Skip to content
Browse by Grade: Year 10

United Kingdom · National Curriculum Attainment Targets

Year 10 Computing

This course explores the architecture of digital systems and the logic behind modern software. Students develop robust programming skills while investigating the ethical and security implications of a hyper-connected world.

6 units·59 topics·Ages 14-15

01Architecting the Machine

12 topics·Autumn Term

An investigation into the internal hardware components and the Von Neumann architecture that governs modern computing.

CPU: Fetch-Execute Cycle & Registers

Examining the Fetch-Execute cycle and how registers manage data flow within the processor.

Simulation GameRole Play
CPU Components: ALU, CU, Registers

Investigating the Arithmetic Logic Unit (ALU), Control Unit (CU), and registers, and their interaction.

JigsawConcept Mapping
Memory Hierarchy: Volatile & Non-Volatile

Distinguishing between volatile and non-volatile memory and the necessity of secondary storage.

Stations RotationDecision Matrix
Secondary Storage: HDD, SSD, Optical

Exploring the different types of secondary storage (HDD, SSD, optical, magnetic tape) and their applications.

Case Study AnalysisFour Corners
Input Devices: Keyboards, Mice, Sensors

Identifying various input devices and their roles in human-computer interaction, including specialized sensors.

Gallery WalkThink-Pair-Share
Output Devices: Screens, Printers, Actuators

Exploring various output devices, including screens, printers, and actuators in embedded systems.

Gallery WalkThink-Pair-Share
Embedded Systems: Design & Applications

Exploring the specialized computers found within larger mechanical or electrical systems.

Gallery WalkCase Study Analysis
Operating Systems: Resource Management

Understanding the role of the operating system in managing hardware, software, and user interaction.

Simulation GameExpert Panel
Operating Systems: User Interface & Security

Investigating different types of user interfaces and the OS's role in security and file management.

JigsawConcept Mapping
Utility Software: Antivirus & Defragmentation

Investigating the purpose of utility software such as antivirus, defragmentation, and compression tools.

Document MysteryDecision Matrix
Utility Software: Compression & Backup

Exploring data compression techniques and the importance of backup utilities.

Case Study AnalysisProblem-Based Learning
The Von Neumann Architecture

Detailed exploration of the stored program concept and the components of the Von Neumann model.

Chalk TalkConcept Mapping

02Logic and Algorithmic Thinking

12 topics·Spring Term

Developing the mental models required to decompose complex problems and design efficient step-by-step solutions.

Computational Thinking: Abstraction

Applying abstraction to simplify complex problems by focusing on essential details.

Problem-Based LearningConcept Mapping
Computational Thinking: Decomposition

Breaking down complex problems into smaller, more manageable sub-problems.

Collaborative Problem-SolvingJigsaw
Computational Thinking: Pattern Recognition

Identifying similarities and trends in data to develop generalized solutions.

Problem-Based LearningGallery Walk
Computational Thinking: Algorithms

Developing step-by-step instructions to solve problems, represented through flowcharts and pseudocode.

Think-Pair-ShareRAFT Writing
Linear and Binary Search

Comparing the efficiency of linear and binary search algorithms.

Case Study AnalysisSimulation Game
Bubble Sort and Insertion Sort

Understanding and implementing basic sorting algorithms.

Role PlayStations Rotation
Merge Sort and Quick Sort (Introduction)

Introducing more advanced, efficient sorting algorithms and their divide-and-conquer approach.

Case Study AnalysisFlipped Classroom
Boolean Logic: AND, OR, NOT Gates

Using AND, OR, and NOT gates to create logical circuits and truth tables.

Stations RotationCollaborative Problem-Solving
Boolean Logic: XOR, NAND, NOR Gates

Expanding on basic gates to include XOR, NAND, and NOR, and their applications.

Problem-Based LearningChalk Talk
Truth Tables and Logic Circuits

Converting between logic expressions, truth tables, and circuit diagrams.

Escape RoomProject-Based Learning
Introduction to Algorithms

Defining algorithms, their characteristics, and their importance in computing.

Think-Pair-ShareCarousel Brainstorm
Algorithm Efficiency: Time Complexity

Introducing the concept of time complexity (Big O notation) to evaluate algorithm efficiency.

Case Study AnalysisFlipped Classroom

03The Art of Programming

12 topics·Summer Term

Mastering procedural programming constructs to create functional, readable, and maintainable code.

Sequence: The Order of Execution

Understanding that instructions are executed in a specific order.

Think-Pair-ShareSimulation Game
Selection: Conditional Logic (If/Else)

Implementing 'if', 'else if', and 'else' statements to control program flow.

Escape RoomProblem-Based Learning
Selection: Case Statements

Using case statements (or switch statements) for multi-way branching.

Collaborative Problem-SolvingDecision Matrix
Iteration: Fixed Loops (For)

Using 'for' loops to repeat a block of code a predetermined number of times.

Stations RotationPeer Teaching
Iteration: Conditional Loops (While)

Using 'while' loops to repeat a block of code until a condition is met.

Collaborative Problem-SolvingCase Study Analysis
Variables and Constants

Working with variables and constants to store and manipulate information.

Peer TeachingThink-Pair-Share
Data Types: Integer, Real, String, Boolean

Understanding fundamental data types and their appropriate use in programming.

Stations RotationChalk Talk
Arrays and Lists

Managing collections of data using arrays (or lists in Python).

Project-Based LearningStations Rotation
2D Arrays (Tables)

Working with two-dimensional arrays to represent tabular data.

Problem-Based LearningCollaborative Problem-Solving
Subroutines and Functions

Modularizing code using subroutines (procedures) and functions.

JigsawFlipped Classroom
Parameters and Return Values

Passing data to subroutines and receiving results back.

Collaborative Problem-SolvingChalk Talk
Local and Global Variables

Understanding variable scope and its implications.

Case Study AnalysisDocument Mystery

04Data Representation

5 topics·Summer Term

Decoding how computers use binary to represent numbers, text, images, and sound.

Binary Numbers and Denary Conversion

Converting between binary and denary number systems.

Stations RotationChalk Talk
Hexadecimal Numbers and Utility

Converting between hexadecimal and binary/denary, understanding its utility in computing.

Stations RotationProblem-Based Learning
Binary Arithmetic: Addition

Performing addition with binary numbers.

Collaborative Problem-SolvingPeer Teaching
Binary Arithmetic: Subtraction

Performing subtraction with binary numbers, including two's complement.

Simulation GameChalk Talk
Binary Shifts: Logical and Arithmetic

Understanding logical and arithmetic binary shifts and their mathematical effect.

Simulation GameChalk Talk

05Connected Networks

12 topics·Summer Term

Understanding the protocols and hardware that allow computers to communicate across the globe.

LANs and WANs

Distinguishing between Local Area Networks and Wide Area Networks.

Concept MappingThink-Pair-Share
Network Topologies: Star and Mesh

Comparing Star and Mesh topologies and their advantages/disadvantages.

Collaborative Problem-SolvingDecision Matrix
Network Hardware: Routers, Switches, WAPs

Understanding the roles of routers, switches, and Wireless Access Points.

Simulation GameStations Rotation
Wired vs. Wireless Connections

Comparing Ethernet and Wi-Fi, including transmission speeds and security.

Four CornersFormal Debate
The Internet and World Wide Web

Distinguishing between the Internet as infrastructure and the Web as a service.

Flipped ClassroomConcept Mapping
TCP/IP Protocol Suite

Understanding the core protocols (TCP, IP) that govern internet communication.

Role PlaySimulation Game
Application Layer Protocols (HTTP, HTTPS, FTP)

Exploring common application layer protocols like HTTP, HTTPS, and FTP.

Case Study AnalysisExpert Panel
Application Layer Protocols (POP, IMAP, SMTP)

Understanding email protocols: POP, IMAP, and SMTP.

Case Study AnalysisFlipped Classroom
Packet Switching

Understanding how data is broken into packets and routed across networks.

Simulation GameChalk Talk
Network Security Threats: Malware

Identifying different types of malware (viruses, worms, ransomware) and their impact.

Case Study AnalysisDocument Mystery
Network Security Threats: Social Engineering

Understanding phishing, pharming, and other human-based attacks.

Role PlaySocratic Seminar
Network Security: Encryption

Exploring the principles of encryption and its role in securing data transmission.

Problem-Based LearningChalk Talk

06Impacts of Digital Technology

6 topics·Summer Term

Analyzing the legal, ethical, and environmental consequences of our reliance on computing.

Data Protection Act (DPA) and GDPR

Reviewing the Data Protection Act and the General Data Protection Regulation.

Formal DebateSocratic Seminar
Computer Misuse Act

Understanding the Computer Misuse Act and its relevance to cybercrime.

Mock TrialCase Study Analysis
Copyright, Designs and Patents Act

Exploring intellectual property rights in the digital age.

Philosophical ChairsExpert Panel
Environmental Impact of Computing

Investigating the carbon footprint of data centers and e-waste.

Fishbowl DiscussionCase Study Analysis
Algorithmic Bias and Fairness

Examining the ethics of algorithmic bias and its societal consequences.

Socratic SeminarFormal Debate
The Digital Divide

Analyzing the societal costs of unequal access to digital technology.

World CaféTown Hall Meeting