This teaches students about lossy and lossless compression, along with the need for compression, and the effect on files. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
This resource is designed to cover:
Why compression is used.
Lossy and Lossless compression.
Scenarios where each type of compression may be used.
Advantages and disadvantages of each type of compression - there is a worksheet task designed for students to obtain this information from the presentation.
Effects on different types of files.
⠀
Other complete lessons in Unit 1.2:
RAM, ROM, and Virtual Memory (Primary Storage)
Units of Storage
Secondary Storage
Binary Crash Course
Representing Images
Representing Sound
Representing Characters
Compression (Current)
This is designed to teach students how images are represented in computers. It provides an overview on bitmaps and vectors, and goes into detail on how pixels are represented. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
This resource is designed to cover:
How an image is represented using pixels.
How each pixel is represented.
Effect of colour depth and resolution on images.
Metadata.
Calculating the size of an image file.
⠀
Other complete lessons in Unit 1.2:
RAM, ROM, and Virtual Memory (Primary Storage)
Units of Storage
Secondary Storage
Binary Crash Course
Representing Images (Current)
Representing Sound
Representing Characters
Compression
This teaches students about Local Area Networks LAN and Wide Area Networks WAN, as well as the role of computers in the Client-Server and Peer-to-Peer models. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, two worksheets with answers, custom exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 2-3 Lessons
This resource is designed to cover:
Local Area Networks and common examples.
Wide Area Networks and common examples.
Client-Server and Peer-to-Peer Network Model.
Role of computers in the Client-Server and Peer-to-Peer models.
⠀
Other complete lessons in Unit 1.3:
Types of Networks (Current)
Network Performance
Network Hardware
The Internet
Network Topologies
Encryption (Free)
Standards and Network Protocols
Network Connections
Secondary storage can be a difficult idea to get your head around, but this complete lesson is going to change that! It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a flashcards worksheet with answers, custom exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 2-3 Lessons
This resource is designed to cover:
The need for secondary storage.
Common types of storage technology: optical, magnetic, solid-state/flash.
Advantages and disadvantages of storage technology.
Characteristics of secondary storage technology: cost, capacity, speed, portability, durability, reliability.
⠀
Other complete lessons in Unit 1.2:
RAM, ROM, and Virtual Memory (Primary Storage)
Units of Storage
Secondary Storage (Current)
Binary Crash Course
Representing Images
Representing Sound
Representing Characters
Compression
This is designed to teach how characters are represented using binary in computers, and character sets: ASCII, Extended ASCII and Unicode. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
This resource is designed to cover:
How characters are represented using binary codes.
Character sets: ASCII, Extended ASCII, Unicode.
Character limit due to how many bits are used to represent a character.
Logical order of characters in character sets.
⠀
Other complete lessons in Unit 1.2:
RAM, ROM, and Virtual Memory (Primary Storage)
Units of Storage
Secondary Storage
Binary Crash Course
Representing Images
Representing Sound
Representing Characters (Current)
Compression
This resource covers the purpose of IP Addresses and MAC addresses, as well as different modes of connection: wireless (using Wi-Fi and Bluetooth) and wired (using Ethernet). It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
This resource is designed to cover:
Purpose of IP Addresses and MAC Addresses in networks.
Format of IP Addresses: IPv4 and IPv6.
Modes of connecting devices:
Wi-Fi
Bluetooth
Ethernet
Brief concept of layers.
⠀
Other complete lessons in Unit 1.3:
Types of Networks
Network Performance
Network Hardware
The Internet
Network Topologies
Encryption (Free)
Standards and Network Protocols
Network Connections (Current)
This lesson teaches students about the star and mesh network topologies. This includes the advantages and disadvantages of each topology. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1-2 Lessons
This resource is designed to cover:
Star Network Topology
Mesh Network Topology
Advantages and Disadvantages of the Star and Mesh Topologies
⠀
Other complete lessons in Unit 1.3:
Types of Networks
Network Performance
Network Hardware
The Internet
Network Topologies (Current)
Encryption (Free)
Standards and Network Protocols
Network Connections
This resource covers the common ways vulnerabilities can be removed: penetration testing, anti-malware software, firewalls, user access levels, passwords, encryption, and physical security. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 2 Lessons
This resource is designed to cover:
How network threats are limited.
Common vulnerability prevention methods:
Penetration Testing
Anti-Malware Software
Firewalls
User Access Levels
Passwords
Encryption
Physical Security
⠀
This lesson teaches students about the internet: Domain Name Service (DNS), server hosting, the cloud, web servers, and clients. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1-2 Lessons
This resource is designed to cover:
The Internet: DNS, Hosting, The Cloud, Web Servers, and Clients.
Purpose of the DNS.
Purpose of the cloud.
Interaction between clients and web servers.
Different types of servers and the services they provide.
Advantages and disadvantages of the cloud.
⠀
Other complete lessons in Unit 1.3:
Types of Networks
Network Performance
Network Hardware
The Internet (Current)
Network Topologies
Encryption (Free)
Standards and Network Protocols
Network Connections
This lesson teaches students about the principle of standards and the different network protocols that are used for communication. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
This resource is designed to cover:
Principle of Standards
Different Types of Network Protocols and their Purpose:
TCP/IP
HTTP
HTTPS
FTP
SMTP
POP
IMAP
⠀
Other complete lessons in Unit 1.3:
Types of Networks
Network Performance
Network Hardware
The Internet
Network Topologies
Encryption (Free)
Standards and Network Protocols (Current)
Network Connections
This resource covers network threats, including malware, social engineering, brute-force, denial-of-service, data interception & theft, and SQL injection. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the video and the preview image to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 2 Lessons
This resource is designed to cover:
Malware
Social Engineering
Brute-Force Attacks
Denial-of-Service Attacks
Data Interception
Data Theft
Concept of SQL injection
Purpose of each threat and how it is used.
⠀
The main laws and legislations are covered: Data Protection Act 2018, Computer Misuse Act 1990, and Copyright Designs and Patents Act 1988. This resource has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
This teaching resource is here to save you time and hassle. With our top-quality materials, you can easily reuse and adapt them to fit your unique teaching style. Say goodbye to the stress of lesson planning and hello to more time for what matters most.
Suggested Duration: 1 Lesson
This resource is designed to cover:
Purpose of each legislation and the actions it allows or prohibits:
Data Protection Act 2018
Computer Misuse Act 1990
Copyright Designs and Patents Act 1988
⠀
Other complete lessons in Unit 1.6:
Ethical and Cultural Issues
Legal, Environmental, and Privacy Issues
Laws and Legislation (Current)
Software Licenses
You can also view a discounted bundle that contains all the above resources.
This resource covers the features of open-source software and proprietary software. This resource has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
This resource is here to save you time and hassle. With our top-quality teaching material, you can easily reuse and adapt them to fit your unique teaching style. Say goodbye to the stress of lesson planning and hello to more time for what matters most.
Suggested Duration: 1 Lesson
This resource is designed to cover:
Purpose of a software license and why they are used.
Features of open-source software.
Features of proprietary software.
Recommending a type of license for a given scenario. This includes the benefits and drawbacks.
⠀
Other complete lessons in Unit 1.6:
Ethical and Cultural Issues
Legal, Environmental, and Privacy Issues
Laws and Legislation
Software Licenses (Current)
You can also view a discounted bundle that contains all the above resources.
This resource covers the conversion between binary and decimal integers to hexadecimal equivalents, and vice versa. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
Please note that a binary crash course version of this resource is available.
This resource is designed to cover:
Main problem with using binary.
Conversion between binary and hexadecimal values.
Conversion between hexadecimal and binary values.
Conversion between denary to hexadecimal values - two methods.
Conversion between hexadecimal and denary values.
⠀
This resource covers the conversion between binary integers and decimal values, and vice versa. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
Please note that a binary crash course version of this resource is available.
This resource is designed to cover:
What is binary?
Conversion between binary and denary.
Conversion between denary to binary - two methods.
⠀
This resource covers everything about utility software, including encryption, defragmentation, and data compression. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
This resource is designed to cover:
Purpose of specified utility software and why it is required:
Encryption software
Defragmentation
Data Compression
⠀
This resource covers binary shifts - multiplying and dividing binary values by ‘shifting’ them by a certain number of places. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
Please note that a binary crash course version of this resource is available.
This resource is designed to cover:
Effects of shifting binary values.
Shifting binary values to the left to multiply values by 2^x.
Shifting binary values to the right to divide values by 2^x.
⠀
This resource covers the addition of two binary values together and overflow errors that may occur. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 1 Lesson
Please note that a binary crash course version of this resource is available.
This resource is designed to cover:
Adding two binary values up to and including 8 bits.
Why overflow errors occur.
⠀
This resource covers everything about the OS, including user interfaces, and memory, peripheral, user, and file management. It has been specially created for the OCR GCSE Computer Science (J277) course, meaning there is no irrelevant content from other exam boards. This resource consists of a PowerPoint presentation, a worksheet with answers, custom-made exam-styled questions with a mark scheme, and a full lesson plan. See the preview to see what is included!
Feedback has been considered when creating and updating this resource to ensure it is appealing, engaging, and challenging. This resource will be updated to ensure it is (one of) the best!
Duration: 2 Lesson
This resource is designed to cover:
User Interfaces: Graphical User Interface (GUI) and Command-Line Interface (CLI)
Memory Management
Multitasking
Peripheral Management, including Device Drivers
User Management
File Management
⠀
This revision resource is specially designed for topic 1.1 covering: atomic stucture, periodic table, development of the atom, development of the periodic table, alkali metals, the halogens, noble gases, and transition metals. This resource contains multiple-choice questions that students can complete to find any gaps in learning, allowing them to revise on specific topics.
With our top-quality teaching material, you can easily reuse and adapt them to fit your unique teaching style. Say goodbye to the stress of lesson planning and hello to more time for what matters most.
█▀▀ █▀▀ ▄▀█ ▀█▀ █░█ █▀█ █▀▀ █▀
█▀░ ██▄ █▀█ ░█░ █▄█ █▀▄ ██▄ ▄█
Curriculum-aligned to AQA GCSE Combined and Triple Chemistry specifications 8462/8464.
Suitable for foundation, higher, and triple students. Questions suitable for higher students only are marked with (H). Questions suitable for triple students only are marked with (T)
Easy to use and integrate into existing lessons.
Find gaps in learning / weak topics, allowing students to tailor their revision.
This resource contains:
40 multiple-choice questions covering content found in topic 1.1. (pdf)
Answer sheet. (pdf)
Recommended activity duration: 45 minutes
Feel free to reach out if you have any questions!
█▀▀ █▀█ █ █▀▄▀█ █▀ █▀█ █▄░█
█▄▄ █▀▄ █ █░▀░█ ▄█ █▄█ █░▀█
█░█░█ █ ▀█ ▄▀█ █▀█ █▀▄
▀▄▀▄▀ █ █▄ █▀█ █▀▄ █▄▀
Disclaimer: This resource does not have any affiliation with AQA or any other exam board. This resource has been created by a third-party to allow students to learn about the content found in an AQA specification.
Please note that this resource does not contain detailed information about practical activities which may be associated with this content.