Welcome to my TES shop, here you will find Computing and ICT related items which will be of use throughout the secondary context.
Feel free to have a browse of the resources available, which include:
-Individual Lessons
-Full Schemes of work
-Mock Exam Papers & Mark Schemes
-Revision Plans
All resources are available at a very reasonable price and have be used effectively to teach lessons.
Enjoy!
Welcome to my TES shop, here you will find Computing and ICT related items which will be of use throughout the secondary context.
Feel free to have a browse of the resources available, which include:
-Individual Lessons
-Full Schemes of work
-Mock Exam Papers & Mark Schemes
-Revision Plans
All resources are available at a very reasonable price and have be used effectively to teach lessons.
Enjoy!
An easy to follow worksheet designed to revisit the FDE Cycle and the Von Neumann Architecture as part of 1.1 Systems Architecture in the Computer Systems component.
The worksheet s designed for students to read over their notes, and attempt the questions, Answer sheet is included.
Has been found useful for mock papers with the students in the past
** Answers are included for teachers who are new to the subject
As part of the 3D Printing module students are tasked with creating a product, this lesson takes them through the process of developing their product
***The whole unit is also available in my shop! Grab a bargain! and decrease your planning time!***
As part of the 3d printing module students are tasked with designing and implementing a product, this takes the students through that process and introduces them to the importance of design work
They are then tasked with producing a design which is to be implemented
***The whole unit is also available in my shop! Grab a bargain! and decrease your planning time!***
Attached is the solution i made to the sample task released by OCR, it has been created using Python (version 3) with the use of the SQLite3 library.
An SQL database was created called students to store the information needed.
The program allows the user to log in and do the following:
1. Enter and store the students details
2. Recall a students details (need ID number)
3. Show all students
4. Show students by gender
5. Show students by form
6. Delete a Student
7. Log out
the data in the database was created using a random name/street generator.
This is the second lesson on Google Sketchup, it introduces the students to new skills that can be used as part of their designing process.
Also included is a worksheet to assist in using the previous tools.
***The whole unit is also available in my shop! Grab a bargain! and decrease your planning time!***
Here you will find easy to follow revision sheets which will help your students to recap the topics in 2.1 Growing The Business, these include:
2.1.1. Business Growth
2.1.2. Changes In Business Aims And Objectives
2.1.3 Business and Globalisation
2.1.4 Ethics, Environment & Business
Attached at the end of the notes are revision questions which the students should be able to answer once they have studied the topic.
Enjoy!
Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.2 Memory which includes:
the difference between RAM and ROM
the purpose of ROM in a computer system
the purpose of RAM in a computer system
the need for virtual memory
flash memory.
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Check out my shop to save on buying multiple sheets!!
Enjoy!
Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.3 Storage which includes:
the need for secondary storage
data capacity and calculation of data capacity requirements
common types of storage:
optical
magnetic
solid state
suitable storage devices and storage media for a given application, and the advantages and
disadvantages of these, using characteristics:
capacity
speed
portability
durability
reliability
cost
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Check out my shop to save on buying multiple sheets!!
Enjoy!
Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.6 Systems Security which includes:
forms of attack
threats posed to networks:
malware
phishing
people as the ‘weak point’ in secure systems (social engineering)
brute force attacks
denial of service attacks
data interception and theft
the concept of SQL injection
poor network policy
identifying and preventing vulnerabilities:
penetration testing
network forensics
network policies
anti-malware software
firewalls
user access levels
passwords
encryption.
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Check out my shop to save on buying multiple sheets!!
Enjoy!
The complete revision set for OCR Computer Science. For all topics:
Computer systems
• Systems Architecture
• Memory
• Storage
• Wired and wireless networks
• Network topologies, protocols
and layers
• System security
• System software
• Ethical, legal, cultural and
environmental concerns
Computational thinking, algorithms
and programming
• Algorithms
• Programming techniques
• Producing robust programs
• Computational logic
• Translators and facilities of
languages
• Data representation
included are 100’s of practice questions related to each topic!
Buy now save ££££’s!
NEW J277 SPECIFICATION:
Here you will find easy to follow revision sheets which will help your students to recap the topic:
2.3 Producing Robust Programs
¨ Defensive design considerations:
o Anticipating misuse
o Authentication
¨ Input validation
¨ Maintainability:
o Use of sub programs
o Naming conventions
o Indentation
o Commenting
¨ The purpose of testing
¨ Types of testing:
o Iterative
o Final/terminal
¨ Identify syntax and logic errors
¨ Selecting and using suitable test data:
o Normal
o Boundary
o Invalid/Erroneous
¨ Refining algorithms
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Enjoy!
Attached is a lesson on how to write to a database using SQLite3 in Python. Included are the following:
1. PPT explaining how to write to a database
2. Example programs (in zip file)
3.Example Database (in zip file, access through a program such as DB Browser (Freeware))
if you need free software to run and connect to sql databases please download the DB Broswer for FREE and also check out a little guide i made to the software, also FREE:
https://www.tes.com/teaching-resource/sqlite-program-introduction-db-browser-11751031
In this pack is a scheme of work which can be used in KS3, why plan when you can have your whole year done for you!
Included are the following topics:
-Digital Safety
-Sequencing & Microbits
-Hardware & Software
-3d Printing in Sketchup Pro
-Python Programming
Topics in the pack can also be bought as separates if you prefer from my shop.
Here you will find the resources to complete Unit 19 in the level 3 Cambridge Technicals.
All of the Learning Objectives have been covered and the lessons contain notes from the chief moderator from OCR.
The assignment which has been used has also been checked using the Assignment Checking service from OCR. (Service is £30 per assignment)
Enjoy!
Attached is a lesson on how to use MAX, MIN & AVG in SQLite3 in Python. Included are the following:
1. PPT explaining how to use the functions
2. Example programs (in zip file)
3.Example Database (in zip file, access through a program such as DB Browser (Freeware))
if you need free software to run and connect to sql databases please download the DB Broswer for FREE and also check out a little guide i made to the software, also FREE:
https://www.tes.com/teaching-resource/sqlite-program-introduction-db-browser-11751031
Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.7 Systems Software which includes:
the purpose and functionality of systems software
operating systems:
user interface
memory management/multitasking
peripheral management and drivers
user management
file management
utility system software:
encryption software
defragmentation
data compression
the role and methods of backup:
full
incremental.
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Check out my shop to save on buying multiple sheets!!
Enjoy!
Here you will find easy to follow revision sheets which will help your students to recap the topic:
2.2 Programming techniques
the use of variables, constants, operators, inputs, outputs and assignments
the use of the three basic programming constructs used to control the flow of a program:
sequence
selection
iteration (count and condition controlled loops)
the use of basic string manipulation
the use of basic file handling operations:
open
read
write
close
the use of records to store data
the use of SQL to search for data
the use of arrays (or equivalent) when solving problems, including both one and two dimensional
arrays
how to use sub programs (functions and procedures) to produce structured code
the use of data types:
integer
real
Boolean
character and string
casting
the common arithmetic operators
the common Boolean operators.
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Check out my shop to save on buying multiple sheets!!
Enjoy!
Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.4 Wired and Wireless Networks which includes:
types of networks:
LAN (Local Area Network)
WAN (Wide Area Network)
factors that affect the performance of networks
the different roles of computers in a client-server and a peer-to-peer network
the hardware needed to connect stand-alone computers into a Local Area Network:
wireless access points
routers/switches
NIC (Network Interface Controller/Card)
transmission media
the internet as a worldwide collection of computer networks:
DNS (Domain Name Server)
hosting
the cloud
the concept of virtual networks
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Check out my shop to save on buying multiple sheets!!
Enjoy!
NEW J277 SPECIFICATION
Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.3 Computer Networks, Connections and Protocols
1.3.1 Networks and topologies ¨ Types of network:
o LAN (Local Area Network)
o WAN (Wide Area Network)
¨ Factors that affect the performance of networks
¨ The different roles of computers in a client-server and a peer-topeer network
¨ The hardware needed to connect stand-alone computers into a
Local Area Network:
o Wireless access points
o Routers
o Switches
o NIC (Network Interface Controller/Card)
o Transmission media
¨ The Internet as a worldwide collection of computer networks:
o DNS (Domain Name Server)
o Hosting
o The Cloud
o Web servers and clients
¨ Star and Mesh network topologies
1.3.2 Wired and wireless networks, protocols and layers ¨ Modes of connection:
o Wired
• Ethernet
o Wireless
• Wi-Fi
• Bluetooth
¨ Encryption
¨ IP addressing and MAC addressing
¨ Standards
¨ Common protocols including:
o TCP/IP (Transmission Control Protocol/Internet Protocol)
o HTTP (Hyper Text Transfer Protocol)
o HTTPS (Hyper Text Transfer Protocol Secure)
o FTP (File Transfer Protocol)
o POP (Post Office Protocol)
o IMAP (Internet Message Access Protocol)
o SMTP (Simple Mail Transfer Protocol)
¨ The concept of layers
NEW J277 SPECIFICATION
Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.4 Network Security
1.4.1 Threats to computer systems and networks ¨ Forms of attack:
o Malware
o Social engineering, e.g. phishing, people as the ‘weak point’
o Brute-force attacks
o Denial of service attacks
o Data interception and theft
o The concept of SQL injection
1.4.2 Identifying and preventing vulnerabilities
¨ Common prevention methods:
o Penetration testing
o Anti-malware software
o Firewalls
o User access levels
o Passwords
o Encryption
o Physical security