You are on page 1of 17

20142015

Mr. Ebrahim Rawat


Head of Computer Science
e.rawat_wis@gemsedu.com
Ms. Kimberley Duff
Lead Teacher: Computer Science
K.duff_wis@gemsedu.com
Welcome to the Computing department of Wellington International School Dubai. Our mis-
sion is to give students exposure to the latest industry standard hardware and software and
equip them with the skills and confidence to contribute to the digital and media rich world
they reside in. This is achieved through our innovative choice of curricula and projects
which are based upon the UK national curriculum and then enhanced to meet the interna-
tional nature of our cohort.
Staffing
Computer Science Teachers
Mr J. Rostron - j.rostron_wis@gemsedu.com
Mr R. Bishop - r.bishop_wis@gemsedu.com
Mr E.Miller - e.miller_wis@gemsedu.com
Mrs N.Victoriya - n.Victoriya_wis@gemsedu.com

Structure of Computer Studies Curriculum:
Connecting your own device to the school - BYOD
Definition of Technology
For purposes of BYOT, Technology means a privately owned wireless and/or portable electronic hand held
equipment that includes, but is not limited to, existing and emerging mobile communication systems and
smart technologies, portable internet devices, Personal Digital Assistants (PDAs), hand held entertainment
systems or portable information technology systems that can be used for word processing, wireless Internet
access, image capture/recording, sound recording and information transmitting/receiving/storing, etc.

Internet
Only the filtered internet gateway provided by the school may be accessed while on site Personal internet
connective devices such as but not limited to cell phones / cell network adapters should not be used.

Security and Damages
Responsibility to keep the device secure rests with the individual owner. WIS is not liable for any device stolen
or damages on site. If a device is stolen or damaged, it will be handled through the administrative office simi-
lar to other personal artifacts that are impacted in similar situations.

B.Y.O.D. Student Agreement
The use of technology to provide educational material is not a necessity but a privilege. A student does not
have the right to use his or her laptop, cell phone or other electronic device while at school. When abused,
privileges will be taken away. When respected, they will benefit the learning environment as a whole.

Cybersafety and Cyberbullying
Every User must take responsibility for his or her use of the network and make every effort to avoid those
types of content. Every User must report security or network problems to a teacher, or administrator.

Year 7: 1 X 55 minute per week of Computer Studies

Year 8: 1 X 55 minute per week of Computer Studies

Year 9: 1 X 55 minute per week of Computer Studies

Year 10: Optional: 3 x 55 minute sessions CIE-Cambridge IGCSE-Computer Science

Year 11: Optional: 3 x 55 minute sessions CIE-Cambridge IGCSE-Computer Science

Year 12: Optional: 4 x 55 minute sessions IB Diploma ( ITGS or Computer Science)

Year 13: Optional: 4 x 55 minute sessions IB Diploma (ITGS or Computer Science)
Support sessions for computer science run every lunchtime and selected days
after school - Please check enrichment calendar for further details
Generic Information related to both years of the IB
Mark Boundaries
ITGS HL
Level Min Max
1 0 10
2 11 20
3 21 31
4 32 43
5 44 56
6 57 68
7 69 100
The Command Terms are used throughout the course and help the students structure their answer
accordingly.
There is a text book available to support this course. We stock a limited number of copies
of this book fro reference but should you wish to purchase your own copy, the details are
below...
Title: Information Technology in a Global Society by Stuart Grey
ISBN: 9781468023619
Summer Task: ITGS Preparation

Read through the 9 page What is ITGS booklet, this will
give you an understanding of the ITGS triangle that is core
to the entire course.

It is a requirement that the questions are completed as
the answers to the 5 questions on page eight will form the
basis of the initial ITGS lessons of Year 12.
Pre-Reading: What is ITGS?

A key part of ITGS is making decisions about the use of technology by weighing up its positive and negative
impacts. You should be able to arrive at well-argued conclusions about how, where, when, or even if, differ-
ent technologies should be used. Below are some examples of ITGS topics and the social impacts and ethical
issues they raise:

Workplace surveillance - Many organisations monitor their employees activities, including the email they
send and the web pages they view. Employers do this to improve productivity and reduce time wasted by
workers, but some workers may feel their privacy is being invaded. Do the benefits of increased productivity
outweigh the uncomfortable feeling of being monitored? To what extent should monitoring be allowed - are
there any activities that should not be monitored? Should employees expect any privacy while using work
computers? Should employers be legally required to inform employees if they are being monitored?

Graphics editing - Computer graphics techniques have advanced to the point where images can be altered in
ways, which are virtually impossible to detect. One common use of graphics software is to change the ap-
pearance of models featured on the covers of magazines. Who might be affected by changing images in this
way? What might be the effects, and how serious
are they? Should it be legal to manipulate images but display them as though they are real? Are some edits
acceptable, but others unacceptable? If so, who is responsible for enforcing these rules: photographers, edi-
tors, the government?

E-waste - The average life time of a computer is relatively short, meaning thousands of new computer pur-
chases are made each year. Many discarded devices are exported to developing countries where they are re-
cycled in hazardous conditions, polluting the environment and causing serious health impacts for the recy-
clers. Who is responsible for helping solve these problems? Should users be responsible for the safe disposal
of equipment, or should manufacturers, who created the equipment in the first place, be required to take it
back for recycling?

Violence in computer games - Increasingly powerful home computers and games consoles have enabled
increased realism in computer games, many of which depict very violent actions. While films and other me-
dia often depict violence too, in computer games the player is more intimately involved, often as the perpe-
trator. Some people believe violent games have a negative effect on young players. What should be done to
keep violent games away from people who might be affected by them? Is there a limit to what it is acceptable
to include in computer games? Are computer games different to other forms of entertainment media?

Internet censorship - Many countries filter Internet access, blocking pages deemed inappropriate. Some
countries do very little filtering, removing only extreme content which may be harmful to society, while oth-
ers filter a much higher percentage of material. This raises many ethical issues about the right to Internet ac-
cess and whether people need protecting from potentially harmful content. Who should be responsible for
deciding what is inappropriate material?
Should anything be allowed on the Internet? Is one solution suitable for everyone? How do we even know if
our Internet connections are being filtered?

The ITGS Triangle

There are four core aspects of ITGS. These aspects - social and ethical significance, IT systems, application to specific scenarios,
and stakeholders, are shown in figure 1-1. These aspects are interrelated, and cannot exist without the others. Every topic studied
in ITGS must cover each of these core elements. .



Strand 1: Social and ethical significance

Issues of social and ethical significance can arise whenever information technology is used. These issues have social impacts - ei-
ther positive or negative - on stakeholders. Impacts affect stakeholders in a variety of ways including economically, legally, and
psychologically. Issues of social and ethical significance also raise ethical questions about systems, such as 'who is responsible if
the system fails?' or 'is this an ethical way to use technology?'. Often, a single IT system causes several social impacts and raises
several ethical questions. The TTGS issues of social and ethical significance are:

Reliability and Integrity
Reliability refers to how well a computer system works: if it functions as intended, or fails and crashes. IT failure can cause loss of
data, time, or money. In the worst cases, failure can even cause injury or death. Integrity refers to the correctness of data. Data can
lack integrity if it is incomplete, out of date, or has been deliberately or accidentally changed.
Problems may also arise if two copies of the same data are stored and only one copy is updated, causing inconsistency.

Security
Security is concerned with protecting IT systems from unauthorised users. Security measures such as passwords, firewalls, and
locks are used to restrict access to machines and networks. Security is closely related to issues such as privacy and integrity, be-
cause a security breach in an IT system can cause loss of control over the data stored in it.
Privacy and anonymity
Privacy is the ability to control how data about us is used. This includes deciding who we give our data to, who they
share our data with, how long data is stored, and how the data is used. IT makes covert data collection relatively easy
and large databases of information can reveal a great deal about people's lives, even if their names are not directly
recorded. If a person has total privacy, hiding their identity, they become anonymous. This can be positive (for exam-
ple, in witness protection) or negative (such as a user committing cyber bullying anonymously). Excessive privacy
also helps hide criminals and terrorists from law enforcement. Finding the right balance of privacy is a big challenge
in IT.

Intellectual Property
Intellectual property refers to 'creations of the mind', including photographs, films, essays, and art works. Copyright
law is designed to protect intellectual property from unauthorised reproduction. Modem IT systems make it easy to
break copyright laws by providing ways to quickly and easily distribute copies of work, with little fear of being
caught.

Authenticity
Authenticity involves a user proving their identity to gain access to a computer system. The most common examples
of authentication are the usernames and passwords used to login to many computer systems. Biometric authentication
using fingerprints or retinal scans is also becoming more common. For transactions across the Internet, digital signa-
tures can be used to prove users' identities.

The Digital Divide and Equality of Access.
IT has not developed at the same rate for everybody in all parts of the world. Even within individual countries there
are often groups or individuals who lack access to technology or services such as the Internet. Often this is for eco-
nomic reasons - IT and its related services are often expensive to buy and maintain. However, lack of literacy or lan-
guage skills (particularly English), a lack of training, or a lack of basic resources such as electricity may also cause
problems and create a digital divide between the 'IT-rich' and the 'IT-poor'.

Surveillance
Surveillance involves using IT to monitor people - either with or without their knowledge or permission. Surveillance
can be performed by governments and law enforcement, or by private groups such as employers. Surveillance is an
increasing issue as world governments search for ways to fight global terrorism and crime. Surveillance is often close-
ly tied to the issue of privacy, especially when it is performed without the subjects' prior knowledge or consent.

Globalisation and Cultural Diversity:
IT has helped to reduce global boundaries and speed up the global spread of news and culture. This is especially true
in recent years with the rapid spread of the Internet to even very remote areas of the world. This spread has benefits,
but may also cause problems such as the erosion, or even complete loss, of traditional cultures, values, and languages.

Policies
Policies are rules designed to control the way people use IT. Individuals or organisations such as schools or business-
es may design policies, or they may take the form of laws created by governments. The fast pace of IT development
means policies often lag behind reality, as developments allow new ways to use - and abuse - information technology,
before they can be regulated.
Standards and Protocols
Standards and protocols are technical rules that designers of hardware and software should follow. They are needed to ensure dif-
ferent systems are compatible with each other. For example, the JPEG image standard ensures any JPEG-compatible graphics
program can open images created by any camera. Similarly, the http protocol ensures web browsers and web servers can com-
municate and exchange information, and the USB standard ensures any USB device will work with any USB port on any comput-
er. Without standards, compatibility and interoperability would be difficult.

People and Machines
People and Machines concern the way that humans interact with IT, including physical interaction through user interfaces, and
our psychological response to IT. For example, many people' trust computers intrinsically, and this has consequences when they
fail. At the extreme, people may become so reliant on IT as to become addicted. In some cases decisions may be left to technolo-
gy even though a human would better make them.

Digital Citizenship
Digital citizenship involves being a good citizen in a digital world. This means using information technology ethically, in a way
that does not harm other users or their hardware and software. It also means using IT in a way that respects the law (for example,
with reference to copyright), and in a way that does not expose you to danger (for example, young children posting personal in-
formation on the Internet and being unaware of the possible consequences).





























Analysing ITGS Situations
When analysing ITGS scenarios, it is important to remember that any IT system can cause several issues of social and ethical sig-
nificance. In turn, each of these issues may cause several social impacts (actual effects on people), and raise several ethical ques-
tions. Figure 1-4 shows guidelines for analysing the issues of social and ethical significance, impacts, and ethical questions.

Evaluating Impacts
A large part of the ITGS course focuses on analysing and evaluating the impacts of IT systems and coming to conclusions about
its use-it is not enough to merely describe the impacts of a system. The questions below can help you evaluate a situation and
come to a conclusion. Not every question will apply to every situation.

Are the impacts serious? Are they life or death, or merely an inconvenience?
Is the impact a long term of short-term impact?
Is there an easy solution to the problem?
Are all stakeholders affected or just a few?
Are the affected stakeholders a large group or a small group?
Is the impact a local issue or a global issue?
Is it the impact likely to lead to further problems?

By considering the answers to several of these questions, the importance of the social impacts can be evaluated.

Analysing
The One Laptop Per Child (OLPC) project provides cheap laptops to children in developing countries. This clearly raises the is-
sue of the Digital Divide. Reducing the digital divide causes several impacts. First, it may produce a positive economic impact, if
it can improve education and stimulate the economy of the country. It may also cause a positive cultural impact, as Internet access
will provide access to a much wider range of educational material However, this cultural impact may also be negative, as expo-
sure to foreign cultures may erode local ones.
The issue of the Digital Divide also raises ethical questions. Responsibility is a key concern-who will be responsible if the laptops
are stolen, or if they break down? Who will be responsible for training teachers and students to use the laptops effectively? Alter-
native decisions must also be considered - perhaps most importantly, whether it is appropriate to spend so much money on com-
puter technology in areas that may lack clean water, schools, and healthcare.
Other issues are also raised: Security and Digital Citizenship are concerns, and could have negative impacts unless students are
trained to correctly use the laptops.
The OLPC project demonstrates how one example of IT has social and ethical significance, positive and negative impacts, and
raises ethical questions. A range of stake- holders is affected, including children, governments, and the families and teachers of
the children, and implicitly the manufacturers of the laptop.

Evaluating
The guiding questions above can be used to evaluate the impacts of the OLPC project. The positive educational impact of the
OLPC is likely to be a long-term impact, and will affect a large number of students, plus their families because the children take
the laptops home. Improved education is also a very important as it underlies several other issues facing developing countries.
These factors make this a significant impact. The issue of responsibility in the event of theft is important, however, there are clear
solutions to this problem. The OLPC has anti-theft systems built in, which can disable the laptop remotely. This should reduce the
impact of theft, reducing it to a short-term problem -until
People realise there is no point stealing the computer. The cultural impact is debatable, since it may be either positive or negative.
The potential erosion of culture may affect a very large group of stakeholders, and is likely to be a long-term effect. However, this
may be outweighed by the educational benefits that access to the computers and the Internet bring.
The ethical question of appropriateness is also tricky-the potential alternative uses of the money (clean water, hospitals, and
schools) could help a very large number of people, and in quite significant ways, since lack of clean water and limited healthcare
cause large numbers of deaths in developing countries. However, it is also possible that the OLPC could help address these issues,
both by improving educational standards-known to have a knock-on effect on health -and by raising the countries' profiles inter-
nationally, which could attract funding and support for these other projects.
As with many issues in ITGS, there is no one correct answer when considering the effects of the OLPC project. Answers are like-
ly to vary from person to person, and from place to place. The most important skill in ITGS is the ability to understand the im-
pacts an IT system has, and then evaluate them to come to a well-argued conclusion.


Strand 2: Application to specific areas

IT is ubiquitous - it exists all around us. Laptop computers, smart phones, and games consoles are obvious examples
of IT in our everyday lives. t IT also exists in many other places: in our cars, controlling the engine and braking sys-
tems; in factories, manufacturing products; in aircraft control systems; and in the banking sector, enabling the global
financial markets to opera e. IT also controls many of our essential services, including water and power distribution.
ITGS examines the effects of information technology in six specific areas:

Business and employment-Many businesses make heavy use of IT to develop, advertise, and sell their products and
services. E-commerce has opened markets for even the smallest businesses, allowing them to compete on a global
scale. Many services such as ticket booking, banking, and shopping can now all be done online from the comfort of
our homes. Many workers can now engage in teleworking, enabling people to work from home or while on the move.
But IT can also cause problems in businesses, with security breaches and employee time-wasting being common con-
cerns.

Education and training-The availability of vast amounts of information for free on the Internet has opened up new
educational possibilities for many people. Sites like Wikipedia allow information, once only available in expensive
paper encyclopaedias, to be read online, for nothing, in dozens of different languages. Formal education organisations
have also taken advantage of the Internet to allow distance learning, while in traditional classrooms many schools are
now furnishing teachers and students with lap tops and Internet access as standard. Initiatives like the Flat Classroom
project have even been successful in fostering collaboration from class- rooms across the world.

Environment - Robotic vehicles are rapidly taking over the job of exploring Earth's extreme environments: the deep
ocean, the polar icecaps, and dangerous volcanic craters. Improvements in satellite technology have allowed high res-
olution mapping of the earth from space, while advanced computer models are used to try to predict the future climate
of our planet. Yet technology also has a cost for our environment: IT equipment contains many hazardous chemicals,
and vast, heavily polluted dumping grounds in developing countries are a forlorn testament to the speed at which tech-
nology changes.

Health-IT has helped advance healthcare in daily tasks such as patient record keeping, as well as more unusual tasks
such as robot-assisted surgery. IT also raises several health issues, especially among the young, with concerns over
addiction, injury from excessive use, and the psychological consequences of being in constant contact, thanks to so-
cial networking, email, and mobile phones.
Home and Leisure-Our leisure time has been significantly changed by developments which let us watch high quality
films, listen to CD-quality music almost anywhere, and stay in touch with family and friends globally. The increased
use of the Internet has led to wide- spread illegal downloading of copyrighted films, software, and music: and the en-
tertainment industry seems unable to stop this trend. IT has also changed how we receive news and stay in contact
with friends: 8 times as many people read The New York Times online compared to the printed edition, while social
network Facebook has 500 million users, each with an average of 130 friends".

Politics and government-IT is used throughout the political process: Barack Obama's 2008 election campaign is fa-
mous for extensively using technology for advertising, gathering support, and fund raising. Many of these technolo-
gies had not even existed at the previous election. Many countries, including the US, now use e-voting machines and
some are considering allowing citizens to vote via the Internet. Once in power, governments are starting to use IT to
increase efficiency and transparency, and allow citizens access to services and information. All governments have not
embraced IT however, a number of regimes across the world routinely restrict citizens' access to technology or ser-
vices such as the Internet. The use of IT in Politics and Government includes use by military and police forces, and
advancements in military robotics often raise ethical questions.




Strand 3: IT Systems

Although ITGS focuses on the social and ethical significance of information technology, students need to
study the underlying technology as well. The IT Systems part of the course examines how these underlying
systems work in order to better understand how the systems differ from previous systems, and how they af-
fect society. All IT systems take data as input and process it according to programmed instructions into out-
put. All IT systems have these three essential components: input, processing, and output. Normally a system
will also store the data it processes on some form of permanent storage device (see chapter 2), and increas-
ingly data will also be communicated to other systems via networks (chapter 4). It is also important to re-
member that an IT system is not just the hardware and software, but also the people who use the system and
the data, which is processed.

All information systems consists of:

1. Hardware to input, process, and output data
2. Software to control the hardware
3. People to use the system
4. Data on which the system performs work









Exercise 1-1
Match the terms on the left with the descriptions on the right.



Exercise 1-2
Read 5 or 6 news articles from the technology sections of newspapers (see page 11 for suggested reading). Determine whether the
articles deal with technology or information technology and briefly explain your reasoning. [4 marks]

Exercise 1-3
Find two ITGS related news articles. Analyse them and describe: the key stakeholders, the IT systems involved, and the area of
application (Business, Health, Politics, Home & Leisure, Education, Environment). Explain the social impacts and ethical issues
caused by the technology - aim for a mix of positive and negative social impacts. [6 marks]

Exercise 1-4
Look at the following examples and decide whether they are suitable ITGS and why?
a) The use of computer games by the military to train soldiers
b) The use of web sites or virtual worlds to provide virtual 'field trips' to schoolchildren
c) The increased incidence of violence on television
d) The increased incidence of apparent Internet addiction in some countries
e) The rise of online crime
f) The release of a new portable music player [2 marks each]

Exercise 1-5
Consider the following ITGS situations. Briefly discuss the potential positive and negative impacts for each. Try to use the key
ITGS language.
b) The use of software controlled medical devices
c) The creation of digital copies of famous works of art
d) The increased use of mobile phones by young people, especially school children
e) The use of the Internet to cast votes in national elections [8 marks each]







1) Privacy A) Refers to creations of the mind which are protected by copyright law
2) Globalisation B) Regulations governing the way IT can be used
3) Equality of Access C) Concerns whether hardware and software work as intended
4) Reliability D) The use of IT to monitor people causes concerns about this
5) Policies E) These help ensure that files created in one application can open in another
6) Surveillance F) The difference between those who have access to IT and those who do not
7) Intellectual Property G) Relates to who data is shared with and how it is used
8) Standards H) This involves proving our identity
9) Authenticity I) Protecting computers, networks, and data from hackers
10) Security J) IT and quicker communication facilitate this
Information Technology in a Global Society (ITGS), is a subject designed to
discuss issues related to information technology and how our world is affect-
ed by IT. Students will look at the technology behind health, education and
business and objectively discuss how these advances have impacted on so-
ciety. ITGS is NOT a technical course and assumes no previous learning
(Higher Level) Paper 1 35%, Paper 2 20%, Paper 3 25%, IA 20%
Overview
2.1 BUSINESS AND EMPLOYMENT
Traditonal businesses Banks, including ATM (automatic teller machines), EFT
(electronic funds transfer),
hotels, supermarkets, travel agencies.
Online businesses (e-commerce) Working practices such as teleworking and home working.
Transportaton Airline reservation systems, navigation, package tracking,
traffic control systems,
IT systems in cars.
2.2 EDUCATION AND TRAINING
Distance learning over large areas Hospitals, prisons, retirement homes, schools.
Use of IT in teaching and learning Educational software, online research and forums, virtual
learning environments (VLE), e-books, Web 2.0 educational
networks, use of mobile devices, game-based learning, fully
immersive environments, filtering and monitoring of stu-
dents internet use, 1-to-1, m-learning.
Hardware and network technologies in the class-
room
Laptop computers, handheld devices, interactive white-
boards.
Provision for special needs Inclusive software, Braille keyboards, accessibility.
School administraton Record-keeping of staff and finances, libraries, student rec-
ords, EDI (electronic data interchange).
2.3ENVIRONMENT
Modelling and simulatons Climate change, forecasting natural events or demographic
changes.
Data logging Sensors, probes, real-time data collection.
Satellite communicaton Remote sensing devices, satellite imagery, tagging.
Mapping, virtual globes Geographic information systems (GIS), global positioning
systems (GPS), cell/mobile phone tracking, online journey
planning, online maps.
E-waste Development, disposal and recycling of IT equipment, mon-
itoring organizations such as the Basel Action Network.
Resource depleton Use of non-renewable resources for manufacturing compo-
nents, electrical consumption of IT systems.
Year 2 IA Hand in Date: 19th December 2013
2.4 HEALTH
Diagnostc and therapeutc tools
Surgery, prosthetic devices, diagnostic technology, rehabilitation, pa-
tient monitoring, individualized IT solutions for disabled people, accessi-
bility.
Medical informaton, administraton, marketng
and sales
Medical advice, e-prescriptions, telemedicine, electronic health records,
international health cards.
Medical research
Global collaboration, database for the Human Genome Project, improv-
ing patient rehabilitation.
Psychological and physical consideratons
Internet addiction, repetitive strain injury (RSI), ergonomics.

2.5 HOME AND LEISURE
Homes and home networks IT management of home systems: for example, lighting, security, enter-
tainment centres.
Digital entertainment Films, photographs, music, arts, online and digital games, gambling,
virtual worlds.
Social networking Chat rooms, messaging, blogging, file sharing, wikis.
Published and broadcast informaton Books, newspapers, digital radio and TV, e-books, podcasts.
Digital policing Monitoring organizations such as the Recording Industry Association of
America (RIAA) and the Motion Picture Association of America (MPAA).
Hardware, sofware and networks Portable digital devices and their ability to remotely control other devic-
es, IT-enabled appliances.
2.6 GOVERNMENT AND POLITICS
Politcal processes Online campaigning, voting, lobbying, fund-raising and advertising.
Government informaton sites For example, travel warnings, tourist information, environmental infor-
mation and warnings, government policies, city government websites.
Access to, and updatng of, personal informaton held
on government databases
Collection, storage and updating of personal data: for example, driving
licence, TV licence, tax returns, passport applications and renewals,
medical records, military service records, social security information,
online police records.
Government control and use of informaton Censorship, data matching across agencies, archiving, biometric data,
national identity cards.
Law and order Police surveillance, terrorist monitoring, DNA data.
Military Cyberwarfare, smart weapons, espionage, battlefield technology.
Student taking ITGS are expected to supplement
their class by reading around current advances
in technology and be able to discuss these with-
in the class with reference to the technology and
who is effected and how by these developments.

Suggested Links:

http://itgstextbook.com
http://itgsopedia.wikispaces.com/
http://www.bbc.co.uk/news/technology/
http://edition.cnn.com/TECH/index.html
Each Project is marked using the UK national Curriculum scale, including sub levels; where
each level is broken down into three sections a,b,and c.



Year and Average Level Table
4c 4b 4a
A Weak Level 4 A Strong Level 4
Mark Boundaries IB
ITGS HL
Level Min Max
1 0 10
2 11 20
3 21 31
4 32 43
5 44 56
6 57 68
7 69 100
Computer Studies IGCSE
Level Min Max
A* 80 100
A 71 79
B 62 70
C 53 61
D 46 52
E 40 45
F 34 39
G 28 33
U 0 27
Grade Boundaries GCSE
Please note that grades for the IB and IGCSE are calculated using our custom made
WIS calculators . These sheets break down the course into its components, complete
with current weightings and grade boundaries.
All Predictions and Current grades are generated using the calculators
The Learner Profile is Embedded into all of our projects in Computer Science
"If at first you don't succeed;
call it version 1.0"
"Those who can't write pro-
grams, write help files."

You might also like