Professional Documents
Culture Documents
Progress in
Science Book 2
Series editors: Gareth Evans, Lorne Pearcey
and George Rouse
Richard Grimmer
Michelle Austin, Andrea Coates,
This title is also available
as an eBook with learning
support.
Visit hoddereducation.co.uk/boost
to find out more.
Contents
Introduction 4
Getting started 6
Introducing spreadsheets 18
Computing: past, present and future 30
Programming in Scratch 42
Computing components 54
Programming in Python: sequence 66
Advanced spreadsheets 78
Algorithms 88
Programming in Python: selection 100
Internet safety, cyber security and encryption 112
Binary and computer logic 124
Sound and video editing 138
Designing websites 150
Networking and the internet 162
Programming in Python: iteration 174
The ethics of computing 186
Projects 198
Glossary 209
Answers to check-in questions 216
Acknowledgements 226
Index 227
3
Introduction
Why study computing? About the book
Computers and the internet are integral aspects of The Student Book is made up of 16 chapters, or
modern life. From governments and multi-national modules, and each of these chapters includes
businesses to local enterprises and individuals, six lessons or double-page spreads. The Student
we rely on computer networks and software to Book finishes with three extended six-week-long
keep the global economy running. Studying computing projects, to showcase the computing skills you have
will enable you to develop a range of knowledge and acquired. You will use the Student Book alongside
skills necessary for success in the modern world. the interactive digital resources on the Boost
This course combines key concepts related to platform.
computational thinking, information technology
and digital literacy to cover the main elements Features
of computer science. At its core is computational Each chapter begins by introducing you to the topic,
thinking, the problem solving and logical thinking explaining why it is relevant.
skills used by computer scientists and programmers
to solve complex problems, which can also be Before you can use a
applied to real world issues in many other subjects
and disciplines. Writing programs allows you to put computer system, you
these skills to the test and to develop your ability to need to know how to
work through problems and find solutions.
While you may not pursue a career as a
access it correctly and this
programmer, you will almost certainly use a variety chapter will help you set
of software applications in your everyday lives.
Learning how to use software correctly and adeptly
yourself up on your school
– to produce effective presentations, documents computer system and think
or spreadsheets to convey information – is an
important skill for many careers. Alongside this
about what you should
comes the ability to develop and edit audio and use it for. You will learn
visual media. how to save and organise
Understanding the development of computing,
how computers and the internet work, how to
files and the key principles
evaluate digital content and the ethical issues of internet research and
surrounding the use of computers help us put the
technology into context. Whatever technology we
digital wellbeing. You will
use, it is important we know how to use it safely also learn basic image
and respectfully so that we can make the most of editing skills.
opportunities in our future lives.
4
Saving work
programs. Some devices and systems The data and software can only be accessed if
use biometrics, such as fingerprints or you have an internet connection.
The first time you save a piece of work, make
BIG?
facialOr
sure you does it
recognition, end after
to enable
give it a suitable dog?
name a and
usersave
to it to the
Logging software
Cloud-based in to your email account
does not usually have as
To overcome this
Youproblem,
can thenPython has a set Logfeatures
in to your
prove their identity.
fruitschool email account. Introduction
correct folder. save changes to the many as downloadable software.
escapefile
oforiginal characters that we can
quickly and easily using shortcut use to addkeys: Favourite
Free storage is limited.
punctuation
and formatting to print lines. Some Write a program that asks the user for three
Choosing
CTRL + S a strong password
in Windows first
examples
ReadingCMDthe
include:
+ S text and
in MacOS. looking at the images will help
Virtual
Ongoing
names
Occasionally,
time.
Learning
subscriptions
and
you will
Environments
can become
the favourite
see
fruit ofcostly
this
each over
icon
named
inthe
(VLEs)
an user.
activity
When you first
Escape character log in you
Output will need to choose a person
A VLE and outputs
is an online the data entered
system download by
that stores an learning
younew grasp
If you thewant
do not
password. theory.
You Key words,
to overwrite
should which
the original
always chooseyou
file,acan
strongWhenbox.
Users Ityour
means
can lose
program you need
legal rightsitto
runs, toshould
their material
look ifadditional
like itthis.
is
resources such as documents, presentations, and
look
\" up
choose in the
‘Save glossary
As’ from at
"the the back
‘File’
password. There are three elements that help to menu oftothe
savebook,
a are resource
stored
The in
online.
circled order
words to
are complete
entered by the
the activity.
user. These
copy video and audio files. VLEs can be used to set, hand
in\'blue of
increase
your work. Give
bold. the new file a suitable
the strength'of a password: resources
Some believe can bedata downloaded at vulnerable
name and save it to the correct folder. in and mark that assignmentsmay and be more
homework. Some
\n new line www.hoddereducation.co.uk/ProgressinComputing.
Output
to being stolen if it is stored online.
length: longer passwords of at least eight VLEs also include discussion threads, polls, quizzes
Cloud
\t
computing
characters are more tab
secure Name one John
and surveys, as well as a place where students and
\\
Cloud
rangecomputing
of characters is where
\
dataaispassword
used: stored online and
containing Checking in message each other. VLEs can be
teachers
Name two can Liz
software
aat is used
mixture via an internet
of upper- browser, rather
and lower-case letters, than accessed fromMariya
home by logging in.
Look this code: ➊Name Whatthree
is data saved as on a computer?
being stored locally on a
numbers and symbols is more secure computer’s hard drive.
software files are saved on a server. ➋Favourite
What does
Checking fruit
in aquestions of
folder contain?
appear John throughout the book.
1The data and
name = 'John'
randomness: passwords that
Server farms are located all around the world so do not contain These
What are
➌Favourite is a short-answer
filefruit
extension?ofquestions
Liz designed to test
2youpet =people
'Cat'
words
do not know can guess
where are more
your data secure.
is physically Logging
your
Favourite knowledge infruit
toand
the ofVLE
understanding
Mariya of what you
3Youprint(name+'\'s
should also make sure petyouis a \t'
choose +
a password have just learnt. Answers to these questions can be
Log in to your school VLE.Mariya
Working
that
petyouthrough the activities provides you with an John
)will remember! Liz
found at the back of the book. 9
opportunity to check your understanding and apply apple orange pear
the theory John's
It outputs: you havepet learnt.is a Cat
Logging in to the school network Checking in
Log in to the school network.
➊ Why do we need to log into a computer
Picking up the tabs Checking in
system?
Email
Write a program to output the following ➋ What is an acceptable
➊ What is wrong with this lineuse policy?
of Python
Itinformation
is important to be
about politeand
people when you
their pets: Explain what is meant by a strong password.
➌code?
email
John someone and Catthe following input('What is your name?')
rules
Liz should be followed
Dog when
emailing your teachers. ❷ What will this code output? Why will it output
Mariya Hamster what it does?
You should store the three names in three name = 'John'
variables. The three pets will also need to be print('name')
stored in three different variables, so you will
Section heading 7
need six variables in total. Your program should
then print out the values of these variables using
the correct escape characters to format them as
shown above.
69
5
Introducing spreadsheets
Getting started
Before you can use a Æ 1 Logging in
computer system, you
need to know how to
access it correctly and this
Your school computer network
chapter will help you set A computer network is a 000 000
110001000
110011000
110001100
1000100011 100010001 01000110 00011000
1000100011 001000110 100110001 010001100110001
collection of computers and
110001000 00011000
010001100
110101000 1001100011 011000110 100010001 110001100010001 00011000
yourself up on your school 010001100
110001000
010001100
110001000
1000100011 001000110
1010100011 101000110
101010001 010001101010001
100010001 010001100010001
00011000
00011000
other digital devices that are
010001100
110001000 1000100011 001000110 100010001 010001100010001 00011000
6
1 Logging in
Section heading 7
Getting started
Click here to
open your
'Documents' A folder
folder. Files inside the
are normally 'Documents'
saved here. folder.
A file
inside the
'Documents'
folder.
8
2 File management, cloud computing and VLEs
9
Getting started
10
3 The internet and digital wellbeing
what you post. Do you sometimes get tired and grumpy when
you are using digital technology?
Copy and paste the URL of each website you visit
and then list the things the website advises you Is there anything you would like to change
should or should not do in a table. For example: about your use of digital technology?
URL: https://www.childnet.com/blog/online-
etiquette-or-netiquette-the-dos-and-donts-of- Tips for managing your use of digital
online-communication-
technology
Do Don’t
Be respectful Be sarcastic Before picking up your device, ask yourself what
you intend to achieve.
Make use of tools that tell you exactly how much
time you spend on each app.
Digital wellbeing Set a time limit for your tech usage each day and
Digital wellbeing is about having a healthy try to stick to it.
relationship with technology. Try to make small changes, such as switching off
Research suggests that 11-year-olds spend up to six some notifications.
hours online every day. Whether or not this is too Put your device into ‘Do not disturb’ mode before
much depends on the quality of the content you are going to bed, or when you have other work to do.
looking at and the activities you are doing online.
However, too much time spent online can affect
your friendships, your health and your performance
at school. Checking in
The effects of spending too much time online ➊ What is the internet?
include headaches and eye-strain, disturbed ➋ Name one thing that you might use the
sleep, falling out with friends and family, becoming internet for at school.
isolated, constantly talking about online activities ➌ Name one thing that you should not use the
such as gaming, prioritising your online activities internet for at school.
over other things that you should be doing and a
➍ Explain what we mean by ‘digital wellbeing’.
decline in the quality of your school work.
11
Getting started
Æ 4 Vector graphics
Data about an image can be stored by a computer width can be changed using formatting options.
as vector graphics or as bitmap graphics. It is also possible to layer objects to create a
Vector graphics are stored as a list of attributes. sense of depth or more complex shapes. Vector
graphics are scalable, which means that they
Larger pictures are made up of shapes called
can be enlarged without any loss in quality as
objects and the attributes for each object are stored
shown here.
separately. The attributes include information such
as the object’s:
height
width
x and y coordinates for the points
outline colour
line width
fill colour.
The shape of the object is stored as a set of points, Even if an object in a vector graphic is quite large, it
and these are connected together by lines. So, for only uses a small amount of memory because the
example, the coordinates of the three corners of a image is recreated from the attributes. Therefore,
triangle are stored. the file size of a vector graphic is often quite
Each object and its attributes can be edited small. Common vector graphic formats are .eps
independently. Objects can be resized by clicking (Encapsulated PostScript File) and .svg (Scalable
and dragging on the points. The colour and line Vector Graphics File).
Æ A vector graphic
12
4 Vector graphics
Checking in
➊ What do we call an image that is made
up of objects?
➋ How is the shape of an object stored?
➌ Vector graphics are scalable. What does
this mean?
➍ Name one type of vector-graphic file.
13
Getting started
Æ 5 Bitmap graphics
Does anything seem strange to you about 0 0 1 10 10 11 01 01 1 0 0
0 1 0 00 01 00 10 00 0 1 0
this picture? 1 0 1 01 00 11 00 10 1 0 1
1 0 0 01 00 00 00 10 0 0 1
1 0 1 01 00 11 00 10 1 0 1
1 0 0 11 10 00 01 11 0 0 1
0 1 0 00 01 00 10 00 0 1 0
0 0 1 10 10 11 01 01 1 0 0
14
5 Bitmap graphics
Isolating an image
Download GIMP (GNU Image Manipulation 9 Once you are happy that all the background
Program), which is free and open-source image has been removed, choose the ‘Fuzzy Select
editing software. Then follow the instructions Tool’ and ensure that ‘Feather edges’ is
below to begin creating your own ‘impossible’ selected. Adjust the radius to about 25 to
photograph. blur the edges of the picture and smooth
1 Download and save an image of a real person. the colours.
Make sure it includes their whole body, not just 10 Select the background area and then click on
their head. ‘Select’ and ‘Invert’ to select the part of the
2 Open GIMP. image required. Copy the image using CTRL + C
or ‘Edit’ and ‘Copy’. Then, create a new layer
3 Click on ‘File’ and ‘Open’ and select your image.
using the new layer icon at the bottom right of
4 Right-click on the layer on the right-hand side of the screen . Make sure that the ‘Fill with’ field
the screen and click ‘Add Alpha Channel’. contains ‘Transparency’. Then paste your image
5 Choose the ‘Fuzzy Select Tool’ and click into the new layer using CTRL + V or ‘Edit’ and
on an area of the background that you wish to ‘Paste’. Finally, click on the anchor symbol to
remove. If necessary, adjust the ‘Threshold’ to lock your image to the new layer.
ensure that only unwanted areas of the image 11 Hide the original image by clicking on the eye
are selected. Then press CTRL + X (CMD + X if symbol to the left of the first layer, so that only
you’re using a Mac) to remove the selected area. the new layer is selected.
6 Repeat Step 5 to remove as much of the 12 Save your image as a GIMP file using ‘File’ and
background as possible. If you make an error, ‘Save’, remembering to give it a new name.
remember that you can use CTRL + Z to undo Then use ‘File’ and ‘Export’ to save it as a .png
your most recent changes. file. Make sure that your image is saved to your
7 Next, choose the ‘Free Select Tool’ to hand documents area.
draw around the remaining areas of background
and use CTRL + X to remove them.
8 Zoom, in using the + key and use the ‘Free
Select Tool’ to remove any background areas
with a significant colour difference close to the
outline of the person.
Checking in
➊ How are bitmap graphics saved?
➋ What determines the quality of a bitmap
image?
➌ What happens to the quality of bitmap
images when you zoom in?
➍ Name one type of bitmap graphic file.
15
Getting started
Æ 6 Impossible photographs
You now know how to isolate an image. Now you
are going to learn how to insert your cut-out into a
new background layer.
16
6 Impossible photographs
Impossible creature
Your final challenge is to use your image editing ‘Rectangle Select Tool’ to select part of each
skills to create an impossible creature, just like the animal
one in this photograph.
‘Scale Tool’ to match the parts of the two
Open GIMP and use the instructions on animals together.
pages 15–16 to help you. You will need to use the:
Checking in
➊ How can different images be combined using
graphics software?
➋ What does the background need to be set to
for this to work?
➌ What helps to make the new image look
realistic?
17
This title is also available
as an eBook with learning
support.
Visit hoddereducation.co.uk/boost
to find out more.