Welcome to my TES shop, here you will find Computing and ICT related items which will be of use throughout the secondary context.
Feel free to have a browse of the resources available, which include:
-Individual Lessons
-Full Schemes of work
-Mock Exam Papers & Mark Schemes
-Revision Plans
All resources are available at a very reasonable price and have be used effectively to teach lessons.
Enjoy!
Welcome to my TES shop, here you will find Computing and ICT related items which will be of use throughout the secondary context.
Feel free to have a browse of the resources available, which include:
-Individual Lessons
-Full Schemes of work
-Mock Exam Papers & Mark Schemes
-Revision Plans
All resources are available at a very reasonable price and have be used effectively to teach lessons.
Enjoy!
NEW J277 SPECIFICATION
Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.3 Computer Networks, Connections and Protocols
1.3.1 Networks and topologies ¨ Types of network:
o LAN (Local Area Network)
o WAN (Wide Area Network)
¨ Factors that affect the performance of networks
¨ The different roles of computers in a client-server and a peer-topeer network
¨ The hardware needed to connect stand-alone computers into a
Local Area Network:
o Wireless access points
o Routers
o Switches
o NIC (Network Interface Controller/Card)
o Transmission media
¨ The Internet as a worldwide collection of computer networks:
o DNS (Domain Name Server)
o Hosting
o The Cloud
o Web servers and clients
¨ Star and Mesh network topologies
1.3.2 Wired and wireless networks, protocols and layers ¨ Modes of connection:
o Wired
• Ethernet
o Wireless
• Wi-Fi
• Bluetooth
¨ Encryption
¨ IP addressing and MAC addressing
¨ Standards
¨ Common protocols including:
o TCP/IP (Transmission Control Protocol/Internet Protocol)
o HTTP (Hyper Text Transfer Protocol)
o HTTPS (Hyper Text Transfer Protocol Secure)
o FTP (File Transfer Protocol)
o POP (Post Office Protocol)
o IMAP (Internet Message Access Protocol)
o SMTP (Simple Mail Transfer Protocol)
¨ The concept of layers
NEW J277 SPECIFICATION
Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.4 Network Security
1.4.1 Threats to computer systems and networks ¨ Forms of attack:
o Malware
o Social engineering, e.g. phishing, people as the ‘weak point’
o Brute-force attacks
o Denial of service attacks
o Data interception and theft
o The concept of SQL injection
1.4.2 Identifying and preventing vulnerabilities
¨ Common prevention methods:
o Penetration testing
o Anti-malware software
o Firewalls
o User access levels
o Passwords
o Encryption
o Physical security
NEW J277 SPECIFICATION
Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.5 Systems Security
The purpose and functionality of operating systems:
o User interface
o Memory management and multitasking
o Peripheral management and drivers
o User management
o File management
1.5.2 Utility software
¨ The purpose and functionality of utility software
¨ Utility system software:
o Encryption software
o Defragmentation
o Data compression
Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.6 Systems Security which includes:
forms of attack
threats posed to networks:
malware
phishing
people as the ‘weak point’ in secure systems (social engineering)
brute force attacks
denial of service attacks
data interception and theft
the concept of SQL injection
poor network policy
identifying and preventing vulnerabilities:
penetration testing
network forensics
network policies
anti-malware software
firewalls
user access levels
passwords
encryption.
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Check out my shop to save on buying multiple sheets!!
Enjoy!
NEW J277 SPECIFICATION:
Here you will find easy to follow revision sheets which will help your students to recap the topic:
2.4 – Boolean logic
Simple logic diagrams using the operators AND, OR and NOT
Truth tables
Combining Boolean operators using AND, OR and NOT
Applying logical operators in truth tables to solve problems
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Enjoy!
NEW J277 SPECIFICATION:
Here you will find easy to follow revision sheets which will help your students to recap the topic:
2.2 – Programming fundamentals
¨ The use of variables, constants, operators, inputs, outputs and
assignments
¨ The use of the three basic programming constructs used to
control the flow of a program:
o Sequence
o Selection
o Iteration (count- and condition-controlled loops)
¨ The common arithmetic operators
¨ The common Boolean operators AND, OR and NOT
The use of data types:
o Integer
o Real
o Boolean
o Character and string
o Casting
The use of basic string manipulation
¨ The use of basic file handling operations:
o Open
o Read
o Write
o Close
¨ The use of records to store data
¨ The use of SQL to search for data
¨ The use of arrays (or equivalent) when solving problems, including
both one-dimensional (1D) and two-dimensional arrays (2D)
¨ How to use sub programs (functions and procedures) to produce
structured code
¨ Random number generation
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Enjoy!
A complete set of revision sheets for J277 OCR Computer Science. Includes all of the topics for the first unit J277/02: Computational thinking, algorithms and programming
2.1 Algorithms
2.2 Programming fundamentals
2.3 Producing robust programs
2.4 Boolean logic
2.5 Programming languages and Integrated
Development Environments
With over 100 practice questions to test your students!!!