Thursday 30 April 2015

Controlled Assessment - Design Solution (9 marks) - due in Tues 5th May

Lesson Objectives

 - understand the scenario AQA Code Puzzle
 - create a flowchart/pseudocode


Starter

Review your homework (The Problem, User Needs, Overview Plan) with a partner, using the mark scheme, and make any necessary changes.


See the FULL MARK SCHEME HERE

PLEASE print your completed Design Solution and hand in to Mrs Palmer (Rm 901) by Tues 5th May

Main

In your Design Solution you can either create a FLOWCHART OR PSEUDOCODE.

Look at the AQA Pseudocode document HERE.


Red Task
Firstly, under your Overview Plan, make add an INPUTS, PROCESSES, OUTPUTS table in your Word Document and list ALL the inputs, processes and outputs you can think of for this program.



Amber Task
Create your flowchart, using draw.io OR write your pseudocode for the AQA Code Puzzle





Green Task
Write a short paragraph under the sub-heading Predicting Future Needs, making suggestions about how the program could be improved/developed in the future.


Plenary

With your Python Buddy review your work again using the Mark Scheme above.


Homework

Complete your Design Solution ready to hand in on Tues 5th May (hard copy)

Monday 27 April 2015

Controlled Assessment Structure - Simple

Create a NEW WORD DOCUMENT

Save it in your CONTROLLED ASSESSMENT FOLDER  as:


SURNAME_FIRSTNAME_58243_CAND NO_WorkName



Header  containing Your Name, Work Title and Wildern School
Footer containing Filepath and Page Numbers



Use Arial Font for all writing 

Fully Justify your text also 



and use 


Consolas Regular Font for all code in size 12



All work to be printed and submitted to Mrs Palmer in Rm 901



Computer Science CA Layout  - Simple


Design of Solution (9 marks) - due in Tues 5th May

   The problem

   User Needs / Success Criteria

   Overview Plan

   Psuedo Code / Flowchart


Solution Development (Python Program)  (9 marks) - due in Tues 19th May

   Comparison of Solution Against User Needs/ Success Criteria

   Solution screenshots with text explaining  which Task it addresses
      (ensure code is #commented fully to achieve higher marks)


Programming Techniques  (36 marks) - due in Mon 1st June

   Check Mr Knight's blog for the list of headings


Testing & Evaluation  (9 marks)- due in Mon 1st June

  Test Table to test the success criteria

  Show at least one re-test

  How well does it meet user need?

  What else could you have done to improve the program?

  Could you have worked harder on this task?

Grade Boundaries

Thursday 23 April 2015

Cryptology

Lesson Objectives

 - understand the term Cryptology
 - use different encryption methods to solve coded messages

Starter

Cryptology Sheet - HERE


Research Questions
1. What is Cryptology?
2. What is a Cipher?
3. Find examples of different ciphers and explain how they're used?


Main





Red Task
Substitution Cipher is one in which letters are represented by other letters, such as the Caesar Cipher.




In pairs, make your own Cipher Wheel and create 3 short coded messages, changing the Shift Value each time. Ask another pair to try and crack your coded messages.



Amber Task
Other Types on Encryption

Make notes and draw the diagram below in your book to explain the following:
a. Plain Text
b. Encryption
c. Cipher Text
d. Decryption



Let's see if you can decrypt some 'simple' ciphertext - HERE



Green Task
Use the website The Black Chamber to explore Substitution Ciphers further and find out more about Frequency Analysis.

In your book answer the following question:
What is Frequency Analysis and how does it help with code breaking?




Extension

Rail Fence Encryption is another type of encryption.

Have a go at completing the following:


Plenary

Add a new post to your Blog entitled Cryptology 


Useful Websites

Cryptology

Lesson Objectives

 - understand the term Cryptology
 - use different encryption methods to solve coded messages

Starter

Cryptology Sheet - HERE


Research Questions
1. What is Cryptology?
2. What is a Cipher?
3. Find examples of different ciphers and explain how they're used?


Main





Red Task
1.Make notes and draw the diagram below in your book to explain the following:
a. Plain Text
b. Encryption
c. Cipher Text
d. Decryption



2. Let's see if you can decrypt some 'simple' ciphertext - HERE


Amber Task
A Substitution Cipher is one in which letters are represented by other letters, such as the Caesar Cipher.




In pairs, make your own Cipher Wheel and create 3 short coded messages, changing the Shift Value each time. Ask another pair to try and crack your coded messages.




Green Task
Use the website The Black Chamber to explore Substitution Ciphers further and find out more about Frequency Analysis.

In your book answer the following question:
What is Frequency Analysis and how does it help with code breaking?




Extension

Rail Fence Encryption is another type of encryption.

Have a go at completing the following:


Plenary

Add a new post to your Blog entitled Cryptology 


Useful Websites
Practical Cryptography
Top 10 Unbreakable Ciphers
Virtual Cipher Wheel
Cryptology Games