Hero image

Free Educational Resources from Mr. Noureddine Tadjerout

Average Rating4.64
(based on 35 reviews)

I am a versatile professional with a diverse skill set and a strong background in education and technology. As an accomplished Author, Teacher Trainer, Examiner, and certified Apple Teacher and VEX Robotics. I have honed my expertise in Computer Science and Mathematics education. Additionally, I hold the role of Curriculum Development Specialist, focusing on Computer Science, Engineering, and Microsoft Office. I am passionate about creating educational resources and assisting fellow educators.

244Uploads

104k+Views

248k+Downloads

I am a versatile professional with a diverse skill set and a strong background in education and technology. As an accomplished Author, Teacher Trainer, Examiner, and certified Apple Teacher and VEX Robotics. I have honed my expertise in Computer Science and Mathematics education. Additionally, I hold the role of Curriculum Development Specialist, focusing on Computer Science, Engineering, and Microsoft Office. I am passionate about creating educational resources and assisting fellow educators.
AS/A level - Computer Science  -Chapter 7_Ethics and Ownership
TadjeroutTadjerout

AS/A level - Computer Science -Chapter 7_Ethics and Ownership

(0)
Chapter 7: Ethics and Ownership 7.1 Legal, Moral, Ethical and Cultural implication 7.2 Copyright issues 7.3 Artificial Intelligence Show understanding of the need for and purpose of ethics as a computing professional Understand the importance of joining a professional ethical body including BCS (British Computer Society), IEEE (Institute of Electrical and Electronic Engineers). Show understanding of the need to act ethically and the impact of acting ethically or unethically for a given situation. Show understanding of the need for copyright legislation Show understanding of the different types of software licensing and justify the use of a license for a given situation. Licenses to include free Software Foundation, the Open Source Initiative, shareware and commercial software. Show understanding of Artificial Intelligence (AI) Understand the impact of AI including social, economic and environmental issues Understand the applications of AI
Computer Science for Year 10 and 11-Memory, storage devices and media
TadjeroutTadjerout

Computer Science for Year 10 and 11-Memory, storage devices and media

(0)
Show understanding of the difference between: primary, secondary and off-line storage and provide examples of each, such as: Primary: Read Only Memory (ROM) and Random Access Memory (RAM) Secondary: hard disk drive (HDD) and Solid State Drive (SSD); off-line: Digital Versatile Disc (DVD), Compact Disc (CD), Blu-ray disc, USB flash memory and removable HDD Describe the principles of operation of a range of types of storage device and media including magnetic, optical and solid state. Describe how these principles are applied to currently available storage solutions, such as SSDs, HDDs, USB flash memory, DVDs, CDs and Blu-ray discs. Calculate the storage requirement of a file.
STEAM Project 2 for Year 5/ 6/7/8 and 9 - Car Construction
TadjeroutTadjerout

STEAM Project 2 for Year 5/ 6/7/8 and 9 - Car Construction

(0)
Welcome to Project 2, our exciting STEAM (Science, Technology, Engineering, Arts, and Mathematics) journey into Car Construction. In this project, we will explore the fascinating world of automotive design and engineering. Objectives: Main objectives for this project are: To learn the fundamental principles of car design and construction. To develop creativity and problem-solving skills by building a Bugatti-inspired car model. To understand the potential of incorporating Sensors , Arduino and other components to enhance your car’s functionality and performance. Making It Smart: One exciting aspect of this project is the opportunity to make our cars smarter by incorporating sensors and additional components. As we progress, we may explore how these technological elements can take our car construction to the next level. Let’s get started on this thrilling journey of innovation and hands-on learning
AS/A level - Computer Science - Chapter 8:  Databases
TadjeroutTadjerout

AS/A level - Computer Science - Chapter 8: Databases

(0)
8.1 Database Concepts 8.2 Database Management System (DBMS) 8.3 Data Definition Language (DDL) and Data Manipulation Language (DML) Show understanding of the limitations of using a file-based approach for the storage and retrieval of data Describe the features of a relational database that address the limitations of a file-based approach Show understanding of and use the terminology associated with a relational database model: Including entity, table, record, field, tuple, attribute, primary key, candidate key, secondary key, foreign key, relationship (one-to-many, one-to-one, many-to-many), referential integrity, indexing Use an entity-relationship (E-R) diagram to document a database design Show understanding of the normalization process: First Normal Form(1NF), Second Normal Form (2NF) and Third Normal Form (3NF) Explain why a given set of database tables are, or are not, in 3NF Produce a normalized database design for a description of a database, a given set of data, or a given set of tables Show understanding of the features provided by a Database Management System (DBMS) that address the issues of a file based approach Including: data management, including maintaining a data dictionary data modelling logical schema data integrity data security, including backup procedures and the use of access rights to individuals / groups of users Show understanding of how software tools found within a DBMS are used in practice, Including the use and purpose of: developer interface query processor Show understanding that DBMS carries out all creation / modification of the database structure using its Data Definition Language (DDL) Show understanding that the DBMS carries out all queries and maintenance of data using its DML Show understanding that the industry standard for both DDL and DML is Structured Query Language (SQL): Understand a given SQL script Understand given SQL (DDL) commands and be able to write simple SQL (DDL) commands using a sub-set of commands Create a database (CREATE DATABASE) Create a table definition (CREATE TABLE), including the creation of attributes with appropriate data types: CHARACTER,VARCHAR(n), BOOLEAN,INTEGER,REAL,DATE,TIME change a table definition (ALTER TABLE) add a primary key to a table (PRIMARY KEY (field)) add a foreign key to a table (FOREIGN KEY (field) REFERENCES Table (Field)) Write an SQL script to query or modify data (DML) which are stored in (at most two) database tables : Queries including SELECT… FROM, WHERE, ORDER BY, GROUP BY, INNER JOIN, SUM, COUNT, AVG Data maintenance including. INSERT INTO, DELETE FROM, UPDATE
Curriculum Scratch programming for Year 7
TadjeroutTadjerout

Curriculum Scratch programming for Year 7

(0)
introduce students to computer programming and games in a fun and exciting way. The Scratch software used in this transition unit was designed with this goal in mind. Students will be able to write their own programs, animations and stories in a matter of minutes. Students will learn how to plan and design projects. They will learn how to work together on a plan in teams and they will have the opportunity to present their work to their peers and teachers. They will learn how to respond and react to feedback. They will research a project on the Internet and learn how to evaluate information on websites.
Computer Science for Year 10 and 11- Ethics
TadjeroutTadjerout

Computer Science for Year 10 and 11- Ethics

(0)
Show understanding of computer ethics, including copyright issues and plagiarism Distinguish between free software, freeware and shareware Show understanding of the ethical issues raised by the spread of electronic communication and computer systems, including hacking, cracking and production of malware
Computer Science for Year 10 and 11- Security
TadjeroutTadjerout

Computer Science for Year 10 and 11- Security

(0)
Show understanding of how data are kept safe when stored and transmitted, including: use of passwords, both entered at a keyboard and biometric use of firewalls, both software and hardware, including proxy servers use of security protocols such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) use of symmetric encryption (plain text, cypher text and use of a key) showing understanding that increasing the length of a key increases the strength of the encryption Show understanding of the need to keep online systems safe from attacks including denial of service attacks, phishing, pharming. Describe how security can be applied to real-life scenarios including, for example, online banking, shopping or safeguards when carrying out online transactions .
IGCSE- year 2023 -Year 10 and 11-Chapter 9 -Databases
TadjeroutTadjerout

IGCSE- year 2023 -Year 10 and 11-Chapter 9 -Databases

(0)
1- Define a single-table database from given data storage requirements 2- Suggest suitable basic data types 3- Understand the purpose of a primary key and identify a suitable primary key for a given database table 4- Read, understand and complete structured query language (SQL) scripts to query data stored in a single database table