EVERMORE SCHOOL LONG TERM PLANNING
YEAR 10 ICT – 2025/2026 ACADEMIC YEAR
TERM ONE
Week Topic/Subtopic Key Objectives Learning Activities Resources
1 Types of Software By the end of the topic the learner should be - Mind map: System vs Edexcel Textbook
able to: application- Group discussion Ch.2Presentation
- Define software- Distinguish between
system and application software
2 Utility Software By the end of the topic the learner should be - Case study walkthrough- Sample
able to: Software demo videos screenshotsTextbook
- Identify types of utility software- Explain
functions of backup, defragmentation,
compression
3 Utility Software cont. By the end of the topic the learner should be - Task: Match utility to use-case- Practice tasksNotes
able to: Activity: Compression and
- Describe formatting and encryption
formatting
utilities- Justify real-world uses
4 Operating Systems By the end of the topic the learner should be - Diagram labeling- Research task Edexcel TextbookOS
able to: on OS types comparison sheet
- Identify OS functions: memory, print
spooling, security- Compare types of OS
5 Application Software By the end of the topic the learner should be - Table completion task- Demo Sample appsTextbook
able to: walk-through
- Identify types: word, spreadsheet,
presentation- Explore features of application
suites
6 Application Software By the end of the topic the learner should be - Group presentations- Create TextbookGantt chart
cont. able to: project timeline samples
- Describe project management, web
authoring, image/sound editing
7 Mid-Term Exam - Assess understanding of software concepts - Exam- Marking and review Assessment paper
(Ch. 2)
8 Mid-Term Break — — —
9 Software Licensing & By the end of the topic the learner should be - Class debate- Task sheet: Update TextbookLicensing chart
Updates able to: scenarios
- Explain proprietary vs open-source-
Reasons for updating software
10 Memory Types By the end of the topic the learner should be - Practical examples- Flashcard NotesDiagram resources
able to: matching
- Describe RAM, ROM and Flash- Compare
their features and uses
11 Impact of RAM on By the end of the topic the learner should be - Role-play: Processor & RAM- Worksheets
Performance able to: RAM upgrade simulation
- Explain how RAM affects multitasking-
Describe virtual memory
12 Processors By the end of the topic the learner should be - Chart comparison- Quiz: Hertz Textbook Ch.3
able to: and GHz
- Define processors and cores- Understand
clock speed & performance
13 Digital By the end of the topic the learner should be - Streaming simulation- Speed test toolsNotes
Communication able to: Ping/latency demo
- Explain bandwidth, latency, streaming
14 Recap and Practice By the end of the topic the learner should be - Quiz rotation- Peer teaching Revision cards
able to:
- Reinforce Chapters 2–4- Identify weak
areas
15 End-of-Term Exam - Assess understanding of content taught this - Written test- Feedback session Exam paper
term
TERM TWO
Week Topic/Subtopic Key Objectives Learning Activities Resources
1 Introduction to By the end of the topic the learner should be - Group brainstorm- Simple LAN Edexcel Textbook
Networks able to: simulation Ch.5
- Define networks and packets- Explain basic
network features
2 Types of Networks By the end of the topic the learner should be - Task sheet comparison- Group Chart
able to: discussion templatesTextbook
- Describe LAN, WAN, PAN, Tethering-
Compare advantages and limitations
3 Network Hardware By the end of the topic the learner should be - Label the network- Identify Printed diagrams
able to: hardware images
- Identify roles of switches, routers, WAPs-
Diagram setup
4 IP, MAC & Device By the end of the topic the learner should be - Worksheet activity- IP simulation NotesDevices (if
Names able to: task available)
- Understand how devices are identified-
Explain differences
5 Network Security By the end of the topic the learner should be - Firewall roleplay- Group VideosTextbook
able to: discussion: Secure/Not secure
- Explain login, password, firewalls,
encryption
6 Mid-Term Exam - Assess network concepts (Ch.5) - Written test- Marking and review Exam paper
7 Mid-Term Break — — —
8 Wireless Security & By the end of the topic the learner should be - Research: Compare WPA & VideosNotes
VPN able to: VPN- Case study
- Differentiate WEP, WPA, VPN- Discuss
secure connections
9 File Access & By the end of the topic the learner should be - Access rights simulation- Log file Textbook
Transaction Logs able to: analysis
- Describe file permissions- Explain logs for
tracking access
10 Threats to Data By the end of the topic the learner should be - Video discussion- Case study Textbook Ch.6
able to: review
- Identify types of threats: malware, phishing,
pharming
11 Protective Measures By the end of the topic the learner should be - Design a secure system poster A3 paperScenarios
able to:
- Explain firewalls, encryption, passwords-
Create secure profile
12 Term 2 Review - Recap Ch. 5–6- Focus on common errors - Mock quiz- Peer feedback Quiz sheets
TERM THREE
Week Topic/Subtopic Key Objectives Learning Activities Resources
1 Backup & Secure By the end of the topic the learner should be - Diagram: backup strategies- Textbook Ch.6Poster
Websites able to: HTTPS poster sheets
- Describe backup types- Explain HTTPS and
security layers
2 Authentication Tools By the end of the topic the learner should be - Demo CAPTCHA tests- Match Worksheets
able to: scenarios to tools
- Describe CAPTCHA, biometrics, pins,
passwords
3 Antimalware By the end of the topic the learner should be - Malware story map- Software Notes
able to: simulation (screenshots)
- Distinguish antivirus, anti-adware, anti-
spyware- Explain detection methods
4 Permissions & Online By the end of the topic the learner should be - Security audit: Sample web pages Real/Mock URLs
Safety able to:
- Explain access rights and secure URLs
5 Email & Attachment By the end of the topic the learner should be - Email analysis game- Quiz: Safe Sample emails
Safety able to: vs unsafe
- Evaluate links and files- Spotting phishing
scams
6 Online Payments By the end of the topic the learner should be - Compare payment methods- Payment process
able to: Create a risk table diagram
- Describe payment systems: cards, PayPal,
NFC
7 Mid-Term Exam - Test cumulative understanding - Written test- Feedback Assessment paper
8 Mid-Term Break — — —
9 Internet Impact By the end of the topic the learner should be - Class debate- Comparison table: Textbook
able to: Internet vs traditional
- Evaluate pros/cons on jobs, media, info
access
10 Protocols & Online By the end of the topic the learner should be - Match protocol to function- FlashcardsChart
Services able to: Scenario-based task
- Describe IMAP, FTP, VoIP, HTTP, SSH
11 Revision: Software & By the end of the topic the learner should be - Quiz carousel- Summary sheets Past papers
Hardware able to:
- Reinforce Chapters 2–3
12 Revision: Networks & By the end of the topic the learner should be - Group revision game- Mock test CardsWorksheets
Security able to: prep
- Reinforce Chapters 4–6
13 Final Assessment - Conduct end-of-year assessment - Timed test- Feedback Full exam
14 Year-End Reflection - Reflect on learning- Class evaluation & - Student surveys- ICT careers Reflection sheets
feedback discussion