All of these students were nominated for their outstanding efforts in Business, ICT or Computing lessons. Two students were randomly selected and they have won HMV gift vouchers. The winners were Alix Longmuir and Jack Dimmock.
The document discusses online marketing and advertising. It outlines three learning outcomes: explaining how a school uses electronic advertising, identifying benefits and limitations of online marketing inside and outside of school, and exploring the impact of online marketing for a real company. It then provides tasks and activities for students to research different ways a school uses online advertising, organize forms of advertising in a "diamond" structure, and explain details of three advertising methods.
The document discusses virtual machines and operating systems. It defines a virtual machine as a software implementation of a machine that executes programs like a physical machine. It explains that a virtual machine hides the underlying hardware complexities from the user and applications. It then outlines the different layers of an operating system, including the hardware, kernel, device drivers, and user interface. It also describes how an operating system manages key computer resources like processors, storage, I/O devices, and data through programs for processor scheduling, memory management, I/O management, and file management. Finally, it explains that an application programming interface allows the same programs to run across different computer systems.
The document provides instructions for a lesson on database normalization. It will teach about 1st, 2nd, and 3rd normal forms, with the goals of organizing data efficiently, eliminating redundant data, and ensuring only related data is stored together. Learners will understand the rules of each normal form and practice converting databases between the forms.
Images are represented as a grid of pixels, with each pixel storing a binary color value. Higher resolution images have more pixels, resulting in larger file sizes. Metadata is additional data stored with images that provides information about the image such as size, camera settings, and date. Color depth also impacts file size, as more bits per pixel allow more possible colors but increase the binary information that needs to be stored.
The document provides instructions for students to complete a spreadsheet activity where they will list 10 technology items for a smart home, include the cost of each item, state how many of each item they want, and use formulas to calculate the total cost of each item and the overall amount of money needed. The learning outcomes are for students to understand how to structure a spreadsheet effectively, use basic formulas for calculations, and some students to add functions.
The document discusses using spreadsheets to perform calculations and modeling. It provides instructions on tasks for students to complete a spreadsheet to calculate advertising costs using formulas, then produce a report showing how changing variables affects total costs. Students are expected to review their own work using comments in the spreadsheet to self-evaluate their learning.
The document provides instructions for students to create a spreadsheet model that tracks the costs of various advertising methods. It outlines the learning outcomes which are for students to create a formatted spreadsheet that models advertising costs and includes cell formatting. It then explains the importance of using proper data types in cells and provides examples. Students are instructed to create a spreadsheet tracking the costs to print and distribute 5 different advertising items.
Volcanoes form where molten rock erupts through the Earth's surface. Magma is liquid rock inside a volcano, while lava is the molten rock that flows out during an eruption at temperatures between 700-1200°C. The Earth has three main layers - the crust, mantle, and core. There are approximately 1,510 active volcanoes worldwide, with around 80 located under oceans.
The document discusses online marketing and advertising. It outlines three learning outcomes: explaining how a school uses electronic advertising, identifying benefits and limitations of online marketing inside and outside of school, and exploring the impact of online marketing for a real company. It then provides tasks and activities for students to research different ways a school uses online advertising, organize forms of advertising in a "diamond" structure, and explain details of three advertising methods.
The document discusses virtual machines and operating systems. It defines a virtual machine as a software implementation of a machine that executes programs like a physical machine. It explains that a virtual machine hides the underlying hardware complexities from the user and applications. It then outlines the different layers of an operating system, including the hardware, kernel, device drivers, and user interface. It also describes how an operating system manages key computer resources like processors, storage, I/O devices, and data through programs for processor scheduling, memory management, I/O management, and file management. Finally, it explains that an application programming interface allows the same programs to run across different computer systems.
The document provides instructions for a lesson on database normalization. It will teach about 1st, 2nd, and 3rd normal forms, with the goals of organizing data efficiently, eliminating redundant data, and ensuring only related data is stored together. Learners will understand the rules of each normal form and practice converting databases between the forms.
Images are represented as a grid of pixels, with each pixel storing a binary color value. Higher resolution images have more pixels, resulting in larger file sizes. Metadata is additional data stored with images that provides information about the image such as size, camera settings, and date. Color depth also impacts file size, as more bits per pixel allow more possible colors but increase the binary information that needs to be stored.
The document provides instructions for students to complete a spreadsheet activity where they will list 10 technology items for a smart home, include the cost of each item, state how many of each item they want, and use formulas to calculate the total cost of each item and the overall amount of money needed. The learning outcomes are for students to understand how to structure a spreadsheet effectively, use basic formulas for calculations, and some students to add functions.
The document discusses using spreadsheets to perform calculations and modeling. It provides instructions on tasks for students to complete a spreadsheet to calculate advertising costs using formulas, then produce a report showing how changing variables affects total costs. Students are expected to review their own work using comments in the spreadsheet to self-evaluate their learning.
The document provides instructions for students to create a spreadsheet model that tracks the costs of various advertising methods. It outlines the learning outcomes which are for students to create a formatted spreadsheet that models advertising costs and includes cell formatting. It then explains the importance of using proper data types in cells and provides examples. Students are instructed to create a spreadsheet tracking the costs to print and distribute 5 different advertising items.
Volcanoes form where molten rock erupts through the Earth's surface. Magma is liquid rock inside a volcano, while lava is the molten rock that flows out during an eruption at temperatures between 700-1200°C. The Earth has three main layers - the crust, mantle, and core. There are approximately 1,510 active volcanoes worldwide, with around 80 located under oceans.
Earthquakes can occur in many places like India where tectonic plates push against each other. Volcanoes form when magma from beneath the Earth's crust erupts through the surface. They happen as magma builds up under the crust due to movement of tectonic plates pushing magma upwards until it erupts.
The document is about the Great Fire of London in 1666. It asks questions to be answered about the fire's start in a bakery on Pudding Lane, Samuel Pepys writing about it in his diary where he buried his wine and parmesan cheese to save them, and how the fire spread quickly due to wooden buildings and drought conditions before finally stopping after burning for nearly 5 days when the wind direction changed.
The document discusses two viral advertisements that students will analyze. It states that the goal of the lesson is for students to identify the purpose of viral ads, describe good and bad features of two ads, and explain how the ads meet their purposes. Students are instructed to complete a worksheet evaluating the first ad and an evaluation form for the second ad. The document concludes by asking students to describe good viral ads using five adjectives.
This document provides a reading lesson and review for three sets of vocabulary words:
1) Lesson 1 words include hope, warm, broken, songs, hundred, children, there, their. Sample sentences to practice these words are provided.
2) Lesson 2 words include across, sure, man's, similar, train, traveled, finally, remember. Again, sample practice sentences are given.
3) Lesson 3 words are board, bears, mountains, course, engine, listened, pictured, opposite, thought, through. More practice sentences for these words conclude the document. Quizzes and a review of all the words are also included to help reinforce spelling and meaning.
Inter-networking allows computers on different networks to communicate via gateways. Routers and bridges connect different network segments and allow communication between computers on different segments. Routers use destination IP addresses to pass data packets between networks, while bridges maintain a table of addresses to reduce traffic by only forwarding packets with valid destinations. A subnet mask is used to determine if an IP address is local or remote, and routable addresses can be reached by anyone on the internet while non-routable addresses are reserved for internal networks.
The document discusses creating a floor plan for a smart home, with different levels of requirements for higher grades including describing the reasons for choosing each piece of technology. It provides instructions for students to create their floor plan using software, adding annotations and images, and to review their work against the learning outcomes to determine what grade they deserve. The document encourages creative thinking about smart home design.
The document discusses Rotary International's "Roll Out the Barrel" project which ships water barrels to communities in Africa and other regions to provide access to clean water. It lists the number of barrels shipped to various countries, with the largest numbers going to Sierra Leone, Uganda, and Zambia. The barrels help save lives by preventing deformities in children and allowing more time for school, while also helping families, communities, and older people obtain fresher water. Each barrel costs £30 as part of efforts to solve water challenges and help those in need.
This document provides instructions for students to practice using search engines effectively. It includes the following:
1. Suggests searching common phrases like "Zerg Rush" and "Barrel roll" on Google to familiarize students with searching.
2. Outlines learning outcomes for a lesson on using the internet to select appropriate information and understanding how search criteria can refine results.
3. Discusses different search criteria and how keywords, phrase matching, and excluding words can help narrow results.
4. Assigns students tasks to complete a search engine worksheet, search different engines for smart home devices, and reflect on the most effective search techniques.
The document provides instructions for a lesson where students will add soundtracks to video ads. It outlines that students will find sounds online, save them, and add/edit the sounds in their videos. The learning outcomes are that all students will use sound, most will edit sound properties, and some will combine multiple sounds. Students will then self-evaluate how their chosen sound enhances their ad.
Earthquakes occur when tectonic plates shift beneath the Earth's surface, causing the ground to shake and sometimes displace. Large offshore earthquakes can displace the seabed enough to create tsunamis. Earthquakes may also trigger landslides or volcanic eruptions in rare cases. Volcanic eruptions happen when gas and magma build up underground, releasing lava, rocks, and ash during more explosive eruptions. Eruptions with less gas and thicker magma tend to be less dramatic and result in lava flows from the vent.
This document provides guidance for students on evaluating video projects. It includes:
1) A list of evaluation keywords for students to use like "assess", "evaluate", and "interpret".
2) Learning outcomes for the lesson around adding elements to videos and providing constructive peer feedback.
3) Examples of stronger and weaker feedback and how to improve feedback.
4) Instructions for students to peer review videos using evaluation keywords and suggestions.
5) A checklist for finishing their own video based on criteria.
6) A prompt for students to self-assess their learning progress.
This document outlines the learning outcomes and tasks for a lesson on graphical user interface (GUI) design. By the end of the lesson, all students will understand the basics of a GUI, most will be able to differentiate between good and bad GUIs, and some will analyze existing GUI examples and describe their positive and negative features. It provides guidelines for a good GUI, then instructs students to complete a GUI template, explaining why good design is important. Students are also asked to research and evaluate examples of good and bad GUIs based on specified criteria.
The document discusses computer networks and the key terms related to them. It defines a network as multiple computers linked together, and provides examples of networks in schools, homes, and workplaces. It distinguishes between a local area network (LAN), which connects devices within a single building, and a wide area network (WAN), which joins multiple computer networks together over a larger geographic area like the Internet. Students are assigned tasks to research these terms and network types, complete a networking worksheet, and quiz each other on what they learned.
In 1992, 1.5 million people in the UK had mobile phones, but by 2012 that number increased 50 times so that over 75 million UK residents now use mobile phones. The document shows how the number of mobile phone users in the UK has grown enormously over the past 20 years, from 1.5 million users in 1992 to over 75 million users in 2012.
By the end of the lesson, students will:
1) Learn the components of a basic graphical user interface.
2) Describe the differences between good and bad GUIs.
3) Some students will analyze existing GUIs and describe their positive and negative features.
The document provides learning outcomes and instructions for an assignment on designing and evaluating graphical user interfaces. Students are asked to complete a GUI template, explain their design choices, and provide peer feedback.
Rainforests are tropical forests that receive a large amount of rainfall each year. They are located in the tropics near the Equator where the climate is warm and stable. Rainforests are important because they stabilize the climate, provide habitat for many species of plants and animals, maintain the water cycle, protect against natural disasters, are a source of medicines and foods, support indigenous people, and are interesting places for visitors. Rainforests have exceptionally high biodiversity due to their favorable climate, supporting over half of the world's plant and animal species in only 2% of the Earth's land.
Rainforests are located in the tropics between the Tropic of Cancer and Capricorn, where the climate is warm and stable year-round. Rainforests are being destroyed at a rate of an area the size of New Jersey each year, primarily for agriculture. While rainforests cover only 2% of the Earth's surface, they contain over 50% of the world's plant and animal species due to the diversity of habitats they provide.
The document defines several words related to architecture, travel, and personality traits. It provides definitions for belfry, carillon, rucksack, conspicuous, portly, mercurial, leisure, unabashed, insufferable, and meticulous.
The document discusses operating systems and their types. It defines an operating system as software that manages computer hardware resources and provides a platform for running applications. It describes interactive, real-time, network, device, embedded, desktop, and server operating systems. The user is tasked with defining operating systems, explaining each type with examples, and comparing desktop, device, embedded, and server operating systems.
This document discusses the difference between input and output devices and provides learning outcomes for a lesson. It defines input as data entered into a computer and output as information presented by a computer. Input devices allow users to enter data, while output devices show what the computer has done. Students will understand the difference between input and output, identify different devices, and describe the purpose of devices. The document instructs students to complete tasks identifying common input/output devices and reflecting on their understanding.
Validation, verification, output and backuplistergc
Validation and verification techniques are used to check that data is plausible and correct. Validation checks if data follows rules, like date formats, while verification checks that the intended data was entered, like confirming passwords. There are several types of validation checks such as format, length, and range checks.
Different types of output include graphs, reports, presentations, sound, video, images and animations. Each has advantages and disadvantages depending on the target audience. Backing up copies data to ensure it is not lost if hardware fails, while archiving stores old data that is not needed daily in a secure location for future reference. The key difference is backed up data may be restored while archived data is preserved long-term.
Earthquakes can occur in many places like India where tectonic plates push against each other. Volcanoes form when magma from beneath the Earth's crust erupts through the surface. They happen as magma builds up under the crust due to movement of tectonic plates pushing magma upwards until it erupts.
The document is about the Great Fire of London in 1666. It asks questions to be answered about the fire's start in a bakery on Pudding Lane, Samuel Pepys writing about it in his diary where he buried his wine and parmesan cheese to save them, and how the fire spread quickly due to wooden buildings and drought conditions before finally stopping after burning for nearly 5 days when the wind direction changed.
The document discusses two viral advertisements that students will analyze. It states that the goal of the lesson is for students to identify the purpose of viral ads, describe good and bad features of two ads, and explain how the ads meet their purposes. Students are instructed to complete a worksheet evaluating the first ad and an evaluation form for the second ad. The document concludes by asking students to describe good viral ads using five adjectives.
This document provides a reading lesson and review for three sets of vocabulary words:
1) Lesson 1 words include hope, warm, broken, songs, hundred, children, there, their. Sample sentences to practice these words are provided.
2) Lesson 2 words include across, sure, man's, similar, train, traveled, finally, remember. Again, sample practice sentences are given.
3) Lesson 3 words are board, bears, mountains, course, engine, listened, pictured, opposite, thought, through. More practice sentences for these words conclude the document. Quizzes and a review of all the words are also included to help reinforce spelling and meaning.
Inter-networking allows computers on different networks to communicate via gateways. Routers and bridges connect different network segments and allow communication between computers on different segments. Routers use destination IP addresses to pass data packets between networks, while bridges maintain a table of addresses to reduce traffic by only forwarding packets with valid destinations. A subnet mask is used to determine if an IP address is local or remote, and routable addresses can be reached by anyone on the internet while non-routable addresses are reserved for internal networks.
The document discusses creating a floor plan for a smart home, with different levels of requirements for higher grades including describing the reasons for choosing each piece of technology. It provides instructions for students to create their floor plan using software, adding annotations and images, and to review their work against the learning outcomes to determine what grade they deserve. The document encourages creative thinking about smart home design.
The document discusses Rotary International's "Roll Out the Barrel" project which ships water barrels to communities in Africa and other regions to provide access to clean water. It lists the number of barrels shipped to various countries, with the largest numbers going to Sierra Leone, Uganda, and Zambia. The barrels help save lives by preventing deformities in children and allowing more time for school, while also helping families, communities, and older people obtain fresher water. Each barrel costs £30 as part of efforts to solve water challenges and help those in need.
This document provides instructions for students to practice using search engines effectively. It includes the following:
1. Suggests searching common phrases like "Zerg Rush" and "Barrel roll" on Google to familiarize students with searching.
2. Outlines learning outcomes for a lesson on using the internet to select appropriate information and understanding how search criteria can refine results.
3. Discusses different search criteria and how keywords, phrase matching, and excluding words can help narrow results.
4. Assigns students tasks to complete a search engine worksheet, search different engines for smart home devices, and reflect on the most effective search techniques.
The document provides instructions for a lesson where students will add soundtracks to video ads. It outlines that students will find sounds online, save them, and add/edit the sounds in their videos. The learning outcomes are that all students will use sound, most will edit sound properties, and some will combine multiple sounds. Students will then self-evaluate how their chosen sound enhances their ad.
Earthquakes occur when tectonic plates shift beneath the Earth's surface, causing the ground to shake and sometimes displace. Large offshore earthquakes can displace the seabed enough to create tsunamis. Earthquakes may also trigger landslides or volcanic eruptions in rare cases. Volcanic eruptions happen when gas and magma build up underground, releasing lava, rocks, and ash during more explosive eruptions. Eruptions with less gas and thicker magma tend to be less dramatic and result in lava flows from the vent.
This document provides guidance for students on evaluating video projects. It includes:
1) A list of evaluation keywords for students to use like "assess", "evaluate", and "interpret".
2) Learning outcomes for the lesson around adding elements to videos and providing constructive peer feedback.
3) Examples of stronger and weaker feedback and how to improve feedback.
4) Instructions for students to peer review videos using evaluation keywords and suggestions.
5) A checklist for finishing their own video based on criteria.
6) A prompt for students to self-assess their learning progress.
This document outlines the learning outcomes and tasks for a lesson on graphical user interface (GUI) design. By the end of the lesson, all students will understand the basics of a GUI, most will be able to differentiate between good and bad GUIs, and some will analyze existing GUI examples and describe their positive and negative features. It provides guidelines for a good GUI, then instructs students to complete a GUI template, explaining why good design is important. Students are also asked to research and evaluate examples of good and bad GUIs based on specified criteria.
The document discusses computer networks and the key terms related to them. It defines a network as multiple computers linked together, and provides examples of networks in schools, homes, and workplaces. It distinguishes between a local area network (LAN), which connects devices within a single building, and a wide area network (WAN), which joins multiple computer networks together over a larger geographic area like the Internet. Students are assigned tasks to research these terms and network types, complete a networking worksheet, and quiz each other on what they learned.
In 1992, 1.5 million people in the UK had mobile phones, but by 2012 that number increased 50 times so that over 75 million UK residents now use mobile phones. The document shows how the number of mobile phone users in the UK has grown enormously over the past 20 years, from 1.5 million users in 1992 to over 75 million users in 2012.
By the end of the lesson, students will:
1) Learn the components of a basic graphical user interface.
2) Describe the differences between good and bad GUIs.
3) Some students will analyze existing GUIs and describe their positive and negative features.
The document provides learning outcomes and instructions for an assignment on designing and evaluating graphical user interfaces. Students are asked to complete a GUI template, explain their design choices, and provide peer feedback.
Rainforests are tropical forests that receive a large amount of rainfall each year. They are located in the tropics near the Equator where the climate is warm and stable. Rainforests are important because they stabilize the climate, provide habitat for many species of plants and animals, maintain the water cycle, protect against natural disasters, are a source of medicines and foods, support indigenous people, and are interesting places for visitors. Rainforests have exceptionally high biodiversity due to their favorable climate, supporting over half of the world's plant and animal species in only 2% of the Earth's land.
Rainforests are located in the tropics between the Tropic of Cancer and Capricorn, where the climate is warm and stable year-round. Rainforests are being destroyed at a rate of an area the size of New Jersey each year, primarily for agriculture. While rainforests cover only 2% of the Earth's surface, they contain over 50% of the world's plant and animal species due to the diversity of habitats they provide.
The document defines several words related to architecture, travel, and personality traits. It provides definitions for belfry, carillon, rucksack, conspicuous, portly, mercurial, leisure, unabashed, insufferable, and meticulous.
The document discusses operating systems and their types. It defines an operating system as software that manages computer hardware resources and provides a platform for running applications. It describes interactive, real-time, network, device, embedded, desktop, and server operating systems. The user is tasked with defining operating systems, explaining each type with examples, and comparing desktop, device, embedded, and server operating systems.
This document discusses the difference between input and output devices and provides learning outcomes for a lesson. It defines input as data entered into a computer and output as information presented by a computer. Input devices allow users to enter data, while output devices show what the computer has done. Students will understand the difference between input and output, identify different devices, and describe the purpose of devices. The document instructs students to complete tasks identifying common input/output devices and reflecting on their understanding.
Validation, verification, output and backuplistergc
Validation and verification techniques are used to check that data is plausible and correct. Validation checks if data follows rules, like date formats, while verification checks that the intended data was entered, like confirming passwords. There are several types of validation checks such as format, length, and range checks.
Different types of output include graphs, reports, presentations, sound, video, images and animations. Each has advantages and disadvantages depending on the target audience. Backing up copies data to ensure it is not lost if hardware fails, while archiving stores old data that is not needed daily in a secure location for future reference. The key difference is backed up data may be restored while archived data is preserved long-term.
The document discusses various topics relating to internet security. It defines firewalls as devices that monitor and control data traffic between the internet and private networks, describing packet filtering and proxy servers. Encryption and public/private key encryption are explained. Digital signatures and certificates are defined, outlining how they are obtained and used to authenticate senders. Computer viruses, worms, spam, phishing, and pharming are defined as well as how to address related vulnerabilities. Authentication, authorization, and accounting are summarized as key computer security procedures.
This document discusses networking basics and compares standalone computers to networked computers. It introduces the three main types of network topologies: bus, ring, and star. The task is to create a four slide presentation with advantages, disadvantages, hardware requirements, and diagrams for each network type, and a summary slide. Key terms are also defined, including hardware components, network segmentation, peer-to-peer vs. server-based networking, and differences between networked and standalone computers.
The document outlines a 30 minute lesson on networking basics that will include:
1) Explaining the advantages of networks over stand-alone computers.
2) Describing the hardware needed to create a network.
3) Comparing and contrasting different types of networks and suggesting suitable ones for different groups.
The students will then create a presentation covering the advantages, disadvantages, hardware requirements, and diagrams for three main types of networks.
This document defines and compares serial and parallel transmission methods. It describes where each method is used and how distance affects data transmission. Key terms like baud, bit rate, bandwidth, and latency are defined. Baud refers to the rate of signal changes, while bit rate is the number of bits sent per second. Bandwidth measures transmission speed and is related to bit rate. Latency refers to the delay between sending and receiving a message.
The document discusses operating systems, including their purpose and types. The main purposes of an operating system are to manage memory, files, processor time, input/output, interrupts, errors, and the human/computer interface. The types of operating systems discussed are batch, real-time, single-user, multi-user, multi-tasking, and distributed systems. The document provides learning outcomes and success criteria for understanding operating systems.
This document discusses creating a floor plan for a smart home. It provides learning outcomes, scenarios, success criteria, and instructions for students. The key points are:
- Students will design and annotate a floor plan for a bedroom or living room including at least 5 smart devices.
- The floor plan should be accurate, include detailed labels, and be neat and tidy.
- Serif Draw software will be used to create the floor plan. Adding comments explaining device placements provides an extra challenge.
- Students will review their work using Jogle, writing 2 positive comments and 1 area for improvement comment.
This document introduces peripherals and describes their main categories: input devices, output devices, and storage devices. It discusses having students identify and research various input devices in small groups to learn their purposes, appearances, connection methods, and functions. The key learning points are to describe common peripherals' features, advantages, disadvantages, and uses, and to justify the appropriate peripheral for a given application.
This document introduces peripherals and describes them as input, output, or storage devices that connect to a computer system. It discusses having students identify and research various input devices, then populate a table with information about features, advantages, disadvantages, and uses of different peripherals. The learning objectives are to describe common peripherals and justify appropriate hardware for given applications.
Primary memory like RAM can be read and written to and is used to store operating systems and active programs and files. ROM is read-only and stores boot programs. Secondary storage like hard disks and USB drives stores inactive programs and files long-term as it is non-volatile. Buffers temporarily store data during transfers between devices like printers and memory that operate at different speeds, allowing the processor to do other tasks, while interrupts signal the processor to refill buffers.
The document provides instructions for students to create a video advertisement for a company called JogsTech using the software Serif MoviePlus. It outlines learning objectives which include importing images, using images, video, and text, and applying effects and transitions. It also lists attributes of a professional video and the tasks and success criteria for the student video project, which is to include a logo, images, text, transitions, and effects. Students will then review and grade their own work.
The document outlines a lesson where students will create logos for a fictional company called JogsTech to advertise a new piece of technology. The learning outcomes are that all students will create a basic logo, most will combine images and text effectively, and some will use advanced software features to create a professional logo. Students are provided criteria for professional logos and instructed to design a 5x5 inch logo with a white background, at least one shape or image, the text "JogsTech", and professional colors. Upon completion, students should export their logo and fill out an evaluation form.
Systems software and applications packageslistergc
This document describes systems software and applications packages. It defines systems software as programs that control hardware operation including the operating system, utility programs, programming tools, and library programs. It provides examples of utility programs. It explains programming tools and library programs. It defines applications packages as programs consciously used by users to perform tasks. It provides examples of general purpose, specialist, and bespoke application software. Finally, it provides instructions for an assigned task to design a set of playing cards with computer system information.
A computer system consists of hardware and software components that work together to take inputs, process them, and produce outputs. The hardware components include input devices to enter data, storage devices to store data and software long-term, and output devices to present the processed data to users. Examples of input devices are keyboards, mice, and microphones. Storage devices include hard drives, DVDs, CDs, and flash drives, which represent data using magnetic domains, lasers, or electric charge. Output devices such as monitors, printers, and speakers are used to display or present the output of the computer's processing to users.
A relational database contains multiple tables that are linked together through key fields. For example, a library database could have tables for customers, books, and book lendings that are connected using unique IDs. This avoids data duplication and allows easy access to and reporting on customer and book information.
Key database terms include: attributes, which are the field names and data types in tables; primary keys, which uniquely identify rows; composite keys, which identify rows using multiple fields; foreign keys, which link tables and are primary keys in other tables; and referential integrity, which ensures consistent updates across related tables.
By the end of the lesson, learners will understand the concepts of 1st, 2nd, and 3rd normal form and practice designing databases according to those forms. Specifically, all will understand the different normal forms, most will design databases in each form, and some will convert databases between the normal forms. The document then provides examples and tasks for learners to practice normalizing databases.
The document provides instructions for students to plan and create a viral advertisement video. It outlines the learning outcomes which are for students to create a plan for their viral ad, find and download assets, and consider sound and animations. Students will choose between advertising flexible mobile phones, movement sensing TVs, or gaming goggles. They are directed to complete a planning document and self-evaluate their work.
The document provides instructions for students to create a spreadsheet model that tracks advertising costs. It outlines the learning outcomes which are for students to create a formatted spreadsheet that models advertising costs with different data types. It then explains cell formats and provides an example task for students to create a spreadsheet that tracks the cost of printing different types of advertisements.
1. All of these students were
nominated in term 1 for their
outstanding efforts in their Business,
ICT or Computing lessons.
Two students were randomly
selected and they have won an HMV
gift voucher.