Hero image

Got IT Covered

Average Rating4.60
(based on 5 reviews)

Complete units of work, paper based or for lessons with computer access. Individual and stand alone lesson plans that are ideal for cover lessons. All lesson plans and resources are suitable to be taught by a cover supervisor. All lessons identify RWCM links and opportunities to identify careers guidance support. Some include expert teacher commentary but all provide a framework for any teacher to follow. Lesson plans are built using an accelerated learning cycle.

51Uploads

11k+Views

16k+Downloads

Complete units of work, paper based or for lessons with computer access. Individual and stand alone lesson plans that are ideal for cover lessons. All lesson plans and resources are suitable to be taught by a cover supervisor. All lessons identify RWCM links and opportunities to identify careers guidance support. Some include expert teacher commentary but all provide a framework for any teacher to follow. Lesson plans are built using an accelerated learning cycle.
11 Denary to Binary
chalstarchalstar

11 Denary to Binary

(0)
This lesson is the third in a sequence of lessons that introduces students to look at how data is stored and manipulated on a computer system. This lesson reverses the process of learning from the previous lesson and looks at two methods for converting denary (base 10) numbers to binary (base 2) numbers. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
10 Binary to Denary
chalstarchalstar

10 Binary to Denary

(0)
Second in a sequence of lessons that ask students to consider how data is stored and manipulated on a computer under the topic of data representation. Fully resourced lesson and detailed lesson plan including numeracy and literacy links. Range of activities. No computer needed. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
09 Binary Basics
chalstarchalstar

09 Binary Basics

(1)
This is the first lesson in a sequence of lessons considering the basics of data representation and binary mathematics. This lesson introduces students to the reasons why computer scientists need to understand and use binary mathematics and introduces the terms kibibyte, mebibyte and so on. There is a fully detailed lesson plan with reading, writing, communication and maths links and careers guidance links are also highlighted. There is an accompanying learning mat or worksheet for students to complete. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats.
Encryption and Ciphers
chalstarchalstar

Encryption and Ciphers

7 Resources
A unit of work that does not require access to computers or the internet. Fully resourced with lesson plans (PPT) and worksheets for each lesson. 7 Lessons plus assessment and DIRT lesson. practical activities involving a range of cipher techniques written tasks related to internet encryption. solutions to tasks included in lesson plans. Lesson plans include teacher notes and guidance on where differentiation will be needed. Includes a range of activities including peer and self assessment, questioning and accelerated learning. Notes on professional development. Reading, Writing, Communication and Mathematics links are highlighted together with opportunities for career guidance.
08 Assessment & DIRT Lesson
chalstarchalstar

08 Assessment & DIRT Lesson

(0)
This is the assessment related to the unit of work on encryption. There is an associated DIRT lesson that follows the assessment and a tracker to check class achievement. Grades are related to approximate achievement expected by a year 7 group and should be amended or differentiated for other year groups. The assessment includes practical decryption activities, multiple choice questions and explain/describe questions as well as state / identify questions.
07 Asymmetric Encryption
chalstarchalstar

07 Asymmetric Encryption

(0)
This lesson builds on lesson 6 in this unit, and describes the difference between symmetric and asymmetric encryption. The lesson includes the full cycle of activities and includes recall activities such as brain dump, and assessment for learning strategies such as a hinge question.
05 Playfair Cipher
chalstarchalstar

05 Playfair Cipher

(0)
The fifth lesson in a sequence of lessons that challenge students to think about different ways that plain text can be converted, encrypted or coded into cipher text. This lesson introduces the Playfair cipher. This is a more challenging lesson to think about than the previous lessons and may need to be significantly differentiated for younger or students with additional educational needs.
04 Pig Pen Cipher
chalstarchalstar

04 Pig Pen Cipher

(0)
This is the fourth lesson in a sequence of lessons about encryption and cipher techniques. The pig pen cipher is a technique mainly developed by freemasons to code messages to each other. Students will investigate how the technique works and reflect on its effectiveness.
03 Random Substitution Cipher
chalstarchalstar

03 Random Substitution Cipher

(0)
This is the third lesson in a series of lessons about ciphers and encryption. In this lesson, students consider why a simple cipher such as the Caesar cipher is inappropriate for internet encryption and look at a more complex cipher method. They are also introduced to the world of code breakers during World War II and the work of Alan Turing.
02 Caesar Cipher
chalstarchalstar

02 Caesar Cipher

(0)
This lesson builds on the first lesson about Morse Code, and challenges students to think about the reason why encryption is needed and then asks them to use a Caesar Cipher to code and decode secret messages.
01 Morse Code
chalstarchalstar

01 Morse Code

(0)
This lesson is the first of a sequence of lessons that challenge students to consider how plain English can be coded or ciphered. It builds on understanding of what Morse Code is used for and students have to cipher and decipher messages themselves. it is an introduction to a unit of work on ciphers and encryption.