Hero image

Got IT Covered

Average Rating4.60
(based on 5 reviews)

Complete units of work, paper based or for lessons with computer access. Individual and stand alone lesson plans that are ideal for cover lessons. All lesson plans and resources are suitable to be taught by a cover supervisor. All lessons identify RWCM links and opportunities to identify careers guidance support. Some include expert teacher commentary but all provide a framework for any teacher to follow. Lesson plans are built using an accelerated learning cycle.

51Uploads

10k+Views

15k+Downloads

Complete units of work, paper based or for lessons with computer access. Individual and stand alone lesson plans that are ideal for cover lessons. All lesson plans and resources are suitable to be taught by a cover supervisor. All lessons identify RWCM links and opportunities to identify careers guidance support. Some include expert teacher commentary but all provide a framework for any teacher to follow. Lesson plans are built using an accelerated learning cycle.
Encryption and Ciphers
chalstarchalstar

Encryption and Ciphers

7 Resources
A unit of work that does not require access to computers or the internet. Fully resourced with lesson plans (PPT) and worksheets for each lesson. 7 Lessons plus assessment and DIRT lesson. practical activities involving a range of cipher techniques written tasks related to internet encryption. solutions to tasks included in lesson plans. Lesson plans include teacher notes and guidance on where differentiation will be needed. Includes a range of activities including peer and self assessment, questioning and accelerated learning. Notes on professional development. Reading, Writing, Communication and Mathematics links are highlighted together with opportunities for career guidance.
02 Caesar Cipher
chalstarchalstar

02 Caesar Cipher

(0)
This lesson builds on the first lesson about Morse Code, and challenges students to think about the reason why encryption is needed and then asks them to use a Caesar Cipher to code and decode secret messages.
04 Pig Pen Cipher
chalstarchalstar

04 Pig Pen Cipher

(0)
This is the fourth lesson in a sequence of lessons about encryption and cipher techniques. The pig pen cipher is a technique mainly developed by freemasons to code messages to each other. Students will investigate how the technique works and reflect on its effectiveness.
05 Playfair Cipher
chalstarchalstar

05 Playfair Cipher

(0)
The fifth lesson in a sequence of lessons that challenge students to think about different ways that plain text can be converted, encrypted or coded into cipher text. This lesson introduces the Playfair cipher. This is a more challenging lesson to think about than the previous lessons and may need to be significantly differentiated for younger or students with additional educational needs.
Data Representation
chalstarchalstar

Data Representation

17 Resources
A collection of lesson plans that cover the GCSE Specification for Pearson Edexcel Computer Science but that have been differentiated for key stage 3 introduction to data representation. All are complete lessons with learning mats (LM) worksheets, and lesson plans (LP). LM are provided in PPTX, PPT and PDF format. LP are provided in PPTX, PPT and PPS format. Note that PPT files may lose some functionality. The lessons take the students on a journey with plenty of recap opportunities to consolidate learning, and a range of learning and teaching activities. Lessons generally do not need computer access, so this unit of work is suitable for cover lessons. There are teacher’s notes which also help to make the lesson appropriate for non-specialist or second subject teachers.
07 Asymmetric Encryption
chalstarchalstar

07 Asymmetric Encryption

(0)
This lesson builds on lesson 6 in this unit, and describes the difference between symmetric and asymmetric encryption. The lesson includes the full cycle of activities and includes recall activities such as brain dump, and assessment for learning strategies such as a hinge question.
03 Random Substitution Cipher
chalstarchalstar

03 Random Substitution Cipher

(0)
This is the third lesson in a series of lessons about ciphers and encryption. In this lesson, students consider why a simple cipher such as the Caesar cipher is inappropriate for internet encryption and look at a more complex cipher method. They are also introduced to the world of code breakers during World War II and the work of Alan Turing.
09 Binary Basics
chalstarchalstar

09 Binary Basics

(1)
This is the first lesson in a sequence of lessons considering the basics of data representation and binary mathematics. This lesson introduces students to the reasons why computer scientists need to understand and use binary mathematics and introduces the terms kibibyte, mebibyte and so on. There is a fully detailed lesson plan with reading, writing, communication and maths links and careers guidance links are also highlighted. There is an accompanying learning mat or worksheet for students to complete. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats.