Understand how algorithms are implemented as Algorithms are used to plan the steps that a digital device will take before they are entered into the device. PS2.1A programs on digital devices Algorithms are used to plan programming. Can pupils read a simple algorithm and explain what it does? Can they answer simple questions about it? PS2.1B Be able to interpret algorithms What is the next step after x? What is the final step in the algorithm? What instruction will you need to add to make it do x? How many steps has your algorithm got? Pupils can create an algorithm using notation or conventions provided by their teacher. Some pupils can PS2.1C Create algorithms create an algorithm by choosing the notation or words themselves. Logical reasoning implies that pupils know the capabilities, rules and possible actions that govern their type of algorithm. For example, a pupil ordering an everyday dressing algorithm would understand that humans Use logical reasoning to predict the behaviour of PS2.1D rarely wear their underwear outside their over-clothes unless they are a super hero. A pupil designing an simple algorithms algorithm for a Bee-bot would know that it has a limited number of commands and would create an algorithm which only utilises these.
PROGRAMMING AND DEVELOPMENT
Reference Objective Notes and guidance
Programs and programming devices, such as floor turtles, have a limited set of commands and can only be Understand that programs execute by following controlled using the commands they recognise. If commands are given that are not exactly the same as the PD2.1A precise and unambiguous instructions ones they recognise, the commands will not be acted upon. An algorithm, by contrast, could be written in many different ways as long as the instruction can be clearly understood by another human. PD2.1B Be able to create a simple program Pupils know how to convert an algorithm into a simple program and test it to see if it works as they expect. Pupils know what they wanted to achieve through their algorithm. Pupils are aware if it has been achieved once the algorithm has been converted into code. Pupils are aware of simple strategies to find and fix Understand how to identify and correct errors in PD2.1C programming bugs such as tracing the steps on the algorithm as the program runs/executes. programs (bug and debug) Pupils use correct language such as bug and debug. Although technically these are reserved for errors in code, KS1 teachers can accept this language when describing algorithmic errors. Pupils are able to create a simple bug by either adding a single wrong instruction or taking away a single PD2.1D Be able to create errors in a simple program instruction into an otherwise perfect program for their peers to debug.
iPrimary Computing.indd 4 25/05/19 10:28 AM
iPRIMARY COMPUTING YEAR 2 5
COMPUTERS: HARDWARE AND SOFTWARE
Reference Objective Notes and guidance
Know about types of mobile phones, smartphones Pupils know things that might connect to their home or school networks such as laptops, desktops and tablet CO2.1A and specialist phones and how they connect to the computers. Pupils know that phones can also use these networks but that they also have their own network network (SIM) that works away from home and school called a mobile phone network. A satellite navigation system helps people get to where they want to go by planning a route for them on a map CO2.1B Know about navigation aids and how they are used on the screen. Some pupils may know that the satellite navigation system receives its location from a satellite that orbits the world. Know about types of input peripheral Pupils know that input devices put information into a digital device. A keyboard puts in letters and numbers. A CO2.1C (e.g. keyboard, mouse, joystick, digital microphone puts in talking or singing. A mouse or touch screen puts in movement into our digital devices and camera, webcam, microphone, touch screen) when we touch or click buttons on a mouse it puts in what apps we want to open or close.
COMMUNICATION AND NETWORKS
Reference Objective Notes and guidance
Understand that some people want to be unkind to others using technology and some want to steal the Understand different forms of cyberattack (based information stored on technology. Can pupils understand how these might operate in their own lives? How CN2.1A on behaviour), including social engineering might they spot someone being unkind? What type of behaviour might they show? How would they know if (shoulder surfing) their information, such as a password, has been stolen or changed? Pupils know that many services are provided for only some people to use. Sometimes these services have Know about and understand the use of log-ins been paid for, such as Netflix, Amazon or Sky. Sometimes the information on the service is only for certain CN2.1B and passwords people, such as their school network which is designed for teachers and pupils only. To make sure the right people access the service, each user is given a log-in and password to identify that they are the right person. Be aware of the risk to data and information: Pupils know that some people want to use, steal or damage other people’s information. They do this by CN2.1C unauthorised access and the importance of logging on using their username and password. Pupils know that they should never share usernames or keeping personal information private passwords with anyone other than a trusted adult at home or school. Understand how to stay safe online, use technology respectfully and identify where to go Pupils are not only able to know and repeat safety rules and instructions, but they also know reasons why CN2.1D for help and support when they have concerns they need to follow them and can explain these in concrete situations. Pupils know to communicate with a about content or contact on the Internet or other trusted adult as soon as anything concerns them and can name their trusted adult at home and at school. online technologies Understand what online services are offered Do pupils know how people purchase things online? Do they know that things purchased online are by: shopping sites – basket, checkout, secure connected to the users’ (often parents’) bank accounts? They understand that some online services offer CN2.1E payment, product catalogue; entertainment some content for free and other content that is paid. Others offer some content for free for a short period of providers – on demand, streaming, downloads; time, after which it has to paid for. Some online services offer things for free but the download will damage gaming sites your computer or steal information from it.
iPrimary Computing.indd 5 25/05/19 10:28 AM
iPRIMARY COMPUTING YEAR 2 6
INFORMATION TECHNOLOGY
Reference Objective Notes and guidance
Pupils should be able to independently choose the right tool (tablet, laptop, camera, floor turtle, etc.) or Select and use technology/software applications IT2.1A software (word processor, presentation tool, drawing package, etc.) for the given or self-selected task, as well purposefully as use it correctly. Pupils should know how to store, organise, name and save their work (where saving is needed), and open Organise, store, manipulate and retrieve digital IT2.1B previously saved documents and make purposeful changes. content Pupils should know how to organise this content, how to name it and find it later. Pupils can create digital artefacts such as letters, lists, poems, simple posters, digitally drawn pictures, simple IT2.1C Create digital content stop motion animations, simple graphs, record video, take photos, etc. IT2.1D Use: text, numbers, images Pupils can create and adapt content that uses text, numbers and images. Pupils create files and create and rename folders if using a Windows or Mac environment, they can create IT2.1E Create files and folders blank documents and create and colour folders in a Google Drive for a Chrome environment. Pupils can save to the photos store on an iPad.
SOFTWARE SKILLS
TEXT MANIPULATION
Reference Objective Notes and guidance
Enter or edit text that is appropriate for a given Pupils use text in a variety of different contexts such as sentences for a letter, single words or phrases for a SS2.1A context numbered or bullet pointed list or enlarged text for a poster or presentation. Pupils are able to use a simple spell checker whilst recognising that it may not always present them with Work towards accurate spelling, punctuation and the word they want. (NOTE: If the word being checked differs by many letters from the correct spelling then SS2.1B grammar incorrect alternatives will be offered, so pupils cannot rely on spell checking if their core spelling is very inaccurate.)
DATA TYPES
Reference Objective Notes and guidance
Identify data types: text, number, date and Pupils should be able to identify and distinguish between text, numbers, dates and currency in a variety of SS2.2A currency different contexts.
iPrimary Computing.indd 6 25/05/19 10:28 AM
iPRIMARY COMPUTING YEAR 2 7
PRESENTATION
Reference Objective Notes and guidance
Pupils decide if the artefact they are creating is for a single user (letter, list) or for group consumption. If Adapt elements to fill the space when designing SS2.3A they are creating for a group (posters, presentations, etc.) they must limit the number of items per page and artefacts for group consumption expand elements to fill the space.
GRAPHIC EDITING
Reference Objective Notes and guidance
Pupils can resize a digital picture or photo if it is being used within another software package such as a word Manipulate a digital picture or photo by resizing SS2.4A processor, desktop publisher or presentation tool, and crop a digital picture or photo to remove a less-needed and cropping it part of the picture or focus on a specific part of it.
Cyber security and Global Information Assurance 1st edition by Kenneth Knapp 1605663271 9781605663272 - Download the ebook now to start reading without waiting