Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
14 views7 pages

Yaer 10 Ict Long Term Year Plan

The document outlines the long-term planning for Year 10 ICT for the 2025/2026 academic year, detailing weekly topics, key objectives, learning activities, and resources for each term. It covers various subjects including software types, operating systems, networks, and online safety. Each week includes specific learning activities designed to reinforce the key objectives and assess student understanding through exams and practical tasks.

Uploaded by

Dickson Kahuya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views7 pages

Yaer 10 Ict Long Term Year Plan

The document outlines the long-term planning for Year 10 ICT for the 2025/2026 academic year, detailing weekly topics, key objectives, learning activities, and resources for each term. It covers various subjects including software types, operating systems, networks, and online safety. Each week includes specific learning activities designed to reinforce the key objectives and assess student understanding through exams and practical tasks.

Uploaded by

Dickson Kahuya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

EVERMORE SCHOOL LONG TERM PLANNING

YEAR 10 ICT – 2025/2026 ACADEMIC YEAR


TERM ONE

Week Topic/Subtopic Key Objectives Learning Activities Resources


1 Types of Software By the end of the topic the learner should be - Mind map: System vs Edexcel Textbook
able to: application- Group discussion Ch.2Presentation
- Define software- Distinguish between
system and application software
2 Utility Software By the end of the topic the learner should be - Case study walkthrough- Sample
able to: Software demo videos screenshotsTextbook
- Identify types of utility software- Explain
functions of backup, defragmentation,
compression
3 Utility Software cont. By the end of the topic the learner should be - Task: Match utility to use-case- Practice tasksNotes
able to: Activity: Compression and
- Describe formatting and encryption
formatting
utilities- Justify real-world uses
4 Operating Systems By the end of the topic the learner should be - Diagram labeling- Research task Edexcel TextbookOS
able to: on OS types comparison sheet
- Identify OS functions: memory, print
spooling, security- Compare types of OS
5 Application Software By the end of the topic the learner should be - Table completion task- Demo Sample appsTextbook
able to: walk-through
- Identify types: word, spreadsheet,
presentation- Explore features of application
suites
6 Application Software By the end of the topic the learner should be - Group presentations- Create TextbookGantt chart
cont. able to: project timeline samples
- Describe project management, web
authoring, image/sound editing
7 Mid-Term Exam - Assess understanding of software concepts - Exam- Marking and review Assessment paper
(Ch. 2)
8 Mid-Term Break — — —
9 Software Licensing & By the end of the topic the learner should be - Class debate- Task sheet: Update TextbookLicensing chart
Updates able to: scenarios
- Explain proprietary vs open-source-
Reasons for updating software
10 Memory Types By the end of the topic the learner should be - Practical examples- Flashcard NotesDiagram resources
able to: matching
- Describe RAM, ROM and Flash- Compare
their features and uses
11 Impact of RAM on By the end of the topic the learner should be - Role-play: Processor & RAM- Worksheets
Performance able to: RAM upgrade simulation
- Explain how RAM affects multitasking-
Describe virtual memory
12 Processors By the end of the topic the learner should be - Chart comparison- Quiz: Hertz Textbook Ch.3
able to: and GHz
- Define processors and cores- Understand
clock speed & performance
13 Digital By the end of the topic the learner should be - Streaming simulation- Speed test toolsNotes
Communication able to: Ping/latency demo
- Explain bandwidth, latency, streaming
14 Recap and Practice By the end of the topic the learner should be - Quiz rotation- Peer teaching Revision cards
able to:
- Reinforce Chapters 2–4- Identify weak
areas
15 End-of-Term Exam - Assess understanding of content taught this - Written test- Feedback session Exam paper
term
TERM TWO
Week Topic/Subtopic Key Objectives Learning Activities Resources
1 Introduction to By the end of the topic the learner should be - Group brainstorm- Simple LAN Edexcel Textbook
Networks able to: simulation Ch.5
- Define networks and packets- Explain basic
network features
2 Types of Networks By the end of the topic the learner should be - Task sheet comparison- Group Chart
able to: discussion templatesTextbook
- Describe LAN, WAN, PAN, Tethering-
Compare advantages and limitations
3 Network Hardware By the end of the topic the learner should be - Label the network- Identify Printed diagrams
able to: hardware images
- Identify roles of switches, routers, WAPs-
Diagram setup
4 IP, MAC & Device By the end of the topic the learner should be - Worksheet activity- IP simulation NotesDevices (if
Names able to: task available)
- Understand how devices are identified-
Explain differences
5 Network Security By the end of the topic the learner should be - Firewall roleplay- Group VideosTextbook
able to: discussion: Secure/Not secure
- Explain login, password, firewalls,
encryption
6 Mid-Term Exam - Assess network concepts (Ch.5) - Written test- Marking and review Exam paper
7 Mid-Term Break — — —
8 Wireless Security & By the end of the topic the learner should be - Research: Compare WPA & VideosNotes
VPN able to: VPN- Case study
- Differentiate WEP, WPA, VPN- Discuss
secure connections
9 File Access & By the end of the topic the learner should be - Access rights simulation- Log file Textbook
Transaction Logs able to: analysis
- Describe file permissions- Explain logs for
tracking access
10 Threats to Data By the end of the topic the learner should be - Video discussion- Case study Textbook Ch.6
able to: review
- Identify types of threats: malware, phishing,
pharming
11 Protective Measures By the end of the topic the learner should be - Design a secure system poster A3 paperScenarios
able to:
- Explain firewalls, encryption, passwords-
Create secure profile
12 Term 2 Review - Recap Ch. 5–6- Focus on common errors - Mock quiz- Peer feedback Quiz sheets
TERM THREE
Week Topic/Subtopic Key Objectives Learning Activities Resources
1 Backup & Secure By the end of the topic the learner should be - Diagram: backup strategies- Textbook Ch.6Poster
Websites able to: HTTPS poster sheets
- Describe backup types- Explain HTTPS and
security layers
2 Authentication Tools By the end of the topic the learner should be - Demo CAPTCHA tests- Match Worksheets
able to: scenarios to tools
- Describe CAPTCHA, biometrics, pins,
passwords
3 Antimalware By the end of the topic the learner should be - Malware story map- Software Notes
able to: simulation (screenshots)
- Distinguish antivirus, anti-adware, anti-
spyware- Explain detection methods
4 Permissions & Online By the end of the topic the learner should be - Security audit: Sample web pages Real/Mock URLs
Safety able to:
- Explain access rights and secure URLs
5 Email & Attachment By the end of the topic the learner should be - Email analysis game- Quiz: Safe Sample emails
Safety able to: vs unsafe
- Evaluate links and files- Spotting phishing
scams
6 Online Payments By the end of the topic the learner should be - Compare payment methods- Payment process
able to: Create a risk table diagram
- Describe payment systems: cards, PayPal,
NFC
7 Mid-Term Exam - Test cumulative understanding - Written test- Feedback Assessment paper
8 Mid-Term Break — — —
9 Internet Impact By the end of the topic the learner should be - Class debate- Comparison table: Textbook
able to: Internet vs traditional
- Evaluate pros/cons on jobs, media, info
access
10 Protocols & Online By the end of the topic the learner should be - Match protocol to function- FlashcardsChart
Services able to: Scenario-based task
- Describe IMAP, FTP, VoIP, HTTP, SSH
11 Revision: Software & By the end of the topic the learner should be - Quiz carousel- Summary sheets Past papers
Hardware able to:
- Reinforce Chapters 2–3
12 Revision: Networks & By the end of the topic the learner should be - Group revision game- Mock test CardsWorksheets
Security able to: prep
- Reinforce Chapters 4–6
13 Final Assessment - Conduct end-of-year assessment - Timed test- Feedback Full exam
14 Year-End Reflection - Reflect on learning- Class evaluation & - Student surveys- ICT careers Reflection sheets
feedback discussion

You might also like