Free Educational Resources from Mr. Noureddine Tadjerout
Average Rating4.64
(based on 35 reviews)
I am a versatile professional with a diverse skill set and a strong background in education and technology. As an accomplished Author, Teacher Trainer, Examiner, and certified Apple Teacher and VEX Robotics. I have honed my expertise in Computer Science and Mathematics education. Additionally, I hold the role of Curriculum Development Specialist, focusing on Computer Science, Engineering, and Microsoft Office. I am passionate about creating educational resources and assisting fellow educators.
I am a versatile professional with a diverse skill set and a strong background in education and technology. As an accomplished Author, Teacher Trainer, Examiner, and certified Apple Teacher and VEX Robotics. I have honed my expertise in Computer Science and Mathematics education. Additionally, I hold the role of Curriculum Development Specialist, focusing on Computer Science, Engineering, and Microsoft Office. I am passionate about creating educational resources and assisting fellow educators.
Describe the purpose of an operating system (You will be required to understand the purpose and function of an operating system and why it is needed. you will not be required to understand how operating system work.)
Show understanding of the need for interrupts
Show understanding of the basic Von Neumann model for a computer system and the stored program concept (program instructions and data are stored in main memory and instructions are fetched and executed one after another)
Describe the stages of the fetch-execute cycle, including the use of registers and buses
Show understanding of how data are kept safe when stored and transmitted, including:
use of passwords, both entered at a keyboard and biometric
use of firewalls, both software and hardware, including proxy servers
use of security protocols such as Secure Socket Layer (SSL) and Transport Layer Security (TLS)
use of symmetric encryption (plain text, cypher text and use of a key) showing understanding that
increasing the length of a key increases the strength of the encryption
Show understanding of the need to keep online systems safe from attacks including denial of service attacks, phishing, pharming.
Describe how security can be applied to real-life scenarios including, for example, online banking, shopping or safeguards when carrying out online transactions .
Creating Slideshows
Using the Master Slide
Manipulating Individual Slides
Manipulating Images
Using Charts/ Graphs on a PowerPoint
Presenter Notes, Slide Animations and Slide Transitions
Printing Slideshows
Show understanding of computer ethics, including copyright issues and plagiarism
Distinguish between free software, freeware and shareware
Show understanding of the ethical issues raised by the spread of electronic communication and computer systems, including hacking, cracking and production of malware
Student Project -Chapter 7: Ethics and Ownership:
You are going to search on:
• ethics
• the responsibilities of the computer professional
• copyright
• software licensing
• artificial intelligence.
Main aims of the student project for Security Privacy and Data Integrity:
You are going to search on:
• data integrity
• data privacy
• data security
• validation and verification
Lesson Objectives:
Lesson 1
All of you will…
Draw simple shapes using the turtle
Understand the use of different commands such as move forward, backward, left, right
Most of you will…
Use computational thinking skills to look for repeating patterns and include them in your programming
Lesson 2
Understand the motion commands with Python turtle module
Understand the use of Variables and how to assign them values.
Understand the use of different commands such as PenUp/PenDown, goto, forward, backward, left, right and t.begin_fill() & t.end_fill(), t.goto(x,y), t.setposition(x,y), t.pensize(value), t.setheading(value), t.color(‘green’)
Lesson 3
What you’re aiming for in this lesson is to:
familiarize yourself with the various code statements
play with the code and learn how to change and adapt it. For example, if you have the code for a small red square, you should be able to change it to make a big yellow square.
be able to use the code we have developed for various shapes to create a picture.
Please make sure you practice geometric shapes below using python programming (turtle graphics) and make sure you learn the name of each geometric shape.
Please click the link below to start your practical tasks
https://trinket.io/
Lesson Objectives: 5.1 Operating System
Explain why a computer system requires an Operating System (OS)Explain the key management tasks carried out by the Operating System:Including memory management, file management, security management, hardware management (input / output / peripherals), process management.Show understanding of the need for typical utility software provided with an Operating System:Including disk formatter, virus checker, defragmentation software, disk contents analysis/disk repair software, file compression, back-up software.Show understanding of program libraries: Including: • software under development is often constructed using existing code from program libraries• the benefits to the developer of software constructed using library files, including Dynamic Link Library (DLL) files.
Learning Objective: 5.2 Language Translators
Show understanding of the need for:• assembler software for the translation of an assembly language program• a compiler for the translation of a high-level language program• an interpreter for translation and execution of a high-level language programExplain the benefits and drawbacks of using either a compiler or interpreter and justify the use of each Show awareness that high-level language programs may be partially compiled and partially interpreted,such as JavaDescribe features found in a typical Integrated Development Environment (IDE)Including:• for coding, including context-sensitive prompts• for initial error detection, including dynamic syntax checks• for presentation, including prettyprint, expand and collapse code blocks• for debugging, including single stepping, breakpoints, i.e. variables, expressions, report window
6.1 Data Security
6.2 Data Integrity
Explain the difference between the terms security , privacy and integrity of data
Show appreciation of the need for both the security of data and the security of the
computer system
Describe security measures designed to protect computer systems, ranging from the
stand alone PC to a network of computers.
Including user accounts, passwords, authentication techniques such as digital
signatures, firewall, antivirus software, anti spyware, encryption.
Show understanding of the threats to computer and data security posed by networks
and the internet.
Including malware (virus, spyware), hackers, phishing, pharming.
Describe methods that can be used to restrict the risks posed by threats
Describe security methods designed to protect the security of data
Including encryption, access rights
10.1 Data Types and Records:
Select and use appropriate data types for a problem solution
including integer, real, char, string, Boolean, date (pseudocode will use the following data types: INTEGER, REAL, CHAR, STRING, BOOLEAN, DATE, ARRAY, FILE)
Show understanding of the purpose of a record structure to hold a set of data of different data types under one identifier
Write pseudocode to define a record structure.
Write pseudocode to read data from a record structure and save data to a record structure
10.2 Arrays:
Use the technical terms associated with arrays (Including index, upper and lower bound)
Select a suitable data structure (1D or 2D array) to use for a given task
Write pseudocode for 1D and 2D arrays
Write pseudocode to process array data
Sort using a bubble sort
Search using a linear search
10.3 Files:
Show understanding of why files are needed
Write pseudocode to handle text files that consist of one or more lines
10.4 Introduction to Abstract Data Types (ADT):
Show understanding that an ADT is a collection of data and a set of operations on those data.
Show understanding that a stack, queue and linked list are examples of ADTs
Describe the key features of a stack, queue and linked list and justify their use for a given situation
Use a stack, queue and linked list to store data
(You will not be required to write pseudocode for these structures, but they should be able to add, edit and delete data from these structures)
Describe how a queue, stack and linked list can be implemented using arrays
Revision for the IGCSE (CIE) computer science paper 22 May/June 2022 (part A and B) with pseudocode solution for part A
Attached revision paper 2 for Part A and B
Part A: Attached Pseudocode Solutuon for task 1/2/3 please help yourself
Part B: Database , validation, data type and Selection and Repetition,
Database:
Trace Table
Data Type and Selection or Repetition
Validation
Pseudocode algorithm
9.1 Computational Thinking Skills:
Show an understanding of abstraction
Need for and benefits of using abstraction
Describe the purpose of abstraction
Produce an abstract model of a system by only including essential details
Describe and use decomposition
Break down problems into sub-problems leading to the concept of a program module (procedure / function)
9.2 Algorithms:
Show understanding that an algorithm is a solution to a problem expressed as a sequence of defined steps.
Use suitable identifier names for the representation of data used by a problem and represent these using an identifier table
Write pseudocode that contains input, process and output
Write pseudocode using the three basic constructs of sequence, selection and iteration (repetition)
Document a simple algorithm using pseudocode
Write pseudocode from:
a structured English description
a flowchart
Describe and use the process of stepwise refinement to express an algorithm to a level of detail from which the task may be programmed
Use logic statements to define parts of an algorithm solution