# MR KENYON

Computer Science Ambassador for the North West with STEM Learning Trust. Teacher of Computer Science and Media.

470Views

Computer Science Ambassador for the North West with STEM Learning Trust. Teacher of Computer Science and Media.

#### Microsoft Excel Scheme of Work

(0)
Scheme of Work for Microsoft Excel targetted at Year 8 and 9 Students. Focus of the unit is on Data Collection, both Primary and Secondary Data Sources are discussed as well Quantitative and Qualitative data. This resource includes a Workbooklet for students, PowerPoint Presentation, Digital Worksheets and Pre-Recorded videos. All Lessons Include Retrieval Starters, Written Activities and Digital Literacy Practice Activities (Applied Knowledge Activities) Lesson One - Excel Basics Lesson on the basics of Microsoft Excel, discussing what the difference between Data and Information is, Basic Formulae and how to use Cell Referencing. Lesson Objective To construct formulas for the purpose of data analysis in Spreadsheet Applications such as Microsoft Excel. Included Resources; PowerPoint, Workbooklet Tasks and Pre-Formatted Excel Spreadsheet. Lesson Two - Research of Data Lesson discusses the ideas behind Primary and Secondary data collection - with a concentration on Secondary Data. Students are given the task of researching the average cost of bills. Lesson Objective Learners will be able to explain the difference between data and information whilst explaining the differences between primary and secondary sources. Included Resources; PowerPoint, Workbooklet Tasks and Pre-Formatted Excel Spreadsheet. Lesson Three - Surveys for Data Lesson shows how students can use Microsoft Forms for the collection of data. Students discuss that this is a Primary Data Collection Method. Lesson Objective Learners will be able to explain the difference between quantitative and qualitative data and how it is collected. Included Resources; PowerPoint, Video Demonstration, Workbooklet Tasks Lesson Four - Data Analysis Lesson discusses methodologies for data analysis, and ensuring that we are able to create information from research. Lesson Objective Learners will be able to create information from data using data analysis techniques. Included Resources; PowerPoint, Video Demonstration, Workbooklet Tasks and Pre-Formatted Excel Spreadsheet.

#### eSafety Scheme of Work

(0)
Scheme of Work for the deliverance of an eSafety Module to Year 7/8 Students. Focus of the unit is on Cyberbullying, Passwords and Security, Social Networks, Screen Time and Mobile Safety. This resource includes a Workbooklet for students, PowerPoint Presentation and digital worksheets. All Lessons Include Retrieval Starters, Written Activities and Digital Literacy Practice Activities (Applied Knowledge Activities) Lesson One - Passwords and Security Lesson Objective Learners should be able to define and demonstrate the rules of creating secure passwords in an online world and explain the reasons why secure passwords are crucial for online and digital safety. Lesson Two - Social Networks Lesson Objective Learners should be able to understand the impact of their Digital footprint and explain how it can affect their online privacy. Lesson Three - Cyberbullying Lesson Objective Learners should be able to identify and consider the problem of Cyberbullying using digital media platforms. Lesson Four - Screen Time Lesson Objective To be able to identify the consequences of too much screen time and the effects that this can have on the brain. Lesson Four -Mobile Device Safety and Unknown Communication Lesson Objective To understand the risks communication methods, especially with people we do not know.

#### New and Emerging Technology - SOW

(0)
Comprehensive scheme on new &amp; emerging digital technologies. Explore IoT, AI, VR, AR, mobile &amp; cloud tech. Fits retail, banking &amp; entertainment sectors Unlock a complete learning package with 15 lessons centered on emerging digital technologies. Each lesson has been meticulously designed, incorporating engaging videos that elucidate complex concepts, ensuring students grasp the essence of every topic. Complementing the video content are interactive activities tailored for hands-on learning and practical application. These exercises not only reinforce the concepts taught but also foster a deeper understanding of real-world implications in sectors like retail, banking, and entertainment. The cherry on top is a seamlessly integrated structured assessment plan. This ensures a balanced blend of knowledge acquisition and practical application, making it ideal for educators aiming for a comprehensive yet hands-on teaching approach. File types included are Video, Document, and PPT. Dive deep into the world of current and emerging digital technologies with this expansive scheme of work. Designed with a holistic approach, this resource meticulously covers: Exploration of digital technologies such as Mobile Technology, Intelligent Computing, Internet of Things, and Cloud Technology. Applications of these technologies in various industries, from retail to entertainment, to fulfill business goals. Comprehensive look at IoT: device connectivity, RFID, NFC, wearable tech, and more. Wide range of application scenarios: health, lifestyle, communication, AI, VR, AR, and Augmented Analytics. Skills Development: Enhance research skills, focusing on technology applications across sectors. Discuss personal &amp; business uses, understanding costs, risks, benefits, legal, and ethical implications. Employ case studies for real-world relevance. Create an in-depth research document on the impact of these technologies on personal and business arenas.

#### Cyberbullying Lesson

(0)
Lesson 3: Cyberbullying Lesson Objective Learners should be able to identify and consider the problem of Cyberbullying using digital media platforms. Keywords Cyberbullying, Empathy, Upstander, Ally, Emerging I can Consider the different perspectives of those involved in cyberbullying. Developing I can Identify ways to be an upstander or ally to someone being bullied. Master I can Problem-Solve potential challenges of responding to cyberbullying.