Free Educational Resources from Mr. Noureddine Tadjerout
Average Rating4.64
(based on 35 reviews)
I am a versatile professional with a diverse skill set and a strong background in education and technology. As an accomplished Author, Teacher Trainer, Examiner, and certified Apple Teacher and VEX Robotics. I have honed my expertise in Computer Science and Mathematics education. Additionally, I hold the role of Curriculum Development Specialist, focusing on Computer Science, Engineering, and Microsoft Office. I am passionate about creating educational resources and assisting fellow educators.
I am a versatile professional with a diverse skill set and a strong background in education and technology. As an accomplished Author, Teacher Trainer, Examiner, and certified Apple Teacher and VEX Robotics. I have honed my expertise in Computer Science and Mathematics education. Additionally, I hold the role of Curriculum Development Specialist, focusing on Computer Science, Engineering, and Microsoft Office. I am passionate about creating educational resources and assisting fellow educators.
Please make sure you practice geometric shapes below using python programming (turtle graphics) and make sure you learn the name of each geometric shape.
Please click the link below to start your practical tasks
https://trinket.io/
Show understanding of the need for input, output, primary memory and secondary (including removable) storage.Describe the principal operations of hardware devices Show understanding of the use of buffersExplain the differences between Random Access Memory (RAM) and Read Only Memory (ROM)Explain the differences between Static RAM (SRAM) and Dynamic RAM (DRAM)Explain the difference between Programmable ROM (PROM), Erasable Programmable ROM (EPROM) and Electrically Erasable Programmable ROM (EEPROM)Show an understanding of monitoring and control systems
Candidates should be able to:Use the following logic gate symbols:
Understand and define the functions of: NOT, AND, OR, NAND, NOR and XOR (EOR) gatesConstruct a logic circuitConstruct a truth tableConstruct a logic expression
Lesson Objectives: 5.1 Operating System
Explain why a computer system requires an Operating System (OS)Explain the key management tasks carried out by the Operating System:Including memory management, file management, security management, hardware management (input / output / peripherals), process management.Show understanding of the need for typical utility software provided with an Operating System:Including disk formatter, virus checker, defragmentation software, disk contents analysis/disk repair software, file compression, back-up software.Show understanding of program libraries: Including: • software under development is often constructed using existing code from program libraries• the benefits to the developer of software constructed using library files, including Dynamic Link Library (DLL) files.
Learning Objective: 5.2 Language Translators
Show understanding of the need for:• assembler software for the translation of an assembly language program• a compiler for the translation of a high-level language program• an interpreter for translation and execution of a high-level language programExplain the benefits and drawbacks of using either a compiler or interpreter and justify the use of each Show awareness that high-level language programs may be partially compiled and partially interpreted,such as JavaDescribe features found in a typical Integrated Development Environment (IDE)Including:• for coding, including context-sensitive prompts• for initial error detection, including dynamic syntax checks• for presentation, including prettyprint, expand and collapse code blocks• for debugging, including single stepping, breakpoints, i.e. variables, expressions, report window
6.1 Data Security
6.2 Data Integrity
Explain the difference between the terms security , privacy and integrity of data
Show appreciation of the need for both the security of data and the security of the
computer system
Describe security measures designed to protect computer systems, ranging from the
stand alone PC to a network of computers.
Including user accounts, passwords, authentication techniques such as digital
signatures, firewall, antivirus software, anti spyware, encryption.
Show understanding of the threats to computer and data security posed by networks
and the internet.
Including malware (virus, spyware), hackers, phishing, pharming.
Describe methods that can be used to restrict the risks posed by threats
Describe security methods designed to protect the security of data
Including encryption, access rights
Chapter 7: Ethics and Ownership
7.1 Legal, Moral, Ethical and Cultural implication
7.2 Copyright issues
7.3 Artificial Intelligence
Show understanding of the need for and purpose of ethics as a computing professional
Understand the importance of joining a professional ethical body including BCS (British Computer Society), IEEE (Institute of Electrical and Electronic Engineers).
Show understanding of the need to act ethically and the impact of acting ethically or unethically for a given situation.
Show understanding of the need for copyright legislation
Show understanding of the different types of software licensing and justify the use of a license for a given situation.
Licenses to include free Software Foundation, the Open Source Initiative, shareware and commercial software.Show understanding of Artificial Intelligence (AI)
Understand the impact of AI including social, economic and environmental issues
Understand the applications of AI
Revision for the IGCSE (CIE) computer science paper 22 May/June 2022 (part A and B) with pseudocode solution for part A
Attached revision paper 2 for Part A and B
Part A: Attached Pseudocode Solutuon for task 1/2/3 please help yourself
Part B: Database , validation, data type and Selection and Repetition,
Database:
Trace Table
Data Type and Selection or Repetition
Validation
Pseudocode algorithm
9.1 Computational Thinking Skills:
Show an understanding of abstraction
Need for and benefits of using abstraction
Describe the purpose of abstraction
Produce an abstract model of a system by only including essential details
Describe and use decomposition
Break down problems into sub-problems leading to the concept of a program module (procedure / function)
9.2 Algorithms:
Show understanding that an algorithm is a solution to a problem expressed as a sequence of defined steps.
Use suitable identifier names for the representation of data used by a problem and represent these using an identifier table
Write pseudocode that contains input, process and output
Write pseudocode using the three basic constructs of sequence, selection and iteration (repetition)
Document a simple algorithm using pseudocode
Write pseudocode from:
a structured English description
a flowchart
Describe and use the process of stepwise refinement to express an algorithm to a level of detail from which the task may be programmed
Use logic statements to define parts of an algorithm solution
Step by Step practical activities for year 8 pupils how to create a Rollover Button and Banners using Fireworks CS6 and Dreamweaver practical activities
Please feel free to leave comment and review. Thank you
Mr.N.T
Test 1 - Topic 1—System fundamentals with Questions and Answers
Test 1: 1.1.1 Identify the context for which a new system is planned.
Test 2- 1.1.2 Describe the need for change management.
Declare and use variables and constants
Understand and use basic data types: Integer, Real, Char, String and Boolean
Understand and use the concepts of sequence, selection, repetition, totalling and counting
Use predefined procedures/functions