Hero image

Got IT Covered

Average Rating4.60
(based on 5 reviews)

Complete units of work, paper based or for lessons with computer access. Individual and stand alone lesson plans that are ideal for cover lessons. All lesson plans and resources are suitable to be taught by a cover supervisor. All lessons identify RWCM links and opportunities to identify careers guidance support. Some include expert teacher commentary but all provide a framework for any teacher to follow. Lesson plans are built using an accelerated learning cycle.

51Uploads

10k+Views

16k+Downloads

Complete units of work, paper based or for lessons with computer access. Individual and stand alone lesson plans that are ideal for cover lessons. All lesson plans and resources are suitable to be taught by a cover supervisor. All lessons identify RWCM links and opportunities to identify careers guidance support. Some include expert teacher commentary but all provide a framework for any teacher to follow. Lesson plans are built using an accelerated learning cycle.
18 Convert from hex
chalstarchalstar

18 Convert from hex

(0)
This lesson builds on lesson 17, and asks students to convert from hexadecimal to both binary and denary. The learning mat includes exercises in both and includes some questions in context. The lesson plan is fully editable in PowerPoint and is broken into a 6-part lesson with recall and self-assessment activities. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
15 Logical Binary Shifts
chalstarchalstar

15 Logical Binary Shifts

(1)
This lesson builds on learning from previous lessons related to binary numbers and binary arithmetic. In this lesson, students will consider how a computer can manipulate binary numbers and multiply or divide by powers of 2. This is a skill required for the Edexcel GCSE Computer Science course but the lesson can be adapted for other groups or courses. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
22 Data Storage Measures
chalstarchalstar

22 Data Storage Measures

(0)
This lesson is the penultimate lesson of a unit about data representation, file sizes and compression. In this lesson, students are introduced to ways of measuring file sizes and asked to familiarise themselves with the terms of measurement as well as convert between them. Ultimately, they should be able to write an expression to show the calculation needed to work out the size of a sound or image file. Learning Objective: To understand that data storage is measured in binary multiples. And to be able to construct expressions that calculate file sizes and data capacity requirements. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
14 Two's Complement
chalstarchalstar

14 Two's Complement

(0)
This lesson is the sixth in a series of lessons on data representation and builds on lesson 5 to look at how computers process negative numbers. There are significant links with maths in this lesson and students need to be clear that adding a negative number is the same as subtracting the positive number. The teacher notes demonstrate two different ways to find the two’s complement of a binary number. The worksheet (learning mat) includes exercises to test students understanding of both processes. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
A1a Ad hoc networks
chalstarchalstar

A1a Ad hoc networks

(0)
This is the first lesson in a sequence of lessons about modern use of technology. Students will be introduced to the terms ad hoc network and open Wi-Fi. They will be asked to describe some of the issues with open networks and compare a range of scenarios that may affect network availability. The lesson plan (LP) and learning mat (LM) are available as PPTX, PPT and PDF formats to ensure compatibility. Note that some animation features may not be available in PPT format.
Encryption and Ciphers
chalstarchalstar

Encryption and Ciphers

7 Resources
A unit of work that does not require access to computers or the internet. Fully resourced with lesson plans (PPT) and worksheets for each lesson. 7 Lessons plus assessment and DIRT lesson. practical activities involving a range of cipher techniques written tasks related to internet encryption. solutions to tasks included in lesson plans. Lesson plans include teacher notes and guidance on where differentiation will be needed. Includes a range of activities including peer and self assessment, questioning and accelerated learning. Notes on professional development. Reading, Writing, Communication and Mathematics links are highlighted together with opportunities for career guidance.
34 Utility Programs
chalstarchalstar

34 Utility Programs

(0)
This lesson is the 9th in a sequence of lessons that cover topic 3: computing of the Pearson Edexcel GCSE Computer Science course. In this lesson, students are asked to state, describe, explain and compare a range of utility programs and discuss how they interact with the operating system to make a computer system more efficient, secure and user-friendly. There is a significant amount of key vocabulary important for this lesson. The lesson plan is provided in PPTX, PPTS and PPT formats, while the learning mat is available as PDF, PPTX and PPT files. Note that some animation and image features are lost in the older version of PowerPoint.
02 Caesar Cipher
chalstarchalstar

02 Caesar Cipher

(0)
This lesson builds on the first lesson about Morse Code, and challenges students to think about the reason why encryption is needed and then asks them to use a Caesar Cipher to code and decode secret messages.
04 Pig Pen Cipher
chalstarchalstar

04 Pig Pen Cipher

(0)
This is the fourth lesson in a sequence of lessons about encryption and cipher techniques. The pig pen cipher is a technique mainly developed by freemasons to code messages to each other. Students will investigate how the technique works and reflect on its effectiveness.
19 Character Sets
chalstarchalstar

19 Character Sets

(0)
This lesson plan forms part of a unit of work to develop student’s understanding of how data is represented on a computer. This lesson concerns the development of character sets, shares information about ASCII and Unicode and the associated learning mat encourages students to consider the fact that emojis can also form part of a character set. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
24 Encryption
chalstarchalstar

24 Encryption

(0)
This lesson also covers material needed for learning about networks and cyber security, but also fits nicely in a unit of work about data representation. In this lesson, students are given the opportunity to reflect on what encryption is and why it is needed as well as practice skills with a Caesar Cipher. There are a range of activities that allow students to read out loud, discuss with other pupils and communicate learning in written activities. There are practical puzzles to investigate encryption algorithms, and a careers guidance discussion about being an ethical hacker. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
39 Computer components
chalstarchalstar

39 Computer components

13 Resources
Familiarise your students with how hardware and software components integrate and interact in a computer system. The unit of work takes students on a journey of understanding of internal components of computer systems: primary memory, CPU, with secondary storage and a description of an embedded system. The unit then develops by looking at OS software, utility programs and considers the importance of developing robust software and how to identify vulnerabilities in a system. It closes by considering the differences between programming languages, and the different types of translators that are used to translate high-level code into machine code. The final lesson includes an assessment task and a lesson designed to get students to reflect on achievement and improve any gaps in understanding.
30 CPU Performance
chalstarchalstar

30 CPU Performance

(0)
This lesson is the fifth in a sequence of lessons and looks at processor performance when related to clock speed, number of cores and bus speed. There are a variety of activities, but the main demonstrate phase considers the language of exams and helps students to understand how much to write in exam style questions. The learning mat (worksheet) is provided in PPTX, PPT and PDF formats. The lesson plan is provided in PPTX, PPTS, PPT formats, though the user should note that some animation and image features lose some functionality in PPT format.
12 Binary Addition
chalstarchalstar

12 Binary Addition

(1)
This lesson is the fourth in a sequence of lessons on the topic of data representation. In this lesson students are introduced to the rules surrounding binary addition. There is a learning mat with questions of increasing difficulty. At the end of the lesson, the students are introduced to the idea of an overflow error. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
A1d Cloud Storage
chalstarchalstar

A1d Cloud Storage

(0)
This is the fourth lesson in a sequence of lessons that consider the uses, benefits and drawbacks of modern technology. In this lesson students will consider how and why some files are stored on remote web servers, and discuss the benefits and drawbacks of using cloud storage. This discussion will include how to set and share files and the importance of access rights when saving to the cloud; how some devices can synchronise data between the device and the cloud, discuss the impact of 24/7 availability of online services such as this, and consider the benefits of scalability of cloud storage (plus the impact of payment for additional storage space) This lesson is appropriate for teaching component 3 of the BTEC Digital Information Technology course. The lesson plan (LP ) and learning mat (LM) are provided as PPTX and PPT and PDF formats, although some or all of the animation settings may be lost in the PPT and PDF formats.
05 Playfair Cipher
chalstarchalstar

05 Playfair Cipher

(0)
The fifth lesson in a sequence of lessons that challenge students to think about different ways that plain text can be converted, encrypted or coded into cipher text. This lesson introduces the Playfair cipher. This is a more challenging lesson to think about than the previous lessons and may need to be significantly differentiated for younger or students with additional educational needs.
01 Morse Code
chalstarchalstar

01 Morse Code

(0)
This lesson is the first of a sequence of lessons that challenge students to consider how plain English can be coded or ciphered. It builds on understanding of what Morse Code is used for and students have to cipher and decipher messages themselves. it is an introduction to a unit of work on ciphers and encryption.
09 Binary Basics
chalstarchalstar

09 Binary Basics

(1)
This is the first lesson in a sequence of lessons considering the basics of data representation and binary mathematics. This lesson introduces students to the reasons why computer scientists need to understand and use binary mathematics and introduces the terms kibibyte, mebibyte and so on. There is a fully detailed lesson plan with reading, writing, communication and maths links and careers guidance links are also highlighted. There is an accompanying learning mat or worksheet for students to complete. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats.
42 Internet and www
chalstarchalstar

42 Internet and www

(0)
This lesson is the 3rd in a series of lessons designed to improve students’ understanding of how networks are organised. This is a ‘back to basics’ lesson that challenges students to use technical language about the internet and world wide web accurately. It also covers basic understanding of the role of the router, what a browser is, distinguishing it from a search engine. Additionally this lesson covers information about connection cables needed for the BTEC Digital Information Technology course. This lesson is provided in PPTX, PPTS, PPT formats. The learning mat is provided in PPTX, PPT and PDF formats. Some animation and image features may be lost in PPT formats.
26 Hardware
chalstarchalstar

26 Hardware

(1)
This lesson is an introduction to a third unit of work that challenges students to consider the hardware and software on a computer system and how they interact. The unit will follow the GCSE specification for Pearson Edexcel Computer Science, but each lesson can stand independently. In this lesson, students must identify and describe a range of peripherals, and explain the difference between hardware and software. This lesson is suitable for key stage 3 and key stage 4. The teacher’s notes would enable a non-specialist to lead the lesson. It is suitable as a cover lesson to preempt delivery of the more detailed lessons in future. The lesson plan is provided in PPTX, PPT and PPS format. The accompanying learning mat is provided in PPT, PPX and PDF formats.