This teaches students about Local Area Networks LAN and Wide Area Networks WAN, as well as the role of computers in the Client-Server and Peer-to-Peer models. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, two worksheets with answers, custom exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 2-3 Lessons
This resource is designed to cover:
Local Area Networks and common examples.
Wide Area Networks and common examples.
Client-Server and Peer-to-Peer Network Model.
Role of computers in the Client-Server and Peer-to-Peer models.
⠀
Other complete lessons in Unit 1.3:
Types of Networks (Current)
Network Performance
Network Hardware
The Internet
Network Topologies
Encryption (Free)
Standards and Network Protocols
Network Connections
This resource covers network threats, including malware, social engineering, brute-force, denial-of-service, data interception & theft, and SQL injection. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 2 Lessons
This resource is designed to cover:
Malware
Social Engineering
Brute-Force Attacks
Denial-of-Service Attacks
Data Interception
Data Theft
Concept of SQL injection
Purpose of each threat and how it is used.
⠀
This lesson teaches students about the internet: Domain Name Service (DNS), server hosting, the cloud, web servers, and clients. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1-2 Lessons
This resource is designed to cover:
The Internet: DNS, Hosting, The Cloud, Web Servers, and Clients.
Purpose of the DNS.
Purpose of the cloud.
Interaction between clients and web servers.
Different types of servers and the services they provide.
Advantages and disadvantages of the cloud.
⠀
Other complete lessons in Unit 1.3:
Types of Networks
Network Performance
Network Hardware
The Internet (Current)
Network Topologies
Encryption (Free)
Standards and Network Protocols
Network Connections
This resource covers the purpose of IP Addresses and MAC addresses, as well as different modes of connection: wireless (using Wi-Fi and Bluetooth) and wired (using Ethernet). It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
This resource is designed to cover:
Purpose of IP Addresses and MAC Addresses in networks.
Format of IP Addresses: IPv4 and IPv6.
Modes of connecting devices:
Wi-Fi
Bluetooth
Ethernet
Brief concept of layers.
⠀
Other complete lessons in Unit 1.3:
Types of Networks
Network Performance
Network Hardware
The Internet
Network Topologies
Encryption (Free)
Standards and Network Protocols
Network Connections (Current)
This lesson teaches students about the principle of standards and the different network protocols that are used for communication. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
This resource is designed to cover:
Principle of Standards
Different Types of Network Protocols and their Purpose:
TCP/IP
HTTP
HTTPS
FTP
SMTP
POP
IMAP
⠀
Other complete lessons in Unit 1.3:
Types of Networks
Network Performance
Network Hardware
The Internet
Network Topologies
Encryption (Free)
Standards and Network Protocols (Current)
Network Connections
This resource covers the conversion between binary and decimal integers to hexadecimal equivalents, and vice versa. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
Please note that a binary crash course version of this resource is available.
This resource is designed to cover:
Main problem with using binary.
Conversion between binary and hexadecimal values.
Conversion between hexadecimal and binary values.
Conversion between denary to hexadecimal values - two methods.
Conversion between hexadecimal and denary values.
⠀
Get all the resources, which cover the content for Unit 1.4, in one place and at a discounted price (10% off). This bundle contains the following resources:
Network Threats (OCR GCSE Lesson)
Network Security (OCR GCSE Lesson)
This resource covers the common ways vulnerabilities can be removed: penetration testing, anti-malware software, firewalls, user access levels, passwords, encryption, and physical security. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 2 Lessons
This resource is designed to cover:
How network threats are limited.
Common vulnerability prevention methods:
Penetration Testing
Anti-Malware Software
Firewalls
User Access Levels
Passwords
Encryption
Physical Security
⠀
This resource covers everything about utility software, including encryption, defragmentation, and data compression. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
This resource is designed to cover:
Purpose of specified utility software and why it is required:
Encryption software
Defragmentation
Data Compression
⠀
This resource covers binary shifts - multiplying and dividing binary values by ‘shifting’ them by a certain number of places. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
Please note that a binary crash course version of this resource is available.
This resource is designed to cover:
Effects of shifting binary values.
Shifting binary values to the left to multiply values by 2^x.
Shifting binary values to the right to divide values by 2^x.
⠀
This resource covers the addition of two binary values together and overflow errors that may occur. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
Please note that a binary crash course version of this resource is available.
This resource is designed to cover:
Adding two binary values up to and including 8 bits.
Why overflow errors occur.
⠀
This resource covers the conversion between binary integers and decimal values, and vice versa. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
Please note that a binary crash course version of this resource is available.
This resource is designed to cover:
What is binary?
Conversion between binary and denary.
Conversion between denary to binary - two methods.
⠀
This resource covers everything about the OS, including user interfaces, and memory, peripheral, user, and file management. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 2 Lesson
This resource is designed to cover:
User Interfaces: Graphical User Interface (GUI) and Command-Line Interface (CLI)
Memory Management
Multitasking
Peripheral Management, including Device Drivers
User Management
File Management
⠀
Buy these resources together and save 10%.
The following resources are included:
Binary & Denary to Hexadecimal (OCR GCSE Lesson)
Binary to Denary (OCR GCSE Lesson)
Binary Addition (OCR GCSE Lesson)
Binary Shifts (OCR GCSE Lesson)
This covers a variety of examples of the main legal, environmental, and privacy issues of digital technology. This resource has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
This resource is here to save you time and hassle. With our top-quality teaching material, you can easily reuse and adapt them to fit your unique teaching style. Say goodbye to the stress of lesson planning and hello to more time for what matters most.
ㅤ
ㅤ
█▀▀ █▀▀ ▄▀█ ▀█▀ █░█ █▀█ █▀▀ █▀
█▀░ ██▄ █▀█ ░█░ █▄█ █▀▄ ██▄ ▄█
This resource is designed to cover:
Variety of examples of legal, environmental, and privacy issues.
Key stakeholders and how they are impacted by digital technology.
⠀
Suggested Duration: 1-2 Lesson(s)
⠀
Other complete lessons in Unit 1.6:
Ethical and Cultural Issues
Legal, Environmental, and Privacy Issues (Current)
Laws and Legislation
Software Licenses
You can also view a discounted bundle that contains all the above resources.
ㅤ
ㅤ
█▀█ ▀█▀ █░█ █▀▀ █▀█
█▄█ ░█░ █▀█ ██▄ █▀▄
You might like these other resource(s):
Multiple-Choice Revision Questions for Paper 1 (Set A)
ㅤ
ㅤ
ㅤ
░█████╗░░█████╗░███╗░░░███╗██████╗░██╗░░░██╗████████╗██╗███╗░░██╗░██████╗░
██╔══██╗██╔══██╗████╗░████║██╔══██╗██║░░░██║╚══██╔══╝██║████╗░██║██╔════╝░
██║░░╚═╝██║░░██║██╔████╔██║██████╔╝██║░░░██║░░░██║░░░██║██╔██╗██║██║░░██╗░
██║░░██╗██║░░██║██║╚██╔╝██║██╔═══╝░██║░░░██║░░░██║░░░██║██║╚████║██║░░╚██╗
╚█████╔╝╚█████╔╝██║░╚═╝░██║██║░░░░░╚██████╔╝░░░██║░░░██║██║░╚███║╚██████╔╝
░╚════╝░░╚════╝░╚═╝░░░░░╚═╝╚═╝░░░░░░╚═════╝░░░░╚═╝░░░╚═╝╚═╝░░╚══╝░╚═════╝░
░██╗░░░░░░░██╗██╗███████╗░█████╗░██████╗░██████╗░
░██║░░██╗░░██║██║╚════██║██╔══██╗██╔══██╗██╔══██╗
░╚██╗████╗██╔╝██║░░███╔═╝███████║██████╔╝██║░░██║
░░████╔═████║░██║██╔══╝░░██╔══██║██╔══██╗██║░░██║
░░╚██╔╝░╚██╔╝░██║███████╗██║░░██║██║░░██║██████╔╝
░░░╚═╝░░░╚═╝░░╚═╝╚══════╝╚═╝░░╚═╝╚═╝░░╚═╝╚═════╝░
These revision questions for computer science paper 2 are designed to sharpen students’ readiness for the exams, by finding any weaknesses in their knowledge and ensuring a thorough grasp of the topic. This activity can be used as a starter, main lesson activity, and even as homework!
You can easily reuse and adapt our top-quality teaching material to fit your unique teaching style. This activity is suitable for classroom use or for self-study at home.
█▀▀ █▀▀ ▄▀█ ▀█▀ █░█ █▀█ █▀▀ █▀
█▀░ ██▄ █▀█ ░█░ █▄█ █▀▄ ██▄ ▄█
Compliant with the OCR GCSE Computer Science specification J277.
This resource contains:
55 multiple-choice questions which cover the content found in paper 2, designed to find any gaps in knowledge so students can be ready for the exams!
A mark scheme for each question allows for students to self-evaluate their work.
⠀
Other useful resources from us:
Grade 9-7 Practice Q’ (Set B) - Exam Q’ Practice (OCR GCSE J277)
Long Answer Practice Q’ (Set B) - Exam Q’ Practice (OCR GCSE J277)
Random Numbers - Python Programming Challenges
█▀▀ █▀█ █ █▀▄▀█ █▀ █▀█ █▄░█
█▄▄ █▀▄ █ █░▀░█ ▄█ █▄█ █░▀█
█░█░█ █ ▀█ ▄▀█ █▀█ █▀▄
▀▄▀▄▀ █ █▄ █▀█ █▀▄ █▄▀
Feel free to leave any feedback in the review section below! :)
Get all the resources, which cover the content for Unit 1.5, in one place and at a discounted price (10% off). This bundle contains the following resources:
Operating Systems (OCR GCSE Lesson)
Utility Software (OCR GCSE Lesson)
The main laws and legislations are covered: Data Protection Act 2018, Computer Misuse Act 1990, and Copyright Designs and Patents Act 1988. This resource has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
This teaching resource is here to save you time and hassle. With our top-quality materials, you can easily reuse and adapt them to fit your unique teaching style. Say goodbye to the stress of lesson planning and hello to more time for what matters most.
Suggested Duration: 1 Lesson
This resource is designed to cover:
Purpose of each legislation and the actions it allows or prohibits:
Data Protection Act 2018
Computer Misuse Act 1990
Copyright Designs and Patents Act 1988
⠀
Other complete lessons in Unit 1.6:
Ethical and Cultural Issues
Legal, Environmental, and Privacy Issues
Laws and Legislation (Current)
Software Licenses
You can also view a discounted bundle that contains all the above resources.
Buy these resources together and save 14%.
The following resources are included in this bundle:
Operating Systems (OCR GCSE Lesson)
Software Licenses (OCR GCSE Lesson)
Utility Software (OCR GCSE Lesson)
Get all the resources, which cover the content for Unit 1.6, in one place and at a discounted price (13% off). This bundle contains the following resources:
Ethical and Cultural Issues (OCR GCSE Lesson)
Legal, Environmental, and Privacy Issues (OCR GCSE Lesson)
Laws and Legislation (OCR GCSE Lesson)
Software Licenses (OCR GCSE Lesson)