Hero image

Free Educational Resources from Mr. Noureddine Tadjerout

Average Rating4.64
(based on 35 reviews)

I am a versatile professional with a diverse skill set and a strong background in education and technology. As an accomplished Author, Teacher Trainer, Examiner, and certified Apple Teacher and VEX Robotics. I have honed my expertise in Computer Science and Mathematics education. Additionally, I hold the role of Curriculum Development Specialist, focusing on Computer Science, Engineering, and Microsoft Office. I am passionate about creating educational resources and assisting fellow educators.

244Uploads

104k+Views

248k+Downloads

I am a versatile professional with a diverse skill set and a strong background in education and technology. As an accomplished Author, Teacher Trainer, Examiner, and certified Apple Teacher and VEX Robotics. I have honed my expertise in Computer Science and Mathematics education. Additionally, I hold the role of Curriculum Development Specialist, focusing on Computer Science, Engineering, and Microsoft Office. I am passionate about creating educational resources and assisting fellow educators.
AS & A Level  ICT - Information Technology 9626 - Chapter 14—Communications technology
TadjeroutTadjerout

AS & A Level ICT - Information Technology 9626 - Chapter 14—Communications technology

(0)
Cambridge International AS & A Level Information Technology 9626 Lesson Plan inlcuded Chapter 14—Communications technology 14.1 Networks 14.1.1 Identify different types of networks. Learning Objective 1: By the end of this session, students will have acquired a comprehensive understanding of Network Fundamentals, particularly focusing on section 14.1.1, which involves the identification of various types of networks. This Including: Local Area Network (LAN), Wide Area Network (WAN), Client-Server, Peer-to-Peer, Virtual Private Network (VPN), Mobile Networks. **14.1.2:Identify protocols associated with different types of networks and their purposes ** **Learning Objective 2: ** By the end of this session, students will be able to identify protocols associated with different types of networks and their purposes, particularly focusing on section 14.1.2, which involves the identification of various characteristics including: protocols associated with each type of network such as those used to increase privacy and security (e.g. tunneling, transport layer security (SSL/TLS), Internet Protocol Security), BitTorrent for transferring large files Uses including: sharing and storage of resources sharing of peripherals exchange of data access to internet services access to telephony services access to content delivery services such as those used for, e.g. video-streaming and software downloads.
STEAM Project 4- Landscape Mountain View with bridge, river and houses for Y5/6/7/8/9 plus Rubric
TadjeroutTadjerout

STEAM Project 4- Landscape Mountain View with bridge, river and houses for Y5/6/7/8/9 plus Rubric

(0)
Introduction : Introduction to Landscape Modeling Welcome to our project on landscape modeling! Today, we will explore how to create a realistic landscape model using both digital tools like Tinkercad and physical materials. Our goal is to recreate a mountain scene with a bridge and river, similar to the image shown. We’ll start by sketching our ideas, then move on to digital modeling in Tinkercad, and finally, build a physical model. This process will help us understand the principles of landscape design and the practical aspects of constructing a model. Marking Rubric for Project 4 : Landscape
Introduction to IT  Security
TadjeroutTadjerout

Introduction to IT Security

(0)
Introduction to IT Security Understanding the fundamentals of IT security is essential in today’s digital world. From personal data protection to safeguarding sensitive information, a strong knowledge base is crucial in preventing cyber threats.
Year 7/8/9- Full Lesson If Statements and Graph - Excel Spreadsheet
TadjeroutTadjerout

Year 7/8/9- Full Lesson If Statements and Graph - Excel Spreadsheet

(0)
Excel Spreadsheets Full Lesson If Statements and Graph **Objectives ** • Understand the use of absolute cell referencing. • Understand the use of simple functions (sum,max,min and average in a spreadsheet. • Understand the use of If statements including the logical, true and false statements. • Understand how calculations can be used as True statements • Understand the use of nested if statements including more than one true statement. • Understand the use of count and sum if functions. • Understand the need the need to present data in a graph format. • Understanding the need to present information in different forms (graphs)
IGCSE Computer Science -Year 10/11- Chapter 10-Boolean logic-2023/2024
TadjeroutTadjerout

IGCSE Computer Science -Year 10/11- Chapter 10-Boolean logic-2023/2024

(0)
Chapter 10 - Boolean logic Candidates should be able to: 1 Identify and use the standard symbols for logic gates 2 Define and understand the functions of the logic gates 3 (a) Use logic gates to create given logic circuits from a: (i) problem statement (ii) logic expression (iii) truth table (b) Complete a truth table from a: (i) problem statement (ii) logic expression (iii) logic circuit © Write a logic expression from a: (i) problem statement (ii) logic circuit (iii) truth table Notes and guidance: • See section 4 for logic gate symbols • Including: – NOT – AND – OR – NAND – NOR – XOR (EOR) – the binary output produced from all the possible binary inputs • NOT is a single input gate • All other gates are limited to two inputs • Circuits must be drawn for the statement given, without simplification • Logic circuits will be limited to a maximum of three inputs and one output
Online E-Safety for year 7 and 8
TadjeroutTadjerout

Online E-Safety for year 7 and 8

(0)
You need to create a PowerPoint about online E-Safety and describe the online danger that can damage your devices and your health There are others who use the internet for illegal and unsavoury purposes. There are several dangers that we might come across when online: Make you sure to open the E-Safety-1 PowerPoint presentation first before you attempt E-Safety-2 PowerPoint Presentation Attached an example for you to follow on e safety 1 and 2 and how to prevent from malware/phishing and cyber bullying
GUI User Interface Elements
TadjeroutTadjerout

GUI User Interface Elements

(0)
When designing your interface, try to be consistent and predictable in your choice of interface elements. Whether they are aware of it or not, users have become familiar with elements acting in a certain way, so choosing to adopt those elements when appropriate will help with task completion, efficiency, and satisfaction. Interface elements include but are not limited to: • Input Controls: checkboxes, radio buttons, dropdown lists, list boxes, buttons, toggles, text fields, date field. • Navigational Components: breadcrumb, slider, search field, pagination, slider, tags, icons • Informational Components: tooltips, icons, progress bar, notifications, message boxes, modal windows • Containers: accordion