Home Teaching: Key Stage 3

Over the coming weeks you'll be able to access resources to support your learning covering priority Key Stage 3 computing topics.

Support is available

If you have any questions about the topic or any of the lesson resources you can access our live chat* for question & answers which is available daily, at the times specified below (except for bank holidays):

*under 16s must be accompanied by a parent or guardian and on a mobile device you will need to download the Vevox App here


Python Programming

The following resource links will take you to the Raspberry Pi projects website, all resources are freely available to download.

Lesson 1 - starting 27th April

Learn how to code about yourself...
By completing this activity, you will learn how to write a Python program telling people all about you using simple programming concepts.

Lesson 2 - starting 4th May

Learn how to code rock, paper, scissors...
By completing this activity, you will make a Rock, Paper, Scissors game and play against the computer.

Lesson 3 - starting 11th May

Learn how to create a turtle race game...
By completing this activity, you will use loops to draw a race track and create a racing turtle game.

Lesson 4 - starting 18th May

Learn how to use selection and repetition
By completing this activity, you’ll learn how to create 2 random teams from a list of players using selection and repetition.

Lesson 5 - starting 26th May

Learn how to use data structures - Part 1
By completing this activity, you will create a dictionary of colours which maps hard to remember colour codes into friendly names.

Lesson 6 - starting 1st June

Learn how to use data structures - Part 2
By completing this activity, you’ll learn how to make your own encryption program, to send and receive secret messages with a friend.


App Development

Learn how to design and create your own mobile app...

By completing this set of lessons you will research, design and write code for your own mobile phone application, before finally evaluating and publishing for the world to see.

Start by visiting the mobile app development homepage

Lesson 1 - starting 27th April

Lesson 1 of this project will explore the concept of decomposition and learners will start to design the Graphical User Interface (GUI) elements of their very first app ('Tappy Tap App').

Lesson 2 - starting 4th May

Lesson 2 of this project will look adding functionality to the 'Tappy tap app' using code.

Lesson 3 - starting 11th May

Lesson 3 of this project will look passing a variable into a label before picking your own project to start developing.

Lesson 4 - starting 18th May

Lesson 4 of this project will look how to handle user input and you will develop your app further.

Lesson 5 - starting 26th May

Lesson 5 of this project will develop your app further and look at gaining user feedback.

Lesson 6 - starting 1st June

Lesson 6 of this project will finalise and share your app as well as taking the end of unit assessment.


Cybersecurity

Learn about common methods of cyberattacks as well as ways in which you can keep your data safe ...

In this unit you will you go on a journey of discovery of techniques that cybercriminals use to steal data, disrupt systems, and infiltrate networks. You will start by considering the value your data holds and what organisations might use it for. You will then learn about social engineering and other common cybercrimes, and finally look at methods to protect against these attacks.

Start by visiting the Cybersecurity homepage

  • Live chat for question & answers is available each weekday, see times above.

  • To download any worksheet or resource, select "Save a copy" on the top right hand side of each document

Lesson 1 - starting 11th May

Learn about the value your data has to organisations and cybercriminals
This lesson you will explore what data companies collect from their users and how they use it. You will look at the privacy policies of some tech companies that they may already be giving data to and will be introduced to the law regarding data protection.

Lesson 2 - starting 18th May

Learn about how humans can be the weak point in a system

During this lesson you will look at the social engineering tactics deployed by cybercriminals to dupe users into giving away data that could lead to further crime.

Lesson 3 - starting 26th May

Learn about techniques used by hackers to exploit computer systems

During this lesson you will explore techniques used by hackers and understand brute force attacks, hacktivists, script kiddies and DDoS attacks.

Lesson 4 - starting 1st June

Learn about the different categories of malware

Learn about the impact different types of malware can have on IT systems. You will also explore how bots are used in conjunction with malware and will understand the hidden role of bots and what potential influence they could have on societal issues