Computer Science - Year 9

Computer Science Overview

Terms 1 & 2: Python programming 2

Building on the Python programming skills and knowledge from the previous year, this unit introduces learners to how data can be represented and processed in sequences, such as lists and strings. The lessons cover a spectrum of operations on sequences of data, that range from accessing an individual element to manipulating the entire sequence.

  1. 30 minute in class assessment
Decomposition

Breaking down a complex problem or system into smaller parts that are more manageable and easier to understand.

Pattern Recognition

Looking for similarities or differences to help solve a problem more efficiently.

Abstraction

Removing unnecessary detail to help simplify a problem.

Algorithm

A set of step-by-step instructions to solve a problem.

Program

A sequence of instructions to perform tasks with computer.

Syntax

The rules governing how to write statements in a programming language.

Syntax error

An error in a programming language caused by not using the correct syntax. These are normally spelling errors or small grammatical mistakes.

Logic error

A fault in the logic or structure of the problem.

Data type

The format in which a variable or constant holds data, such as ‘integer’ or ‘string’.

Execute

To run a computer program.

String

A sequence of characters often stored as a variable in a computer program. These characters can include numbers, letters and symbols.

Boolean

A data type in computing which only has two possible values, true or false.

Variable

A memory location within a computer program where values are stored.

List

A set of data values of the same type, stored in a sequence in a computer program. Also known as an array.

Data structure

The way that data is stored in a database or program. Any facility that hold more than one item of data is known as a data structure.

Element

An individual component of a list or array.

  • Spiritual
  • Moral
  • Social
  • Cultural
Develop the individual:

Create a supportive community:

Terms 2 & 3: Cybersecurity

This unit takes learners on a journey of discovery of techniques that cybercriminals use to steal data, disrupt systems, and infiltrate networks. The learners will start by considering the value their data holds and what organisations might use it for. They will then learn about social engineering and other common cybercrimes, and finally look at methods to protect against these attacks.

  1. In 30 minute class assessment
Anti-virus

Anti-virus software scans all forms of storage devices for viruses (programs harmful to computers) and, if found, attempts to remove them.

Blagging

The act of inventing a story or scenario to gain a targeted victim's interest. This may encourage them to give away confidential information, or even send money.

CAPTCHA

Completely automated public Turing test to tell computers and humans apart. This is a way of working out if a user is a human or robot by asking them to identify image features.

Data

Units of information. In computing there can be different data types, including integers, characters and Boolean. Data is often acted on by instructions.

DNS

Domain name system (or server) - an internet service that translates IP addresses into website domain names. All websites have equivalent IP addresses.

Hacker

A person who tries to gain unauthorised access to a computer.

Hacking

Gaining unauthorised access to a computer.

IP Address

A unique address for each computer device on a network.

Keylogger

A software program or hardware device that records all keystrokes on a computer keyboard.

Malicious code

Malicious code is software written to harm or cause issues with a computer.

Malware

Software that is designed to cause harm or damage to a computer. This includes viruses that might damage files, adware that causes pop-ups, and spyware that collects and shares login details.

Network

A group of interconnected computers/devices.

Patch

An update to a piece of software, usually to fix bugs or improve the software in some way.

Pharming

A cyberattack that redirects a user from a genuine website to a fake one.

Phishing

An attempt to gain personal information about someone by way of deception, eg sending an email pretending to be from their bank asking them for their bank details.

Ransomware

Malware which encrypts a user's files, then demands a ransom payment to decrypt them.

Server

A computer that holds data to be shared with other computers. Servers require server software.

Shouldering

The programs, applications and data in a computer system. Any parts of a computer system that aren't physical.

Spyware

A program secretly installed on a computer to automatically collect information about the user over a period of time.

Trojan

Malware that appears legitimate, but performs some malicious activity when it is run.

Virus

Any computer program designed to replicate and damage other computer systems and software.

  • Spiritual
  • Moral
  • Social
  • Cultural
Develop the individual:

Create a supportive community:

Terms 5 & 6: Representations: Going audio-visual

In this unit, learners will focus on making digital media such as images and sounds, and discover how media is stored as binary code.

  1. 30 minute in class assessment

Analogue

Continuous data which can have a range of values.

Binary

A number system that contains two symbols, 0 and 1. Also known as base 2.

Bit

The smallest unit of data in computing represented by a 1 in binary.

Colour depth

The amount of bits available for colours in an image.

Compression

A method of reducing file sizes, particularly in digital media such as photos, audio and video.

Data

Units of information. In computing there can be different data types, including integers, characters and Boolean. Data is often acted on by instructions.

Digital

Information stored as discrete values usually represented as numbers. This contrasts with analogue data which is represented by continuous data, usually in waves.

JPEG

Joint Photographic Experts Group - a digital image format which uses lossy compression.

Metadata

Data about data, eg photo image files have data about where the photo was taken and which camera took the picture.

MP3

A standard audio file format which uses lossy compression. Compatible with most media players. Designed by the Moving picture experts group - layer 3.

Pixel

Picture element - a single dot of colour in a digital bitmap image or on a computer screen.

Resolution

The fineness of detail that can be seen in an image - the higher the resolution of an image, the more detail it holds. In computing terms, resolution is measured in dots per inch (dpi).

Sample rate

How many samples of data are taken per second. This is normally measured in hertz, eg an audio file usually uses samples of 44.1 kHz (44,100 audio samples per second).

Upload

To add data to a server on the internet, eg you can upload videos to social media websites.

Zip

A file format that takes an existing file or files and compresses them into a single file of a smaller size.

  • Spiritual
  • Moral
  • Social
  • Cultural
Develop the individual:

Create a supportive community: