Hero image

Edulito

Average Rating4.19
(based on 40 reviews)

I started out as a science teacher and made the transition to teaching ICT and Computer Science, which I have now been doing for over 20 years. I have also worked with primary school teachers to support their delivery of the national curriculum in computing. Edulito is a UK based educational publishing company that provides learning resources for school-aged children. All of the available resources have been tested in UK schools.

117Uploads

78k+Views

20k+Downloads

I started out as a science teacher and made the transition to teaching ICT and Computer Science, which I have now been doing for over 20 years. I have also worked with primary school teachers to support their delivery of the national curriculum in computing. Edulito is a UK based educational publishing company that provides learning resources for school-aged children. All of the available resources have been tested in UK schools.
KS3 Unit - What is Computational Thinking?
edulitolearnedulitolearn

KS3 Unit - What is Computational Thinking?

(0)
This unit provides detailed teaching resources to teach students about computational thinking and includes at least 6 hours of lessons.Students develop simple algorithms and learn about key terminology such decomposition, abstraction and pattern recognition. This unit includes a: PowerPoint presentation (43 Slides) PDF teaching file Unit Test (including mark scheme) These resources can be used by a computing teacher or a non-specialist teacher to teach about computational thinking. This unit can be taught in a classroom with no computers. What will students learn in Unit 1? ALL STUDENTS • I understand the terms algorithm, decompose, abstraction and pattern recognition. • I can produce a simple algorithm that solves a problem. MOST STUDENTS • I can produce an algorithm that solves a problem. • I can apply the terms algorithm, decompose, abstraction and pattern recognition. SOME STUDENTS • I can compare two algorithms that perform the same task and understand why one algorithm is more efficient than another algorithm.
TEACHER POWERPOINTS: UNIT 2.1 ALGORITHMS J277 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 2.1 ALGORITHMS J277 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (86 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 2.1. It includes: Teaching PowerPoints (includes checkpoint questions and answers) Student PowerPoints (Includes checkpoint questions, but omits the answers) Content Covered: Principles of computational thinking: Abstraction Decomposition Algorithmic thinking Identify the inputs, processes, and outputs for a problem Structure diagrams Create, interpret, correct, complete, and refine algorithms using: Pseudocode Flowcharts Reference language/high-level programming language Identify common errors Trace tables Standard searching algorithms: Binary search Linear search Standard sorting algorithms: Bubble sort Merge sort Insertion sort
TEACHER POWERPOINTS: UNIT 1.2 MEMORY & STORAGE J277 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 1.2 MEMORY & STORAGE J277 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (188 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 1.2. It includes: Teaching PowerPoint Presentations (including checkpoint questions and answers) Part 1 – Memory (33 Slides) Part 2 – Secondary Storage (45 Slides) Part 3 – Data Storage – Numbers (49 Slides) Part 4 - Data Storage: Characters, Images & Sound (61 Slides) Student PowerPoint Presentations (Including checkpoint questions, but omits the answers) Part 1 – Memory Part 2 – Secondary Storage Part 3 – Data Storage – Numbers Part 4 - Data Storage: Characters, Images & Sound Content Covered: The need for primary storage The difference between RAM and ROM The purpose of ROM in a computer system The purpose of RAM in a computer system Virtual memory The need for secondary storage Common types of storage: Optical Magnetic Solid state Suitable storage devices and storage media for a given application The advantages and disadvantages of different storage devices and storage media relating to these characteristics: Capacity Speed Portability Durability Reliability Cost The units of data storage: Bit Nibble (4 bits) Byte (8 bits) Kilobyte (1,000 bytes or 1 KB) Megabyte (1,000 KB) Gigabyte (1,000 MB) Terabyte (1,000 GB) Petabyte (1,000 TB) How data needs to be converted into a binary format to be processed by a computer Data capacity and calculation of data capacity requirements Numbers How to convert positive denary whole numbers to binary numbers (up to and including 8 bits) and vice versa How to add two binary integers together (up to and including 8 bits) and explain overflow errors which may occur How to convert positive denary whole numbers into 2-digit hexadecimal numbers and vice versa How to convert binary integers to their hexadecimal equivalents and vice versa Binary shifts Characters The use of binary codes to represent characters The term ‘character set’ The relationship between the number of bits per character in a character set, and the number of characters which can be represented, e.g.: ASCII Unicode Images How an image is represented as a series of pixels, represented in binary Metadata The effect of colour depth and resolution on: The quality of the image The size of an image file Sound How sound can be sampled and stored in digital form The effect of sample rate, duration and bit depth on: The playback quality The size of a sound file The need for compression Types of compression: Lossy Lossless
TEACHER POWERPOINTS: UNIT 2.2 PROGRAMMING FUNDAMENTALS J277 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 2.2 PROGRAMMING FUNDAMENTALS J277 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (148 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 2.2. It includes: Teaching PowerPoint Presentations (including checkpoint questions and answers) Part 1 – Programming Fundamentals (62 Slides) Part 2 – Data Types & Additional Programming techniques (86 Slides) Student PowerPoint Presentations (Including checkpoint questions, but omits the answers) Part 1 – Programming Fundamentals Part 2 – Data Types & Additional Programming techniques Content Covered: The use of variables, constants, operators, inputs, outputs and assignments The use of the three basic programming constructs used to control the flow of a program: Sequence Selection Iteration (count-and condition-controlled loops) The common arithmetic operators The common Boolean operators AND, OR and NOT The use of data types: Integer Real Boolean Character and string Casting The use of basic string manipulation The use of basic file handling operations: Open Read Write Close The use of records to store data The use of SQL to search for data The use of arrays (or equivalent) when solving problems, including both one-dimensional and two-dimensional arrays How to use sub programs (functions and procedures) to produce structured code Random number generation
TEACHER POWERPOINTS: UNIT 2.5 PROGRAMMING LANGUAGES AND IDES J277 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 2.5 PROGRAMMING LANGUAGES AND IDES J277 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (31 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 2.5. It includes: Teaching PowerPoint Presenations (includes checkpoint questions and answers) Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers) Content Covered: Characteristics and purpose of different levels of programming language: High-level languages Low-level languages The purpose of translators The characteristics of a compiler and an interpreter Common tools and facilities available in an Integrated Development Environment (IDE): Editors Error diagnostics Run-time environment Translators
34 HOMEWORK ACTIVITIES - AQA GCSE COMPUTER SCIENCE 8525 (FROM 2020)
edulitolearnedulitolearn

34 HOMEWORK ACTIVITIES - AQA GCSE COMPUTER SCIENCE 8525 (FROM 2020)

(0)
This pack consists of 34 editable homework/classwork activities that can be used to support your delivery of the course. In addition, the homework bundle also contains a suggested mark scheme for each activity. Unit 3.1 · Decomposition and Abstraction · Flowcharts and High-Level Languages · Sorting Data · Sorting & Searching Programs Unit 3.2 · Selection · Iteration · Arrays (Lists) · Functions · Improving Programs · Testing Unit 3.3 · Data Capacity · Conversions · Compression Unit 3.4 · Components of a CPU · CPU Performance · Embedded Systems · Operating Systems · Utility Software · Boolean Logic and Truth Tables · Logic Gates · Programming Languages Unit 3.5 · LANs and WANs · Wired & Wireless Networks · Star & Bus Topology · Network Protocols · The Concept of Layers Unit 3.6 · Malware · Cyber Threats · Network Vulnerabilities Unit 3.7 · Relational Databases · Relational Databases and SQL Unit 3.8 · The Impact of Technology · The Digital Divide · Impact of New Technology
TEACHER POWERPOINTS: UNIT 3.6 CYBER SECURITY 8525 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 3.6 CYBER SECURITY 8525 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (54 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.6. It includes: Teaching PowerPoint Presentations (includes checkpoint questions and answers) Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers) Content Covered: Be able to define the term cyber security and be able to describe the main purposes of cyber security. Students should know that cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access. Understand and be able to explain the following cyber security threats: • social engineering techniques • malicious code (malware) • pharming • weak and default passwords • misconfigured access rights • removable media • unpatched and/or outdated software. Explain what penetration testing is and what it is used for. Define the term social engineering. Describe what social engineering is and how it can be protected against. Explain the following forms of social engineering: • blagging (pretexting) • phishing • shouldering (or shoulder surfing). Define the term malware. Describe what malware is and how it can be protected against. Describe the following forms of malware: • computer virus • trojan ��� spyware. Understand and be able to explain the following security measures: • biometric measures (particularly for mobile devices) • password systems • CAPTCHA (or similar) • using email confirmations to confirm a user’s identity • automatic software updates.
TEACHER POWERPOINTS BUNDLE: GCSE COMPUTER SCIENCE EDEXCEL 1CP2 - ALL TOPICS FROM 1 TO 6
edulitolearnedulitolearn

TEACHER POWERPOINTS BUNDLE: GCSE COMPUTER SCIENCE EDEXCEL 1CP2 - ALL TOPICS FROM 1 TO 6

9 Resources
These adaptable PowerPoint Presentations (750 Slides) provide complete coverage of all aspects of the specification in relation to Edexcel GCSE Computer Science 1CP2 (from 2020) - Topics 1 to 6. It includes: Teaching PowerPoints (including checkpoint questions and answers) - 750+ slides Student PowerPoints (Including checkpoint questions, but omits the answers) A Complete Guide to Python Programming (including student activities) The resources cover: Topic 1: Computational thinking – understanding of what algorithms are, what they are used for and how they work; ability to follow, amend and write algorithms; ability to construct truth tables. Topic 2: Data – understanding of binary, data representation, data storage and compression. Topic 3: Computers – understanding of hardware and software components of computer systems and characteristics of programming languages. Topic 4: Networks – understanding of computer networks and network security. Topic 5: Issues and impact – awareness of emerging trends in computing technologies, and the impact of computing on individuals, society and the environment, including ethical, legal and ownership issues. Topic 6: Problem solving with programming
Python Games Bundle
edulitolearnedulitolearn

Python Games Bundle

4 Resources
These resource has been produced to teach 7 to 14 year olds about programming concepts by creating fun games using the text-based programming language Python. The activities and challenges have been designed to provide a stimulating, engaging and effective way of improving students’ knowledge of the core programming concepts.
TEACHER POWERPOINTS: UNIT 1.1 SYSTEMS ARCHITECTURE J277 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 1.1 SYSTEMS ARCHITECTURE J277 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (62 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 1.1. It includes: · Teaching PowerPoint (includes checkpoint questions and answers) · Student PowerPoint (Includes checkpoint questions, but omits the answers) Content: The purpose of the CPU: The fetch-decode-execute cycle Common CPU components and their function: ALU (Arithmetic Logic Unit) CU (Control Unit) Cache Registers Von Neumann architecture: MAR (Memory Address Register) MDR (Memory Data Register) Program Counter Accumulator How common characteristics of CPUs affect their performance: Clock speed Cache size Number of cores
TEACHER POWERPOINTS: UNIT 2.4 BOOLEAN LOGIC J277 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 2.4 BOOLEAN LOGIC J277 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (42 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 2.4. It includes: Teaching PowerPoint Presentations (includes checkpoint questions and answers) Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers) Content Covered: Simple logic diagrams using the operators AND, OR and NOT Truth tables Combining Boolean operators using AND, OR and NOT Applying logical operators in truth tables to solve problems
14 TOPIC TESTS - OCR GCSE COMPUTER SCIENCE J277 (FROM 2020)
edulitolearnedulitolearn

14 TOPIC TESTS - OCR GCSE COMPUTER SCIENCE J277 (FROM 2020)

(0)
This pack consists of 14 end of topic tests that can be used to support your delivery of the course. In addition, the topic test bundle also contains a mark scheme for each test. Unit 1.1 – 1 Test Unit 1.2 – 3 Tests Unit 1.3 – 2 Tests Unit 1.4 -1 Test Unit 1.5 - 1 Test Unit 1.6 - 1 Test Unit 2.1 - 1 Test Unit 2.2 - 1 Test Unit 2.3 - 1 Test Unit 2.4 - 1 Test Unit 2.5 - 1 Test
TEACHER POWERPOINTS: UNIT 1.3 COMPUTER NETWORKS, CONNECTIONS AND PROTOCOLS J277 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 1.3 COMPUTER NETWORKS, CONNECTIONS AND PROTOCOLS J277 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (111 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 1.3. It includes: Teaching PowerPoint Presentations (including checkpoint questions and answers) Part 1 – Networks & Topologies (66 slides) Part 2 - Wired & Wireless Networks, Protocols & Layers (45 slides) Student PowerPoint Presentations (Including checkpoint questions, but omits the answers) Part 1 – Networks & Topologies Part 2 - Wired & Wireless Networks, Protocols & Layers Content Covered: Types of network: LAN (Local Area Network) WAN (Wide Area Network) Factors that affect the performance of networks The different roles of computers in a client-server and a peer-to-peer network The hardware needed to connect stand-alone computers into a Local Area Network: Wireless access points Routers Switches NIC (Network Interface Controller/Card) Transmission media The Internet as a worldwide collection of computer networks: DNS (Domain Name Server) Hosting The Cloud Web servers and clients Star and Mesh network topologies Modes of connection: Wired - Ethernet Wireless Wi-Fi & Bluetooth Encryption IP addressing and MAC addressing Standards Common protocols including: TCP/IP (Transmission Control Protocol/Internet Protocol) HTTP (Hyper Text Transfer Protocol) HTTPS (Hyper Text Transfer Protocol Secure) FTP (File Transfer Protocol) o POP (Post Office Protocol) IMAP (Internet Message Access Protocol) SMTP (Simple Mail Transfer Protocol) The concept of layers
TEACHER POWERPOINTS: UNIT 1.4 NETWORK SECURITY J277 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 1.4 NETWORK SECURITY J277 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (42 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 1.4. It includes: Teaching PowerPoint (includes checkpoint questions and answers) Student PowerPoint (Includes checkpoint questions, but omits the answers) Content Covered: Forms of attack: Malware Social engineering, e.g. phishing, people as the ‘weak point’ Brute-force attacks Denial of service attacks Data interception and theft The concept of SQL injection Common prevention methods: Penetration testing Anti-malware software Firewalls User access levels Passwords Encryption Physical security
TEACHER POWERPOINTS: UNIT 3.8 IMPACTS OF DIGITAL TECHNOLOGY 8525 (FROM (20
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 3.8 IMPACTS OF DIGITAL TECHNOLOGY 8525 (FROM (20

(0)
These adaptable PowerPoint Presentations (38 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.8. It includes: Teaching PowerPoint Presentations (includes checkpoint questions and answers) - 38 slides Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers) Content Covered: Explain the current ethical, legal and environmental impacts and risks of digital technology on society. Where data privacy issues arise, these should be considered. Exam questions will be taken from the following areas: • cyber security • mobile technologies • wireless networking • cloud storage • hacking (unauthorised access to a computer system) • wearable technologies • computer-based implants • autonomous vehicles.
TEACHER POWERPOINTS: UNIT 3.1 FUNDAMENTALS OF ALGORITHMS 8525 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 3.1 FUNDAMENTALS OF ALGORITHMS 8525 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (74 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.1. It includes: Teaching PowerPoint Presentations (includes checkpoint questions and answers) -74 Slides Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers) Content Covered: Understand and explain the term algorithm. Understand and explain the term decomposition. Understand and explain the term abstraction. Use a systematic approach to problem solving and algorithm creation representing those algorithms using pseudo-code, program code and flowcharts. Explain simple algorithms in terms of their inputs, processing and outputs. Determine the purpose of simple algorithms. Understand that more than one algorithm can be used to solve the same problem. Compare the efficiency of algorithms explaining how some algorithms are more efficient than others in solving the same problem. Understand and explain how the linear search algorithm works. Understand and explain how the binary search algorithm works. Compare and contrast linear and binary search algorithms. Understand and explain how the merge sort algorithm works. Understand and explain how the bubble sort algorithm works. Compare and contrast merge sort and bubble sort algorithms.
TEACHER POWERPOINTS: UNIT 3.5 FUNDAMENTALS OF COMPUTER NETWORKS 8525 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 3.5 FUNDAMENTALS OF COMPUTER NETWORKS 8525 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (69 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.5. It includes: Teaching PowerPoints (including checkpoint questions and answers) - 69 slides Student PowerPoints (Including checkpoint questions, but omits the answers) Content Covered: Define what a computer network is. Discuss the advantages and disadvantages of computer networks. Describe the main types of computer network including: • Personal Area Network (PAN) • Local Area Network (LAN) • Wide Area Network (WAN). Understand that networks can be wired or wireless. Discuss the advantages and disadvantages of wireless networks as opposed to wired networks. Describe the following common LAN topologies: • star • bus. Define the term network protocol. Explain the purpose and use of common network protocols including: • Ethernet • Wi-Fi • TCP (Transmission Control Protocol) • UDP (User Datagram Protocol) • IP (Internet Protocol) • HTTP (Hypertext Transfer Protocol) • HTTPS (Hypertext Transfer Protocol Secure) • FTP (File Transfer Protocol) • email protocols: • SMTP (Simple Mail Transfer Protocol) • IMAP (Internet Message Access Protocol). Understand the need for, and importance of, network security. Explain the following methods of network security: • authentication • encryption • firewall • MAC address filtering. Describe the 4-layer TCP/IP model: • application layer • transport layer • internet layer • link layer. Understand that the HTTP, HTTPS, SMTP, IMAP and FTP protocols operate at the application layer. Understand that the TCP and UDP protocols operate at the transport layer. Understand that the IP protocol operates at the internet layer.
Python Video Tutorials #8 - The Use of Lists
edulitolearnedulitolearn

Python Video Tutorials #8 - The Use of Lists

(0)
This lesson provides an introduction to the use of arrays in Python - These are called lists. The lesson goes through a range of techniques for manipulating and managing simple lists. The next lesson will cover 2D Arrays (2D Lists). Python and the Python Logo are trademarks or registered trade marks of the Python Software Foundation.
Python Video Tutorials #6 - The Use of Sequence and Selection
edulitolearnedulitolearn

Python Video Tutorials #6 - The Use of Sequence and Selection

(0)
In this lesson you are introduced to two programming concepts - Sequence and Selection. You will learn how to use IF statements, IF then ELSE statements, IF and ELSE-IF statements and Nested IF. Python and the Python Logo are trademarks or registered trade marks of the Python Software Foundation.