Computing – Year 3
- Children demonstrate the importance of having a secure password and not sharing this with anyone else.
- Children can explain the negative implications of failure to keep passwords safe and secure.
- Children understand the importance of staying safe and the importance of their conduct when using familiar communication tools such as 2Email in Purple Mash.
- Children know more than one way to report unacceptable content and contact.
- Children can carry out simple searches to retrieve digital content. They understand that to do this, they are connecting to the internet and using a search engine such as Purple Mash search or internet-wide search engines.
- Children can collect, analyse, evaluate and present data and information using a selection of software, e.g. using a branching database (2Question), using software such as 2Graph.
- Children can consider what software is most appropriate for a given task.
- They can create purposeful content to attach to emails, e.g. 2Respond.
- Children can turn a simple real-life situation into an algorithm for a program by deconstructing it into manageable parts. Their design shows that they are thinking of the desired task and how this translates into code.
- Children can identify an error within their program that prevents it following the desired algorithm and then fix it.
- Children demonstrate the ability to design and code a program that follows a simple sequence. They experiment with timers to achieve repetition effects in their programs.
- Children are beginning to understand the difference in the effect of using a timer command rather than a repeat command when creating repetition effects.
- Children understand how variables can be used to store information while a program is executing.
- Children can ‘read’ programs with several steps and predict the outcome accurately.
- Children can list a range of ways that the internet can be used to provide different methods of communication.
- Children can use some of these methods of communication, e.g. being able to open, respond to and attach files to emails using 2Email. They can describe appropriate email conventions when communicating in this way.