This teaches students about lossy and lossless compression, along with the need for compression, and the effect on files. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
This resource is designed to cover:
Why compression is used.
Lossy and Lossless compression.
Scenarios where each type of compression may be used.
Advantages and disadvantages of each type of compression - there is a worksheet task designed for students to obtain this information from the presentation.
Effects on different types of files.
⠀
Other complete lessons in Unit 1.2:
RAM, ROM, and Virtual Memory (Primary Storage)
Units of Storage
Secondary Storage
Binary Crash Course
Representing Images
Representing Sound
Representing Characters
Compression (Current)
This is designed to teach students how images are represented in computers. It provides an overview on bitmaps and vectors, and goes into detail on how pixels are represented. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
This resource is designed to cover:
How an image is represented using pixels.
How each pixel is represented.
Effect of colour depth and resolution on images.
Metadata.
Calculating the size of an image file.
⠀
Other complete lessons in Unit 1.2:
RAM, ROM, and Virtual Memory (Primary Storage)
Units of Storage
Secondary Storage
Binary Crash Course
Representing Images (Current)
Representing Sound
Representing Characters
Compression
This teaches students about Local Area Networks LAN and Wide Area Networks WAN, as well as the role of computers in the Client-Server and Peer-to-Peer models. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, two worksheets with answers, custom exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 2-3 Lessons
This resource is designed to cover:
Local Area Networks and common examples.
Wide Area Networks and common examples.
Client-Server and Peer-to-Peer Network Model.
Role of computers in the Client-Server and Peer-to-Peer models.
⠀
Other complete lessons in Unit 1.3:
Types of Networks (Current)
Network Performance
Network Hardware
The Internet
Network Topologies
Encryption (Free)
Standards and Network Protocols
Network Connections
Secondary storage can be a difficult idea to get your head around, but this complete lesson is going to change that! It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a flashcards worksheet with answers, custom exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 2-3 Lessons
This resource is designed to cover:
The need for secondary storage.
Common types of storage technology: optical, magnetic, solid-state/flash.
Advantages and disadvantages of storage technology.
Characteristics of secondary storage technology: cost, capacity, speed, portability, durability, reliability.
⠀
Other complete lessons in Unit 1.2:
RAM, ROM, and Virtual Memory (Primary Storage)
Units of Storage
Secondary Storage (Current)
Binary Crash Course
Representing Images
Representing Sound
Representing Characters
Compression
This is designed to teach how characters are represented using binary in computers, and character sets: ASCII, Extended ASCII and Unicode. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
This resource is designed to cover:
How characters are represented using binary codes.
Character sets: ASCII, Extended ASCII, Unicode.
Character limit due to how many bits are used to represent a character.
Logical order of characters in character sets.
⠀
Other complete lessons in Unit 1.2:
RAM, ROM, and Virtual Memory (Primary Storage)
Units of Storage
Secondary Storage
Binary Crash Course
Representing Images
Representing Sound
Representing Characters (Current)
Compression
This resource covers the purpose of IP Addresses and MAC addresses, as well as different modes of connection: wireless (using Wi-Fi and Bluetooth) and wired (using Ethernet). It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
This resource is designed to cover:
Purpose of IP Addresses and MAC Addresses in networks.
Format of IP Addresses: IPv4 and IPv6.
Modes of connecting devices:
Wi-Fi
Bluetooth
Ethernet
Brief concept of layers.
⠀
Other complete lessons in Unit 1.3:
Types of Networks
Network Performance
Network Hardware
The Internet
Network Topologies
Encryption (Free)
Standards and Network Protocols
Network Connections (Current)
This lesson teaches students about the star and mesh network topologies. This includes the advantages and disadvantages of each topology. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1-2 Lessons
This resource is designed to cover:
Star Network Topology
Mesh Network Topology
Advantages and Disadvantages of the Star and Mesh Topologies
⠀
Other complete lessons in Unit 1.3:
Types of Networks
Network Performance
Network Hardware
The Internet
Network Topologies (Current)
Encryption (Free)
Standards and Network Protocols
Network Connections
This resource covers the common ways vulnerabilities can be removed: penetration testing, anti-malware software, firewalls, user access levels, passwords, encryption, and physical security. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 2 Lessons
This resource is designed to cover:
How network threats are limited.
Common vulnerability prevention methods:
Penetration Testing
Anti-Malware Software
Firewalls
User Access Levels
Passwords
Encryption
Physical Security
⠀
This lesson teaches students about the internet: Domain Name Service (DNS), server hosting, the cloud, web servers, and clients. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1-2 Lessons
This resource is designed to cover:
The Internet: DNS, Hosting, The Cloud, Web Servers, and Clients.
Purpose of the DNS.
Purpose of the cloud.
Interaction between clients and web servers.
Different types of servers and the services they provide.
Advantages and disadvantages of the cloud.
⠀
Other complete lessons in Unit 1.3:
Types of Networks
Network Performance
Network Hardware
The Internet (Current)
Network Topologies
Encryption (Free)
Standards and Network Protocols
Network Connections
This lesson teaches students about the principle of standards and the different network protocols that are used for communication. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
This resource is designed to cover:
Principle of Standards
Different Types of Network Protocols and their Purpose:
TCP/IP
HTTP
HTTPS
FTP
SMTP
POP
IMAP
⠀
Other complete lessons in Unit 1.3:
Types of Networks
Network Performance
Network Hardware
The Internet
Network Topologies
Encryption (Free)
Standards and Network Protocols (Current)
Network Connections
This resource covers network threats, including malware, social engineering, brute-force, denial-of-service, data interception & theft, and SQL injection. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 2 Lessons
This resource is designed to cover:
Malware
Social Engineering
Brute-Force Attacks
Denial-of-Service Attacks
Data Interception
Data Theft
Concept of SQL injection
Purpose of each threat and how it is used.
⠀
The main laws and legislations are covered: Data Protection Act 2018, Computer Misuse Act 1990, and Copyright Designs and Patents Act 1988. This resource has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
This teaching resource is here to save you time and hassle. With our top-quality materials, you can easily reuse and adapt them to fit your unique teaching style. Say goodbye to the stress of lesson planning and hello to more time for what matters most.
Suggested Duration: 1 Lesson
This resource is designed to cover:
Purpose of each legislation and the actions it allows or prohibits:
Data Protection Act 2018
Computer Misuse Act 1990
Copyright Designs and Patents Act 1988
⠀
Other complete lessons in Unit 1.6:
Ethical and Cultural Issues
Legal, Environmental, and Privacy Issues
Laws and Legislation (Current)
Software Licenses
You can also view a discounted bundle that contains all the above resources.
This resource covers the features of open-source software and proprietary software. This resource has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
This resource is here to save you time and hassle. With our top-quality teaching material, you can easily reuse and adapt them to fit your unique teaching style. Say goodbye to the stress of lesson planning and hello to more time for what matters most.
Suggested Duration: 1 Lesson
This resource is designed to cover:
Purpose of a software license and why they are used.
Features of open-source software.
Features of proprietary software.
Recommending a type of license for a given scenario. This includes the benefits and drawbacks.
⠀
Other complete lessons in Unit 1.6:
Ethical and Cultural Issues
Legal, Environmental, and Privacy Issues
Laws and Legislation
Software Licenses (Current)
You can also view a discounted bundle that contains all the above resources.
This resource covers the conversion between binary and decimal integers to hexadecimal equivalents, and vice versa. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
Please note that a binary crash course version of this resource is available.
This resource is designed to cover:
Main problem with using binary.
Conversion between binary and hexadecimal values.
Conversion between hexadecimal and binary values.
Conversion between denary to hexadecimal values - two methods.
Conversion between hexadecimal and denary values.
⠀
This resource covers the conversion between binary integers and decimal values, and vice versa. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
Please note that a binary crash course version of this resource is available.
This resource is designed to cover:
What is binary?
Conversion between binary and denary.
Conversion between denary to binary - two methods.
⠀
This resource covers everything about utility software, including encryption, defragmentation, and data compression. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
This resource is designed to cover:
Purpose of specified utility software and why it is required:
Encryption software
Defragmentation
Data Compression
⠀
This resource covers binary shifts - multiplying and dividing binary values by ‘shifting’ them by a certain number of places. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
Please note that a binary crash course version of this resource is available.
This resource is designed to cover:
Effects of shifting binary values.
Shifting binary values to the left to multiply values by 2^x.
Shifting binary values to the right to divide values by 2^x.
⠀
This resource covers the addition of two binary values together and overflow errors that may occur. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
Please note that a binary crash course version of this resource is available.
This resource is designed to cover:
Adding two binary values up to and including 8 bits.
Why overflow errors occur.
⠀
This resource covers everything about the OS, including user interfaces, and memory, peripheral, user, and file management. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 2 Lesson
This resource is designed to cover:
User Interfaces: Graphical User Interface (GUI) and Command-Line Interface (CLI)
Memory Management
Multitasking
Peripheral Management, including Device Drivers
User Management
File Management
⠀
Learn all about Python exception handling! Teach students to catch errors, use try-except blocks, and create robust Python programs that handle unexpected issues smoothly and efficiently. This interactive workbook includes examples, challenges, and annotated solutions to allow students to self-evaluate their code.
You can easily reuse and build upon our top-quality teaching material to fit your unique teaching style. This activity is suitable for classroom use or for self-study at home, and allows for students to develop their problem-solving skills.
█▀▀ █▀▀ ▄▀█ ▀█▀ █░█ █▀█ █▀▀ █▀
█▀░ ██▄ █▀█ ░█░ █▄█ █▀▄ ██▄ ▄█
This resource can be used for both GCSE and A-Level classes.
This workbook contains 9x pages with:
Explanations & Examples to simplify learning and clarify concepts which are complex to understand at first.
6x Challenging Tasks to apply knowledge learned and enhance problem-solving skills. Some challenges may require more thinking and research than others.
Solutions in both source code form and written form for students who use online compilers.
Other useful resources from us:
Dictionaries - Python Programming Challenges
█▀▀ █▀█ █ █▀▄▀█ █▀ █▀█ █▄░█
█▄▄ █▀▄ █ █░▀░█ ▄█ █▄█ █░▀█
█░█░█ █ ▀█ ▄▀█ █▀█ █▀▄
▀▄▀▄▀ █ █▄ █▀█ █▀▄ █▄▀