Autumn 1
Year 1
Week 1
Digital Literacy
To explain how passwords are used to protect information, accounts and devices.
You have 2 mins to discuss what a password is with your talking partner.

When might a password be really important?
Are there things you do online that you don’t need a password for?

Can you guess which password is a ‘good’ or ‘bad’ password?
Week 2
Information Technology
Exploring the keyboard
LC : To use an iPad to write.
I can open a word processor.
I can recognise keys on a keyboard.
I can identify and find keys on a keyboard.
Key vocabulary
Word processor, keyboard, keys, letters, type
Week 3
Information Technology
Adding and removing text
LC : To add and remove text on an iPad.
I can enter text into an iPad.
I can use letter, number, and Space keys.
I can use Backspace to remove text.
Key vocabulary
Numbers, space, backspace, text cursor
Week 4
Information Technology
Adding and removing text
LC : To add and remove text on an iPad.
I can enter text into an iPad.
I can use letter, number, and Space keys.
I can use Backspace to remove text.
Key vocabulary
Numbers, space, backspace, text cursor
Week 5
Information Technology
Exploring the toolbar
To identify that the look of text can be changed on a computer
I can type capital letters
I can explain what the keys that I have already learnt about do
I can identify the toolbar and use bold, italic, and underline
Key vocabulary
Capital letters, toolbar, bold, italic, underline
Week 6
Information Technology
Making changes to writing
To make careful choices when changing text
I can select a word by double-clicking
I can select all of the text by clicking and dragging
I can change the font
Key vocabulary
Select and font
Week 7
Year 2
Week 1
Digital Literacy
Online Safety
Do you know how to stay safe online?
Vocabulary
Password
A series of letters, number and special characters entered after your username to access an online site.
Smart rules
A set of rules based around the word SMART designed to help you stay safe when online.
Never share your personal information!
Personal information is your name, where you live, your age, password and your school name.
Week 2
What is IT?
LC : To recognise the uses and features of information technology
I can identify examples of computers
I can describe some uses of computers
I can identify that a computer is a part of IT
Key vocabulary
Information technology (IT), computer
Week 3
Computer Science
IT in school
LC : To identify the uses of information technology in the school
I can identify examples of IT
I can sort school IT by what it’s used for
I can identify that some IT can be used in more than one way
Key vocabulary
Information technology (IT)
IT can be explained as being a computer or something that works with a computer.
Week 4
Computer Science
IT in the world
LC : To identify information technology beyond school
I can find examples of information technology
I can sort IT by where it is found
I can talk about uses of information technology
Key vocabulary
Information technology (IT), computer
Week 5
Computer Science
The benefits of IT
LC : To explain how information technology helps us
I can recognise common types of technology
I can demonstrate how IT devices work together
I can say why we use IT
Key vocabulary
Information technology (IT), computer, barcode, scanner/scan
Week 6
Week 7
Year 3
Week 1
Digital Literacy
Online Safety
LC : To describe simple strategies for creating and keeping passwords private.
Vocabulary
Protect - To defend or keep safe.
Digital Citizen - People who use technology to communicate with others online.
Password - A secret word only you know.


We are going to create a strong password on seesaw and learn a way of creating strong passwords.
Open seesaw.
Find the activity Strong Password Creator.

Week 2
Computer Science
What is a digital device?
LC : To explain how digital devices function.
I can explain that digital devices accept inputs
I can explain that digital devices produce outputs
I can follow a process
I can explain what makes a secure password
Key vocabulary
Digital device, input, process, output, secure, password, cyber attack
Week 3
Computer Science
What parts make up a digital device?
LC : To identify input and output devices.
I can classify input and output devices.
I can describe a simple process.
I can design a digital device.
Key vocabulary
Digital device, input, process, output
Week 4
Computer Science
What parts make up a digital device?
LC : To identify input and output devices.
I can classify input and output devices.
I can describe a simple process.
I can design a digital device.
Key vocabulary
Digital device, input, process, output
Week 5
Computer Science
How do digital devices help us?
LC : To recognise how digital devices can change the way that we work
I can explain how I use digital devices for different activities
I can recognise similarities between using digital devices and using non-digital tools
I can suggest differences between using digital devices and using non-digital tools
Key vocabulary
Program, digital, non-digital
Week 6
Week 7
Year 4
Week 1
Digital Footprints
LC: To understand how to create a positive digital footprint.
What is a digital footprint?
It is important to know that if you post something on the internet, it will stay there. On the Internet a digital footprint is the word used to describe the trail, traces or “footprints” that people leave online.
Your digital footprint
Every time you go online you leave a trail. If you take a look in the history section of your website browser and you can see the websites you have visited in the past.
We are living in an increasingly digital world. You might add data about yourself on a great number different websites or applications.
Your own digital footprint is the data that is left behind by you on all the digital services that you use.
Top tips for a positive digital footprint.
1. Do not share your password with anyone, and change it often – like a toothbrush.
2. Always remember to logoff when you have finished with an online service.
3. Use your own digital footprints to remember your favourite websites like the history button and your bookmarks.
4. Remember that most of the websites you visit will make a note of your visit and may also track the websites you visit before and after their website!
5. Let an adult know if anything you read or see makes you feel worried or upset.
6. Only use your first name. Do not give out any personal information.
7. Make sure you have permission to view and share information online. Make sure the information you share is positive.
Use the activity on seesaw to create a poster to help others to create a positive digital footprint.
Week 2
Computer Science
Connecting networks
LC : To describe how networks physically connect to other networks
I can describe the internet as a network of networks
I can demonstrate how information is shared across the internet
I can discuss why a network needs protecting
Key vocabulary
Internet, network, router, network security
Week 3
Computer Science
What is the internet made of?
LC : To recognise how networked devices make up the internet
I can describe networked devices and how they connect
I can explain that the internet is used to provide many services
I can recognise that the World Wide Web contains websites and web pages
Key vocabulary
Network switch, server, wireless access point (WAP), router
Week 4
Computer Science
What is the internet made of?
LC : To recognise how networked devices make up the internet.
I can describe networked devices and how they connect.
I can explain that the internet is used to provide many services.
I can recognise that the World Wide Web contains websites and web pages.
Key vocabulary
Network switch, server, wireless access point (WAP), router
Week 5
Computer Science
Sharing information
LC : To outline how websites can be shared via the World Wide Web (WWW)
I can explain the types of media that can be shared on the WWW
I can describe where websites are stored when uploaded to the WWW
I can describe how to access websites on the WWW
Key vocabulary
Website, web page, web address, router, routing, web browser
Week 6
Week 7
Year 5
Week 1
Digital Literacy
Online Safety
LC : To explain what a strong password is and demonstrate how to create one.
Vocabulary
Online safety
Refers to staying safe when having a presence online.
Password
A string of characters that allows access to a computer system or service.
Smart rules
A set of rules based around the word SMART designed to help you stay safe when online.

Can you spot a strong password?

Week 2
Computing systems and networks – Systems and searching
To explain that computers can be connected together to form systems
I can show that systems are built using a number of parts
I can describe the input, process, and output of a digital system
I can explain that computer systems communicate with other devices
Week 3
Computer systems and us
Computing systems and networks – Systems and searching
LC
- To recognise the role of computer systems in our lives
- I can identify tasks that are managed by computer systems
- I can identify the human elements of a computer system
- I can explain the benefits of a given computer system
- I can explain how to keep my personal information safe online.
Week 4
Searching the web
Computing systems and networks – Systems and searching
LC :
- I can make use of a web search to find specific information
- I can refine my web search
- I can compare results from different search engines
- I can explain why I should search trustworthy websites and not share any personal information online.
Week 5
Week 6
How search results are ranked
Computing systems and networks – Systems and searching
To explain how search results are ranked
●I can order a list by rank
●I can explain that a search engine follows rules to rank results
●I can give examples of criteria used by search engines to rank results
Week 7
Year 6
Week 1
Online Safety
Cyber Bullying
LC:
I can describe how to capture bullying content as evidence (e.g screen-grab, URL, profile) to share with others who can help me.
What Is Cyber Bullying?
Cyber bullying is the use of technology to harass, threaten, embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal information, pictures, or videos designed to hurt or embarrass someone else.




Week 2
Internet addresses
LC : To explain the importance of internet addresses
I can recognise that data is transferred using agreed methods
I can explain that internet devices have addresses
I can describe how computers use addresses to access websites
Key vocabulary
Communication, protocol, data, address, Internet Protocol (IP) address, Domain Name Server (DNS)
Week 3
Data packets
LC : To recognise how data is transferred across the internet
I can identify and explain the main parts of a data packet
I can explain that data is transferred over networks in packets
I can explain that all data transferred over the internet is in packets
Key vocabulary
Packet, header, data payload
Week 4
Working together
LC : To explain how sharing information online can help people to work together
I can recognise how to access shared files stored online
I can send information over the internet in different ways
I can explain that the internet allows different media to be shared
Key vocabulary
Chat, explore, slide deck
Week 5
Working together
LC : To explain how sharing information online can help people to work together
I can recognise how to access shared files stored online
I can send information over the internet in different ways
I can explain that the internet allows different media to be shared
Key vocabulary
Chat, explore, slide deck