task:
defines a task. As students become more Does the program behave as expected?
experienced, they can expand a given task These are all important questions at this Create a ‘catching’ game that includes a
or develop a task themselves. Later, they level. Here, learners need to know how to score and at least three falling objects. The
may work from formal specifications or user test their programs, find and correct errors, objects should fall at different speeds.
© MICHAEL ZECH/stock.adobe.com
As a teacher, I want the learners to program that do require an understanding of Again, you can see how this part of the
demonstrate their understanding of variables. This also means that the activities task guides the design to include a focus
variables. This means I don’t want them to will largely be at the designing and coding on the variables (score, speed, and size),
choose a task that might limit this, and so levels of abstraction. but leaves learners free to design their
in this project, I have provided the task. In The main design activities can now begin. own programs independently. The last
another unit, the focus will be different and Learners need to choose their assets (sprites, step, before we move on to the coding
I might work with learners to identify the sounds, and backgrounds). This is also their level, is to encourage students to check
user requirements themselves. opportunity to begin personalising their back with their original task. Does their
project; it’s important that learners recognise design meet the requirements you gave
THE DESIGN there is no one right answer, and that they them? Once they are confident that it
For context, these learners will have had can achieve the task in different ways. does, they can begin their implementation
several years’ experience working through Just like the program stub we provided, at the coding level.
the levels of abstraction, so they know how
to use designs and implement them. Before
this task, they will also have completed three
lessons introducing the concept of variables. “ AS LEARNERS MOVE FROM NOVICE TO
EXPERT, PROGRESSING THROUGH EACH OF
Every programming language is slightly
different in how it can be used. It is important
for learners to have an understanding of
THESE LEVELS SHOULD BECOME ROUTINE
this before they begin designing, or they
may plan a project that is unachievable. In the algorithm and design for that part of the THE CODING/BUILDING
this project, we provide a ‘program stub’, program have been provided for learners Learners can refer to Figure 1 and its
which is part of the program they will (Figure 1). This models to learners how implementation in the program stub
need to complete the task (helloworld.cc/ we write algorithms, and create this part to scaffold what they need to do next.
fruitcatcher). Give learners time to familiarise of the program design. It also gives them a The unit of work also contains a design
themselves with this project before they reference for their next step: worksheet, which is organised so that
begin their design, so they can remind learners can approach each section
themselves of the Scratch environment and Write two algorithms (include a drawing independently:
its capabilities. The stub will also maintain and a description) for the two new sprites
learners’ focus on variables. Providing the you chose. Each sprite must change 1. Add sprites with the necessary artwork
code for the sprites that will not use variables the score by a different amount, should 2. Initialise variables — use clear names!
means learners will spend their time move at a different speed, and could be a 3. Algorithm for sprite 1
designing and implementing the parts of the different size. 4. Algorithm for sprite 2
n Figure 1 The information above prompts learners how to write the algorithm and create the program design for this task
“ IF LEARNERS START CHANGING RANDOM as expected for the task or design. In this
project, for example, a program might run
VALUES ‘JUST IN CASE’ , YOU’LL KNOW successfully, but perhaps the items of fruit
IT’S TIME TO BRING THEM BACK A LEVEL are flying up into the air instead of into the
fruit-catcher bowl. This is what testing is for.
Working through these levels within a
unit of work gives learners the opportunity
As this project is an assessment piece, working. This can become a problem if to develop skills at a realistic pace and
learners are largely left to implement learners find a bug in their programming. gives you the opportunity to scaffold
their programs with this scaffolding. If Most debugging will happen at the coding specific skill sets. This ultimately ensures
learners do not have much experience at level, especially in the early stage of text- that learning to program is an option for a
implementing code, you might spend more based languages where many of the errors wider range of learners.
time making links between the algorithm are syntax-related. However, if learners
and the code.
Working at the code level is also an
find themselves with a logic error, or a
more substantial bug, they may need to
FURTHER READING
opportunity to observe more general revisit their algorithm to work out what it
programming skills: are learners testing is doing and to plan an alternative solution. The National Centre for Computing
each bit of code as they go? Do they An easy way to spot whether you need to Education. (2022). Programming and
duplicate chunks of code rather than bring learners back to the design level is if Algorithms within the Computing
rewriting very similar scripts for each their approach to debugging has resorted Curriculum. helloworld.cc/p&areport
sprite? These will be opportunities for you to changing random blocks/values ‘just in
to engage with learners while they are case’ because they have no idea why their Waite, J. L., Curzon, P., Marsh, W.,
creating their projects, depending on what program is not working. Talking through Sentance, S., & Hadwen-Bennett,
the focus of your unit is. the algorithm and precisely what it is A. (2018). Abstraction in action:
doing, and then working out the bit that’s K-5 teachers’ uses of levels of
RUNNING THE PROJECT not clear and rewriting that section, will abstraction, particularly the design
It can sometimes be difficult to distinguish support these learners. level, in teaching programming.
between the levels of coding/building and The other aspect of this level that should International Journal of Computer
running the project, as learners should be not be overlooked is testing. This is not the Science Education in Schools, 2(1),
repeatedly cycling through coding and same as just running the code as you are 14–40. helloworld.cc/waite18
running, to check t hat their program is working through the project. Testing is about
n a March 2019 blog post puts it, “Computer science is no more curriculum, but its medium. Coding is the
I (helloworld.cc/schleicher2019), about computers than astronomy is about lab work of computer science: it motivates,
Andreas Schleicher, director of education telescopes.” illuminates, and brings to life the dry bones
and skills at the OECD, asked, “Should But if computer science is not about of theory. Without programming, computer
schools teach coding?” This was computers, what is it about? It is the science would be a dry, theoretical husk
somewhat misreported in the press as study of information, computation, and of a subject. Imagine a music lesson
“Teaching children coding is a waste of communication. Take information, for in which the students only studied the
time, OECD chief says” (helloworld.cc/ example: suppose I show you a picture of the rules of counterpoint or the structure of a
telegraph2019). But it’s a good question. French national flag, and one of the Mona sonata, but never brought them to life by
Let’s start at the beginning, though. Lisa, and ask, ‘Which picture contains more performing or composing any music.
Technology moves fast. To equip our information?’ What does that even mean? But that’s not all: programming is more
young people to flourish in a world of A way to make the question more precise than mere medium. As Fred Brooks put it,
change, we therefore strive to give them might be, ‘Suppose I dictated instructions “The scientist builds in order to study, but
a foundational understanding of the world to you over the phone; which picture would the engineer studies in order to build.” Most
that surrounds them, and an intellectual take you longer to reproduce?’ of programming’s body of knowledge is
toolbox that will equip them to deal with Clearly the Mona Lisa has more organised around the challenge of building
successive waves of technology. For information in this sense: it would be ever more ambitious edifices of software,
that reason, the computing curriculum in slow and painstaking for me to dictate and having them actually work and be
England, introduced in September 2014, instructions so that you could reproduce useful. Programming is the very stuff of
established computer science (not just it at your end, even rather approximately. computer science.
coding, and with computational thinking at Thus, we have begun to speak of Coding is phenomenally creative.
its core) as a foundational subject that all information as a measurable quantity. We The same Fred Brooks wrote that, “The
children learn, alongside maths and science, start to think about how tightly we could programmer, like the poet, works only
from primary school onwards. The previous compress data before transmitting it, and slightly removed from pure thought-stuff.
ICT curriculum focused on technology; how we could detect, and perhaps correct, He builds his castles in the air, from air,
the current curriculum focuses on ideas errors made during transmission. All this creating by exertion of the imagination. Few
and principles. As the famous aphorism is called information theory; it is part of media of creation are so flexible, so easy
computer science, it has a substantial to polish and rework, so readily capable of
body of theory, and it has immediate realising grand conceptual structures.”
SIMON PEYTON JONES practical consequences. When a child does a science experiment,
Simon is a British computer scientist she is seeing physical principles at work,
who researches the implementation and Where coding fits in coming to life in front of her eyes. If she
applications of functional programming What, then, is the role of coding or does the experiment right, we know what
languages, particularly lazy functional programming (the terms are roughly will happen. In contrast, when she writes a
programming. equivalent) in computer science? Coding is program, no one knows what will happen.
not the message of England’s computing The programmer brings into the world a
new creation, formed from an infinitely by everyone: business innovators (for And yet, and yet. There are two risks
malleable substance, which does something identifying a need or potential); scientists here. First, there is the risk that we
new, conjured from the mind of its creator. (for working with data and developing confuse the medium with the message.
We are not limited by the strength of wood, computational models of scientific I fear a future prime minister giving a
or the budget of the school workshop: processes); those procuring software (for speech saying, “The new computing
in programming, we are limited only by example in health services, for knowing curriculum has been a great success:
our own ability or inability to manage the what is possible and what they should be every child now leaves school fluent in
complexity of our creation.
© StockImageFactory/stock.adobe.com
hatever learners want to be when they grow up,
nW
learning to program teaches them vital skills
quickly teach themselves others built on the Tomorrow’s problems The Telegraph’s interpretation of
same concepts, and should also be able to Returning to Schleicher’s blog post, he Schleicher’s blog post: helloworld.cc/
recognise those same concepts appearing says, “The risk is that we will again be telegraph2019
in the wider world that surrounds them. teaching students today’s techniques to
The second risk is that we may forget solve tomorrow’s problems; by the time
that the school computing curriculum today’s students graduate, these techniques and understand them deeply. People
is for the many, not the few. I certainly might already be obsolete. We should occasionally say, ‘In the future, computers
hope that the education our young people instead focus on the computational thinking will program themselves,’ but I believe they
receive will inspire some of them to be the that underpins these techniques, and that are mistaken — we will simply increase the
software developers of the future. But many students can use to shape the technologies ambition of the programs we write.
more will become lawyers and plumbers, of tomorrow.” So yes, to answer the question, we should
hairdressers and doctors. They all learn the Fair enough — and indeed, computational teach our children to code. But we should do
elementary principles of natural science, thinking is already explicitly at the core so not as an end in itself, but rather as a
and similarly they should all learn the of the English national curriculum, from powerful and effective means to motivate,
elementary principles of computer science. start to finish. But teaching programming illuminate, and exemplify the underlying
And, just as mathematics appears in primary is emphatically not ‘teaching today’s principles of computer science. There is no
schools mainly in the guise of arithmetic, so techniques to solve tomorrow’s problems’. more intellectually exciting, creative, or
computer science will appear mainly in the Programming is computational thinking practically useful subject. I want to convey to
form of simple programming. Just as no one incarnate, brought to life, made tangible, our young people a visceral sense of that
confuses arithmetic with the manifold glories executable, and useful. It provides a richness and creative possibility, and by far
of mathematics, so we should not confuse powerful way to practise and so develop the best way to do so is to share with them
programming with computer science. those computational thinking skills, the joy and beauty of programming.
INTRODUCING
PROGRAMMING THROUGH
THE WIDER CURRICULUM
Ben Hall looks at the crossover between literacy and
coding, and how it can help in the primary classroom
uch of the research around broaden the appeal of the subject for both (see the photo below) or Code-a-Pillars.
M how we learn to program, and learners and teachers? This works really well in a continuous
which approaches are most successful, Researcher Jane Waite and her provision environment where children
has been focused on older learners, colleagues drew parallels between the immerse themselves in the language
particularly undergraduates or those design level of a program — where a pupil before applying it to a different context,
transitioning to text-based languages. uses simple language to explain what much as you might do with many other
There is comparatively little research on characters will be needed and what they subjects. Using Fakebots or grids can be
how children learn to program from an will do — and the planning of writing in a a really useful way to introduce directional
early age. If we want children to become literacy lesson (helloworld.cc/waite2018). language (see the article on page 60
curious and confident programmers, Researcher Raymond Lister and colleagues for more on this). Once the language is
then an understanding of their formative also investigated the links between writing secure, we can then introduce symbols to
experience would certainly help. skills and early programming, but in the represent movements.
Computing is usually seen as a STEAM context of text-based (in this case Python) This is very similar to literacy, where
(science, technology, engineering, arts, and languages for older learners (helloworld. children are immersed in the language
maths) subject. However, are we missing cc/lister2009). Can this research help through opportunities to listen to
a trick? Are there parallels between us develop our understanding of how stories and explore books. Through this,
programming and literacy, and could this the youngest learners are introduced they understand that books convey
to programming? meaning and that they have an order
and a sequence: spot the link? Sway
Skill acquisition Grantham, a senior learning manager at
As a former specialist computing the Raspberry Pi Foundation, explores
teacher in a primary school, I this connection in a blog post, analysing
have been fortunate to teach ‘Talk for Coding’ as an approach based
learners from the age of six on Pie Corbett’s ‘Talk for Writing’ learning
right through to the age of sequence (helloworld.cc/grantham2017).
thirteen. This has given She draws upon research that concluded
me some insight into how that sequence, structure, and clarity
children pick up key skills. of expression are as important in
I’ve typically introduced programming as they are in writing
computing to the (helloworld.cc/burke2010).
youngest learners by
looking at concepts such Parallels
as instructions, and As children’s literacy skills develop and
developing vocabulary to they become more aware of structure in
help learners access floor writing, there are some interesting parallels
robots such as Bee-Bots we can draw on.
Firstly, nursery rhymes. They’re parallels with literacy — we plan writing that of learning a programming language?
sequenced (for example, One, Two, Three, and design algorithms, and storyboards In maths, when you teach patterns and
Four, Five), and may include some form can be used for both. sequencing, how can you translate these
of repetition (such as Hickory Dickory The research suggests that this into the corresponding programming
Dock or Ten Green Bottles). Knowledge of approach is not widely used: Waite and concepts? Can you link debugging to the
these patterns can be directly applied to a colleagues identified that 82 percent of process of correcting errors in other
sequence of instructions, or even used as a primary teachers thought that design in subjects? A great way to develop your
basis for programming projects. In ScratchJr, programming was at least very useful, computing teaching is to ensure you use all
we have the perfect platform for storytelling. whereas only 44 percent actually used your experience, from all of your primary
One of my favourite learning sequences it in their teaching ‘always’ or ‘usually’. curriculum, to make computing as
with Year 1 (aged 5–6) tied in with their Double this number ‘always’ or ‘usually’ accessible as possible to the broadest
class book at the time, The Three Little Pigs, used planning in writing. This could range of learners.
which they retold through ScratchJr. reflect a lack of confidence in teachers’
I was careful not to bring in the subject knowledge, a shortage of materials
programming element too quickly; it to support design-led activities, or the
was much more effective when children curriculum itself. In England, the curriculum
were able to plan an element, using a for English states that children should ‘plan,
storyboard, which they could then apply evaluate, and improve’ their writing — but BEN HALL
within the tool. This is very similar to how there is no mention of planning or design Ben is a learning manager at the
most literacy teachers would encourage in computing. Raspberry Pi Foundation, developing
children to plan a story before writing It can be helpful to draw upon other curriculum resources for England’s
it. Design in programming is equally subjects, not just literacy, in your primary National Centre for Computing Education.
important, and this is a way to introduce computing classes. Consider languages. He was previously a primary teacher
it by using a known context and drawing How could learners apply their experience specialising in computing (@hengehall).
from prior learning. There are many of learning a second spoken language to
COMPREHENSIVE
DAVID J.
MALAN
David is a Gordon McKay
Professor of the Practice of
PROGRAMMING
Computer Science at the
Harvard John A. Paulson School of Engineering
and Applied Sciences in Massachusetts, USA.
He is the instructor for CS50.
n I s
it actually possible to read the
student’s code? Poor indentation
(unless programming in Python!) and
no commenting might not matter to
the processor, but to an instructor it
can cause quite the headache!
© CS50, cs50.harvard.edu.
n H
ow efficient is the student’s
code? If the program is correct, but
takes 15 minutes to run, is it all
that useful?
n CS50 staff grading student work at a grading party
Assessing programming through different axes allows us to test several skills via a single assignment:
Some questions that we consider when
looking at design include: n S
cope rewards student effort in solving n D
esign considers the efficiency,
problems, reiterating the importance of a culture elegance, and clarity of a student’s
n H
ow frequently do the same lines of error and normalising the idea that failure code from an organisational standpoint
of code repeat? to completely solve a problem is not a total (how does it work?)
failure, but a learning opportunity (did you try?)
n D
oes a student’s code have an n S
tyle is the most human-focused axis, and
computers, and as such, this area of computing particularly ■ What the research says:
complements other school subjects, with a practical focus on fostering data literacy competencies
collecting, storing, and analysing data at scale. The study of ■ Captivating data visualisations
data and information also provides a solid basis for learners ■ A real-life data project
to understand the role of artificial intelligence in analysing and ■ Boosting engagement with big data
interpreting data.
There are skills and concepts associated with each stage
of a data life cycle, which involves questioning, collecting,
implementing, analysing, and sharing. The
implementation stage of this process, in
particular, involves the application of
computing. Learners will use, design, and
compare different tools and approaches
to storing data digitally, including text files,
spreadsheets, and databases.
IN SUMMARY
DATA AND
INFORMATION
Understand how data is collected,
organised, and analysed to explore
real-world scenarios
STAGE 1 STAGE 2
■ Explain that data can be helpful in answering ■ Identify that yes/no questions can be used to
questions structure data
■ Collect, group, and compare simple data ■ Answer questions using decision trees
■ Explain that names/labels can be used to ■ Use sensors/data loggers to collect data
describe objects
■ Explain how data can be searched and
■ Identify how attributes can be used to ordered using different fields
compare objects
■ Use suitable tools and applications (including
■ Describe how data can be presented spreadsheets) to handle data
pictographically
■ Use AND/OR operators to refine searches
■ Present data using pictographs and
simple charts ■ Choose an appropriate format to present data
In the table below, you will find learning outcomes associated with
the ‘Data and information’ strand of the Raspberry Pi Foundation’s
computing taxonomy. These learning outcomes are illustrative of the
kinds of knowledge and understanding that learners could develop in
this area of computing. They are not prescriptive, but instead aim to
illustrate the wide applications of the discipline.
These learning outcomes were originally developed to complement
the English national curriculum for computing, and as such, stage 1
roughly corresponds to ages 5–7, stage 2 to ages 7–11, stage 3 to
ages 11–14, stage 4 to ages 14–16, and stage 5 to ages 16–19.
■ Describe the stages of the data life ■ Describe the role of a database and its data ■ Describe approaches to optimising
cycle, including questioning, collecting, model in structuring and organising data databases, including normalisation
implementing, analysing, and sharing
■ Explain how a relational database is implemented ■ Explain how databases handle and process multiple
■ Collect, process, and analyse quantitative data to through tables and keys transactions
answer a specific question
■ Compose SQL expressions that ■ Construct database tables, relationships, and
■ Explain the need for being selective when add, retrieve, and update data in an views using SQL
working with large data sets existing database
■ Design, build, and interact with a database using a
■ Apply formulas within a spreadsheet to process ■ Explain how data can be organised, stored, and database management system
data retrieved using files
■ Describe the relationship between artificial
■ Use sorting and filtering techniques to help ■ Identify sources of potential bias within a intelligence, machine learning, and big data
identify patterns in data data set at each part of the data life cycle
■ Describe the kinds of problem that data science
■ Present data in a range of different formats to aid ■ Distinguish between quantitative and qualitative can address
understanding data
■ Design and conduct a data science
■ Prepare data for analysis, importing, investigation, identifying a problem, data
structuring, and cleaning as appropriate sources, and methodology
■ Report on findings, making use of descriptive ■ Build interactive data dashboards to summarise
statistics and visualisations data and aid analyses
■ Distinguish between public and private ■ Identify potential sources of bias within data
data sets and work with both analysis
oday, data analysis is everywhere: This model characterises data- and a process aspect (such as being able
T large companies collect and related competencies from two different to prepare data in a way that is suitable
analyse masses of data to systematically perspectives: content areas and process for visualising it and creating the aspired
promote their products, while social areas. The content areas clearly emphasise visualisation). Although the competency
media platforms use data analysis to technical aspects and hence are focused model was developed with a focus on
suggest friends. on computer science content. In contrast, computing education, we can also adapt it
Nowadays, everyone is confronted the process areas take a more practically to incorporate aspects from other subjects.
with new challenges because of the oriented perspective, illustrating what can After all, computer science is not the only
increasing and widespread relevance of be done with data. subject that is dealing with data today. Other
data; these include deciding which personal These two types of competency area topics can contribute important elements too,
and foreign data is shared with others are closely intertwined, meaning that each particularly to the content areas, enriching
(including services on the internet), under data literacy competency has to connect to the model and extending its usability.
which conditions, and for which purpose. at least one content and one process area.
We also need to ask what others can do For example, the competency to visualise The life cycle of data
with, and read from, this data. And it’s not data and analyse results incorporates both When trying to include data literacy
just children and young people who need a content aspect (such as knowing different competencies in school teaching, the
to gain skills in this area — we all need to visualisation methods and their purpose) question often arises as to where to start.
become data literate.
FURTHER READING
Grillenberger, A. & Romeike, R.
(2018). Developing a Theoretically
Founded Data Literacy Competency
Model WiPSCE ’18, October 4–6, 2018,
Potsdam, Germany. helloworld.cc/
grillenberger2018
n Figure 2 The data life cycle model gives a structure for teaching data literacy, for both teachers and students
Most computing lesson plans probably have instead of discussing fictitious examples. An exemplary project, particularly
various connection points to data literacy, The important question, therefore, is not considering data analysis, is based on real
so there are multiple possibilities for data where to start with teaching data literacy, data about school students. For example,
literacy teaching. Yet it is crucial to keep in but where to connect it to what we already learners could examine a data set about
mind the entire process of working with teach. The data life cycle helps to identify Portuguese students that was released
data. When only discussing distinct parts such connection points. on the UCI Machine Learning Repository,
of this topic (for example the analysis), helloworld.cc/UCIdataset. Students can
other important aspects are missing (such Fostering data literacy in school analyse this using simple tools (like Orange,
as gathering data, or justifying the analysis Several challenges have to be overcome orange.biolab.si), to predict grades based
from an ethical perspective). when fostering data literacy competencies on the information contained in the data set.
We therefore also developed the data in school. For example, we have to identify As this setting directly concerns students,
life cycle model (Figure 2) as a structure suitable tools, select appropriate examples particularly if the teacher presents it as a
for teaching data literacy. This model that are relevant and motivating to possible new way to grade them, it raises
provides a structure for teachers and students, and work out which concepts can several ethical problems that directly affect
students when working with data and foster these skills. the students. The resulting discussions that
emphasises the complete process, not We cannot teach most data literacy arise on challenges, risks, and opportunities,
just a small part of it. Of course, we can’t competencies through theory alone; along with the possibility of directly working
consider all aspects in the same depth suitable examples and appropriate data with and analysing large amounts of data,
in school, but using the data life cycle play a significant role in teaching these lead to another challenge. Although this
helps to bring together all the knowledge competencies. Such data is available from article has taken a computing education
and skills students gain throughout their various sources today. The application perspective on data literacy, the topic also
computing education. programming interfaces (APIs) of widely affects and applies to many other subjects.
For example, aspects related to known services on the internet (such as We should therefore consider data literacy
data modelling, implementation, and Twitter) aren’t the only data sources we an interdisciplinary topic, and it should be
optimisation are already in most computing can use; there are also rich and easy-to-use taught in school accordingly.
curricula, and so only need to be connected data sets available, such as those released Fostering data literacy in school is an
with other elements of the data life cycle. by public administrations as part of open- open challenge to which we all can, and
When working with databases, you can data projects. For example, data.gov.uk must, contribute if we are to prepare our
gather and structure real data in class for contains open data published by the UK students for a life in a world where we use
efficiency, storing them in the database government and public bodies. data continuously and everywhere.
DATA VISUALISATIONS
FOR INQUISITIVE MINDS
How to get your students started with data science by introducing
exciting and interesting visualisations
isualising data is the art of being Telling a story with data the beige line representing the march on
V able not only to present data in a Take a look at the data you can see in Figure Moscow and the black line representing
visual format, but to truly tell a story with 1 below. Can you extract any meaning from the retreat back to Poland. The scale
it. A good visualisation will bring data it? What story is it telling you? You can of the losses becomes very clear when
to life, aiming to provide the audience inspect the data in more detail here: ncce.io/ you compare the thickness of the two
with something that they might not have minard-data. lines: Napoleon set off with 422,000
been able to spot merely by looking at This data relates to Napoleon’s 1812 troops and returned with just 10,000.
numbers on a page. While writing a unit march on Russia. The numbers alone don’t Other forms of data have also
on data science for the Teach Computing tell much of a story, but in 1869 Charles been represented in the visualisation.
Curriculum, I became infatuated with Joseph Minard, a French civil engineer known Geographical features such as locations and
the creative ways in which people have for his information graphics, produced what rivers crossed have been plotted, as well as
visualised data, drawing out trends, is now widely regarded as the best statistical the varying temperatures at different points
correlations, and patterns. In this article, graph of all time; see Figure 2. on the march and retreat. If you look closely,
I want to highlight some of the best The visualisation shows Napoleon’s this helps you to see where and why tragedy
visualisations that are adaptable for army, departing at full strength from the occurred at various points on the journey.
most age groups, so you can use them Polish border to Russia, and then their During the retreat on 28 September 1813,
to inspire your classes and get them subsequent retreat. The thickness of the the data labels on the black line read 50,000,
thinking about data. lines represents the size of the army, with before dropping to 28,000, showing that
22,000 men died crossing the Berezina river
near Minsk!
What I love about this visualisation is that
the more you look at it, the more you see.
The visualisation really made me feel as
though I understood a little more about the
story of Napoleon’s march on Russia — a
story that I certainly wouldn’t have been
able to get by simply studying the data as
n Figure 1 What does this data tell you? numbers on a page.
BEN GARSIDE
Ben works for the Raspberry Pi Foundation
and is also a Computing at School
community leader. Recently, Ben has
been developing resources for the Teach
Computing Curriculum, as well as writing
online courses and content for Isaac
Computer Science (@BenberryPi).
n Cholera dot map
s a society, we have never before too hot, students turn on a fan. But how control plant at the same time as we watered
A collected more data about many fans do we need to turn on? After all our other plants, when the control plant
individuals. Despite this, most people and experimenting, we know that each fan was dry (giving a negative moisture signal),
institutions do a poor job of interpreting lowers the greenhouse temperature by the rest of the plants in the greenhouse
data and using it to make meaningful between 7 and 10 degrees. Opening the would need to be watered as well.
change. I wanted to tackle this problem on a door and turning on both fans can bring a This method of determining when to
local scale with my learners in FH Grows. greenhouse that’s pushing 100 degrees water our plants worked well. We rarely
FH Grows is the name of my seventh- in late May or early June down to a more ever saw our plants turn yellow from
grade class (aged 12–13), and a student-run manageable 80 degrees. overwatering again. Here is where the
agriculture business at Knollwood Middle Turning data into action can allow for creativity came in. We received a signal from
School in Fair Haven, New Jersey. In FH some creativity as well. Overwatering plants Raspberry Pi when the soil was not wet
Grows, we grow produce and sell it, both can be a real problem; we found that our enough, so we played around with what we
online and through student-run farmers’ plants were turning yellow because we were could do with that signal. We displayed it
markets. Any produce we don’t sell is watering them every day when we didn’t on the dashboard along with our other data,
donated to our local soup kitchen. To get the need to. How could we solve this problem but we also decided to make the signal send
most out of our school gardens, students and become more efficient at watering? us an email from the plant. When I showed
have built sensors and monitors using Students built a Raspberry Pi that used a students how this worked, they decided to
Raspberry Pis. These sensors collect data, moisture sensor to find out when a plant write the message from the plant in the first
which allows me to teach students how to needed to be watered. We used a plant with person. So every week or so, we received an
get better at interpreting data themselves, this moisture sensor in the soil as our control email from Carl the Control Plant asking us to
and how to turn it into action. plant. We figured that if we watered the come out and water him!
TEACHING DATABASES
USING BIG DATA
Databases are fundamental to modern society, so why do many young people
(and their teachers) find the topic less than engaging?
here has been major curricular interact with huge data sets multiple times Why do we need a database to store ten
T change in Scottish computing in a day? In this article, I’d like to explore an records? A spreadsheet, or even a table in
education over the last eight years. approach to learning about databases that Word, would allow us to store and see this
Previously, there were separate show pupils the relevance of understanding information at a glance.
qualifications in computing and and being able to extract meaning from To see the need for databases, and
information systems. To generalise, modern data sets. their enormous power and value, we must
the former focused on programming use big data: data sets with thousands
and the second on databases. The Big data of records, data that requires queries
new qualifications, introduced in Imagine an introductory database lesson and sorts in order to tell us something
2014, combined these two separate that talks about the millions and billions meaningful. Multiple, linked tables can then
qualifications into one new qualification of records and fields contained in the be used to show why careful design of
called ‘computing science’. A more recent Amazon or Twitter databases. Pupils, keen databases is so important. Close to home
update introduced SQL queries at all levels to get insight into the technology behind for me, for example, Glasgow City Council
of computing science. these huge enterprises, are then directed and the Scottish Government publish a
Soon after this update, at a meeting to Microsoft Access, where they have to range of data sets about crime, education,
with local computing teachers, we create a single table, declare a few fields, environment, and population, which can be
were discussing, first, the importance and create a handful of records in an used in class (helloworld.cc/glasgowdata
of databases in the study of computing address book or music database. This and helloworld.cc/scotlanddata).
science and, second, how it can be difficult discrepancy, between the reality of huge, The Scottish Index of Multiple Deprivation
to engage pupils in a topic that can be drier enterprise-scale databases and what is an excellent, interactive example of data
than programming or designing websites. pupils can actually create, is massive. How being used to analyse and compare huge
How can a topic that underpins so much many of us have asked pupils to enter five amounts of socioeconomic data (helloworld.
of modern technology be seen as boring or or ten records into a database, with no cc/smd). Simply comparing Glasgow and
irrelevant by pupils who, unwittingly or not, actual thought as to the educational value? Edinburgh shows stark differences, but
n Inside Airbnb offers vast amounts of data relating to hosts, listings, and reviews
IMDB
Field(s) listing_url, summary, price, bedrooms
Many of our young people will be big
Table(s) Listings
fans of online streaming services, and
will likely be familiar with the Internet
Search criteria Bedrooms > 1, price <=60, zipcode=EH99%
Movie Database (IMDb). Data sets
Airbnb Looking at a single listing on the Airbnb might the web server view the scraper
Another powerful example is the big website will show you the listing, some software as an attack?
data available about Airbnb. Airbnb host information, and a summary of their Then we can look at the social and
has disrupted the world of travel and reviews. What better illustration of a join? economic implications of Airbnb. Would
accommodation, and the site Inside Airbnb This view is created dynamically using data you like to live alongside someone who
(helloworld.cc/airbnb) allows you to from all three tables. lets out their apartment to multiple people
download vast amounts of data that has Data on Inside Airbnb is updated 250 nights of the year? What impact has
been scraped from the site for many of the regularly. Pupils can click on the URLs the site had on the hotel industry? What
most popular destinations in the world.
This context allows us to see the real-world
website and the database behind it.
These data sets require some analysis “ TO SEE THE POWER AND VALUE OF
DATABASES, WE MUST LOOK TO DATA
and work before they can be used
in a classroom situation. Using the SETS WITH THOUSANDS OF RECORDS
Edinburgh Airbnb data (helloworld.cc/
edinburghairbnb), I downloaded listings,
hosts, and review data for thousands of contained in the database and verify impact does it have on cities that welcome
destinations in the capital and imported that the data they’re examining is for a lots of tourists each year? Does Airbnb
it into Access. Some fields needed a little real host with a real listing in a real city. I drive up rents and restrict availability for
work to make them usable. Creating a believe this authenticity, and the quantity local residents?
relational database of the data allows us to of data used, will start to show pupils the There are lots of other sources of
illustrate the cardinality of the data. value of database management software. large data sets out there. I hope this article
This data is too much to take in just by The focus on SQL will mean they don’t provides you with a helpful starting point
looking through the tables, but we can become experts in Access but, instead, for finding examples that will grab the
now start to construct queries. If I wanted come to understand the underlying attention of the young people in your
to stay near the Scottish Government structure of databases and the language classes, which they’ll want to manipulate
building in the EH99 postcode area, but used to query the data. and manage.
could only afford £60 a night for at least Other discussions will follow. Is it legal
two bedrooms, which table or tables would to scrape data? None of the downloaded
I look in, and what criteria would I use? The data is hidden or hacked, but do we TONY HARKINS
SQA exam board that my school follows have the right to extract, store, and Tony is head of computing at St Aloysius’
plans queries as shown in Figure 1. From manipulate it? How could bot software College, Glasgow.
there, it’s then trivial to code this query: be programmed to scrape the data? Why
In developing an understanding of AI, learners will explore ■ What the research says:
examples of different AI applications and the crucial role of AI ethics
data in these systems. In comparison to traditional rule-based ■ What the research says:
big ideas in AI education
systems, where decisions made by the system are governed
by programmed rules, AI systems make decisions based on ■ AI for preschoolers
patterns in data — patterns that may be harder for humans ■ The history of AI
to explain. Learners will explore how AI systems make use of ■ Ideas for discussions in the classroom
models, as well as looking at how such models are generated.
Alongside this technical knowledge, learners will also need to
understand the social and ethical implications of AI.
Artificial intelligence is an emerging technology, and as such
is a new strand within the Raspberry Pi Foundation’s taxonomy
of formal education content. While there is a broad consensus
as to the importance of learners understanding, applying, and
building with AI systems, there is less agreement
about what, how, and when we should teach it.
Many relevant tools, initiatives, and resources
are nonetheless available, and there are
multiple active research projects in this area.
This section therefore provides an insight into
AI education at this point in time.
IN SUMMARY
ARTIFICIAL
INTELLIGENCE
Understand the capabilities and
limitations of artificial intelligence,
along with its applications and wider
impacts
STAGE 1 STAGE 2
■ Recognise that AI systems are computing ■ Name examples of AI applications in a wider
systems that are designed and built by people societal context
■ Describe examples of the problems ■ Contrast the benefits and issues of using
associated with using and trusting AI and trusting AI systems
systems
■ Describe how data is key to AI systems and the
■ Describe the purpose of familiar AI applications decisions they make
■ Identify the parts of a system that are AI and the ■ Design and test supervised learning ■ Compare AI task types (classification,
parts that are not solutions for classification problems regression, clustering, generative, decision-
making)
■ Compare data-driven models and ■ Train models and incorporate them into a
rule-based models programmed solution ■ Identify different AI engines (e.g. decision trees,
k-nearest neighbors, neural networks, linear
■ Describe how the data life cycle is applied to an ■ Evaluate whether a model is fit or not fit for regression)
AI system purpose
■ Explain that different engines have different
■ Train a machine learning model ■ Identify a neural network as a supervised learning levels of explainability
algorithm
■ Explain the difference between training and ■ Choose the right algorithm to solve a particular
test data ■ Identify the different components of a problem
neural network and describe their purpose
■ Evaluate the performance of a ■ Describe the role of weights and
decision-tree model ■ Evaluate the performance of a neural network backpropagation during the training of a
neural network
ENGAGING CHILDREN
WITH AI ETHICS
STORY BY Ben Garside
rtificial intelligence (AI) is a term that approach teaching young people about it. Why is this important?
A is now in most people’s vocabulary, Researchers Mhairi Aitken and Morgan Aitken and Briggs stress that learning
even if the meaning isn’t always understood. Briggs at The Alan Turing Institute have about AI through this lens is important;
With huge amounts of data constantly being found that many curricula designs focus on children need to understand the role of AI
generated in the world, alongside regular AI and data science skills and capabilities, in their lives and critically engage with this
developments in hardware capabilities, more to “equip the next generation to pursue technology if they are to make informed
and more systems that we interact with, or careers in these fields” (helloworld.cc/ choices about how they interact with it. The
that make decisions about us, use AI. As a aitken2022). They make the case that paper illustrates that it’s almost guaranteed
result, educators are becoming increasingly AI education needs to go beyond simply that every young person will at some point
interested in teaching young people about preparing young people for careers, and interact with, or be the subject of, a decision
this technology. At the same time, there isn’t that we should instead make it a priority made by an AI system. For example, if a child
a huge amount of evidence-based research to encourage discussions about the social interacts with a voice-based digital home
in this area of education, so curriculum and ethical ways in which AI is designed, assistant, or uses a social media app, they
designers are making choices as how best to developed, and deployed. will be submitting their data and interacting
with AI applications, perhaps unbeknown Child-centred AI centred AI into practice. The paper thus
to them! These examples might both seem As well as the more negative examples recommends a substantive approach
harmless, but many such systems aren’t discussed above, the paper highlights that to engaging children around AI ethics,
designed with children in mind, and without “children and young people have a unique engaging young people in discussions
children having a basic education about set of needs, and it is important to note that that help them understand the role and
how they work, there may be unforeseen if developed ethically and responsibly and impact AI has in their lives and allows them
problems. Aitken and Briggs quote the with children’s voices included and listened to “critique the ways that AI is designed,
case of a ten-year-old child who asked an to, AI technologies could provide beneficial developed, and deployed”. The researchers
Amazon Alexa for a challenge, with Alexa outcomes”. For example, the researchers focus on the benefits of this type of
responding with a challenge that placed the argue that within education, AI could help approach and highlight that if young people
child’s safety at risk. support children’s learning, such as through are involved in this way, they are better
The paper also describes how AI systems real-time translation, allowing children equipped to make “informed choices” and
might have an impact on “shaping children’s to access global educational resources, to “hold AI systems and their developers to
views of the world”, such as deciding what or by supporting those with visual or account”. Translating this for the classroom,
content to display to them online, what hearing impairments. However, to ensure this means that to engage children with
content to filter out, and influencing the that children’s needs and interests are AI, we should begin with no assumptions
about what they already know, and should
promote a dialogue, asking questions like:
IN WHICH THEY WILL LIVE AND WORK n What are your concerns, interests, and
priorities?
n What are the important issues in your
FURTHER READING
to achieve fairness, but because of a lack AI practices
of attention towards ethical considerations, n Ensuring the next generation of developers
the result was a system that “exacerbated and policymakers are equipped with an
existing inequalities in society leading to understanding of the ethical considerations Aitken, M., & Briggs, M. (2022).
unfair outcomes”. AI is clearly increasingly around AI and its uses Engaging children with AI ethics. In
impacting children’s lives and shaping the n Ensuring ethical mindsets of future
AI, data science, and young people.
future societies in which they will live and developers and members of the tech Understanding computing education
work. Aitken and Briggs conclude that it industry (Vol 3). Proceedings of the Raspberry
is therefore vital that children and young Pi Foundation Research Seminars.
people are equipped to interrogate and Organisations that are creating and using helloworld.cc/aitken2022
understand the role of AI systems. AI may find it challenging to put child-
rom September 2021 to March ideas shared in one of these seminars, describe what educators should teach in US
F 2022, the Raspberry Pi Foundation presented by Professor Dave Touretzky schools across the discipline of computer
hosted a series of seminars in partnership and Professor Fred Martin, about how to science, but they say very little about AI. As
with The Alan Turing Institute focused approach teaching AI. such, this was the stimulus for starting the
on artificial intelligence (AI), machine AI4K12 initiative.
learning, and data science education AI4K12 The AI4K12 project has a number of goals.
(helloworld.cc/AIseminars). These are The AI4K12 project (ai4k12.org), One is to develop a curated resource directory
important topics in both the Foundation’s spearheaded by Touretzky and Martin, for K–12 teachers, and another is to create
learning resources for learners and focuses on teaching AI in K–12 (that is, to a community of K–12 resource developers.
educators, and for our programmes of learners aged 4–18) in the US. The AI4K12 Several members of the AI4K12 working
research, and will only become more team has aligned its vision for AI education group are practitioners in the classroom who
important as AI increasingly becomes to the CSTA standards for computer science have made a huge contribution to taking this
ingrained in our societies. In this article, I education (helloworld.cc/CSTAstandards). project from idea stage to fruition. If you’ve
will summarise and explore some of the These standards, published in 2017, heard of AI4K12 before, it’s probably because
of the Five Big Ideas the team has set out, to
encompass the AI field from the perspective
© AI4K12
1. P
erception: the idea that computers
area. Despite being developed for a US approach, which would mean showing Professor Matti Tedre and Dr Henriikka
audience, I believe the description laid out students an AI system’s inputs and outputs Vartiainen shared their description of
in these five ideas is immensely useful to all only, to demonstrate what AI is capable of computational thinking 2.0 (helloworld.
educators, researchers, and policymakers without trying to teach any technical detail. cc/tedreseminar). Their description
around the world who are interested in The AI4K12 researchers are keen focuses only on the ‘Learning’ aspect of
AI education. for learners to understand, at an age- the AI4K12 Five Big Ideas, and on the
During the seminar, Touretzky and Martin appropriate level, what is going on inside distinct ways that thinking underlies
shared some great practical examples. an AI system, not just what the system can data-driven programming and traditional
Martin explained how the big ideas do. They believe it’s important for young programming. From this, we can see some
translate into learning outcomes for each people to build mental models of how AI differences between how different groups
of the four age groups (ages 5–8, 9–11, systems work, and that when young people of researchers describe the thinking skills
12–14, and 15–18). You can find out more get older, they should be able to use their young people need in order to understand
about their examples in their presentation increasing knowledge and skills to develop and develop AI systems. Tedre and
slides (helloworld.cc/AI4K12ppt) or their own AI applications. Vartiainen are working on a more granular
description of machine learning thinking,
which has the potential to impact the way
ery often, the most vivid examples tablet, and merely exposing them to it will Research-led
V of how quickly children learn and not introduce new concepts. How can we PopBots are still in the early stages of
progress can be seen in the youngest age develop children’s computing knowledge so development and are not yet widely available.
groups. A great example is how children it will encourage them to be more than just Despite this, there is already a growing body
use construction-based resources such as passive users? of research investigating the inclusion of AI
wooden blocks, train tracks, or LEGO®. in the curriculum at an early age. Williams
Often, children experience these for the AI literacy would like to see PopBots developed as an
first time when they enter the primary Could artificial intelligence (AI) provide open-source platform that students could
classroom. Initially, they will use these an answer? A Massachusetts Institute of build from classroom materials. Research
resources in quite a free, unstructured way. Technology team has aimed to make AI supports further development.
Over time, with guidance and support, accessible by developing PopBots, small A recent paper by Williams and colleagues
they construct increasingly complex and robots that are used to introduce AI to investigates how AI can influence young
imaginative models, often linked to other children. They have also developed easy-to- children’s perceptions of robots (helloworld.
areas of learning. The models from the end use resources to complement the hardware. cc/williams2019). They found perceptions
of the year are unrecognisable from those One such resource explores machine of robots are shaped at an early age, so
constructed at the beginning. learning, where a robot can be programmed for children to be AI-literate, their earliest
Can the same be said of children’s to sort healthy or unhealthy foods. Children experiences should be meaningful and
first encounters with technology in the begin by classifying foods for the robot, informed. It is an emerging technology, so
classroom? Many schools will provide access but soon realise it would take too long to the research is at an early stage, but there is
to tablets or computers as part of their do this for every single food type. Through no doubt that AI will increasingly shape our
early-years provision, but how much of that supervised machine learning, children can world. Helping children develop a conceptual
is about consuming the technology, and do quickly train PopBots to classify foods and understanding at an early age needs to be at
children relate it to real-world applications? develop their own understanding of healthy the forefront of curriculum development.
In my experience, simply having the devices eating. Through this simple activity, children
available is not enough — most children start become AI-literate creators — turning a
school able to navigate their way around a passive device into something that makes BEN HALL
informed, intelligent decisions. Ben is a learning
Randi Williams, who worked on the manager at the
Raspberry Pi
WHAT IS A POPBOT? PopBots project, gives her view on
introducing children to AI: “Children’s Foundation. He’s
views of themselves relative to technology a former primary
PopBots are constructed using LEGO and use a change. Their views of how much they can teacher, a CAS
mobile phone with additional LEGO or Arduino participate in technological invention change. Master Teacher,
peripherals. Users interact with them via a I love the fact that early AI education makes and a Raspberry Pi Certified Educator
programming interface on a tablet or computer. children feel more curious about their world, (@hengehall).
and empowered to change it.”
SNAPSHOTS FROM
THE HISTORY OF AI
George Boukeas introduces fascinating
stories to share with your students
he story of artificial intelligence a proxy for answering the question: the are still the yardstick for intelligence, but
T(AI) is a story about humans trying imitation game. there is no requirement that a machine
to understand what makes them human. In modern terms, you can imagine should think in the same way humans do,
Some of the episodes in this story are a human interrogator chatting online as long as it behaves in a way that suggests
fascinating, and could help learners catch a with another human and a machine. If some sort of thinking to humans.
glimpse of what the field is about and, with the interrogator does not successfully In his essay, Turing also discusses
luck, compel them to investigate further. determine which of the other two is the learning machines. Instead of building
human and which is the machine, then highly complex programs that would
The imitation game the question has been answered: this is a prescribe every aspect of a machine’s
In 1950, Alan Turing published a machine that can think. behaviour, we could build simpler programs
philosophical essay titled Computing This imitation game is now a fiercely that would prescribe mechanisms for
Machinery and Intelligence, which started debated benchmark of artificial intelligence learning, and then train the machine to learn
with the words: “I propose to consider the called the Turing test. Notice the shift in the desired behaviour. Turing provides an
question: can machines think?” Yet Turing focus that Turing suggests: thinking is to be excellent metaphor that could be used in
did not attempt to define what it means identified in terms of external behaviour, not class to describe the essence of machine
to think. Instead, he suggested a game as in terms of any internal processes. Humans learning: “Instead of trying to produce a
programme to simulate the adult mind,
why not rather try to produce one which
simulates the child’s? If this were then
subjected to an appropriate course of
education one would obtain the adult brain.
We have thus divided our problem into
two parts. The child-programme and the
education process.”
It is remarkable how Turing even
describes approaches that have since
evolved into established machine learning
methods: evolution (genetic algorithms),
punishments and rewards (reinforcement
learning), and randomness (Monte Carlo
tree search). He even forecasts the main
© chrisdorney/stock.adobe.com
The evolution of a definition program, and Turing famously played a few The evaluation function was handcrafted
The term ‘artificial intelligence’ was coined games with human opponents executing by human experts, and the only form of
in 1956, at an event called the Dartmouth the algorithm by hand. Claude Shannon learning was the system’s ability to fine-
workshop. It was a gathering of the field’s wrote Programming a Computer for tune some of its parameters.
founders; researchers who would later have Playing Chess in 1950, in which he laid the Modern chess-playing programs need
a huge impact, including John McCarthy, foundation for many of the search techniques to evaluate far fewer positions and do
Claude Shannon, Marvin Minsky, Herbert that would later be applied in games not require specialised hardware to vastly
Simon, Allen Newell, Arthur Samuel, Ray (helloworld.cc/shannon1950). outperform human players. The last known
Solomonoff, and W. S. McCulloch. Search is the main approach for playing win by a human against a top chess-
The simple and ambitious definition for many of these games, systematically playing machine was in 2005.
Deep Blue’s victory was part of an
impressive string of achievements,
THE STRATEGY
“ GAME GO WAS
ALWAYS THE
HOLY GRAIL
OF GAME AI
ARTIFICIAL INTELLIGENCE
IN THE CLASSROOM
Emily Dreimann shares ideas for kick-starting discussions on artificial intelligence
here’s little doubt that artificial lifelike robot Sophia, for example, has interactions with the technology. Here are
T intelligence (AI) has captured our become a familiar sight on talk shows, and just a few of the angles from which we can
collective imagination. TV series and films has even starred in music videos. approach this topic, and suggestions for
increasingly explore the implications of this At the same time, our understanding of resources that can complement them.
technology, from family favourites such how we personally interact with AI in our
as WALL-E to the distinctly darker Black day-to-day lives, and how we can use it to AI in action
Mirror. Robotics companies, meanwhile, our advantage, remains limited. Ask a class With the recent proliferation of smart
are transforming the more benign of these of 13-year-olds what they think of when speakers and virtual assistants, this
visions into reality: Hanson Robotics’ they hear ‘artificial intelligence’, for example, technology can be a useful framework for
and the answers tend towards a common an initial discussion around the key tenets
theme: ‘creepy’; ‘sinister’; ‘taking over the of artificial intelligence. Most young people
EMILY world’. How do we keep interest levels up will have been exposed to these devices
DREIMANN while grounding AI in reality and preparing in some form; fewer, however, are likely
Emily is a digital students for the workplaces of the future? to identify them as an example of AI. You
communications For young people to be able to lead and could ask students:
officer who succeed in the data-driven economy, a n What does AI look like?
previously worked strong understanding of this ever-evolving n What does it sound like?
at the David & Jane technology is paramount. To engage n To what extent should it mirror
Richards Family students with this topic, lessons should not human behaviour?
Foundation only highlight the many forms that artificial Google’s Duplex AI assistant is a great
(@em_dreimann). intelligence can take in the real world, but example of the capabilities and potential of
also offer a tangible experience of and this technology. In a popular video of the
© Anthony Brown/stock.adobe.com
point for a discussion about AI
GET CREATIVE
WITH DATA
AI and machine learning form a key part of
Get Creative With Data, a data science course
for students aged 11–14 from the David & Jane
Richards Family Foundation (@DJRichardsFF).
“
Coupled with its hands-on, accessible nature,
this activity has the potential to engage even
AI ARGUABLY REMAINS A THEORETICAL
the most reluctant of students. CONCEPT, WHILE MACHINE LEARNING CAN
Not so intelligent? ALREADY BE SEEN IN ACTION IN INDUSTRY
At the same time, we need students to be
critical in their appraisal of AI technology.
The statement that ‘Machine learning is costumes as an example, you could allow Machine, developed by the Massachusetts
written in Python; artificial intelligence is students to explore; with suggestions such Institute of Technology, is an interactive
written in PowerPoint’ is a great starting as ‘sentient stone’ and ‘a skunk in a moose tool that asks the user to judge the most
point for this discussion. You could ask suit’, it should quickly become apparent to acceptable outcomes of a series of moral
students what they understand by this. The them that this technology has some way to dilemmas faced by a self-driving car. By
aim here is to draw out the idea that we can go in capturing the uniquely human traits of engaging with this modern take on the
already see machine learning in action in creativity and humour. classic trolley problem, students develop a
industries across the globe, while AI arguably deeper and more personal understanding
remains a theoretical concept. Has anyone Branching out of the ethical challenges surrounding
yet created a truly intelligent machine? AI and machine learning can also be ideal artificial intelligence.
There is a wealth of resources that we starting points for generating lively debate These activities have been popular in
can draw on to assist students in forming around other key topics in computing. An schools I have worked with. Teachers have
their own opinions in this debate. The Turing unplugged activity in which students create commented that pupils were “fully engaged”
test, for example, is an important concept for their own algorithm to guide a visitor from and found the topic “really interesting”. By
students to understand and remains a useful the school reception to their classroom providing students with an interactive forum
benchmark against which to measure the is an ideal catalyst for a discussion about in which to explore AI, we have an excellent
capabilities of AI technology. Encourage your the differences between how people and opportunity to support the next generation
students to read aloud some transcripts for machines make sense of instructions. We in confidently claiming their place in the
entries to the Loebner Prize, a now defunct can highlight the ability of humans to apply modern world.
need to understand the impact that technology has on ■ What the research says:
individuals and on society at large. Technology may impact for contexts to inspire
better or worse, and in a wide range of ways, including health ■ Morals and ethics in computer science
and well-being, careers, privacy, global politics, equality, and ■ What the law says about hacking
the environment. ■ Upgrade culture
Our approach to learning about the impact of technology
■ Air pollution project
begins with learners identifying technology around them
and its direct impact on them as individuals, both at home
and at school. Beyond this focus, they then start to explore
the benefits and issues for society, specifically through the
lens of moral, ethical, and legal frameworks, and the rights
of individuals and organisations. Ultimately, they begin to
think more from a global perspective, considering issues of
equity and challenges facing the environment. Throughout
their study, learners will encounter familiar
examples and contexts, as well as considering
the challenges presented by emerging
technologies such as artificial intelligence
and machine learning.
IN SUMMARY
IMPACT OF
TECHNOLOGY
Understand the impact of computer
systems on individuals, organisations,
and society
STAGE 1 STAGE 2
■ Identify and describe familiar examples of ■ Identify tasks that are managed by computer
information technology systems
■ Identify information technology that can be ■ Recognise that human decisions determine
used in more than one way the use and impact of information
technology
■ Use information technology for different activities
■ Explain how the internet allows data to be
■ Explain why we use information technology shared globally
and some of its benefits
■ Explain the benefits of a given information
technology system
In the table below, you will find learning outcomes associated with
the ‘Impact of technology’ strand of the Raspberry Pi Foundation’s
computing taxonomy. These learning outcomes are illustrative of the
kinds of knowledge and understanding that learners could develop in
this area of computing. They are not prescriptive, but instead aim to
illustrate the wide applications of the discipline.
These learning outcomes were originally developed to complement
the English national curriculum for computing, and as such stage 1
roughly corresponds to ages 5–7, stage 2 to ages 7–11, stage 3 to
ages 11–14, stage 4 to ages 14–16, and stage 5 to ages 16–19.
■ Describe the potential harms of information ■ Describe the sustainability challenges associated ■ Outline the data protection principles that
technology upon society and individuals with digital technologies developers and organisations must comply with
■ Recognise the need for laws related to the ■ Outline the benefits and risks to individuals ■ Describe the laws that aim to protect
misuse of computers and data as a result of emerging technologies individuals from malicious communication
(for example AI)
■ Describe the difference between legal, ethical, ■ Evaluate the societal impacts of digital
and moral behaviours ■ Describe the rights that individuals have in technologies, including how we work, communicate,
relation to their personal data learn, and entertain
■ Consider content copyright and credit
sources of information ■ Outline laws that aim to protect individuals and ■ Compare the positive and negative impacts
organisations from digital crime of digital technologies on our physical and
■ Discuss uses of information technology that may mental health
be considered immoral or unethical ■ Describe examples of situations where
digital technologies introduce bias or ■ Identify factors that affect the accessibility,
■ Explain the importance of seeking diverse reduce equity usability, and cultural relevance of digital
perspectives in evaluating and improving technologies
digital artefacts
■ Discuss the ways in which technological
products and tools cater for all members of a
diverse population
INSPIRING YOUNG
PEOPLE WITH CONTEXTS
THEY CARE ABOUT
STORY BY Oliver Quinlan
any young people get into making people with mental health issues with Ideas, technology, and skills
M things with computers through managing their medication. The idea for From our research into these and
an early interest in the technology itself. this project came from the interest in many other projects, we put together
There are many others who may not be health issues of one of the project team a framework to help us understand the
as fascinated by technology for its own and drew on the experience of their different ways in which young people
sake, but given the right context, can see parent, who was working in healthcare. approach making digital projects. We found
it as a powerful tool to make a difference The team had worked together before and that successful digital projects involve three
to the things they care about. met through a summer coding camp. For key areas: ideas, technology, and skills.
One such compelling context is health this project, they wanted to take skills they What tends to happen is that young
and well-being. We see just how many had learnt together and apply them to an people start their projects with an
children care deeply about issues in this area they all cared about. They combined emphasis on one of these three areas.
area every year from the projects entered a lot of thoughtful design work with both Many start with the technology that they
to Coolest Projects, the Raspberry Pi hardware and software skills to realise have access to and explore its potential
Foundation event showcasing young their idea as a working prototype. uses. This is an important consideration,
people’s digital projects.
n The interaction of ideas, technology, and
Back in 2018, the Foundation carried skills in the Locking Medical Box project
out some research looking at the stories
behind the projects children presented
at the events in the UK and Ireland. One
of the most highly regarded projects at
the UK event was Be Healthy, an app to
guide people’s diets and health habits.
The young creator of this app took a
holistic view of health and created a single
app that could encourage people to live
healthy lives in a variety of ways. They
focused very much on the design of the
app, starting with the goals they wanted
to achieve and then exploring how they
would realise them with the technology.
Another was Locking Medical Box, a
physical computing project that supported
as a lack of access to technology can be Other young people start with an idea Evidence from research into formal
very limiting. This approach appeals to in an area they care about and want to education shows that when computing
young people with a strong interest in make a difference to. This approach can lessons address contexts young people
technology for its own sake, and allows be a challenge for adults to facilitate, as feel apply to them, such as health and well-
them to explore the possibilities of it requires young people to figure out being, it can help to motivate groups that
particular technologies. how they can execute ideas that are are usually less engaged with computing,
Some young people start with skills they often quite ambitious, using technology particularly girls (see the ‘Further reading’
have learnt or want to learn, and create a they have access to and skills they can box). This suggests that encouraging
project to apply these skills. In our research, realistically acquire during the course of young people to approach digital making by
we found that this approach was less the project. It is a common tendency to be focusing on the ideas that matter to them
common than the other two. It is a focus ambitious with ideas, but matching them could be an effective way of opening up the
that we saw being taken by young people to a comfortably challenging level of skill activities to a wider range of students.
who already had quite a lot of experience and the technology available to them can The Foundation is currently working
with computing and digital making. require some support. together with Apps for Good (helloworld.
cc/appsforgood) and the Behavioural
Insights Team (helloworld.cc/thebit)
© patpitchaya/stock.adobe.com
HOW MORAL IS YOUR MACHINE?
Diane Dowling explores the moral and ethical dimension of computer science education
he A-level computer science and the lower animals, the moral sense or forums. Such a wide sphere of influence
T specification of all English exam conscience is by far the most important.” It can and will result in diverse views of
boards requires students aged 17–18 is a generally accepted view that as humans what is right and wrong, even between
to have the ability to ‘articulate the we all have: members of the same household.
individual (moral), social (ethical), legal, Some moral values are widely held by
and cultural opportunities and risks of n The ability to anticipate the consequences most societies, but there can be shades of
digital technology’. of our own actions grey in even the most widely held beliefs.
The terms ‘ethics’ and ‘morals’ are n The ability to make value judgements ‘Thou shalt not kill’ is a tenet of many
sometimes used interchangeably, as both n The ability to choose between alternative religions, and most people, when asked,
refer to behaviour that can be labelled as courses of action will agree that killing another human being
‘right’ or ‘wrong’. Ethics may be guided or is wrong. However, across the globe, 56
directed by codes of conduct in schools or Although we all have the capacity for countries retain the death penalty, and
workplaces, or by faith leaders, for those moral behaviour, our individual moral code research shows that in these countries,
who practise a religion. Ethical guidance is not biologically determined, but arises as the majority of the population agrees that
is provided to computing professionals a result of human experience. The society the penalty is an appropriate punishment
by external bodies such as the British in which we live influences our morals; for those in society who commit the most
Computer Society, which sets the for young people, they will be formed by serious crimes.
professional standards of competence, the views of parents, teachers, and other An interesting dilemma arises when we
conduct, and ethical practice for computing people they interact with. Increasingly have to choose between two alternative
in the United Kingdom. for most of us, this will include content courses of action, where both are morally
On the other hand, morals are guided by consumed through the internet. The reprehensible. An example of such a
our own principles and a sense of permitted internet does not respect national borders; dilemma is the much-studied trolley problem.
behaviour. Charles Darwin maintained thoughts and ideas can be readily shared In this thought experiment, there is a
that “Of all the differences between man on social media, in chat rooms, and on runaway trolley. Ahead, on the tracks, there
are five people tied up and unable to move; for making this impossible choice?
the trolley is heading straight for them. You An algorithm may ensure that consistently
are standing, some distance away, next to reliable decisions are made, but whose
a lever. If you pull this lever, the trolley will morals will determine the way that
switch to a different set of tracks. However, autonomous machines are programmed?
you notice that there is one person on the Would you rather a human could override a
side track. You have two options: machine-made decision, or that rules were
absolute and consistently applied? Machine
n Do nothing and allow the trolley to kill the learning muddies the debate still further.
five people on the main track Neural networks used for this purpose are
© caifas/stock.adobe.com
n Pull the lever, diverting the trolley onto the difficult to analyse in order to determine
side track, where it will kill one person why a decision was produced, so there is a
serious issue of accountability.
The dilemma can be made more challenging The Massachusetts Institute of Technology
by adapting the alternatives to include has created a website — moralmachine.net n Charles Darwin wrote of humans’ sense of morality
DIANE DOWLING
Diane is a learning manager at the
© Stanislav/stock.adobe.com
ention ‘hacking’ or ‘hackers’ to cybercrimes, and share some resources you discussions in game-modding forums at the
M your class and you might spot a can use to educate your pupils. Although top end of primary-school age (helloworld.
few smiles or exchanged glances. There this article focuses on UK law, its learnings cc/ncareport). Looking at the makeup of
might even be confessions of “I managed should still be relevant for all. many digital literacy curricula, perhaps
to hack so-and-so’s Roblox account once.” we’ve spent too much time on teaching
Pupils’ eagerness to identify as hackers “It’s OK, I only teach primary” how to protect against cybercriminals at the
might be somewhat explained by the You might question whether we need to expense of reminding pupils not to become
romanticisation of hacking in popular be covering the legalities of hacking in cybercriminals themselves! What’s more, the
culture. But let’s be absolutely clear: without primary schools, as surely these pupils are advent of new off-the-shelf hacking tools has
express permission, unauthorised access too young to be at risk of offending — but lowered the bar of the technical knowledge
to any computer system is illegal, and our you’d be surprised. The Pathways Into Cyber required to undertake cyberattacks, so it’s
pupils need to know this so they don’t find Crime report from the UK’s National Crime more important than ever that we educate
themselves on the wrong side of the law. In Agency (NCA) highlighted that 61 percent of pupils from a young age on what is and isn’t
this article, we’ll unpick a little about what hackers start hacking before the age of 16, OK to do with computers.
the law says around hacking and other and many can trace their pathways back to There is also a real positive opportunity
here to promote cybersecurity career choices
and strike an appropriate balance of stick
and carrot. Pupils need to know what is
illegal, but they also need to know that if they
have an interest in the computer science
behind hacking, there is an ever-growing
world of jobs available to them when they’re
a bit older. Many offenders interviewed by
the NCA and police officers were motivated
not through malicious intent, but by genuine
curiosity, and by the satisfaction to be gained
from solving the complex technical challenge
of the hack. If we can get these pupils on
the right track, they’ll be a huge asset to any
organisation that employs them to defend
their digital interests. So, what does the law
n Figure 1 Child-friendly translations of the laws constituting the UK’s Computer Misuse Act 1990 actually say?
© oz/stock.adobe.com
FURTHER
RESOURCES
barefootcomputing.org/cyber: all the
activities mentioned in the article
and more can be downloaded here.
[email protected] or
[email protected]: email
addresses for additional cybercrime-
related support in the UK.
By introducing pupils to the Computer barrister, and jury members. Pupils then hear
Misuse Act 1990 (or your country’s a number of cybercrime cases and for each,
equivalent) and case studies such as these, consider whether the law has been broken,
we can lead discussions to educate pupils on who the victims are, and what the punishment
what constitutes the illegal use of computers, might be. The resources even include
the impact of these crimes, and the sentences templates to create a barrister’s wig for pupils
perpetrators can receive. Here is a selection of and a judge’s wig for the teacher!
JON CHIPPINDALL &
questions to lead a discussion with pupils: From the same set of resources, You’re the ALAN MERRETT
Cyber Security Expert brings us back to the Jon (pictured) is the Barefoot director and
n How was the law broken? positive opportunities of the topic, namely the computing lead at Crumpsall Lane
n What specific part of the law was broken? raising awareness of cybersecurity careers. It Primary School in Manchester, UK. He also
n Who are the victims? How are they affected? does this by giving pupils a taste of life in leads the computing PGCE at The University
n What might the punishment be? this field as they learn what a brute-force of Manchester. Alan is a senior officer in the
hack is and, importantly, what strategies we Cyber Prevent Team at the UK’s National
Taking this one step further, the free Barefoot could deploy to guard against it. So, for Crime Agency. He has 34 years of law
You’re the Jury resources, which can be those pupils who exchanged a knowing enforcement experience, including overt
downloaded for free at barefootcomputing. glance at the mention of hacking, let’s and covert roles with HM Customs and a
org/cyber after a quick registration, suggest harness that curiosity and raise their team leader role at the UK’s Interpol Desk
turning classrooms into courtrooms and awareness of the rewarding careers that and Fugitives Unit.
putting pupils in the roles of defendant, pursue this interest legally.
echnology is more embedded in be a single root cause of upgrade culture. manufacturers and mobile network carriers,
T our lives than ever before, and This is why I want to start a conversation and for their profit margins, a two- or three-
most of us now carry a computer in our about it, so we can challenge our current year life cycle of devices is beneficial.
pocket everywhere we go. On top of that, perspectives and establish fact-based Where do you, as a consumer, see your
the length of time for which we use each attitudes. I think it’s time that we, as role in this process? Is it wrong to want
individual piece of technology has rapidly individuals and as a society, examined our to upgrade your phone after two or three
decreased. This is what’s referred to as relationship with new technology. years of constant use? Should phone
upgrade culture, a cycle that sees many companies slow their development, and
of us replacing our most trusted devices What is the natural lifespan of a device? would this hinder innovation? And, if you
every two to three years with the latest Digital technology is still so new that really need to upgrade, is there a better use
products offered by tech giants such as there is really no benchmark for how long for your old device than living in a drawer?
Apple and Samsung. digital devices should last. This means These questions defy simple answers, but
How we got to this point is hard to that the decision-making power has by your students should be aware of their role
determine, and there does not seem to default landed in the hands of device in this process as consumers, so this is a
great area for in-class discussion.
© sashazerg/stock.adobe.com
© Kirill Gorlov/stock.adobe.com
n A common trope of mobile phone adverts is the overwrought
aspect of the environmental impact of there are renewable alternatives, you’ll comparison of your current device with a newly launched version
device production: the materials that are be disappointed: a study by researchers
used to create some of the tiny components working at Yale University found that there or environmentally friendly. As many of
that form our technological best friends. are currently no alternative materials that are the mines are located in distant areas of
Some components of your phone as effective (helloworld.cc/graedel2013). developing countries, these problems may
cannot be created without using rare Then there’s the issue of how the feel remote to you, but they affect a lot of
chemical elements, such as europium and materials are mined. The market trading people and are a direct result of the market
we are creating by upgrading our devices
so frequently.
WE HAVE LET DEVICE MANUFACTURERS
“ AND NETWORK CARRIERS TELL US HOW
Many of us agree that we need to do
what we can to counteract climate change,
and that to achieve anything meaningful,
LONG OUR DIGITAL DEVICES SHOULD LAST we have to start looking at the way we
live our lives. This includes questioning
how we use technology. It will be through
dysprosium. (In fact, there are 83 stable these materials is highly competitive, and discussion and opinion-gathering that we
non-radioactive elements in the periodic more often than not, manufacturers buy can start to make more informed decisions
table, and 70 of them are used in some from the companies that offer the lowest — both as individuals and as a society.
capacity in your phone; see helloworld. prices. To maintain their profit margins,
cc/phoneelements). Upgrade culture these companies have to extract as much The obsolescence question
means there is high demand for these material as possible, as cheaply as they You probably also have that one friend/
materials, and deposits are becoming can. As you can imagine, this leads to colleague/family member who swears by
more and more depleted. If you’re hoping mining practices that are less than ethical their five-year-old mobile phone and scoffs
at the prices of the newest models. These after a new model is released, our opinion
© Onidji/stock.adobe.com
people are often labelled as sticklers who are of our device worsens, even if only on a
afraid to join the modern age, but is there subconscious level.
another way of seeing them? The truth is, if This marketing strategy is related
you’ve bought a phone in the last five years, to a business practice called planned
then — barring major accidents — it will most obsolescence, which sees manufacturers
likely still function, and be just as effective as purposefully limiting the durability of their
it was when it came out of the box. So why products in order to sell more units. An
are so many consumers upgrading to new early example of planned obsolescence
devices every two or three years? is the light bulb, invented by the Edison
There isn’t a single reason, but I believe company. It was relatively simple for the
marketing departments should shoulder company to create a light bulb that would
much of the responsibility. Using marketing last 2500 hours, but it took years and
strategies, device manufacturers and a coalition of manufacturers to make a
mobile network carriers purposefully version that reliably broke after 1000 hours
encourage us to view the phones we (helloworld.cc/lightbulb). We’re all aware
currently own in a negative light. A that the light bulb revolutionised many
common trope of mobile phone adverts aspects of life, but it turns out it also had
is the overwrought comparison of your a big influence on consumer habits and on
current device with a newly launched what we see as acceptable practices by
n Manufacturers often purposefully limit the durability of
version. Thus, with each passing day technology companies. their products in order to sell more units
The widening digital divide celebrated — but do you ever stop and ask
The final aspect of the impact of upgrade who really benefits from this? Is your new
culture that I want to examine relates to phone really that much better than the old
the digital divide. This term describes the one, or could it be that you’re mostly just
societal gap between the people with basking in the social rewards of having the
access to, and competence with, the latest newest bit of kit?
technology, and the people without these What do you think? Time for you to
privileges. To be able to upgrade, say, discuss with your students! Here are some
MAC BOWLEY
Mac is a learning manager at the Raspberry
your mobile phone to the latest model discussion starters to use with them:
Pi Foundation. When he isn’t teaching, you
every two years, you either need a great
can usually find him tinkering with his latest
degree of financial freedom, or you need ◊ When you are in charge of buying your
project (@Mac_Bowley).
to tie yourself to a 24-month contract that own phone, what can you do to make
may not be easily within your means. As a the device last longer than the usual
society, we revere the latest technology and two- to three-year upgrade cycle? Upgrade culture is one of the topics for
hold people with access to it in high regard. ◊ Do you think upgrade culture is which we offer you a discussion forum on
What does this say to people who do not something that should be addressed our free online Impact of Technology
have this access? by mobile phone manufacturers and course (helloworld.cc/impactoftech). The
Inadvertently, we are widening the providers, or is it caused by our own course, designed for educators, also
digital divide by placing more value on new consumption habits? covers how to facilitate classroom
technology than is warranted. Innovation ◊ How might we address upgrade culture? discussions about these topics — sign up
is exciting, and commercial success is Is it a problem that needs addressing? today to take part for free!
n 2018, Indonesia burned measurements from around the city, we through higher-order tasks, or do group
I approximately 529,000 hectares of might have some visibility as to when work, and it creates more supervised
land. That’s an area more than three times pollution was likely to affect our school. coding time.
the size of Greater London, or almost the I initially started doing this because when
size of Brunei. With so much forest being Making room for student-led projects I set coding challenges for homework, I
burned, the whole region felt the effects of I’ve always encouraged my students to often had students who confessed they had
the pollution. Schools frequently had to ban do their own projects, because it gives spent all night trying to solve it, only for me
outdoor play and PE lessons, and on some programming tasks meaning and creates to glance at the code and notice a missing
days, schools were closed completely. Many something they can be genuinely proud colon or indentation issue. I began flipping
schools in the region had an on-site CO2 of. The other benefit is that it gives them the less difficult theory for students to do
detector to reveal when pollution was bad, something to talk about in university essays as homework, to create more programming
but by the time the message could get out, and interviews, especially as they often time in class where we could resolve issues
children had already been breathing in the need to do extensive research to solve the more quickly. This then evolved into a
polluted air for several minutes. problems central to their projects. system in which students could work much
My Year 12 students (aged 16–17) This project was much more than this: more at their own pace, and eventually led
followed the news and weather forecasts it was a genuine passion project in every to a point at which older students could,
intently, and we all started to see how sense of the word. Three of my students in effect, learn through their own projects,
the winds from Singapore and Sumatra approached me with the idea of tracking such as the pollution monitor.
were sending pollution to us in Kuala CO2 to give schools a better idea of when
Lumpur. We also realised that if we had there was pollution and which way it was Building the pollution monitor
going. They’d had some experience of using The students started by looking at existing
Raspberry Pi computers, and knew that it weather station projects — for example,
was possible to use them to make weather there is an excellent tutorial at helloworld.
n Arduino sensor used for
detecting pollution stations, and that the latest versions had cc/weatherstation. Students discovered
wireless LAN capability that they could use. that wind data is relatively easy to get over
I agreed to support them during allocated a large area, but the key component would
programming time, and to help them reach be something to measure CO2.
out to other schools. We found a sensor (the CCS811 sensor
I was able to offer students support with module) on a Malaysian site called Lazada.
this project because I flip quite a lot of the It was designed to work with an Arduino,
theory in my class. Flipped learning is a and so we connected our Raspberry Pi
teaching approach in which some direct via its USB port to an Arduino, and so to
© Arduino.cc
instruction, for example reading articles the CO2 sensor. You could also order a
or watching specific videos, is completed more accurate sensor directly from the
at home. This enables more of our class Arduino store (the MG-811 sensor) or
time to be used to answer questions, work order a variety of sensors from eBay, such
n Circuit design of the CO2 sensor using just Raspberry Pi; designed on circuito.io
planning, implementation, testing, and evaluation. Throughout ■ What the research says:
their journey in computing, learners should apply and hone the importance of team diversity
these skills using relevant tools and techniques. Most learners ■ Design in the primary classroom
will have some previous experience of design processes from ■ Agile methodologies
other subjects, but they may not necessarily associate them ■ Testing and a culture of positive failure
with computing.
In the early stages of their learning, there is a focus on
learners planning and communicating their ideas and
discovering the value in planning before they put those
ideas into practice. They will also learn to express the key
requirements of a task and to provide feedback on their own or
others’ solutions. As they progress, they will encounter more
formalised approaches to designing, testing, and evaluating
their products. Increasingly, the responsibility for analysis,
user research, and establishing success criteria for a particular
project will shift to the learners themselves, until
they are able to independently design and
develop significantly complex digital artefacts
that meet the needs of their audience.
IN SUMMARY
DESIGN AND
DEVELOPMENT
Understand the steps involved in
analysing, planning, creating, and
evaluating computing artefacts
STAGE 1 STAGE 2
■ Outline the broad requirements of a task ■ Explain the key requirements a digital artefact has
to fulfil to meet the needs of its audience
■ Experiment with different tools and
approaches to understand what is possible ■ Explain the limits of what is possible with
before building a solution available tools, time, and understanding
■ Use planning templates to sketch and describe ■ Describe the benefits of planning before creating
solutions before building them a project
■ Check that a solution meets the task requirements ■ Iterate and improve a solution
incorporating suitable media
Why
subscribe?
• Teaching resources and
ideas used by over 90
percent of our readers
• Exclusive news,
research findings,
and in-depth features
• Delivered to your
door four times a year
FREE
PDF
for anyo
ne
anywhe ,
re
eam diversity is one of the both in face-to-face university settings The results of the study indicate that
T core advantages of learning in and in online classrooms, for the course diverse teams were rated more highly on
groups, and new research has shown ‘Nanotechnology and nanosensors’. The project innovation, both for online and face-
its benefits for project innovation. The diversity of a team was rated according to-face learners. This evidence supports
study, conducted at the Israel Institute to four variables: gender, native language, the idea that working in collaboration with
of Technology, found that the inclusion academic discipline, and academic level. people from diverse backgrounds enhances
in classroom settings of people from Not surprisingly, the group of online creative ideas and innovative solutions. In
various academic disciplines and levels learners was more diverse than the group particular, the study found that a mixture of
helps students create innovative and of university students, with followers from academic discipline and academic level — the
implementable solutions. Individual over 150 countries. The group of university task-related diversity — was key to project
differences, researchers found, invite students, although less diverse in native innovation. For teachers, this type of research
students to approach situations in language than the online group, showed should be taken as an incentive to experiment
various ways, and stimulate new ideas slightly more diversity in gender. with classroom diversity for group projects.
and fresh perspectives. To understand how diversity relates to So, how diverse is your classroom?
Over the past few decades, student project innovation, both groups of learners
populations have become increasingly were split up into teams of four and were
FURTHER READING
mixed on biodemographic variables such asked to develop a new product. In the
as gender, age, and ethnicity. Although creative stage, students had to create Usher, M., & Barak, M. (2019). Team
barriers to participation in education still new ideas, and in the application stage, diversity as a predictor of innovation
persist, classrooms are increasingly mixed, the implementation was carried out. The in team projects of face-to-face
especially in online settings. innovation of students’ team projects was and online learners. Computers
For this study (helloworld.cc/usher2019), assessed on product necessity, STEM & Education, 144. helloworld.cc/
Usher and Barak were interested in how interdisciplinarity, market readiness, and usher2019
diversity relates to project innovation, innovation type.
© Svitlana/stock.adobe.com
MATTHEW
WIMPENNY-SMITH
Matthew is leader of digital strategy and a
computing subject leader. He has worked
for Headington School Oxford, UK, for the
last seven years in the Prep School, teaching
EYFS, Key Stage 1, and Key Stage 2. He is
a CAS Master Teacher and the Oxfordshire
Primary Community Leader. He is also a
BCS Certified computer science teacher,
Raspberry Pi Certified Educator, Google L1,
and NCCE facilitator (@MWimpennyS).
JANE WAITE
Jane is a research scientist at the Raspberry
n Figure 2 Summary of the post-assessment survey results
Pi Foundation. Her interests include using
design in primary programming, semantic
interface, and that their designs would felt about Scratch. It must be noted that waves, PRIMM, and migrating to online
need to be modified. I purposefully kept for this project, I intentionally gave limited teaching using ABC (@janewaite).
them constrained to just being able to support with both Slides and Scratch.
display and scroll through text and images The results and comments from the
on the micro:bit LED matrix, and I would post-assessment suggested that pupils this, to show them how to implement ideas
use the text-based Mu editor. The next found following a design constraint and know what is doable. It seems that
three lessons were a busy time for the in Scratch harder than they initially the current way I teach Scratch isn’t quite
class as they adapted their designs and thought. This led me to realise that they hitting the mark, and I need to do more
taught themselves how to scroll and overestimated their abilities with Scratch. research in my class to explore this.
display images on the micro:bit. They also One pupil who found it challenging even This was emphasised by the results of
discovered that there were limitations, asked, “Please can I just do the whole another question, this time asking them if
such as not being able to display certain project in Slides?” they felt ready to move on from Scratch
languages, for example those with Cyrillic- Perhaps pupils may have been (Figure 3). The results show that over 50
based alphabets. overconfident with Scratch, as in the past, percent were either not sure or not ready.
they’ve tended not to stick to an initial This classroom research has highlighted
Post-assessment idea once they got started, and just done the need for me to ask my pupils about
The post-assessment survey highlighted what was easy as they wrote the code; their learning more often, and not to move
some interesting results (Figure 2). or perhaps they are used to copying code them on until they’re ready. I also need to
Predictably, the pupils’ confidence without truly understanding it. Scratch is do more to develop my pedagogy of
with using Google Slides was high, but complex, and learning how to implement a teaching computing — but that’s for
interestingly, there was a shift in how they design isn’t easy. I need to work more on another article!
AGILE METHODOLOGIES
IN THE CLASSROOM
Introducing agile practices into the classroom has lots of benefits beyond giving
students a taste of what working as a software developer entails
eing agile means moving and requirements, through design, building, There is a whole range of methodologies
B responding quickly, and it’s also testing, and then finally delivery. Years and frameworks that can be used to help
an adjective that is applied to a range might have passed between the first and you work in a more agile way. I won’t go into
of methodologies developed to improve final stages. Years is a long time in the tech all of them — just a few favourites that we
the software development process and world, and by that time, the requirements employ in the classroom every day.
life cycle. It means being able to respond might well have changed. But too late
to shifting requirements, industry — the product has already been signed, Pair programming
changes, and unforeseen problems. It sealed, and delivered. This is the most important agile methodology
usually involves cross-disciplinary teams we use. During a project (which we call a
of developers collaborating, planning, Why in the classroom? ‘sprint’ and lasts two days), we pair students
and reviewing software together and I teach software development to adults, for about half the time. We initially give
one of its key tenets is to work in short preparing them for work in the industry. students a quarter of the allotted coding time
iterations, building the minimal product Exposing them to common industry practices to explore aspects of the problem alone, and
you need and then refactoring and and structuring their classroom like a then we randomly pair them up to continue
improving it later. development shop is important in preparing working. When they pair, they have to start
It stands in contrast to the more them for work. However, the techniques again, integrating ideas from both of their
traditional ‘waterfall’ approach, in which and ideas that I’m going to talk about can be initial explorations. At the end, they split
a product flows down through several applied to all areas of life, and provide tools again and independently finish up the project
fixed stages, from initially deciding the for tackling any project or problem. in whatever way they prefer.
DRIVING AND
NAVIGATING
The driver:
n Is the one using the computer
n Listens to the navigator
n Implements the ideas of the navigator
n Can question the navigator
The navigator:
n Directs the driver
n Explains their ideas
n Doesn’t touch the computer
n Can use pen and paper to help explain
their thinking
ne of my fondest memories of Don’t test only code: it seems simple to Make it explicit early: build debugging into
O teaching is when a group of ten- build testing into upper-primary or lower- lessons all the way from primary and lower
year-old students visited my secondary secondary programming sessions. However, secondary, so that it becomes a standard
school for a computing experience day. when programming is still so new as a part of the programming process.
The first question I asked students was, concept, it is tough for students to think
“What does FAIL stand for?” After I’d about what might be wrong with their work: Build a culture of support and
given them the answer (First Attempt they don’t know what they don’t know. improvement: programming lessons should
In Learning), I spent a few minutes Instead, you could initially plan a lesson build confidence. One method you can use
telling them that the second time they on testing something that’s more familiar to is pair programming, which has been shown
fail, it changes its meaning to “Further students, like some pre-prepared directions to improve social and communication skills
Attempts in Learning” and that, each time to the school library for an open day, or for (see the article on page 58 of The Big Book
they fail, it just means they are learning someone with a visual impairment. If you of Computing Pedagogy for more on this).
how to improve. Throughout the day, I add in a few mistakes along the way, it will However, allow a little longer for students to
rewarded students who told me they’d give students a chance to find errors and find a solution through collaboration.
got something wrong. At the end of their correct them. You could also test a piece of
experience day, I walked them to the writing, a drawing, a piece of music, or a Model it and scaffold it: provide students
minibus, and the head teacher came over mathematical equation. with a test plan for a short piece of code and
and asked them what they’d been doing. demonstrate how to use it. Have a look at the
One young lad shouted passionately Model how to fail well: in my first interview test plans section of Isaac Computer Science
“We’ve been learning to FAIL!” I’ll admit to for an ICT teacher role, I couldn’t turn the for examples (helloworld.cc/testplans).
being a bit nervous about what the head’s projector on. Embarrassing? Yes! However,
reaction might be, but he just grinned and in my feedback, I was told that part of the The testing process
said “Brilliant!” reason I was appointed was the way in Coursework projects and non-examined
In our culture, we reward people for doing which I told the students that I’d made an assessments have historically been
things right and punish them for getting error and then calmly talked them through structured to reflect the waterfall
them wrong. Wrong is bad; right is good. Do my process of checking (testing) each development methodology, where
you recognise this in your students? ‘I tested potential cause as I went about solving testing is a process that’s carried out
my product thoroughly and found there was the problem. after development. More recently, mark
nothing I could improve.’ This might not be a
result of laziness or a lack of understanding;
it could just be a student wanting to show
that they got it all right, because ‘right’ is
“ INSTILLING A LOVE OF FAILURE AND
IMPROVEMENT IS IMPORTANT, AND WE
‘good’, so that means they did ‘good’ —
right? So, because testing is (mostly) the CAN DO THIS BY NORMALISING TESTING
process of identifying things that are wrong,
the challenge is: how do you help students
unlearn that wrong is bad? In a programming lesson, modelling schemes for these types of project have
failure could take the form of a live-coding been updated to reflect more modern
Normalising testing demonstration. Almost every time I have agile methodologies, in which students
It’s important to instil a love of failure and shown students a programming concept are expected to apply agile development
improvement in your classroom, and we during one of these demonstrations, the principles, with testing assessed throughout
can do this by normalising testing. Here are thing doesn’t work as I thought it should … the process (see the previous article for
a few tips: and that’s more than OK! more on agile methodologies).
© Anch/stock.adobe.com
n The waterfall methodology compared to the more modern agile methodology
So how can students best show their network requirements, or specific uses they supported their peers during code
understanding of testing for formal of a particular data structure. Some reviews; and communication as they
assessment? Let’s walk through it by using subprograms or classes will be very similar, articulated their coding journey in a report.
an advanced-level project (for students so it’s best to test more than one of the Above all, they should have built resilience as
aged 16+) as an example, where students same type only if it allows a student to they planned and iterated their development
submit a coding solution to an identified show a new testing concept. as a result of testing feedback.
problem, along with a report explaining their In the end, isn’t education all about learning
testing process: n In
addition to the more obvious that failure is OK? With that in mind, there
opportunities to carry out iterative was no need for me to be so nervous about
n In
their project report, students should unit tests, it is important to document my head teacher’s reaction to my group’s
demonstrate how they have put theory integration testing to check how a few exclamation that they’d been failing with me
into practice. From the start, students modules work together, preferably ones all day. It’s his job to see where improvements
should be able to explain their approach with interesting edge cases. You can can be found; he was just testing.
to testing — justifying an agile approach, read more about types of testing on
for example. Isaac Computer Science at helloworld.cc/
testingtypes.
n Having analysed and decomposed the
problem, students could then identify a n When a solution has been through this
range of (not necessarily all) data that could alpha phase, end users can then carry out
be used in acceptance testing to show that some usability testing — approaching this
the system works as intended, including as a beta-test opportunity that is again
validation tests to check the robustness cross-referenced to the success criteria
of some of the planned subprograms. identified at the analysis stage.
Students can show how they have
embedded testing holistically by testing An advanced-level student wants to see
a few of their designs with end users and where they went wrong and how they
updating those designs based on feedback. fixed it. Although it’s not always part of PETE BELL
the assessment criteria, it is important Pete is a learning manager at the
n Students should be selective when for students to reflect on their journey as Raspberry Pi Foundation. He was
choosing subprograms to test, focusing learners, including how they have developed previously a computing teacher for 23
on those that can provide opportunities wider twenty-first-century skills, such years and the head of his school’s STEM
to best demonstrate good testing as critical thinking as they planned and faculty. Pete is also an experienced
practice. Examples are login systems, executed their tests; creativity as they assessment designer (@petejbell).
timers, scoring systems, storage and developed their solution; collaboration as
these risks and the steps they can take to mitigate them. This ■ What the research says:
topic area has a few different dimensions to it that are more or media use and attitudes
Early on, we need to support learners in becoming safe ■ Safeguarding in online lessons
users of digital technology, so that they can realise the ■ Cybersecurity activities and tools
benefits of such technologies without putting themselves
■ Thinking like a hacker
at risk. While online personal safety should be present in
every school subject area, computing classes provide a space
for learners to understand the limits of computing and how
technology can be exploited.
Personal safety lessons continue to thread through all
learning stages, with the focus shifting to the risks and threats
relevant to learners’ ages and the technologies they
use. However, as learners progress, they should
also begin to consider safety and security from
an organisational and societal standpoint, as
well as delving into the technical innovations
that help keep systems secure.
IN SUMMARY
SAFETY AND
SECURITY
Understand the risks of using
technology, and how to protect both
individuals and systems
STAGE 1 STAGE 2
■ Explain how to use computing equipment safely ■ Demonstrate safe and responsible behaviour when
using a range of information technology
■ Use information technology safely and
with respect ■ Demonstrate how to keep passwords and
other credentials safe and secure
■ Demonstrate safe behaviour when working online
■ Describe when individuals might be asked for
■ Give examples of personal information personal data online
and know who it should and should not be
shared with ■ Explain the security risks of linking to or
sharing content owned by others
■ Outline how individuals should report concerns
about content or contact from the internet ■ Explain how misleading information or media can
pose a security risk
In the table below, you will find learning outcomes associated with
the ‘Safety and security’ strand of the Raspberry Pi Foundation’s
computing taxonomy. These learning outcomes are illustrative of the
kinds of knowledge and understanding that learners could develop in
this area of computing. They are not prescriptive, but instead aim to
illustrate the wide applications of the discipline.
These learning outcomes were originally developed to complement
the English national curriculum for computing, and as such stage 1
roughly corresponds to ages 5–7, stage 2 to ages 7–11, stage 3 to
ages 11–14, stage 4 to ages 14–16, and stage 5 to ages 16–19.
■ Identify where and how to report ■ Outline the role of encryption in protecting data ■ Describe strategies and techniques
inappropriate content, contact, or conduct and its importance in data security to protect against common security
vulnerabilities
■ Describe authentication techniques used
to improve security, such as biometrics,
captchas, and two-factor authentication
eaching online safety is hard. Ofcom report suggests that children aged This conceptual understanding needs to
T Curriculum requirements vary from 3–4 largely use video-sharing platforms underpin online safety education.
class to class, from year to year, and even (89 percent) and watch TV and films
from one term to the next. Teachers have online (81 percent). These continue to be What do learners actually know?
to work hard to ensure they know how to popular activities for those aged 5–7 (95 Researcher Macaulay and his
use specific tools safely, how to support percent and 74 percent respectively). By colleagues used questionnaires with
young people, and that the tools they’re the 8–11 age group, 84 percent are using learners aged 9–11 to compare their
using are still relevant. On top of this, messaging sites and apps as one of their subjective knowledge of online safety
there are the broader trends in terms of main online activities. This trend continues to their objective knowledge. Subjective
what tools students are using. Each year with those aged 12–15, with 91 percent knowledge is how learners feel about their
in the UK, Ofcom (the UK government’s using social media and 73 percent using own ability, while objective knowledge
communications regulator) produces a live-streaming apps and websites. Finally, reflects their actual understanding.
report about children and parents’ media by 16–17, 100 percent had a mobile To measure subjective knowledge,
use and attitudes, which highlights some phone and this was their primary device learners were asked to rate statements
of these trends. In the 2022 report, 99 for interacting online. such as ‘I know what to do to stay safe
percent of 3–17-year-olds had been online This high level of exposure to the on the internet’ and ‘I know what things
in the last year (helloworld.cc/ofcom2022). internet can lull educators and parents could put me in danger or upset me on
While this fact is perhaps no surprise, into a false sense of security; they may the internet’ on a four-point scale, from
pair it with research conducted by Peter think that young people therefore have ‘Disagree a lot’ to ‘Agree a lot’. To then
Macaulay and colleagues concluding that the skills they need to navigate this measure their objective knowledge,
students think they are better at keeping world successfully. And to an extent, learners were asked open questions such
themselves safe online than they really they are right. These tools are designed as ‘What things might put someone in
are (helloworld.cc/macaulay2020), and to be intuitive, and through experience, danger of harm, or make them feel upset,
it appears we need to review our online people learn how to use them more when they use the internet?’ and ‘What
safety curriculum focus. proficiently. However, we don’t want things can you do to stay safe from
learning about online safety to happen harm or getting upset on the internet?’
How are learners using tech? through experience. Knowing there is The learners’ ideas about the dangers
A helpful first step in providing suitable a report button on a website does not of the internet were then grouped into
online safety education is understanding mean you know what you should report, six categories of the most common
how technology is being used by learners what behaviour is unacceptable or responses: people online pretending to
of different ages. Classes will vary, but the inappropriate, or why you should report it. be somebody else; being in contact with
© Graphicroyalty/stock.adobe.com
n Young people can’t always identify sponsored
content, or whether a social media post is genuine
MAKE CONCRETE
There is often a nervousness among
teachers when it comes to teaching learners
“ THE CONFIDENCE WITH WHICH LEARNERS
DISCUSS ONLINE SAFETY IS NOT A FAIR
about being safe online, due to potentially
encouraging uptake among those who do ASSESSMENT OF THEIR UNDERSTANDING
not already use the tools, or being aware
that they do not meet the stipulated age to
use the tool being discussed. However, we examples, there should be content that
teach children to cross roads safely before you can objectively assess to inform future FURTHER READING
we expect them to do it independently. The approaches to teaching and learning. There
more skills we can give learners that are are some examples in the research shared
Macaulay, P. J. R., et al. (2020).
grounded in real-life, concrete knowledge in this article, and others have been built
Subjective versus objective
rather than theoretical knowledge, the easier into resources, such as in the Raspberry Pi
knowledge of online safety/dangers
it is for them to apply them. This could be Foundation’s Teach Computing Curriculum
as predictors of children’s perceived
through using social stories and debates to units (for example, the unit of work for
online safety and attitudes towards
discuss morals and ethics, or by using role students aged ten to eleven at helloworld.
e-safety education in the United
play, for example becoming data detectives cc/TCCcommunication).
Kingdom. Journal of Children and
to find ‘hidden’ information about someone These changes to educators’ practice
Media, 14(3), 376-395. helloworld.
through the content they post online. are not substantial. They do require
cc/macaulay2020
some preparation and some time spent
ASSESS ONLINE SAFETY understanding the learners in your Ofcom. (2022). Children and
What this research highlights is that the classrooms each year, but as teachers, you parents: media use and attitudes
confidence with which learners will discuss do that every day. However, actively making report 2022. helloworld.cc/
online safety is not a fair assessment of objective online safety a focus could prevent ofcom2022
their actual understanding. By teaching a student from learning about the risks of
key concepts and using concrete online safety the hard way.
© successphoto/stock.adobe.com
Motivating Jenny (motivatingjenny.org),
supported by the UK’s National Cyber
Security Centre, has created a number
of tools to help developers consider
the security of their code and embed n Using prompt cards and values cards can help to stimulate
a workplace culture in which software positive conversations about cybersecurity issues
nter any primary school and you number, and they know that they shouldn’t is challenging, but remember that you work
E will find strategies for keeping share those things online. Then they share with the real experts! Ask your learners
yourself safe being modelled every day of a photo of themselves on social media in what’s popular at the moment, how it
the year. From not running with scissors their school uniform, in front of their house, works, and what safety measures they
to negotiating whether it’s acceptable to with their best friend. Without the context, take when using that technology. Creating
declare who someone else can or can’t such as different ways and places we share a safe space for them to share openly and
play with at lunchtime, we are constantly information about ourselves online, learners honestly gives you the power to support
guiding learners to recognise boundaries, often imagine that the only time they need them in making the right decisions to keep
be honest about their choices, and develop to be careful about this is when someone is themselves safe and know how to handle
a little common sense that jumping off directly asking for their contact information. new situations. Equally, your online safety
something really high may hurt. Yet, more curriculum should be reactive and allow you
often than not, I see online safety relegated What’s trending? to address new issues as they arise.
to computing lessons and Safer Internet The digital world that your learners are
Days. One-off lessons are simply not a part of is constantly changing. New Where is it relevant?
enough to safeguard our learners. apps, games, social media, and other The conversation around online safety is no
We all want to keep our learners safe, and technological advances are constantly longer solely about online safety. It’s about
it’s challenging to ensure our online safety being introduced, so teaching the same how learners handle their digital selves in
curriculum stays up to date. I recommend online safety lessons year-on-year isn’t all aspects of their development, and this
asking yourself the following three questions suitable. Keeping up with the latest trends requires both computing and non-computing
when reviewing online safety in your school:
“What’s your context?”, “What’s trending?”,
and “Where is it relevant?”
TIPS FOR INCORPORATING ONLINE
What’s your context? SAFETY INTO THE SCHOOL DAY
It can be very tempting to start a school year
or unit of work with several discrete online
n Read some online safety books such as Chicken Clicking (helloworld.cc/chicken) or When Charlie
safety lessons. These often demonstrate to McButton Lost Power (helloworld.cc/charlie) to open up different conversations.
outside observers that online safety is taught n In science, when learning about what humans need to stay healthy, could you extend this to a conversation
in your school (there’s a timetabled lesson about healthy and unhealthy behaviours with device use?
for it!) and reassure you that learners have n When discussing stories about friendships in personal, social, health, and economic (PSHE) education
some safety skills before you begin using classes or assemblies, do you include the differences between online friendships and offline ones?
technology more prevalently. However, what Opening up the conversations you are already having is a great way to encourage more honest discussion.
we often see here is a lack of context. n ProjectEVOLVE has a range of activities to meet statements of the Education for a Connected World
For example, if we ask learners what Framework (register to access these free resources at helloworld.cc/evolve). These range from discussion
personal information is, they can tell us it’s questions to vocabulary that inspires reflection. Why not use these to start or end your school day?
their name, school, address, and phone
n Your online safety curriculum is vital if your learners are to grow up safe and empowered
skills — for example, a learner’s self-image units, as they consider what is and isn’t Your online safety curriculum is vital for
and identity, managing relationships with OK to include in the artefacts they create your learners if they are to grow up safe and
friends, building a reputation, avoiding (helloworld.cc/tcc). When learning about empowered. Yet spending more time on
bullying and isolation, and having a healthy, searching for media or information, learners topics relating to safety does not necessarily
balanced lifestyle. If we leave these skills to explore managing information online and mean greater learning outcomes. Use these
be developed solely in computing lessons, the issues they need to consider around three questions as a starting point to review
we not only misrepresent their importance, copyright and ownership. Across all units, we your online safety curriculum and to ensure
but we also wouldn’t have a great deal encourage learners to manage their online that it is as prevalent as instructions about
of time left to teach anything else! Online accounts and think about the online reputation not running with scissors!
safety has to be taught throughout the they are creating, as well as their rights to
school day in various contexts, whether it’s privacy and security. Each of these examples
a casual conversation at break about online offers relevant opportunities to learn the skills
gaming with friends, or a social story about of online safety and digital citizenship within
friends who were unkind either with or the context of their computing units of work.
without technology. These TCC units are also linked to
the Education for a Connected World
In the computing classroom Framework, created by the UK Council
After asking yourselves those three for Internet Safety (helloworld.cc/
questions, there may still be some topics connectedworld). Even if you’re not teaching
to be addressed in your computing lessons in the UK, this framework is a great resource
that are relevant to the content you are for understanding the breadth of online
teaching. This is a great opportunity to safety and digital citizenship. Although it
use learners’ developing technological includes recommended learning outcomes SWAY GRANTHAM
skills while addressing online safety in a for learners aged 4 to 18, it doesn’t Sway is a senior learning manager at the
contextual way. recommend the most appropriate times and Raspberry Pi Foundation. She leads a
In the Teach Computing Curriculum (TCC), places to teach that content. For the TCC, team developing computing resources for
we teach learners about sharing personal we chose the most pertinent aspects to primary teachers (@SwayGrantham).
information throughout the ‘Creating media’ computing, but the rest is up to you.
© patrick/stock.adobe.com
SAFEGUARDING IN
ONLINE LESSONS
How do you organise live learning sessions
that are both safe and help young people to
learn? Carrie Anne Philbin investigates
ransitioning learning from a face- There are four areas to think about if you between young people, as this could
T to-face interaction to online can want to host online teaching sessions: be a safeguarding risk. Use your school
sound straightforward, especially as we account and not a personal account when
now live in a society where it’s common to n hoosing the right technology
C using online tools, and check the privacy
have access to devices and the internet. In n Communicating with young people settings. It’s also a good idea to test
a school environment, it is relatively easy to and parents the functionality of the technology with
promote the welfare of young people and n Designing your session colleagues, perhaps by having a practice
vulnerable adults and to keep them safe, n Child protection run of your session. They can stress-test
thanks to well-established routines built on any interactive features, and provide you
decades of learning. So if we find ourselves Choosing the right technology with useful feedback to incorporate before
having to teach online, how do we promote There are lots of different tools you could you run it with students.
the well-being of young people while they use to host live sessions, and they vary Another consideration is access. Does
learn? Here are some tips that might help, in their functionality, cost, and usability. the technology you want to use require
based on feedback and ideas from brilliant When choosing a technology, think about young people to have an online account?
educators and leading children’s charities how you intend to use it and how your This may be an issue for learners below
such as the UK’s NSPCC (nspcc.org.uk), intended audience will use it. Consider the age of 13. Do check your school
who have tested different approaches to whether it allows private communication e-safety policy, as it is likely that there is
hosting online sessions. between you and young people, or already guidance available on this issue.
SAFEGUARDING
ONLINE GUIDES
FOR TEACHERS
n NSPCC: undertaking remote teaching safely
(helloworld.cc/NSPCC)
n GOV.UK: Education for a Connected
World framework (helloworld.cc/
connectedworld)
n GOV.UK: coronavirus safeguarding
guidance (helloworld.cc/safeguarding)
© Sushiman/stock.adobe.com
n Childnet: teachers and professionals
section (helloworld.cc/childnet)
n UK Safer Internet Centre: social media
guides (helloworld.cc/saferinternet)
eaching cybersecurity can be a data breach. We then set up various allowed for topical classroom discussions
T dull without hands-on practical machines mimicking commonly known in which students debated the advantages,
experiences and exercises. Fortunately, vulnerabilities, to demonstrate how a disadvantages, difficulties, and ethics
my passion for cybersecurity and my over penetration tester could identify weaknesses of such a project. Students are always
20 years of experience as a data security and how they could be fixed. Running interested to learn more from real-life case
engineer have helped me to understand an activity such as this not only has the studies that help them relate personally to
how to motivate my students to acquire advantage of keeping our school network as the importance of cybersecurity. Khanteepop
the real-world skills needed for success in secure as possible, but also helps students to Thaipradith, one of my students at Steam
industry. In this article, I’m going to present understand the types of threat schools face, Labs, shared, “I learn ethical hacking to keep
activities and tools you can use to link and how to put their learning into action. myself updated with the news and security.
cybersecurity topics and skills to the world This project particularly stressed the By going through the process of ethical
outside the classroom walls. importance of keeping all operating systems hacking, I’m able to gain knowledge in order
up to date and using suitable security to use it to secure myself, as well as people
Projects with real-life consequences software, and the real-life consequences around me, from being hacked.”
I recently gave my students a taste of of not doing so. Students absolutely
industry experience through a data security thrived during this project, as it allowed Professional real-world tools
project about our internal IT infrastructure. them to develop some basic skills that Another way of increasing engagement
Working alongside a team of remote ethical hackers and penetration testers in cybersecurity teaching is through using
penetration testers, I identified weaknesses use in industry, as well as practical skills tools that are actually used in industry.
in our own school system that could allow they can use in their everyday lives. It also We use Raspberry Pis preloaded with Kali
Linux, a system commonly used by industry
n Keep students engaged with cybersecurity
by using real-life tools and projects specialists, to teach students about evolving
threats in cybersecurity (helloworld.cc/
kalilinux). Students learn the fundamental
skills and steps needed to protect themselves
against these threats, and the importance of
ensuring that any data that is transmitted is
encrypted. Using Kali Linux, students explore
how to scan devices and sniff packets of data
that are being transmitted. They learn how
penetration testers identify whether particular
ports are open on network devices using
a TCP half-open port scan, and then look
at what action a penetration tester would
take if there were ports open that could be
dangerous (you can learn more about how to
do this at helloworld.cc/sniffpacket).
FURTHER
RESOURCES
n h elloworld.cc/steamblog: blog at Steam
Labs (an online school that teaches
robotics and ethical hacking), where I post
free cybersecurity content for schools at
the request of other global educators
n h elloworld.cc/robparker: my LinkedIn
profile; here, you can contact me for help
with designing lessons and raise queries
about how to integrate cybersecurity into
the classroom
Another great way of putting cybersecurity system. Wireshark (wireshark.org) is parts of their education. Importantly, students
into practice is by using Secure Shell. Using another powerful real-life tool you can use finish these lessons with the know-how they
Raspberry Pi’s command line, students learn in cybersecurity lessons. It analyses network need to help protect themselves and their
how to access a device remotely by analysing traffic and explores how encryption works, families’ devices from this type of hacking.
the weaknesses in its security. The students underlining the importance of having a strong VirtualBox (virtualbox.org) is another
take the perspective of the hacker, and password. Our students quickly discover how great tool, particularly if you’re low on time
search for areas of weakness. From there, easy it is to crack a user’s password using and budget. It is a well-rounded, free, open-
we challenge them to think of ways of fixing tools such as John the Ripper (helloworld. source piece of virtualisation software. This
the issues in the system. Any skilled ethical
hacker or penetration tester has to be able to
ANY SKILLED ETHICAL HACKER HAS TO
“
understand offensive security and think like
a malicious hacker. Students are taught the
ethics behind cybersecurity, and they thrive UNDERSTAND OFFENSIVE SECURITY
when learning about the skills that ethical AND THINK LIKE A MALICIOUS HACKER
hackers develop and use in higher education.
Similarly, we use Shodan (shodan.io),
which can index every device connected to cc/john), and why systems block multiple type of software allows you to install and use
the internet, to demonstrate the importance password attempts when individuals use applications and operating systems other than
of keeping devices that are connected to the brute-force tools such as Hydra. Through those running on your computer. This means
internet up to date. We use it to explore how these activities, we’re developing their you can look at malicious files safely without
a hacker could potentially take advantage analytical and problem-solving skills, which infecting your computer, which can be a
of a device using an outdated operating they can transfer to everyday life and other great starting point for applying cybersecurity
knowledge and skills in the classroom.
Raspberry Pi OS Lite is another good place to
ROB PARKER start. You can download a headless image and
Rob is a computer science educator and the data teach students how to access devices without
protection officer at St Andrews International a keyboard, mouse, or monitor.
School, Bangkok. He is also a robotics and If educators develop fun and exciting
technology coach at Steam Labs (steamlabs. projects in cybersecurity, we will start to
co.th), a specialist online school that teaches unlock our students’ ability to excel, and help
robotics, computer science, and ethical hacking. them to keep their own data and devices
Rob is a certified Ethical Hacker with EC-Council. secure, as well as those of the organisations
they work for in the future.
now thy enemy. This is one of the to accomplish it? What is their motivation?
K most famous tenets of warfare, Understanding the offence improves our
according to the legendary Chinese defence. Understanding the techniques
general Sun Tzu. It’s great advice on phishers use helps us to identify them more
the battlefield, and its utility extends to quickly and accurately.
the teaching of cybersecurity. In a way, After studying these emails, it’s time for
cybersecurity is war: an ever-evolving students to show me what they’ve learnt,
conflict between those who want by phishing me. In doing so, they have to
information and those who have that ask themselves the same questions: what
information. By the time I start teaching am I trying to accomplish, and how? Some
phishing, the majority of students have students’ emails are more convincing than ZACH HUFFMAN
already been phished. If you want to beat others, but they all make it clear that they Zach is an upper-school computer science
the bad guys, I teach them, you have know what a phishing attempt looks like. teacher at the Hun School of Princeton
to walk a mile in their shoes to really Most of them are funny, and occasionally, in New Jersey, USA. He is an avid gamer
understand them. one of them actually fools me. Any student and has spent the last five years teaching
that does this gets extra credit and provides computer science, from kindergarten all
Walk a mile the entire class with another learning the way up to 12th grade (@ltwheat).
When I introduce cybersecurity, I use as opportunity: it’s a win-win situation.
many real-world examples as possible. I By studying and then creating real-life
keep every single phishing email I get in artefacts, we deepen our understanding of causation. In doing so, they gain a level of
a folder, so that when we study phishing, them. Being the bad guys makes us better understanding that does not come with
we are studying primary sources. I pick out good guys. So, the next time you study a simply studying the subject. They understand
a few and we study each one as a class. threat, have your students emulate it. Have their foe, and as Sun Tzu said, “If you know
We ask ourselves, what is this person them write a clickbait title for a fake news the enemy and know yourself, you need not
trying to accomplish? How are they trying article, or equate a spurious correlation with fear the result of a hundred battles.”
ver time, the meaning of the word students were learning how to be problem- relate this approach to the karate principle.
O ‘hacking’ has changed. Today, it solvers and how to fill the gaps in their Although martial arts do teach people how
often has pejorative connotations around knowledge. They were learning to hack, in to do harmful things to other human beings,
bad things that bad people do on their the spirit of the original meaning of the term. a sensei is there to guide students in self-
computers. However, the term has much Developing students’ problem-solving control and discipline. Relating this to hacking,
more positive origins, with its first recorded skills is no bad thing, but what if we were students can easily go online and follow
use coming from the Tech Model Railroad to take this a step further and also teach hacking tutorials, but at home, there is no
Club at the Massachusetts Institute of students how to hack in the more common, sensei there to guide them about the rights
and wrongs of their choices. As educators, we
need to remember our role as sensei.
WE DECIDED TO GO BEYOND THE THEORY
“ AND GIVE STUDENTS THE CHANCE TO
Let’s keep teaching our students to be
curious about technology, to want to know
how something works, to be problem-
EXPLORE THE CODE BEHIND THESE ATTACKS solvers, and, therefore, to be hackers — just
like the good people of MIT’s Tech Model
Railroad Club.
Technology (MIT) in the 1950s. Members malicious sense of the word? When writing
of this club enjoyed taking apart model cybersecurity units for the Teach Computing
trains to discover how they worked, Curriculum (helloworld.cc/tcccyber1 and
with the aim of enhancing them; they helloworld.cc/tcccyber2), this is exactly what
were ‘hacking’ the technology they were we did. We made the conscious decision,
working with. In this article, I argue that in places, to go beyond the theory of how
hacking shouldn’t be used as a dirty word, these attacks work and give students the
and that teaching students how to hack opportunity to explore the code that makes
isn’t necessarily a bad thing. them happen. We created activities in which
When I was a teacher, I often asked learners use very unsophisticated code that
classes to open up old computers over a could be used for a brute-force attack, as well
series of lessons about hardware. We would as an activity in which students perform an
look at their components, see how they fit SQL injection on a fake website.
together, and discuss what we could do We’re not encouraging students to become BEN GARSIDE
to improve the machines. This method of criminals, of course, and we contextualise Ben is a learning manager for the
teaching students about hardware had more these activities with the ethics and legalities Raspberry Pi Foundation. He has worked
benefits than just visualising the abstract: of these types of action. As Zach argues on the production of the Teach Computing
without realising it, I’d been teaching my in the previous article, I believe that we’re Curriculum, and on online courses including
students how to hack. Just as Grace Hopper encouraging students to get a deeper the recently released Introduction to
famously enjoyed dismantling clocks as a understanding so that they can better Machine Learning and AI (@BenberryPi).
child to figure out how they worked, my protect themselves against real threats. I
greatly between students and will probably be limited to a ■ What the research says:
narrow set of skills. In order to access and progress learning in the digital divide
all areas of a computing curriculum, learners need opportunities ■ Digital skills for SEND learners
to develop skills such as using a keyboard and mouse, saving ■ Whole-school approach to digital skills
and organising their work, and more. This doesn’t mean that ■ Tablets and cross-curricular learning
we need to dedicate entire lessons to typing skills, but instead
■ Young digital artists
we need to provide opportunities to develop these skills
■ Logging on for lower primary
alongside the broader concepts and skills within computing.
Initially, the focus for learners will be on developing the
basic skills required to access learning, using a range of
devices and simple software. As learners experience more
devices, tools, and software, we can challenge them to see
the commonalities between them, allowing them
to learn to use new tools more quickly. They
will then be able to be more selective in the
tools they use for specific tasks, and will
gradually become able to use specialist
tools and software.
IN SUMMARY
EFFECTIVE
USE OF TOOLS
Select and use appropriate
hardware and software tools
STAGE 1 STAGE 2
■ Recognise the different applications of information ■ Identify the features and limitations of different
technology in different contexts devices
In the table below, you will find learning outcomes associated with
the ‘Effective use of tools’ strand of the Raspberry Pi Foundation’s
computing taxonomy. These learning outcomes are illustrative of the
kinds of knowledge and understanding that learners could develop in
this area of computing. They are not prescriptive, but instead aim to
illustrate the wide applications of the discipline.
These learning outcomes were originally developed to complement
the English national curriculum for computing, and as such, stage 1
roughly corresponds to ages 5–7, stage 2 to ages 7–11, stage 3 to
ages 11–14, stage 4 to ages 14–16, and stage 5 to ages 16–19.
■ Describe how different software ■ Use collaborative revision tools to provide ■ Adapt to new software tools, combining past
applications are suited to feedback and suggestions experience with available documentation
different purposes and support
■ Apply versioning to files to provide a
■ Be familiar with a range of online communication version history ■ Use appropriate software tools to support planning,
and collaboration tools development, organisation, and collaboration
■ Demonstrate responsibility for files
■ Combine software tools to create through organisation and backup strategies ■ Use collaborative tools to connect and
digital products collaborate remotely with others
■ Explain the purpose and benefits of templating
■ Save and organise files within folders and create and styling tools
multiple versions where appropriate
■ Use templating and styling tools to create
■ Select hardware and software tools that consistency within digital products
are appropriate for a specific task
ow wide is your use of computers and do not have access to computers and researchers Korupp and Szydlik (helloworld.
H and digital devices? Think about the internet. A 2019 study by Lloyds Bank cc/korupp2005). They analyse the causes
your day so far: from the moment you got identified that “11.9 million people (22%) do of the digital divide through three lenses:
up to the moment you now find yourself not have the Essential Digital Skills needed human capital, which relates to people’s
reading this article, where and how have for day-to-day life in the UK” (helloworld. education and their experiences with
you interacted with computers? What are cc/lloyds2019). As the use of technology technology at work; family composition,
the purposes of your interactions with has expanded, the range of services which considers the make-up and income
technology — work, social, play? Are these available on devices has also increased, of a household; and social context, which
interactions all productive? And what else and consequently, so has the digital divide. considers an individual’s generation, gender,
do you have planned for the day that will Of the tasks you have completed using ethnic background, and geographical
involve technology? computers so far today, how many could location. Within these groups there are
Now that you have reflected on your own you have completed if you had not been complex factors that can either exacerbate
interactions, what about those of others? able to access some kind of digital device? or mitigate the divide. Whatever the cause,
Not everyone has access to digital devices. the impact is that these people or groups
There has been a great deal of research in Causes of the digital divide are excluded from some aspects of society.
recent years into the digital divide, a term The causes of the digital divide are wide- The digital divide came into sharp focus
first used by psychologist Lloyd Morrisett. ranging and complex. There are numerous during the coronavirus pandemic. The need
This is the gap between those who have papers offering ideas, including those from for people to isolate from each other, and
the expansion of online services, meant therefore, this group surely cannot be functional computer sets to educationally
that the pace of change increased hugely. victims of the digital divide? disadvantaged young people in the
Schoolchildren found themselves in home These beliefs have now been challenged. UK. The impact was immediate: young
learning environments, needing laptops In a 2019 study, researcher Scolari focused people were more engaged with learning;
or tablets and, crucially, bandwidth, to on media literacy, breaking down the parents reported positive changes in their
access their learning. Such a scenario was term into ten ‘new literacies’ (helloworld. children’s attitude and behaviour; and
unthinkable before the pandemic. Some cc/scolari2019). He found that the term youth and social workers deepened their
children and families adapted quickly and digital native has “more problems than relationships with families, enabling them
easily, using devices they already had and advantages”. Not all young people, for to provide better support (helloworld.cc/
dedicating spaces in their homes to school- example, have access to devices, and much RPFreview2021).
based activities. Others were less fortunate, of the behaviour of these so-called digital There have been a number of other
coping with very limited space and having natives is focused on the consumption of similar initiatives advocating the idea of
in many cases to share devices unsuitable digital content, such as watching something one laptop per child (OLPC). However, it’s
for learning, such as mobile phones, online or playing with a device. This does important to stress that equipment alone
between multiple siblings. Researchers not involve using digital tools to their will not necessarily deliver improvements.
Holmes and Burgess highlight that only 51 full extent; consumers are not producing Researchers Thapa and Sein studied an
percent of the poorest households have anything by doing this, or thinking about OLPC scheme in Nepal that had been
internet access, compared to 99 percent of how they could make best use of the tools widely regarded as a success. They found
the richest (helloworld.cc/holmesburgess); they have at their disposal. In fact, labelling that it wasn’t the technology per se that
it is very clear that the pandemic has people as digital natives can actually brought quality education to these schools,
exacerbated existing inequalities. widen the digital divide. It peddles the false but rather, it was the ecosystem around
the deployment of these devices that had
a more significant role in the success story
omputing curricula generally cover Why is developing fluency in basic iPad. If we can teach young people how to
C a wide range of skills, concepts, digital skills and literacy important? use these options independently as part
and knowledge, and much of the focus is 1. It reduces cognitive load of computing lessons, it will help them to
often on creative projects, programming, Cognitive load relates to the number of items become more effective in their learning.
and abstract computer science concepts. a person can hold in their working memory. Similarly, highlighting how to increase the
There is a powerful argument, however, For many younger pupils and students with size of text or change the background colour
for ensuring that we teach the basic skills SEND, basic skills such as logging on and in documents will allow learners to modify
well in the first instance, with a particular opening files are not practised enough to be digital documents to be more accessible.
benefit for young people with special moved to long-term memory, and therefore
educational needs and disabilities (SEND). rely on working memory. This results in the 4. Digital skills open up greater
Basic digital skills are any skills that are frustrating position of a child spending much opportunities for employment
required to access and use a computer of a lesson simply accessing a computer and There are few jobs where digital skills are
effectively. The concept of digital natives finding work. Once these actions become not required, and even the application
has been widely discredited, but many fluent, learners can concentrate on the process generally requires the use of some
teachers believe that young people just content of the lesson more effectively. elements of technology. For students who
‘get’ computers and can use them with are not taking an IT or computer science
ease, as they are more confident users. 2. It increases confidence in using qualification, schools need to consider how
However, although children may be technology to teach key employability skills, such as
experts at swiping and accessing content Once learners become fluent in using the sending emails and searching for information
on certain devices, such as tablets, they computer in basic ways, their confidence online. A functional skills qualification in IT
often lack keyboard and mouse skills, and will develop. This will help to increase would greatly benefit some learners with
the understanding of the basics of an their motivation and contribute to a feeling SEND in preparing them for their next steps
operating system. of achievement. in education or employment.
Basic digital literacy is equally
important. The skills and knowledge 3. It enables learners to use assistive 5. It helps students use technology safely
required to communicate effectively and technologies effectively and make simple and responsibly
to use current and emerging technologies modifications to content to support Young people need to be taught about the
are essential if students are to remain their learning risks of online technologies, how to act
safe and act appropriately online. Young Mainstream applications and devices appropriately online, and where to go for
people with additional learning needs now have a greater amount of assistive help with safely accessing key services.
and disabilities can be among the most technology built in — for example, Immersive They need the same opportunities for
vulnerable in terms of online risks and Reader in Microsoft 365, Voice Typing in learning, entertainment, and shopping as
behaviours. Google Docs, and Speak Screen on the their peers.
© epixproductions/stock.adobe.com
n
with the Immersive Reader
tool, built into Microsoft
365 products and the Edge
browser, and as an extension
in Chrome (see helloworld.
cc/immersivereader for
more info)
n Enable Speak Selection in the
Accessibility settings on the
iPad to enable students to
listen to any selected text
n Try the Voice Typing option
in the Tools toolbar in Google
Docs to allow learners to
convert speech to text; there
is also a dictation function
via the keyboard on iPad
and Android tablets, and in
Microsoft Word online
How can we teach key skills effectively? them, or add subtitles to videos. Where Computing often doesn’t receive enough
n evelop fluency through routine. For
D possible, share these with parents to use space in the curriculum. However, an
example, pupils open and save work from at home. investment of time and effort in developing
the same folder each lesson, and have a n Show students how to adapt digital key digital and digital literacy skills early in a
routine for logging on when they enter the content to make it more accessible. child’s computing journey will pay
ICT suite or access a laptop. Share these A great benefit of the pandemic has dividends later in increased confidence,
routines with the other teachers these been that we have been able to provide fluency, and access to learning for all of
learners work with. lesson content for students to access your students.
n Provide support materials for learners for in their own time, so they can revisit
habitual actions — create a set of simple and consolidate their learning. If this is
instructions for each step, with image in an editable format (such as Word,
support. For example, log on, open an PowerPoint, or Google Docs), learners
application, save work, and take a photo can change the background colour,
on the iPad. increase the font size, choose a more
n Provide lots of opportunities for repetition readable typeface, and increase line
to consolidate learning — time spent spacing to make it more readable. If you
repeating an action multiple times, or are providing videos to watch, enable the
practising keyboard and mouse skills, use of closed captions.
is worthwhile for helping key skills to n Model safe and responsible use of
become fluent early in the year. Consider technology in the classroom, and make
how to combine this with other meaningful your actions explicit through commentary
tasks in the classroom, or to assist with and discussion. CATHERINE ELLIOTT
other learning goals (for example, typing n When teaching digital literacy and online Catherine is the SEND lead for the Sheffield
practice to support spelling). safety, make sure you discuss risks and eLearning Service (sheffieldclc.net), and she
n Teach learners how to use assistive behaviour in several different situations works on ways to make computing accessible to
technologies built into the mainstream and contexts, as some young people all learners. She is a member of the CAS Include
tools that are available at school or at with SEND struggle to generalise their working group, and leads the SEND Virtual and
home through a learning platform. There knowledge. Issues also need explaining the Sheffield and South Yorkshire Secondary CAS
are a number of tools to allow students to explicitly for those students who can’t Communities (@catherinelliott).
dictate rather than type, have text read to infer risk from subtle cues.
A WHOLE-SCHOOL
APPROACH TO DIGITAL SKILLS
Claire Buckler shares the benefits of embedding digital
skills across the curriculum
ike most schools, at Devonport High communicate and collaborate — vital skills Berryman, will bring his business students
L School for Boys (DHSB), we want to for being digitally literate after leaving in when they need to access technology.
ensure that all of our students are equipped school. We offer a coding club here twice He says, “Digital literacy is an important
with the digital skills they need to thrive a week, which is full of students who don’t skill, and at DHSB we have embraced this.
in the world. We have been working hard take computer science as an option but still The Learning Commons inspires the future
to ensure that even those students who see the benefits of learning to code. generation to be creative and learn the skills
don’t choose to take computer science are needed to adapt.” Google Expeditions is
technologically literate. Across the school, The benefit of support currently a favourite app among teachers
technology has a strong presence. We All of this comes from having a school that and students, who can use our class set
operate a bring-your-own-device policy, sees digital literacy as an essential skill and of Google Cardboards — the affordable
which will shortly be replaced with a one- is happy to provide the time and resources VR headsets.
student-to-one-Chromebook scheme. to get all staff and students on board. My Another way we involve students in
Most departments have Chromebooks or role is a great example of this: I am the technology is with our Digital Leader
iPads, and we encourage students to use director of the Learning Commons, a library scheme. Students take the roles of IT
mobiles phones as learning devices. As a and digital breakout space. We have 60 helpdesk staff, and we assign technical
Google Reference School, we use Google Chromebooks, which are available at break support tickets to them. They are an
tools in creative and innovative ways across times, and an innovative learning space. amazing resource for the school, saving time
the whole of our curriculum. This healthy The Learning Commons is often booked out and allowing technical staff to concentrate
relationship with technology is essential by teachers who enjoy the freedom that on infrastructure issues. Students who
for our students, to ensure that they are the space offers compared to a traditional are successful in their bid to be part of the
data-aware and can use digital tools to classroom. Our assistant head, Nick Digital Leader scheme take the Google
Applied Digital Skills course (helloworld.cc/
digitalskillscourse). They are available to run
BECOMING A GOOGLE REFERENCE SCHOOL theatre lighting, set up for assemblies, lead
Code Club sessions, and produce graphics
DAN ROBERTS, HEAD TEACHER AT DEVONPORT HIGH SCHOOL FOR BOYS and informatics for school departments.
We currently have over 30 Digital
Devonport High School for Boys was Leaders, with a healthy waiting list. Some
approached to be a Google Reference School of the team are also e-safety ambassadors
and we opted to use Google for Education and run relevant workshops. The students
to reduce costs and improve productivity involved show fantastic problem-solving
and efficiency. More importantly, we value and creative thinking skills. But the most
how the apps empower young people to amazing thing about these students, in my
collaborate, rather than more traditional opinion, is that very few of them are taking
virtual learning environments which limit computer science as an elective at GCSE.
collaboration and learning. Clearly, they have a great relationship with
technology. One of our Digital Leaders,
am fortunate to work in a school When implementing the use of tablets science curriculum to adapt around the topic
I where significant investments in the classroom, our aims were for pupils of rocks. We began our journey with this
have been made to promote and develop to develop key literacy skills, explore new topic for timetabling reasons, but quickly
the computing curriculum — and one key routes for creativity, and learn how to record adapted the lessons learnt to other areas of
benefit is that every pupil aged seven to and evaluate their work. the curriculum, such as history and English.
eleven has their own tablet. Because of these investments in
Nearly two years ago, I was given the developing the computing curriculum, I have Getting started with the tablets
opportunity to work with an experienced learnt more about using technology in the Our journey began with eliciting the pupils’
computing specialist to develop a cross- classroom in the past 18 months than I have understanding and curiosity by using the
curricular approach to using tablets in the in almost ten years of teaching. Prior to this, PicCollage app to write questions over a
classroom. This opportunity came about my experience of computer science was very photograph of a rock. Straight away, my
through fortunate timetabling and as a limited and I had scarcely been exposed to students and I encountered problems: we
result of my reputation for being interested computing or technology in the classroom. couldn’t get the camera covers off the cases;
in using technology with my students — Tablets were my starting point, and I had one we didn’t know how to capitalise letters;
I’m one of a small number of people who afternoon a week with our specialist, and a and we were afraid to press any buttons
know how to get the interactive display
and sound in the school hall to work at the
same time! The specialist, who was known
to our head teacher, was employed at the
school to lead the computing curriculum,
provide our pupils with stimulating
opportunities, and deliver continuing
professional development for staff.
INTRODUCING
TABLETS TO
YOUR PUPILS
n L et children explore the apps
T each them what key symbols
+ to add
n
for fear of “destroying the tablets” (to use Growing more confident Overcoming barriers
the children’s words). I questioned myself We were eager to build on our initial I am still working to overcome some barriers:
throughout: was the time used to model exercise, and our subsequent activities balancing book work with technology;
every tap worth it? Was every child making explored different methods of recording. A figuring out how to show constructive
progress from their individual starting point? popular app with my class is Balloon Stickies marking and give feedback on the tablets;
What was the difference between this and Plus, an application that allows you to add and planning the next steps in embedding
the tried and tested strategies? speech bubbles to photos. Not only do they the cross-curricular use of technology in my
Despite these initial hurdles, the dialogue like the name, they also enjoy being able to setting. However, my pupils are becoming
created through this activity allowed for choose between typing and voice recording, “confident”, “reflective”, and “enthusiastic”
thoughtful, memorable, and reflective learning and the freedom to present their work the learners (to use their own words again) and I
among the group. Writing on the tablets way they want to. I have found that taking believe that this shows the strong impact
also helped to alleviate the apprehension away the structure of an exercise book has that tablets can have when used as a
that some of the children felt about writing allowed children to focus on the content and learning tool in the primary classroom.
in exercise books. Misconceptions were creativity of their learning.
identified, understanding was assessed, and One of the most positive changes I’ve
I was able to reflect on my teaching. As with seen in my pupils is their ability to reflect
most things in a school environment, I learnt on their own evolving knowledge. Using
that patience needed to be embraced, and Adobe Spark Video, we were able to bring
that the quality of participation, confidence, to life an investigation on the permeability of
and problem-solving skills witnessed in rocks. We used technology to look back at
one afternoon justified the time needed to prior learning, and this helped to predict and
embed routines. Most importantly, I learnt justify the results. As each experiment was CHARLOTTE SPENCELEY
that children need to be taught how to conducted, the tablets were used to record Charlotte is an upper-primary teacher and
use technology in a meaningful way, and the results visually. Spark Video supported school council lead at Giffard Park Primary
not to assume that all young people are our observations, reasoning, and conclusions School in the UK. She is also a newly
digital natives — a term often used to by allowing us to explain each step verbally qualified teacher mentor and is the health
describe the generation that has grown up and annotate the video with additional and well-being champion at her school.
in the era of technology and the internet. information. Having to record experiments
or the past three years, I’ve had the at the start of the year, they’re given a commissioned to take some shots for
F pleasure of running a photography large art pad to be used as their portfolio. the staffroom walls by the deputy head
club for a small group of children. It’s given This is for them to keep and use. It’s not a teacher! This is such a positive experience
me the opportunity to share one of my book that gets marked, but a pad that gets for the kids and is hopefully something
own passions with the pupils, as well as admired. It should be a reflection of their they’ll remember for a long time.
helping them to get creative more often. work and a space for them to show off
In my opinion, too much of primary school their talent. Simple equipment
life is taken up by English and maths! We The second way is our own little When getting started and looking at buying
need to give pupils the chance to let their blog space. The idea is for the pupils to equipment for a club like this, it’s important
creativity flow, and create something keep it up to date and share their work. to remember that the type of camera used
unique and memorable. It looks great and is an excellent way for really doesn’t matter. Honestly!
Each week, the club meets up and them to showcase their photos. The trick We started off with some simple point-
spends an hour playing with a set of with this is to find a blogging platform with and-shoots: bog-standard, cheap, and
cameras in and around our school. I set a healthy storage allowance, otherwise cheerful. The trick was to get the kids
them a challenge or a theme each week, you’ll fill it up pretty quickly. This has also thinking about how they could use them
and we head off to see what we can snap. been a great way for us to share the work in different and interesting ways, and
It might be as simple as giving them a title with students’ parents. I can quickly send how they could make sure the subject in
such as ‘Stone’ or ‘Shadows’ and seeing out the link in an email so they can see the the photograph was captivating. After a
what they come up with. Other weeks, we great work their kids do in the club. few months, I managed to beg, steal, and
might go on quick trips, or maybe look at The last method is a favourite of the borrow from the head to get some Sony
the work of a professional photographer. pupils. Taking a wall in one of the main A5000s. These cameras are great. They
The teaching comes from talking about school corridors, we’ve created our very have all the power of a DSLR, but they’re
photography concepts during each of own Photography Club Gallery. They small enough for little hands. These were
these activities. We talk about lighting, get to pick their favourite snaps (some a bit pricey and are fairly delicate — a
composition, the rule of thirds, and what of them would not be my choice!) and scenario that will fill all primary-school
they think makes a good photograph. display them in frames, labelled with their teachers with dread. So with the little
names and the camera used. All I did was funding I had left, I bought a few ‘rough
Sharing is key buy the cheapest frames I could find at and tough’ cameras. I chose the Ricoh
There’s no point in the pupils taking all IKEA, and they love the gallery. We have WG-30, and I can’t recommend these
these wonderful pictures if they are never a three-month policy on changing the cameras enough. They’re waterproof,
seen again! Our club has a few different photos, just to make sure the gallery stays shockproof, and even have digital
ways of sharing their beautiful work. First, fresh and new. The pupils have even been microscope capability. They really
n The DSLR pro photographers! n Use the slow shutter speed on a DSLR to paint with light
n A simple glass ball can create magical images n Broken equipment is given new life in the hands of inquisitive minds
stopped me from worrying when a child shutter speed, you can paint using the light good. I’m not sure how often we get to do
was running down the mud track in the of a torch. So cool! My personal favourite that in a primary school anymore, with all
middle of the Yorkshire Dales! piece of equipment, though, is a glass the pressure of tests. My biggest hope is
Allowing the children to investigate and ball. Pick one up on eBay for little money, that it’s passed on a love and enthusiasm
explore with the cameras has been one of and get ready to take some unbelievable for photography in the pupils, and that it’s
my drives for the club. One way I’ve done pictures. They make even the most novice something they’ll remember doing. I can’t
this is by collecting bits and pieces for us to photographer look like a pro. wait to see some of their portfolios in
use with the cameras. I’ve been to camera future life. Fingers crossed!
shops and bought old, broken, and scrap Three years on…
SLR lenses. They’re great for looking at how Having worked with the same small group
a camera works, but also for holding up to of children for such a long time, I’ve seen MATTHEW MOORE
the lens of your cheap camera and taking them develop right before me. The club Matthew is a computing specialist at a primary
some interesting snaps. I’ve also added a has seen them change into future artists. It school in Bradford, UK. He is also a CAS Master
few small torches for painting with light. Do has instilled in them a sense of aesthetic. Teacher and Hub Leader, as well as a Raspberry
a few Google searches to find out how you It has given them the opportunity to create Pi Certified Educator.
can achieve this; it’s incredible. Using a slow something with the sole purpose of looking
© yellowj/stock.adobe.com
LOGGING ON AND BEYOND
Sway Grantham shares tips on how to teach children under
seven to log on to school computers independently
ust like blowing their noses or tying Teach it explicitly you would eventually intervene, but you
J their shoelaces, logging on to school If you plan a lesson in which the outcome is might set them a personal target to work
computers is a skill young primary-school that learners have logged on successfully, on that specific skill until they got there. We
students need to learn. However, many you can break down each step and take don’t want to impact the children’s attitude
children can find logging on by themselves your time, without feeling the pressure of to computing because they struggle with
quite challenging. Here are some top tips moving on to other lesson content. For those logging on.
to help you get your youngest learners learners who still struggle, a visual prompt Logging on is a skill that many adults
logging on to devices independently. is often useful — you can hand them a chart take for granted, but it is a skill in itself. We
showing each of the steps, to encourage need to give it the amount of time it
Simple usernames and passwords them to continue independently. deserves, so that we can get the majority of
Consider what is making it hard for our learners to do it independently as soon
the learners to log on. If it’s unrealistic Peer support as possible. This not only makes our lives
usernames and passwords, you should Can the children who have mastered the easier, but it also broadens the learners’
speak to the IT manager, or whoever skill support those who haven’t, until they opportunities for using technology across
controls your logins, and make these become more independent? I would often the curriculum in the future.
appropriate for the age and ability of the set table challenges for everyone on one
children. Their first name and a ‘1’ for Year table to get logged on, awarding school
1, and a three-letter password, is more points for the fastest table. This encouraged
than enough for this age group. However, the more capable children to support those
you should avoid them all having the same who were struggling, reducing the time
password, as we do not want to advocate pull on the teacher, and also allowing the
this, even with our youngest learners. learners to learn from their peers. I also had
a rule that the only person allowed to touch
Check and build the foundations the computer was the person who was
There is a range of foundational skills using it, so the helpers could tell them what
that children need before they can log on to do, but not do it for them!
independently, including turning on and
shutting down computers safely, using a Don’t let it be a barrier SWAY GRANTHAM
keyboard, and using a mouse to click in If, after trying all of the above, you still have Sway is a senior learning manager at the
a box. Do your students have these skills some learners who are struggling, they Raspberry Pi Foundation, where she leads
already? If they don’t, it’s worth spending should still be able to access the computing a team developing computing resources for
some time on developing them, so that curriculum with support. Just like if a child primary teachers (@SwayGrantham).
logging on isn’t an overwhelming task. was unable to dress themselves for PE,
Q WHEN IS IT AVAILABLE?
Your 100-page magazine is available three times
A per year — keep an eye out for special editions
too! Check out our podcast at helloworld.cc/podcast to
get more great Hello World content between issues.
IT’S FREE!
Hello World is free now and forever as a Creative
Commons PDF download. You can download every
issue from helloworld.cc. Visit the site to see if
you’re entitled to a free print edition, too.
GET IN TOUCH
Want to talk? You can reach us at:
[email protected]