Professional Documents
Culture Documents
Teaching Notes 1 Asal It
Teaching Notes 1 Asal It
1 Data processing
and information
Unit plan
Session Outline of lesson content Resources
1.1 Sources Understand the differences Worksheet 1.1 Data and information
of data and between data and information, Worksheet 1.2 Data sources
information and the different categories they
Worksheet 1.5 Data and information crossword
can be grouped under.
Worksheet 1.6 Definitions
Coursebook 1.1, questions 1–7
Coursebook 1.2, questions 8–9
Coursebook Practical Activity 1.01, 1.02
Coursebook exam-style questions 1, 2
1.2 Understand the purpose and Worksheet 1.7 Decrypt the message
Encryption need for encryption. Coursebook Practical Activity 1.03, 1.04
Understand how data is Coursebook question 10
encrypted and decrypted.
Coursebook exam-style questions 3a–c
1.3 Validation Understand the need for and Worksheet 1.3 Validation
and difference between validation Worksheet 1.4 Verification
verification and verification.
Worksheet 1.8 Key words
Understand the different
Coursebook Practical Activity 1.05, 1.06, 1.07, 1.08
methods of validation and
verification. Coursebook questions 11–13
Coursebook exam-style questions 3d, 4
1.4 Data Understand batch, online and Coursebook questions 14, 15
processing real-time processing. Coursebook Practical Activity 1.09
Describe examples of batch, Coursebook exam-style questions 5–8
online and real-time processing.
BACKGROUND KNOWLEDGE
• Learners should have experience of working with data and information, although they may not
be aware of the differences. They should be accustomed to the use of sources, and the need
to reference sources in work to avoid plagiarism. Learners may be familiar with the purpose of
encryption but may not be aware of the details of how it works.
• Learners may have experienced validation and verification, for example, when using the internet
they may have had to enter passwords twice, or been told that a postcode or zipcode was
invalid. This presents a good starting point for this module.
• Learners have likely used systems that make use of different data processing methods, for
example, buying tickets, which again presents a useful starting point to introduce the theory.
• Understand the difference between data and • Define data and information.
information.
• Evaluate whether an example is data or
• Understand the difference between direct information.
and indirect data.
• Define static and dynamic data.
• Understand the factors that affect the quality
of information. • Evaluate whether static or dynamic data is
more appropriate for a scenario.
• Define direct and indirect data.
• Evaluate whether direct and indirect data is
more appropriate for a scenario.
• Name the factors that affect the quality of
information.
KEY WORDS
Common misconceptions
Misconception How to elicit How to overcome
Data and information are often Show examples of each and Repetition and clear instructions
confused i.e. data is called then ask learners to apply on how to convert data into
information. their knowledge to new data/ information.
information.
Direct vs indirect: learners Give examples of each and ask Show multiple examples of
may think that any data that is learners which they are. direct and indirect and explain
collected from the source at any the difference between each.
point in time is direct.
Lesson starters
1 What does it mean? (10 min)
Learning intention: To understand the difference between data and information.
Preparation: Collect some examples of meaningless data. This could be a range of different types of data,
but all out of context.
Description: Display the data on the board and ask your learners what it means. Discuss with learners
what they think the data means and why they don’t actually know. Link to the difference between data and
information. Discuss how to make the data have meaning.
What to look for in identifying misconceptions through starter activity: Learners may confuse data with
information, and think that the title of data is the information when it is the title and the data combined
that provide the information.
Main activities
1 Collecting data (30 min)
Learning intention: To understand the differences between types of data.
What this activity is good for: Consolidating understanding.
Preparation: Look for some examples of data with descriptions about them, e.g. where they were collected.
Description: Introduce the different ways data can be categorised (direct and indirect). Show different
examples of data and information and ask learners to vote as to whether they are static/dynamic and
direct/indirect.
Differentiation ideas: To challenge confident learners, ask them to justify their choice and ask them
whether the type of data it is, is suitable for its requirements.
Plenary ideas
1 Select data/information for a context (10 min)
Preparation: Supply any context that requires data/information collecting.
Description: Learners need to decide what type of data should be collected and how it should be collected.
Challenge learners by asking them to justify their choices.
Homework idea
Ask learners to complete Worksheet 1.1 Data and information by finding different pieces of data and
information.
Assessment idea
Include questions on basic definitions as well as contexts where learners have to select the most appropriate type
of data/information.
1.2 Encryption
LEARNING INTENTIONS
• Understand the need for and purpose of • Define the term encryption.
encryption.
• Explain the need for encryption in
• Understand the different forms of different contexts.
encryption.
• Define symmetric and asymmetric
• Understand the function, advantages and encryption.
disadvantages of different encryption
protocols. • Define SSL and TLS.
• Explain the advantages and disadvantages
of symmetric, asymmetric, SSL and TLS.
• Suggest a suitable encryption method for
a scenario.
KEY WORDS
Common misconceptions
Misconception How to elicit How to overcome
Learners may mix up the Ask learners for definitions of Ask learners to record
different types of encryption. each type, or to explain how definitions. Recap the
they work in a given context. differences often.
Lesson starters
1 Decrypt the message (10 min)
Learning intention: To experience decrypting a message.
Resources: Worksheet 1.7 Decrypt the message.
Description: Give learners the worksheet with an encrypted message and the code. Ask learners to decrypt
the message.
Main activities
1 Encrypting data (30 min)
Learning intention: To understand how data can be encrypted.
What this activity is good for: Independence, working with others.
Description: Ask learners to develop an encryption routine and then write a message using their routine.
Then ask learners to swap their routines with a partner and decode each other's messages.
Differentiation ideas: To support learners, provide them with an encryption routine that they need to use.
To challenge confident learners, ask them to swap encrypted messages without giving away the details on
how to decode the message.
Plenary idea
1 Put the actions in order (10 min)
Preparation: Select one method of encryption split down into instructions.
Description: Give/show learners the list of instructions in a random order for one type of encryption,
e.g. SSL. Learners need to put them back into order.
Homework idea
Ask learners to collate a list of websites that make use of encryption, e.g. websites which use HTTPS or have the
padlock symbol.
Assessment idea
Give learners questions in context where encryption is needed and get learners to identify a suitable method and
explain how it works in that context.
KEY WORDS
Common misconceptions
Misconception How to elicit How to overcome
Validation and verification are Ask learners for definitions and Link verification to verifying a
often mistaken for each other to suggest appropriate rules for password: links to double entry.
by learners. a scenario. Validation means valid, i.e. is
it allowed?
Lesson starters
1 Select the data (10 min)
Learning intention: To explore what would be classed as valid and invalid data.
Preparation: Find an example form with data to be filled in, e.g. name, address, email, phone number, etc.
Description: Show learners a form, e.g. a webpage where some data has to be entered. Ask learners to
identify what should be entered in each box and what would be classed as invalid.
Main activities
1 Create validation rules (60 min)
Learning intention: To select appropriate validation rules and implement validation rules.
What this activity is good for: Practical implementation of theory.
Preparation: Use either a populated database or a spreadsheet, or learners’ own pre-existing systems.
Description: Combine the teaching of this unit with the other unit, e.g. spreadsheets or databases. Introduce
each validation check and then ask learners to implement an example of it in a spreadsheet or database.
Provide learners with a database to add them to, or ask them to add additional ones to pre-existing
databases.
Differentiation ideas: To support learners, provide them with a list of the checks to add and a different
example of each to follow.
To challenge confident learners, ask them to implement multiple rules in each field.
Plenary ideas
1 Key words (10 min)
Resources: Worksheet 1.8 Key words.
Description: Give each learner a set of the key cards and ask them to add definitions and examples
to the back.
Homework idea
Ask learners to complete Worksheet 1.3 Validation and Worksheet 1.4 Verification.
Assessment idea
Ask questions for this section with the other units as well, so it's not in isolation. Integrate with tests for other
units such as algorithms, databases, spreadsheets. Include tasks for learners to select appropriate validation
rules and verification checks to use. Incorporate questions asking learners to select and justify a check/rule for a
given scenario.
KEY WORDS
batch processing: sets of data are processed all at one time without user interaction
online processing: also known as interactive processing, data is input by the user and feedback given
in the form of outputs
real-time processing: data is processed as soon as it has been input and outputs are generated
immediately
master file: a table in a database containing information about one set of things, e.g. employees
transaction file: data that is used to update a master file
Lesson starters
1 Categorise (10 min)
Learning intention: To identify processing methods for scenarios.
Preparation: Make a list of scenarios/contexts that require processing.
Description: Ask learners to consider each scenario and then decide which method of processing should be
applied. Ask learners to vote as to which one should be used. Ask learners to justify their choice.
Main activities
1 Automated stock control system (60–120 min)
Learning intention: To create an automated stock control system.
What this activity is good for: Teamwork, practical skills and application of theory.
Preparation: Choose a scenario that requires an automated stock control system, such as a clothes shop.
Description: Teach it with the Unit 10 Database and file concepts, or at least recap when coming to
databases – it's not for teaching in isolation. Ask learners to work together to create a stock control system
and consider the different processing methods that will be involved with it. Ask learners to summarise what
the stock control system does and the actions that are performed.
Differentiation ideas: To support learners, pair them with a strong learner who can support their
development. Learners could be provided with a skeleton database that just requires additional functions
adding to.
To challenge confident learners, ask them to justify their choices and consider other additions such
as adding validation and verification. Ask learners to consider the hardware that would be used with
the system.
Plenary ideas
1 Match the statements (10 min)
Preparation: Provide a set of statements describing the different processing methods.
Description: Give learners a set of statements and they have to determine which processing method each
statement refers to.
Homework idea
Ask learners to find a real-life example of each data processing method and to bring a description of it, along
with justification as to the method, to the next lesson to present to the class.
Assessment ideas
Include test questions asking for definitions of the different methods of data processing.
In end-of-unit and end-of-year tests ask questions related to contexts, where learners have to determine which
data processing method is more appropriate for a context, and describe the processes in each example.