I started out as a science teacher and made the transition to teaching ICT and Computer Science, which I have now been doing for over 20 years. I have also worked with primary school teachers to support their delivery of the national curriculum in computing.
Edulito is a UK based educational publishing company that provides learning resources for school-aged children. All of the available resources have been tested in UK schools.
I started out as a science teacher and made the transition to teaching ICT and Computer Science, which I have now been doing for over 20 years. I have also worked with primary school teachers to support their delivery of the national curriculum in computing.
Edulito is a UK based educational publishing company that provides learning resources for school-aged children. All of the available resources have been tested in UK schools.
This unit provides detailed teaching resources to teach students about computational thinking and includes at least 6 hours of lessons.Students develop simple algorithms and learn about key terminology such decomposition, abstraction and pattern recognition.
This unit includes a:
PowerPoint presentation (43 Slides)
PDF teaching file
Unit Test (including mark scheme)
These resources can be used by a computing teacher or a non-specialist teacher to teach about computational thinking. This unit can be taught in a classroom with no computers.
What will students learn in Unit 1?
ALL STUDENTS
• I understand the terms algorithm, decompose, abstraction and pattern recognition.
• I can produce a simple algorithm that solves a problem.
MOST STUDENTS
• I can produce an algorithm that solves a problem.
• I can apply the terms algorithm, decompose, abstraction and pattern recognition.
SOME STUDENTS
• I can compare two algorithms that perform the same task and understand why one algorithm is more efficient than another algorithm.
These adaptable PowerPoint Presentations (86 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 2.1.
It includes:
Teaching PowerPoints (includes checkpoint questions and answers)
Student PowerPoints (Includes checkpoint questions, but omits the answers)
Content Covered:
Principles of computational thinking:
Abstraction
Decomposition
Algorithmic thinking
Identify the inputs, processes, and outputs for a problem
Structure diagrams
Create, interpret, correct, complete, and refine algorithms using:
Pseudocode
Flowcharts
Reference language/high-level programming language
Identify common errors
Trace tables
Standard searching algorithms:
Binary search
Linear search
Standard sorting algorithms:
Bubble sort
Merge sort
Insertion sort
These adaptable PowerPoint Presentations (188 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 1.2.
It includes:
Teaching PowerPoint Presentations (including checkpoint questions and answers)
Part 1 – Memory (33 Slides)
Part 2 – Secondary Storage (45 Slides)
Part 3 – Data Storage – Numbers (49 Slides)
Part 4 - Data Storage: Characters, Images & Sound (61 Slides)
Student PowerPoint Presentations (Including checkpoint questions, but omits the answers)
Part 1 – Memory
Part 2 – Secondary Storage
Part 3 – Data Storage – Numbers
Part 4 - Data Storage: Characters, Images & Sound
Content Covered:
The need for primary storage
The difference between RAM and ROM
The purpose of ROM in a computer system
The purpose of RAM in a computer system
Virtual memory
The need for secondary storage
Common types of storage:
Optical
Magnetic
Solid state
Suitable storage devices and storage media for a given application
The advantages and disadvantages of different storage devices and storage media relating to these characteristics:
Capacity
Speed
Portability
Durability
Reliability
Cost
The units of data storage:
Bit
Nibble (4 bits)
Byte (8 bits)
Kilobyte (1,000 bytes or 1 KB)
Megabyte (1,000 KB)
Gigabyte (1,000 MB)
Terabyte (1,000 GB)
Petabyte (1,000 TB)
How data needs to be converted into a binary format to be processed by a computer
Data capacity and calculation of data capacity requirements
Numbers
How to convert positive denary whole numbers to binary numbers (up to and including 8 bits) and vice versa
How to add two binary integers together (up to and including 8 bits) and explain overflow errors which may occur
How to convert positive denary whole numbers into 2-digit hexadecimal numbers and vice versa
How to convert binary integers to their hexadecimal equivalents and vice versa
Binary shifts
Characters
The use of binary codes to represent characters
The term ‘character set’
The relationship between the number of bits per character in a character set, and the number of characters which can be represented, e.g.:
ASCII
Unicode
Images
How an image is represented as a series of pixels, represented in binary
Metadata
The effect of colour depth and resolution on:
The quality of the image
The size of an image file
Sound
How sound can be sampled and stored in digital form
The effect of sample rate, duration and bit depth on:
The playback quality
The size of a sound file
The need for compression
Types of compression:
Lossy
Lossless
These adaptable PowerPoint Presentations (148 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 2.2.
It includes:
Teaching PowerPoint Presentations (including checkpoint questions and answers)
Part 1 – Programming Fundamentals (62 Slides)
Part 2 – Data Types & Additional Programming techniques (86 Slides)
Student PowerPoint Presentations (Including checkpoint questions, but omits the answers)
Part 1 – Programming Fundamentals
Part 2 – Data Types & Additional Programming techniques
Content Covered:
The use of variables, constants, operators, inputs, outputs and assignments
The use of the three basic programming constructs used to control the flow of a program:
Sequence
Selection
Iteration (count-and condition-controlled loops)
The common arithmetic operators
The common Boolean operators AND, OR and NOT
The use of data types:
Integer
Real
Boolean
Character and string
Casting
The use of basic string manipulation
The use of basic file handling operations:
Open
Read
Write
Close
The use of records to store data
The use of SQL to search for data
The use of arrays (or equivalent) when solving problems, including both one-dimensional and two-dimensional arrays
How to use sub programs (functions and procedures) to produce structured code
Random number generation
These adaptable PowerPoint Presentations (31 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 2.5.
It includes:
Teaching PowerPoint Presenations (includes checkpoint questions and answers)
Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers)
Content Covered:
Characteristics and purpose of different levels of programming language:
High-level languages
Low-level languages
The purpose of translators
The characteristics of a compiler and an interpreter
Common tools and facilities available in an Integrated Development Environment (IDE):
Editors
Error diagnostics
Run-time environment
Translators
This pack consists of 34 editable homework/classwork activities that can be used to support your delivery of the course. In addition, the homework bundle also contains a suggested mark scheme for each activity.
Unit 3.1
· Decomposition and Abstraction
· Flowcharts and High-Level Languages
· Sorting Data
· Sorting & Searching Programs
Unit 3.2
· Selection
· Iteration
· Arrays (Lists)
· Functions
· Improving Programs
· Testing
Unit 3.3
· Data Capacity
· Conversions
· Compression
Unit 3.4
· Components of a CPU
· CPU Performance
· Embedded Systems
· Operating Systems
· Utility Software
· Boolean Logic and Truth Tables
· Logic Gates
· Programming Languages
Unit 3.5
· LANs and WANs
· Wired & Wireless Networks
· Star & Bus Topology
· Network Protocols
· The Concept of Layers
Unit 3.6
· Malware
· Cyber Threats
· Network Vulnerabilities
Unit 3.7
· Relational Databases
· Relational Databases and SQL
Unit 3.8
· The Impact of Technology
· The Digital Divide
· Impact of New Technology
These adaptable PowerPoint Presentations (54 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.6.
It includes:
Teaching PowerPoint Presentations (includes checkpoint questions and answers)
Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers)
Content Covered:
Be able to define the term cyber security and be able to describe the main purposes of cyber security.
Students should know that cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
Understand and be able to explain the following cyber security threats:
• social engineering techniques
• malicious code (malware)
• pharming
• weak and default passwords
• misconfigured access rights
• removable media
• unpatched and/or outdated software.
Explain what penetration testing is and what it is used for.
Define the term social engineering.
Describe what social engineering is and how it can be protected against.
Explain the following forms of social engineering:
• blagging (pretexting)
• phishing
• shouldering (or shoulder surfing).
Define the term malware.
Describe what malware is and how it can be protected against.
Describe the following forms of malware:
• computer virus
• trojan
��� spyware.
Understand and be able to explain the following security measures:
• biometric measures (particularly for mobile devices)
• password systems
• CAPTCHA (or similar)
• using email confirmations to confirm a user’s identity
• automatic software updates.
These adaptable PowerPoint Presentations (750 Slides) provide complete coverage of all aspects of the specification in relation to Edexcel GCSE Computer Science 1CP2 (from 2020) - Topics 1 to 6.
It includes:
Teaching PowerPoints (including checkpoint questions and answers) - 750+ slides
Student PowerPoints (Including checkpoint questions, but omits the answers)
A Complete Guide to Python Programming (including student activities)
The resources cover:
Topic 1: Computational thinking – understanding of what algorithms are, what they are used for and how they work; ability to follow, amend and write algorithms; ability to construct truth tables.
Topic 2: Data – understanding of binary, data representation, data storage and compression.
Topic 3: Computers – understanding of hardware and software components of computer systems and characteristics of programming languages.
Topic 4: Networks – understanding of computer networks and network security.
Topic 5: Issues and impact – awareness of emerging trends in computing technologies, and the impact of computing on individuals, society and the environment, including ethical, legal and ownership issues.
Topic 6: Problem solving with programming
These resource has been produced to teach 7 to 14 year olds about programming concepts by creating fun games using the text-based programming language Python. The activities and challenges have been designed to provide a stimulating, engaging and effective way of improving students’ knowledge of the core programming concepts.
These adaptable PowerPoint Presentations (62 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 1.1.
It includes:
· Teaching PowerPoint (includes checkpoint questions and answers)
· Student PowerPoint (Includes checkpoint questions, but omits the answers)
Content:
The purpose of the CPU:
The fetch-decode-execute cycle
Common CPU components and their function: ALU (Arithmetic Logic Unit)
CU (Control Unit)
Cache
Registers
Von Neumann architecture:
MAR (Memory Address Register)
MDR (Memory Data Register)
Program Counter
Accumulator
How common characteristics of CPUs affect their performance:
Clock speed
Cache size
Number of cores
These adaptable PowerPoint Presentations (42 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 2.4.
It includes:
Teaching PowerPoint Presentations (includes checkpoint questions and answers)
Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers)
Content Covered:
Simple logic diagrams using the operators AND, OR and NOT
Truth tables
Combining Boolean operators using AND, OR and NOT
Applying logical operators in truth tables to solve problems
This pack consists of 14 end of topic tests that can be used to support your delivery of the course. In addition, the topic test bundle also contains a mark scheme for each test.
Unit 1.1 – 1 Test
Unit 1.2 – 3 Tests
Unit 1.3 – 2 Tests
Unit 1.4 -1 Test
Unit 1.5 - 1 Test
Unit 1.6 - 1 Test
Unit 2.1 - 1 Test
Unit 2.2 - 1 Test
Unit 2.3 - 1 Test
Unit 2.4 - 1 Test
Unit 2.5 - 1 Test
These adaptable PowerPoint Presentations (111 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 1.3.
It includes:
Teaching PowerPoint Presentations (including checkpoint questions and answers)
Part 1 – Networks & Topologies (66 slides)
Part 2 - Wired & Wireless Networks, Protocols & Layers (45 slides)
Student PowerPoint Presentations (Including checkpoint questions, but omits the answers)
Part 1 – Networks & Topologies
Part 2 - Wired & Wireless Networks, Protocols & Layers
Content Covered:
Types of network:
LAN (Local Area Network)
WAN (Wide Area Network)
Factors that affect the performance of networks
The different roles of computers in a client-server and a peer-to-peer network
The hardware needed to connect stand-alone computers into a Local Area Network:
Wireless access points
Routers
Switches
NIC (Network Interface Controller/Card)
Transmission media
The Internet as a worldwide collection of computer networks:
DNS (Domain Name Server)
Hosting
The Cloud
Web servers and clients
Star and Mesh network topologies
Modes of connection:
Wired - Ethernet
Wireless Wi-Fi & Bluetooth
Encryption
IP addressing and MAC addressing
Standards
Common protocols including:
TCP/IP (Transmission Control Protocol/Internet Protocol)
HTTP (Hyper Text Transfer Protocol)
HTTPS (Hyper Text Transfer Protocol Secure)
FTP (File Transfer Protocol) o POP (Post Office Protocol)
IMAP (Internet Message Access Protocol)
SMTP (Simple Mail Transfer Protocol)
The concept of layers
These adaptable PowerPoint Presentations (42 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 1.4.
It includes:
Teaching PowerPoint (includes checkpoint questions and answers)
Student PowerPoint (Includes checkpoint questions, but omits the answers)
Content Covered:
Forms of attack:
Malware
Social engineering, e.g. phishing, people as the ‘weak point’
Brute-force attacks
Denial of service attacks
Data interception and theft
The concept of SQL injection
Common prevention methods:
Penetration testing
Anti-malware software
Firewalls
User access levels
Passwords
Encryption
Physical security
These adaptable PowerPoint Presentations (38 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.8.
It includes:
Teaching PowerPoint Presentations (includes checkpoint questions and answers) - 38 slides
Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers)
Content Covered:
Explain the current ethical, legal and environmental impacts and risks of digital technology on society. Where data privacy issues arise, these should be considered.
Exam questions will be taken from the following areas:
• cyber security
• mobile technologies
• wireless networking
• cloud storage
• hacking (unauthorised access to a computer system)
• wearable technologies
• computer-based implants
• autonomous vehicles.
These adaptable PowerPoint Presentations (74 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.1.
It includes:
Teaching PowerPoint Presentations (includes checkpoint questions and answers) -74 Slides
Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers)
Content Covered:
Understand and explain the term algorithm.
Understand and explain the term decomposition.
Understand and explain the term abstraction.
Use a systematic approach to problem solving and algorithm creation representing those
algorithms using pseudo-code, program code and flowcharts.
Explain simple algorithms in terms of their inputs, processing and outputs.
Determine the purpose of simple algorithms.
Understand that more than one algorithm can be used to solve the same problem.
Compare the efficiency of algorithms explaining how some algorithms are more efficient than others in solving the same problem.
Understand and explain how the linear search algorithm works.
Understand and explain how the binary search algorithm works.
Compare and contrast linear and binary search algorithms.
Understand and explain how the merge sort algorithm works.
Understand and explain how the bubble sort algorithm works.
Compare and contrast merge sort and bubble sort algorithms.
These adaptable PowerPoint Presentations (69 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.5.
It includes:
Teaching PowerPoints (including checkpoint questions and answers) - 69 slides
Student PowerPoints (Including checkpoint questions, but omits the answers)
Content Covered:
Define what a computer network is.
Discuss the advantages and disadvantages of computer networks.
Describe the main types of computer network including:
• Personal Area Network (PAN)
• Local Area Network (LAN)
• Wide Area Network (WAN).
Understand that networks can be wired or wireless.
Discuss the advantages and disadvantages of wireless networks as opposed to wired networks.
Describe the following common LAN topologies:
• star
• bus.
Define the term network protocol.
Explain the purpose and use of common network protocols including:
• Ethernet
• Wi-Fi
• TCP (Transmission Control Protocol)
• UDP (User Datagram Protocol)
• IP (Internet Protocol)
• HTTP (Hypertext Transfer Protocol)
• HTTPS (Hypertext Transfer Protocol Secure)
• FTP (File Transfer Protocol)
• email protocols:
• SMTP (Simple Mail Transfer Protocol)
• IMAP (Internet Message Access Protocol).
Understand the need for, and importance of, network security.
Explain the following methods of network security:
• authentication
• encryption
• firewall
• MAC address filtering.
Describe the 4-layer TCP/IP model:
• application layer
• transport layer
• internet layer
• link layer.
Understand that the HTTP, HTTPS, SMTP, IMAP and FTP protocols operate at the application layer.
Understand that the TCP and UDP protocols operate at the transport layer.
Understand that the IP protocol operates at the internet layer.
In this lesson you will learn how you can create functions and procedures. This is an essential skill if you want to create more complex problems.
Python and the Python Logo are trademarks or registered trade marks of the Python Software Foundation.
This lesson provides an introduction to the use of arrays in Python - These are called lists. The lesson goes through a range of techniques for manipulating and managing simple lists. The next lesson will cover 2D Arrays (2D Lists).
Python and the Python Logo are trademarks or registered trade marks of the Python Software Foundation.
In this lesson you are introduced to two programming concepts - Sequence and Selection.
You will learn how to use IF statements, IF then ELSE statements, IF and ELSE-IF statements and Nested IF.
Python and the Python Logo are trademarks or registered trade marks of the Python Software Foundation.