GCSE (Insert Subject) - CCEA



-720090-72009000GCE Digital TechnologyContentsPageUnit AS 1: Digital Technology Approaches to System Development5Unit AS 2: Fundamentals of Digital Technology23Unit A2 1: Information Systems41Unit A2 2: Application Development57IntroductionCCEA has developed new GCE Digital Technology specifications for first teaching from September 2016. This scheme of work has been designed to support you in introducing the new specification.The scheme of work provides suggestions for organising and supporting students’ learning activities. It is intended to assist you in developing your own scheme of work and should not be considered as being prescriptive or exhaustive.Please remember that assessment is based on the specification which details the knowledge, understanding and skills that students need to acquire during the course. The scheme of work should therefore be used in conjunction with the specification.Published resources and web references included in the scheme of work have been checked and were correct at the time of writing. You should check with publishers and websites for the latest versions and updates. CCEA accepts no responsibility for the content of third party publications or websites referred to within this scheme of work.A Microsoft Word version of this scheme of work is available on the subject microsite on the CCEA website (.uk/microsites). You will be able to use it as a foundation for developing your own scheme of work which will be matched to your teaching and learning environment and the needs of your students.I hope you find this support useful in your teaching.Best wishesMichael McEnerySubject OfficerDigital TechnologyE-mailmmcenery@.ukTelephone028 9026 1200 (2170)CCEA Exemplar Scheme of Work:GCE Digital TechnologyUnit AS 1:Approaches to System DevelopmentSpecification: GCE Digital TechnologyUnit AS 1: Approaches to System DevelopmentPrior Learning:? There is no specific requirement for prior learning although, it is envisaged that many candidates will have already gained skills, knowledge and understanding of Digital Technology through their successful completion of a related GCSE course. Some candidates may have completed a GCSE Applied ICT course or the Business and Communications Systems course before embarking on this award.Background Reading: All definitions of Digital Technology terminology should be taken from the BCS Academy Glossary Working Party (2013), “BCS Glossary of Computing and ICT, 13th ed.”, Swindon, BCS.Assessment: External written examination 1 hour 30 minutes Students answer short and extended questions based on the Fundamentals of Digital Technology. It is worth 50% of AS level and 20% of A level grade.Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApproaches to System DevelopmentStudents should be able to:Reasons for system development 10 hoursexplain the impact of the ‘software crisis’;explain the need for software systems that meet the needs of organisations and/or individuals;Students should be able to define the term “software crisis” and be able to describe the main reasons why such a crisis occurred with a focus on rapid increase of computer power and complexity of problems that could be solved managing user expectations. In groups students should research how software systems are meeting the needs of global and local organisations and individualsFactfiles will be available in due course with respect to each of the learning outcomesbuet.ac.bd/iict/iictcourses/ict6010/lecture_1.pdfSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApproaches to System DevelopmentStudents should be able to:Reasons for system development (cont.)explain the main factors affecting system development ? the user needs, time and cost;Students should be able to explain how user needs, development time and development costs influence system developmentiDocs/9780538478298-ppt-ch12 understand that a computer system consists of a user interface, processes and data; andStudents should be familiar with a range of user interfaces, a range of processes and the type and volume of data used in computer systems in a range of applicationsdescribe the roles of the following during system development: the systems analyst, the project manager and the programmer.Students should be able to describe main responsibilities of the systems analyst, the project manager and the programmer when a system is being developed Analysis15 hoursdescribe the purpose of analysis;Students need to understand that the purpose of system Analysis is the process of studying an existing system to determine how it works and how it meets the user’s needsBCS - C (pp 227–238)evaluate different fact-finding techniques: interviews, questionnaires, observation and document sampling;Students should be able to describe the benefits and drawbacks of using interviews, questionnaires, observation and document sampling as fact finding methodsSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApproaches to System Development (cont.)Students should be able to:Analysis (cont.)distinguish between functional and non-functional user requirements in systems such as stock control, reservation, payroll and billing;In groups, students should research the user needs in the following applications: stock control, reservation, payroll and utility billing. The user needs should then be classified as functional or non-functionalexplain the purpose of a Data Flow Diagram (DFD); andStudents need to explain how a DFD shows what kind of information will be input to and output from the system, where the data will come from and go to, and where the data will be storedtutorials/leveled-dfd.jsp See Appendix 2 of Specification for symbols used in producing DFDsProduce context and level 1 DFDs for simple scenarios.Students need to be able to draw a Context Diagram from a variety of scenarios that shows a single process that represents the entire system including the major information flows between the external entities and the system and then be able to produce a level 1 diagram that decomposes the single process into a number of sub-processes to identify further data flows and data storesSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApproaches to System Development (cont.)Students should be able to:Design, Development and Testing15 Hoursdescribe the purpose of system design, development and testing;Students need to be able to describe the purpose of system design, development and testing by referring to the activities that take place at each of these stagesBCS - C (pp 227–238)describe the use of storyboarding in developing the user interface;Students should be able develop skills in creating a storyboard to plan the development of a user interface that could then be implemented by a third partywatch?v=VSFm-nfuHuYdescribe the use of prototyping in the design of the user interface and the data model;Students should be able to define the term prototyping and be able to identify reasons why a prototype would be used to design a user interface and a data model. In groups students should be able to research why a prototype is used during system development the importance of testing throughout the development of a system in ensuring system quality;Students should understand the difference between black box and white box testing of a system. Students need to have experience of module, integration and system testing as important stages within the development of systemSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApproaches to System Development (cont.)Students should be able to:Design, Development and Testing (cont.)distinguish between different types of testing: system, acceptance, alpha and beta;Students should be able to define system, acceptance, alpha and beta and why each type of testing is required, making reference to who is involved such as developer or end user and what type of data is used the purpose of a test plan;Students should understand that the Test Plan ensures all functional and design requirements are met as specified in the documentation. It will also provide test methods for Unit, Integration and System Testing describe the main components of a test plan;Students in groups should look at example test plans to identify and describe typical components such as: Features to be tested, Success and Failure criteria, Test deliverables, Staff Responsibilities and Test ScheduleSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApproaches to System Development (cont.)Students should be able to:Design, Development and Testing (cont.)distinguish between different types of test data; andStudents should experience testing a solution with different types of test data including Normal, Extreme and Erroneous. Students should be able to explain the different types of test datadescribe the main components of a test plan.Students in groups should look at example test plans to identify and describe typical components such as: Features to be tested, Success and Failure criteria, Test deliverables, Staff Responsibilities and Test ScheduleImplementation10 hoursdescribe the purpose of system implementation;Students need to understand the purpose of the Implementation Plan describing how the information system will be deployed, installed and become a fully operational system referring to the overall resources needed to support the implementation (such as hardware, software and personnel)BCS - C (pp 227–238)Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApproaches to System Development (cont.)Students should be able to:Implementation (cont.)evaluate different changeover methods: parallel, direct, pilot and phased;In groups students should discuss and produce a list of benefits and drawbacks of parallel, direct, pilot and phased changeover methodsas_a2_ict_new/ocr/A2_G063/331_systems_cycle/slc_stages/miniweb/pg17.htm describe the different types of documentation: user documentation and technical documentation, and explain how they are used;Students should understand the need for user and technical documentation and refer to situations in which they are needed. Students should also be able to state the typical contents of both types of documentationwhat-are-user-documentation-and-technical-documentation/explain what is meant by data conversion;Students should understand the importance of converting data to a format that is compatible with the new systemdescribe the purpose of system maintenance; andStudents should understand the purpose of maintenance is to ensure that the system continues to function free of errors, meeting the user requirements with appropriate hardwareAIMS/Information_Management/4-05-10.pdfSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApproaches to System Development (cont.)Students should be able to:Implementation (cont.)evaluate different forms of maintenance: corrective, adaptive and perfective. In groups students should discuss and produce a list of benefits of corrective, adaptive and perfective maintenance and come up with techniques that could be used to minimise these types of maintenanceAlternative Development Approaches10 hoursdescribe the main features of different approaches to system development: the waterfall model, rapid application development (RAD) and Agile; andStudents need to be able to describe the main features of the waterfall model, rapid application development (RAD) and Agile evaluate different approaches to system development: the waterfall model, RAD and Agile.Students need to be able to describe the benefits and drawbacks of the waterfall model, rapid application development (RAD) and Agile approachesIn groups students should be able to name and justify a suitable approach based on a given scenarioBCS - C (pp 227–238)Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApproaches to System Development (cont.)Students should be able to:Software Projects5 Hoursdescribe the main elements in the organisation of a software project: resources, constraints and risks;Students should be able to describe the following terms: resources, constraints and risks in the context of a software iixx/key-features-of-project-management-system explain the main features of project management for a software project;Students should be able to refer to monitoring, scheduling, budget and resources when describing the main features of project managementevaluate the use of project management tools: Gantt charts and critical path analysis; andStudents need to be able to describe the benefits and drawbacks of Gantt charts and critical path analysis in project managementas_a2_ict_new/ocr/A2_G063/331_systems_cycle/planning_tools/miniweb/pg6.htmSee Appendix 2 of Specification for Network Diagram Notation used in critical path analysisdescribe the importance of version management during system development.In groups students should be able to examine sample Gantt charts and critical path analysisStudents should understand the importance of tracking changes by developers during system development and the need to track a number of developers who are involved during system developmentSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApproaches to System Development (cont.)Students should be able to:Security Issues5 Hoursexplain why data is archived;Students need to understand the importance of the process of identifying and moving inactive data into long-term archival storage systems to optimise the performance of resources needed the need for backup and recovery;Students need to explain that by protecting an organisation's data, you need to implement a data backup and recovery planIn groups students could research situations when a backup file would be neededevaluate methods of backup: full backup, differential backup and incremental backup;In groups students should discuss and produce a list of benefits and drawbacks of full backup, differential backup and incremental backupSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApproaches to System Development (cont.)Students should be able to:Security Issues (cont.)explain the purpose of a disaster recovery plan; anddescribe the contents of a typical disaster recovery plan.Students need to understand that a disaster recovery plan is a documented set of procedures to recover and protect the IT part of a business in the event of a disaster. In groups students should research typical disaster recovery plans and report back on the contents foundblog/2013/07/five-elements-to-include-in-a-disaster-recovery-plan/Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesProgrammingStudents should be able to:Programming Environment 5 Hoursexplain the purpose of a computer program;Students should fully understand the purpose of a program with reference to the computer hardwareBCS - C (pp 259–316)describe the main features of an Integrated Development Environment (IDE); andStudents need to describe the main features of an IDE including the different tools to automate and assist a developer in the creation of software such as: Code editor, Translator, Debugger and GUI builder the process of translation.Students need to be aware of the different methods used to translate programs into binary format including Assemblers, Interpreters and Compilersidemployee.id.tue.nl/g.w.m.rauterberg/lecturenotes/DA308/COMPILER.pdf Program Structure15 Hoursexplain the terms algorithm, syntax, data type, and variable;Students should be given sample algorithms and matching programming code in a given language to illustrate the terms algorithm, syntax, data type, and variableBCS - C (pp 259–316)C# Tutorialsbasic/variables-datatypes.phpSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesProgramming (cont.)Students should be able to:Program Structure (cont.)Students use the suggested tutorials and type the code into the computer. Students should avoid copying and pasting the code as this will not help them to learn the syntax and develop programming skills Tutorialsen/Variables_and_Typesdescribe the fundamental programming concepts of sequence, selection and iteration, including count-controlled and condition-controlled loops;Students should use sample programs and edit these to illustrate how sequence, selection and iteration are used including count-controlled loops i.e. ‘FOR’ loops and condition-controlled loops e.g. ‘WHILE’ loopsPython Selectionen/Conditions C# Selectionbasic/conditional-constructs.php Loops C#basic/loop-constructs.php Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesProgramming (cont.)Students should be able to:Program Structure (cont.)For loop C# Loop C# Loopsen/Loopsdescribe how algorithms can be represented using flowcharts;Students should practice drawing flowcharts from a given algorithm and understand the purpose of both an algorithm and a flowchartarticle/flowchart-programmingexplain object-oriented terminology: objects, classes, methods and inheritance; andStudents should be given examples of object oriented programs and from these they should be able to define the terms objects, classes, methods and inheritancewatch?v=z4W1_bkMNO0Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesProgramming (cont.)Students should be able to:Program Structure (cont.)Python Objectsen/Classes_and_ObjectsC# the use of the object oriented approach.In groups students should discuss and produce a list of benefits and drawbacks of using an object oriented approach Unit AS 2:Fundamentals of Digital TechnologySpecification: GCE Digital TechnologyUnit AS 2: Fundamentals of Digital TechnologyPrior Learning: There is no specific requirement for prior learning although, it is envisaged that many candidates will have already gained skills, knowledge and understanding of Digital Technology through their successful completion of a related GCSE course. Some candidates may have completed a GCSE Applied ICT course or the Business and Communications Systems course before embarking on this award.Background Reading: All definitions of Digital Technology terminology should be taken from the BCS Academy Glossary Working Party (2013), “BCS Glossary of Computing and ICT, 13th Ed.”, Swindon, BCS.Assessment: External written examination 1 hour 30 minutes Students answer short and extended questions based on the Fundamentals of Digital Technology. It is worth 50% of AS level and 20% of A level grade.Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesData Representation Students should be able to:Bits and Bytes6 Hoursexplain the terms bit, byte, kilobyte, megabyte, gigabyte and terabyte; andDefine a byte as the equivalence of 8 bitsDefine each term and express the equivalent denary value using precise values:1 Kb = 1024 bytes = 2101 Mb = 1024K = 2201 Gb = 1024Mb = 2301 Tb = 1024Gb = 240Factfiles will be available in due course with respect to each of the learning outcomesdemonstrate that 2n different values can be represented with n bits (maximum n = 8).Understand place value in binary up to a maximum of 8 bits: 20 - 27 and the equivalent range of values in denary from 0 – 255. (only integer values) - C11 (pp 332–338)Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesData Representation (cont.)Students should be able to:Binary and Decimal10 Hoursperform conversions from decimal to binary and from binary to decimal for a maximum of 8 bits; Convert a positive decimal integer into binary and convert a positive binary number back to decimal within an 8 bit range. (0000 0000 to 1111 1111 and 0 to 255). Covert from denary to binary in less than 8 bits where possible. Pupils should be given a range of questions to calculate answers keeping within an 8 bit rangeBCS - C11 (pp 332–338).Teacher produced worksheetsdemonstrate how the two’s complement system can represent positive and negative numbers in binary using 8 bits; andUnderstand how one’s complement is used to represent negative and positive numbers. Explain why two’s complement is used and perform calculations using an 8 bit range for representing negative and positive numbers. Pupils should be given question worksheets to calculate answers for both negative and positive valuesTeacher produced worksheets 1s-complement/ how ASCII and Unicode are used to represent characters.Explain how characters are represented using ASCII and Unicode. Give pupils sample codes to explain how they differ and how characters are representedASCII and Unicode character tables%20Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesData and Information (cont.)Students should be able to:Data, Information and Knowledge6 Hoursdistinguish between data, information and knowledge by using examples; andIntroduction to the importance of information to organisationsDefinitions of the terms and common examples of data, information and knowledgeIdentify data, information and knowledge for common scenarios.BCS – (p 323)describe how the quality of the information produced can be affected by the following factors: accuracy, relevance, up to date/currency, completeness, presentation and reliability.Use some examples and consequences of poor quality information - examples where information is not accurate, up-to-date, complete, relevant or presented effectively and describe the consequences of these factors on common information systemsUse legacy past papers to give pupils examples of different situationsgcse_new/data_info_knowledge/quality/miniweb/index.htmLegacy Past Papers AW111/AP111Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesData and Information (cont.)Students should be able to:Data Validation and Verification6 Hoursdescribe and apply the following data validation methods: range, type, length, format, presence, Modulus 11 check digit and lookup;State the purpose and definitions of data validation and data verification. Pupils should understand the difference between these conceptsBCS – (pp 75–79)gcse_new/databases/validation_verification/miniweb/pg2.htmunderstand the purpose of data verification methods: double entry, proofreading, check-digits and batch totals (hash and control); andExplanations and examples of range, type, length, format, presence, Modulus 11 check-digit and lookup. Pupils could work together to create an on line glossary of the key words associated with validation totals the limitations of data validation and data verification.Through calculations understand the practical use of a modulus 11 check-digit (up to a maximum of 5 digits). Pupils should be given examples to calculate typical check digitsGive pupils explanations and examples of data verification methods, e.g. double entry, proofreading, check digits, and batch totals (hash and control)Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesHardware and SoftwareStudents should be able to:Architecture 12 Hoursdescribe the internal components of a computer system: processor, clock, main memory, cache memory, buses (address, data and control), I/O controllers, registers and ports;Pupils could work together to create an on line glossary of the key words associated with computer architecturePupils could trace through a program to understand how the internal components of a computer system operatePupils should summarise the fetch execute cycle in their own works incorporating key termsdescribe the fetch-execute cycle;Fetch Execute Cycleas_as_computing/ocr/H447/F453/3_3_3/fetch_execute_cycle/theory_fetch_execute.htmlevaluate the factors that can influence the speed of processing: processor type, clock speed;CPU Performancebbc.co.uk/education/guides/zmb9mp3/revision/2explain the need for secondary storage;Introduce the class to the purpose of backing storage devices. Pass around examples of external storage devicesExamples of magnetic tape, optical disk, external hard diskSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesHardware and Software (cont.)Students should be able to:Architecture (cont.)12 Hoursdescribe secondary storage media: magnetic, optical and flash; andPupils will work in pairs to produce a table comparing and evaluating storage devices. Comparison points could include capacity, access time and transfer speed as well as cost per GB. The internet will be used to research current storage capacities to demonstrate how storage capacities continually advance. Each group will take a storage device and gives as class presentation as to how it worksas_a2_ict_new/ocr/AS_G061/312_software_hardware/storage_devices/miniweb/index.htmevaluate the use of secondary storage media for common applications.How a hard disk workswatch?v=AfmTaOJMoUkRecap activity. Pupils in pairs will sort various statements relating to different storage devices and place them against the correct storage deviceFlash memory external storage statementsSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesHardware and Software (cont.)Students should be able to:The User Interface5 Hoursdescribe the main features of different types of user interface: windows, icons, menu, pointer (WIMP), command line and forms dialogue; andPresent the different forms of interfaceas_a2_ict_new/ocr/AS_G061/312_software_hardware/user_interfaces/miniweb/index.htmevaluate different types of user interface: WIMP, command line and forms dialogue.Pupils in small groups will evaluate the different types of user interfaceData Compression7 Hoursexplain the need for data compression;Explain the need for compressionPupils should use the compression websites listed to upload and compress a photograph and view the resultCompression websitesdescribe how zipping is used to compress data; common data file formats: txt, wav, bitmap, JPEG, MPEG and GIF;Pupils research and evaluate common data file formatsLinks to evaluate data file formatsdesign/different-image-formats/Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesHardware and Software (cont.)Students should be able to:Data Compression (cont.)7 Hoursdescribe how text, sound and video can be input using a range of devices such as personal computers, laptops, tablets or smartphones.Recap activity. Pupils are given a list of scenarios and they must choose the best file typearticles/which-image-format-best-for-email-newsletters-jpeg-gif-png.htmhowto/30941/whats-the-difference-between-jpg-png-and-gif/ Software7 Hoursdescribe the purpose of an operating system;Describe the purpose of an operating puterbasics/2describe different types of operating system: single user, multi-user, multiprocessing, multitasking and multithreading;In pairs pupils should summarise the different types of operating system in their own words to each other the need for utility programs; andPupils should name five utility programs that they have used. These should be categorised some common utility programs: data compression, file backup, archive software and disk defragmenters.Utility programsgcse_computing/ocr/213_software/utilities/miniweb/pg7.htmSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesHardware and Software (cont.)Students should be able to:Application Software 5 Hoursexplain what is meant by application software;Explain what is meant by application softwaregcse_computing/ocr/211_hardware_software/types_sw/miniweb/pg7.htmexplain the difference between generic software and special purpose software;Show images of different examples of software. Pupils must decide whether the software type is application or system softwareas_a2_ict_new/ocr/AS_G061/312_software_hardware/software/miniweb/pg7.htmcompare the use of custom-built software with off-the-shelf software;Pupils should evaluate custom built software with off the shelf software from the point of view of cost, bugs and development time and user requirementsexplain how application software can be delivered on different platforms, for example downloaded to a device accessed using the web; andPupils should produce a spider diagram to represent the overall software topicevaluate different methods of obtaining software: proprietary and open source.gn.support/open-source-vs-proprietary-softwareSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesHardware and Software (cont.)Students should be able to:Processing Systems5 Hoursdescribe batch processing and real-time processing;Explain batch processing and real time processing the use of batch processing and real-time processing for common applications; andPupils will identify the main features of batch processing and real time processingPupils will evaluate the use of batch processing and real-time processing for common applicationsdescribe the input, output and processing involved in a range of common devices: automatic teller machines (ATMs), point of sale (POS) terminals and smartphones.Pupils in small groups will be presented with information regarding a particular device. Pupils will identify the input, output and processing involved and present their findingsStudents will compile their research to make notesSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesWeb Technology and MultimediaStudents should be able to:Web Applications10 Hoursexplain the terms the WWW, the Internet, URL, HTTP, IP address, web browser, web server, web hosting, FTP, ISP, search engine, cache, cookies, portal, website and webpage; Explain to students that web technology evolved from prior client-server technology, and therefore is not completely newAsk individual students if they can explain each of the terms and request the others to comment on the accuracy of each explanationBCS - A11 Internet(p 109–120)explain how domain names are organised;Using text and diagrams as appropriate, explain the accepted meaning of each term and their order of significance, e.g.: WWW, webpage, website, etc.Emphasise that the WWW and the Internet are not the sameUsing .uk as an example of a domain name, ask students if they know why the example is structured as it isProvide the accepted answer to the question and continue on to explain why domain names must be mapped to unique IP addresses discussed before. Use a diagram to explain the mapping processBCS - A11 Internet(p 114) ContentLearning OutcomesTeaching and Learning ActivitiesResourcesWeb Technology and Multimedia (cont.)Students should be able to:Web Applications (cont.)10 HoursUsing standard telephone numbering as an example, explain to/remind students why the setting of standards is so important to any technologydescribe the role of the International Telecommunication Union (ITU) and World Wide Web Consortium (W3C) in agreeing web standards; andDescribe the roles of the ITU and W3C in agreeing web standardsBCS - A11 Internet(p 114–115)evaluate the use of an Intranet by an organisation.Explain the term Intranet to the studentsSplit the students into teams and ask each team to discuss the advantages and disadvantages of using an intranetDiscuss and correct as needed the ideas formed by the teamsBCS - A12 Networking(p 140)Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesWeb Technology and Multimedia (cont.)Students should be able to:Website Development11 Hoursexplain how webpages are created using Hypertext Mark-Up Language (HTML);Explain what a mark-up language is and how HTML is used to design multimedia documents such as webpagesCreate a web page using a web authoring programEmphasise that initially HTML documents were created using a text editor, and now they are created using special webpage editors that automatically insert all the HTML tags neededBCS - C9 Programming Languages(p 319)html/html_intro.aspBCS - C9 Programming Languages(pp 320–321)understand the purpose of a range of HTML tags: paragraph, image, anchor, ordered list, unordered list and hyperlinks;Help students understand the purpose of each HTML tagAsk students if they think the formatting and layout of a webpage should be exactly the same, similar or completely different across all types of user device e.g. mobile phone and laptop computertags/ how cascading style sheet (CSS) is used in web development;After discussing some of the answers, explain how CSS is simply a way of reusing specific webpage styles across multiple types of device as appropriateEmphasise that CSS rules are applied to avoid ambiguity across different sheetsBCS - C9 Programming Languages(p 322)css/default.aspSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesWeb Technology and Multimedia (cont.)Students should be able to:Website Development (cont.)11 Hoursdistinguish between client-side and server-side processing; andExplain to/remind students of the 3 key layers of digital technology i.e. presentation/user interface, process and data/storageIn the context of the 3 layer model, describe client-side and server-side processing using a travel booking as an exampleAsk selected students to distinguish between the 2 sides of processingComplement and correct answers as appropriateBCS - A11 Internet(pp 112, 113) BCS - A12 Networking – (p 140)bbc.co.uk/education/guides/znkqn39/revision/3evaluate methods of ensuring security over the internet: encryption (including public and private keys), hypertext transfer protocol secure (https), secure sockets layer (SSL), digital signature or digital certificate.Explain to/remind students that security is a key issue throughout digital technology. Explain each of the methodsSplit the students into teams and ask each team to discuss the advantages and disadvantages of using each methodDiscuss and correct as needed the ideas formed by the teamsBCS - A16 Computer Security(pp 164–170)Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesWeb Technology and Multimedia (cont.)Website Development (cont.)11 HoursStudents to consider issues around cybercrime and identify measures that can be taken to protect systems and individuals from attack or falling victim to fraudstersStudents to investigate and research recent cyberattacks that were reported in the media. Identify what the threats were and their impact and implications for the victimsCybercrimeBCS - A16 Computer Security(pp 160–172) .uk/crime-threats/cyber-crime.uk/crime-threats/cyber-crime/online-safety-guidance-for-businesses.uk/crime-threats/cyber-crime/online-threats-to-consumersinterpol.int/Crime-areas/Cybercrime/CybercrimeTERM/C/cyber_crime.htmlUnit A2 1:Information SystemsSpecification: GCE Digital TechnologyUnit A2 1: Information SystemsIn this unit, students develop knowledge and understanding of information systems. It acts as an extension to Unit AS 2: Fundamentals of Digital Technology for students progressing from AS Level. Background Reading:? All definitions of ICT terminology should be taken from the BCS Academy Glossary Working Party (2013), “BCS Glossary of Computing and ICT, 13th ed.”, Swindon, BCS.Assessment:? This unit is assessed through an external written examination lasting two hours 30 minutes. The examination includes both short and extended writing questions and is worth 150 marks. This is worth 40% of the A Level Grade.Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesNetworks (40 hours)Students should be able to:Network Resources(12 hours)describe networks by their scope: local area network (LAN), metropolitan area network (MAN) and wide area network (WAN); Whole class teaching: Introduce Students to types of networks – LAN, MAN, WAN.uk/e-learning/NetTechDC02CD/index.htmdescribe the purpose of the network resources: network card, server, switched hub, repeater, wireless access point, media converter, internet protocol (IP) address and media access control (MAC) address; Students should use the tutorial from the Teach ICT website to build a network and become familiar with how various network resources are used in a typical LANgcse_new/networks/hardware/resources/NWB_SIM.swfas_a2_ict_new/ocr/A2_G063/333_networks_coms/network_components/miniweb/index.htmSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesNetworks (40 hours)Students should be able to:Network Resources (cont.)define the purpose of an IP address and a MAC address;describe the features of a peer-to-peer (P2P) and server-based networks; andStudents should draw a diagram of their school network including an explanation of how resources are useddata_communication_computer_network/computer_network_topologies.htmevaluate the bus, star and ring network topologies.Student activity: In pairs students will produce a table and identify the main features of client server and peer to peer networksStudent activity: In small groups students create a network topology. They evaluate the topology and feedback their results to the classStudent activity: Students should work together to create an on line glossary of the key words associated with networksSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesNetworks (cont.)Students should be able to:Protocols (7 hours)explain the need for communication protocols; Student activity: Students will make up a mnemonic to help learn all the levels in the OSI modelStudent activity: Students describe the main features of the OSI modelStudent activity: Students in pairs will present presentations on the various communication protocols.uk/e-learning/NetTechDC01BCD/page_23.htmdescribe the Open Systems Interconnection (OSI) network organisation model and each of its component layers; anddescribe communication protocols: transmission control protocol/internet protocol (TCP/IP), Ethernet, carrier sense multiple access with collision detection (CSMA/CD), token passing, Wi-Fi, Bluetooth, Voice Over Internet Protocol (VoIP) and radio-frequency identification (RFID).Bluetooth: as_a2_ict_new/ocr/A2_G063/333_networks_coms/optical_wireless/miniweb/pg5.htmSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesNetworks (cont.)Students should be able to:Transmission media (3 hours)define the terms bandwidth and broadband; Whole class teaching:Define the terms bandwidth and broadband; andDescribe transmission mission mediaBandwidth: as_a2_ict_new/ocr/A2_G063/333_networks_coms/bandwidth/miniweb/index.htmwatch?v=ICJqv0TN6-cdescribe transmission media: metal cable, fibre optic and wireless; andInternet Research: Students complete a table evaluating transmission mediaTransmission media: articles-tutorials/netgeneral/Copper-Glass-Guide-Network-Cables.html.uk/e-learning/NetTechDC01CCD/index.htmevaluate these transmission media in terms of volume of data transfer, bandwidth and security.Fibre optic cable: as_a2_ict_new/ocr/A2_G063/333_networks_coms/optical_wireless/miniweb/pg3.htmWireless: gcse_new/communication/wi-fi_bluetooth/miniweb/index.htm ContentLearning OutcomesTeaching and Learning ActivitiesResourcesNetworks (cont.)Students should be able to:Error detection and correction (3 hours)describe and evaluate methods of detecting and correcting data transmission errors: parity bits, checksums, echo checking and cyclic redundancy check (CRC).Whole class teaching: Demonstrate how parity works. Students must identify the weakness of parityStudents complete past paper questions on error detectionParity: puter_logical_organization/error_codes.htmA level ICT Past paper:June 2014 Question 1 January 2014 Question 1 January 2013 Question 5 June 2012 Question 2 January 2010 Question 3Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesNetworks (cont.)Students should be able to:Databases(15 hours)describe the main features of a relational database;Student activity: Students should be provided with various database scenarios and should be able to identify and describe examples of attribute, entity, primary key, composite key, foreign key, data duplication and data inconsistencyDatabase Design and Normalisation:.uk/e-learning/DDFun01CD/index.htmLessons/computerbasics/lesson1-2/lesson2-4database.htmA Level ICT Past paper:January 2010 Question 1January 2011 Question 6June 2011 Question 6June 2012 Question 1January 2013 Question 4June 2013 Question 6January 2014 Question 5June 2014 Question 2May 2015 Question 4describe the difference between a logical data model and a physical data model; Student activity: In small groups students could be given a scenario and should identify the entities and relationships required to produce the databasedefine the terms attribute, entity, primary key, composite key, foreign key, relationships, referential integrity, data duplication and data inconsistency; Working with others: Students will work in pairs and as individuals to normalise data requirements for a scenario to 3NFproduce an entity-relationship (ER) model from the given data requirements for a scenario; Working with others: Students will complete a normalisation worked example in Explain Everything which will be uploaded to the school VLE for other students to usedescribe the characteristics of data in un-normalised form, first normal form (1NF), second normal form (2NF) and third normal form (3NF);Student Activity: Students will create their own relational database for a given scenarioSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesNetworks (cont.)Students should be able to:Databases (cont.)describe the advantages and disadvantages of normalisation; normalise data requirements for a scenario to 3NF; Working with others: Students in pairs will create a data dictionary for a given scenario to help understand the termStudent Activity: Provide students with data and work through practical examples to understand the how to create and update a database using SQL termsStudents should then compare SQL with QBE and evaluate their experienceStudents in pairs will produce a spider diagram providing an overview of Databasesdescribe the components of a data dictionary; use Structured Query Language (SQL) to create tables and to retrieve, update, insert and delete data in a relational database; and Page 161 – 167 AQA Computing for A2 Nelson Thornesas_as_computing/ocr/H447/F453/3_3_9/sqlintro/home_sql.htmlsql/default.asp Query by Example (QBE) as an alternative to SQL. Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApplications of Digital Technology (40 hours)Students should be able to:Artificial Intelligence(5 hours)explain what is meant by artificial intelligence (AI); Videos: news/news_videos/home_ai.htmltechnology/artificialintelligenceai the significance of the Turing test in defining what is meant by AI; anddescribe the main features of neural network modelling.Expert Systems(8 hours)describe the structure of an expert system; Working with others: Students are given an answer to an exam question which contains mistakes. The students must identify the mistakes and suggest an alternative answeras_a2_ict_new/ocr/A2_G063/334_applications_ict/expert_systems/miniweb/index.htm the purpose of the knowledge base and inference engine in an expert system; Students in pairs will produce a spider diagram providing an overview of the components and advantages and disadvantages of Expert Systemsexplain the following terms in relation to expert systems: shell; heuristics; fuzzy logic; and knowledge engineer; andSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApplications of Digital Technology (cont.)Students should be able to:Expert Systems (cont.)evaluate the use of expert systems in medicine, car engine fault diagnosis and life insurance.Working with others: Students will research the use of an expert system in a given application and evaluate its use. They will present their findingsExpert systems in health care: PolarProbe developed by Polartechnics: Page 17 – 18 A level ICT PM Heathcoteselfhelpguide/bodymap/Car engine fault diagnosis: ICT: January 2012 Question 4Natural language and voice recognition (3 hours)describe the technology required for natural language and voice recognition systems; andStudent Activity:Students in pairs evaluate the use of voice recognition via the practical use of a voice recognition systemvoicerecognition.htmlVoice recognition systems:watch?v=ImlKOA1MhlIevaluate the use of natural language and voice recognition systems.Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApplications of Digital Technology (cont.)Students should be able to:Robotics(4 hours)describe the technology involved in the use of robotics; andPaired Activity: Students in pairs evaluate the use of robotics in a range of commercial situationsindustrial.htmnews/429248/this-robot-could-transform-manufacturing/united_kingdom/en/products/industrial_robots/articles/i/industrial_robot.htmVideos relating to robots:teaching-resource/an-introduction-to-robotics-6169990news/news_videos/home_robots.htmlevaluate the use of robotics in a range of commercial situations.Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApplications of Digital Technology (cont.)Students should be able to:Mobile technologies (6 hours)describe how technology supports mobile phone communication: mobile phone masts, cells, handoffs, base station controller, mobile switching centre and public switched telephone network (PSTN) telephone system.Students summarise how technology is used to support mobile phone communication. This summary must incorporate the key terms identified in the specification.uk/static/archive/ra/topics/mpsafety/school-audit/mobilework.htmconsumer-tips/how-wireless-works/watch?v=JepEtbbOyOUA2 ICT Past Papers:January 2010 Question 3Data Mining(4 hours)explain what is meant by data mining; and how digital technology can be used in data mining to gather, store, process and analyse large volumes of data.text/dmwhite/dmwhite.htmSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApplications of Digital Technology (cont.)Students should be able to:Cloud computing (10 hours)explain what is meant by cloud computing;technology_explained/cloud_computing/cloud_computing.htmlexplain the terms virtualisation, hosted instances, hosted solutions and clustering; describe how cloud computing provides services such as data storage, email, virtualised software, backup and remotely hosted applications; andBenefit of Cloud computing:bbc.co.uk/news/business-12068756evaluate the use of cloud computing in terms of business benefits and security issues.Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesIndividual (moral), social (ethical) and legal considerations (10 hours)Students should be able to:Legislation (5 hours)describe the main features of the following legislation: the Data Protection Act, the Copyright, Designs and Patents Act and the Computer Misuse Act; andStudent Activity: Students will complete a paper based/computer based activity whereby they match key features from legislation to the appropriate legislationData Protection Act: - video relating to improper use of personal dataunderstand and apply how each piece of legislation may impact on organisations, their employees and members of the public.Working with others: Students will discuss the implications of legislation for an organisation, its employees and members of the publicStudents will complete a spider diagram as part of revisionMoral and ethical considerations (5 hours)explain the ethical considerations around: automated decision making; online censorship; monitoring of personal behaviour; artificial intelligence; and the capture, storage and analysis of personal information. Working with others: provide students with journalistic articles relating to the ethical considerations stated. Students will describe the ethical considerations for each scenarioUnit A2 2:Application DevelopmentSpecification: GCE Digital TechnologyUnit A2 2: Application Development Prior Learning: There is no specific requirement for prior learning although, it is envisaged that many candidates will have already gained skills, in problem solving using software packages or programming through their successful completion of a related GCSE course. In this module students will be expected to use knowledge and understanding of Digital Technology in the AS course and the theory module of A2.Background reading: All definitions of Digital Technology terminology should be taken from the British Computer Society, “BCS Glossary of Computing and ICT, 13th Ed.” Swindon, BCS.Assessment: Internally assessed and externally moderated. Students compile a portfolio of evidence for Analysis, Design, Development, Testing and Evaluation. It is worth 20% of the A Level grade.Specification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApplication DevelopmentAnalysis15 HoursStudents should be given the opportunity to become involved in a real-world situation. They should be able to apply their skills, knowledge and understanding of digital technology to solve a problem as specified in the case studyStudents need to be able to document a comprehensive and coherent analysis for the case study givenFactfiles will be available in the course with respect to each of the learning outcomesCCEA will provide a new case study each year. This will be published on the CCEA websiteAt Agreement Trials sample materials will be available to assist Centres in delivering solutions to a variety of approaches to aspects of the given case studyThe Marking Scheme is on Pages 34–40 of the specificationSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApplication Development (cont.)Students should be able to:Analysis (cont.)Resources used for AS 1, AS 2 and A2 1Exemplar materials from the Legacy A2 Coursework Whilst the assessment criteria have changed, the standard required is still the same and the approaches to problem solving are similarproduce a Gantt chart to schedule the project;Students should be able to produce a Gantt chart showing clearly the planning stages and time requirements for each component of their solutionidentify internal and external constraints that may impact on the solution; Students should be able to describe and justify both internal and external constraints on the solutiondetail the user requirements in terms of Inputs, Processes and Outputs;Students need to fully explain user requirements in terms of the inputs needed with consideration given to data sources and the relevant processes and the outputs expectedSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApplication Development (cont.)Students should be able to:Analysis (cont.)prioritise and justify user requirements into essential and non-essential;Students should be able to identify which user requirements are essential and non-essential to allow planning for a solution designuse analysis tools such as DFDs (level 0 and level 1) to illustrate the flow of data through the information system and the processes required; andStudents need to draw DFD’s to show what kind of information will be input to and output from the system, where the data will come from and go to, and where the data will be stored. Students need to be able to draw a Context Diagram from the information in the case study that shows a single process that represents the entire system including the major information flows between the external entities and the system and then be able to produce a level 1 diagram that decomposes the single process into a number of sub-processes to identify further data flows and data stores specify the hardware and software requirements to produce the new system.Students should be able to state and justify the purpose and list the hardware required for the design of their solution along with a list of the relevant system and application software required for the design of the solutionSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApplication Development (cont.)Students should be able to:Design20 Hoursproduce an overall design for the system;Students should use the skills they have developed to design a solution giving consideration to either an off-the-shelf package or a programming solution when considering a system specificationproduce a description for each process, and algorithms where appropriate, based on user requirements;Students should be able to produce an overall storyboard or produce a type of structured diagram which outlines the design of the solutionproduce a detailed design of each user interface, including appropriate validation;Students should be able to demonstrate their skills in producing algorithms and/or in describing required processesuse data modelling techniques to produce an Entity Relationship (ER) diagram for a fully relational database;Students should give full consideration to designing appropriate data structures, data validation techniques and the components required for the user interfaceshow in detail how the database solution is normalised to 3NF;Students should produce a fully labelled ER diagram(s) to illustrate the entities to use in their solution including the degree of relationships between entitiesSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApplication Development (cont.)Students should be able to:Design (cont.)design the required queries and reports; andStudents should demonstrate their skills in database normalisation to 3NF clearly indicating first, second and third normal forms using appropriate notation for entities and attributesdevelop a comprehensive test plan.Students should be able to design structured queries that reference both single and multiple tables producing highly formatted reports to show outputs requiredStudents should include a comprehensive and well-structured test plan for the design of their solution, including a wide range of test data and expected results from the testingSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApplication Development (cont.)Students should be able to:Application Development20 hoursselect and use appropriate software to develop and implement the solution;Students should use an appropriate software solution, either an ‘off-the-shelf’ package or a programming approach to produce an effective solution to the specified problemtest the software solution; andAs part of the solution students should present high quality evidence of effectively implementing the test plan. Students should also involve third party users at this stage. Students should also document the results of testing including outputs cross-referenced to the user requirementsdocument a strategy for system implementation.Students need to describe and detail a relevant strategy for implementation including reference to installation, a suitable changeover method, file conversion and staff trainingSpecification ContentLearning OutcomesTeaching and Learning ActivitiesResourcesApplication Development (cont.)Students should be able to:Documentation and Evaluation15 Hoursevaluate the solution against the user requirements;Students should describe in a detailed way the effectiveness of the solution produced against the user requirements described in the Analysis sectionidentify possible extensions to the system; andAs part of the evaluation of the solution students should describe both the benefits and limitations of the solution stating possible extensions and developments that could take place in the futuredevelop an electronic guide, accessible from the user interface, which explains how to use the application.Students should produce user documentation with reference to a brief statement of what the package does, hardware and software configuration, user guide, a detailed troubleshooting guide and a frequently asked questions sectionStudents should use software skills to create an electronic link on the User Interface to a PDF version of user documentation ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download