Hero image

Free Educational Resources from Mr. Noureddine Tadjerout

Average Rating4.64
(based on 35 reviews)

I am a versatile professional with a diverse skill set and a strong background in education and technology. As an accomplished Author, Teacher Trainer, Examiner, and certified Apple Teacher and VEX Robotics. I have honed my expertise in Computer Science and Mathematics education. Additionally, I hold the role of Curriculum Development Specialist, focusing on Computer Science, Engineering, and Microsoft Office. I am passionate about creating educational resources and assisting fellow educators.

244Uploads

104k+Views

248k+Downloads

I am a versatile professional with a diverse skill set and a strong background in education and technology. As an accomplished Author, Teacher Trainer, Examiner, and certified Apple Teacher and VEX Robotics. I have honed my expertise in Computer Science and Mathematics education. Additionally, I hold the role of Curriculum Development Specialist, focusing on Computer Science, Engineering, and Microsoft Office. I am passionate about creating educational resources and assisting fellow educators.
MS PowerPoint for year 6/ 7 /8 and 9
TadjeroutTadjerout

MS PowerPoint for year 6/ 7 /8 and 9

(0)
Creating Slideshows Using the Master Slide Manipulating Individual Slides Manipulating Images Using Charts/ Graphs on a PowerPoint Presenter Notes, Slide Animations and Slide Transitions Printing Slideshows
Curriculum Computer Science for Year 6 ( Computational thinking and Blockly Block Programming)
TadjeroutTadjerout

Curriculum Computer Science for Year 6 ( Computational thinking and Blockly Block Programming)

(0)
In Term 1- This course is designed to provide students with fundamental Knowledge related to computer science. It also introduces students to Computational thinking and how computers work. In Term 2- This course defines the competency level require to understand and explore the basic programming concepts/ principles while using a friendly mobile app creation environment (Blockly games programming), which mainly designed to create simple animations and fun games. It enables the learner to write scripts on mobile devices and traditional PCs. By going through this course, learners shall be well prepared to move on to HTML5, JavaScript, and more. In Term 3- This course defines the competency level require to understand and explore the basic programming concepts/ principles while using a friendly mobile app creation environment (Blockly games programming), Blockly Games is a series of educational games that teach programming. It is designed for students who have not had prior experience with computer programming. By the end of these games, players are ready to use conventional text-based languages which mainly designed to create simple animations and fun games. It enables the learner to write scripts on mobile devices and traditional PCs. By going through this course, learners shall be well prepared to move on to HTML5, JavaScript, and more.
Computer Science for Year 10 and 11 - Operating systems and computer architecture
TadjeroutTadjerout

Computer Science for Year 10 and 11 - Operating systems and computer architecture

(0)
Describe the purpose of an operating system (You will be required to understand the purpose and function of an operating system and why it is needed. you will not be required to understand how operating system work.) Show understanding of the need for interrupts Show understanding of the basic Von Neumann model for a computer system and the stored program concept (program instructions and data are stored in main memory and instructions are fetched and executed one after another) Describe the stages of the fetch-execute cycle, including the use of registers and buses
AS/A level - Computer Science  - Chapter 6: Security, privacy and data integrity
TadjeroutTadjerout

AS/A level - Computer Science - Chapter 6: Security, privacy and data integrity

(0)
6.1 Data Security 6.2 Data Integrity Explain the difference between the terms security , privacy and integrity of data Show appreciation of the need for both the security of data and the security of the computer system Describe security measures designed to protect computer systems, ranging from the stand alone PC to a network of computers. Including user accounts, passwords, authentication techniques such as digital signatures, firewall, antivirus software, anti spyware, encryption. Show understanding of the threats to computer and data security posed by networks and the internet. Including malware (virus, spyware), hackers, phishing, pharming. Describe methods that can be used to restrict the risks posed by threats Describe security methods designed to protect the security of data Including encryption, access rights
Hardware and software PC Assembly and Repair for Year 7/8 and 9
TadjeroutTadjerout

Hardware and software PC Assembly and Repair for Year 7/8 and 9

(0)
Create a PowerPoint and a poster including the three parts above including the PC or laptop with the latest technology used on them such as hardware component (for example maximum storage devices HDD, CPU, RAM, Motherboard, ….etc), why some of the PCs or laptops are more expensive than others, what makes them so expensive in term of what ? What are the main Components of a Computer System? Gives and Example of Input and Output devises Gives an example of an Operating Systems After you create a PowerPoint and a poster, you should present and explain at the front of the class your project
AS/A level - Computer Science  - Chapter 11 – Programming
TadjeroutTadjerout

AS/A level - Computer Science - Chapter 11 – Programming

(0)
11.1 Programming Basics 11.2 Constructs 11.3 Structured Programming 11.1 Programming Basics Implement and write pseudocode from a given design presented as either a program flowchart or structured English Write pseudocode statements for: • the declaration of variables and constants • the assignment of values to variables and constants • expressions involving any of the arithmetic or logical operators input from the keyboard and boutput to the console. Use built-in functions and library routines Any functions not given in the pseudocode guide will be provided String manipulation functions will always be given 11.2 Constructs Use pseudocode to write: • an ‘IF’ statement including the ‘ELSE’ clause and nested IF statements • a ‘CASE’ structure • a ‘count-controlled’ loop: • a ‘post-condition’ loop • a ‘pre-condition’ loop Justify why one loop structure may be better suited to solve a problem than the others **11.3 Structured Programming ** Define and use a procedure Explain where in the construction of an algorithm it would be appropriate to use a procedure. Use parameters: A procedure may have none, one or more parameters and A parameter can be passed by reference or by value. Define and use a function Explain where in the construction of an algorithm it is appropriate to use a function. A function is used in an expression, e.g. the return value replaces the call. Use the terminology associated with procedures and functions: including Procedure / function header, procedure / function interface, parameter, argument, return value Write efficient pseudocode
Curriculum for Computational Thinking
TadjeroutTadjerout

Curriculum for Computational Thinking

(0)
This course is designed to provide students with fundamental skills and knowledge required for a critical thinker to solve real life problems. They will learn computational thinking; decompose data, recognize patterns, automate solutions using algorithms and flow charts. Moreover, students will generalize solutions to a wider variety of real world problems based on a set of identified similarities and differences and then share results using various online platforms.
Create Workbooks Using Microsoft Excel 2010
TadjeroutTadjerout

Create Workbooks Using Microsoft Excel 2010

(0)
After completing this chapter, you will be able to do the following: • Identify Microsoft Excel 2010 components. • Enter and modify data in a worksheet. • Navigate within a worksheet. • Copy, cut, paste, and move cells. • Modify column and row settings.
AS/A level - Computer Science  -Chapter 3- Hardware
TadjeroutTadjerout

AS/A level - Computer Science -Chapter 3- Hardware

(0)
Show understanding of the need for input, output, primary memory and secondary (including removable) storage. Describe the principal operations of hardware devices Show understanding of the use of buffers Explain the differences between Random Access Memory (RAM) and Read Only Memory (ROM) Explain the differences between Static RAM (SRAM) and Dynamic RAM (DRAM) Explain the difference between Programmable ROM (PROM), Erasable Programmable ROM (EPROM) and Electrically Erasable Programmable ROM (EEPROM) Show an understanding of monitoring and control systems Candidates should be able to: Use the following logic gate symbols: Understand and define the functions of: NOT, AND, OR, NAND, NOR and XOR (EOR) gates Construct a logic circuit Construct a truth table Construct a logic expression
AS/A level - Computer Science  -Chapter 9 - Algorithm design and problem-solving
TadjeroutTadjerout

AS/A level - Computer Science -Chapter 9 - Algorithm design and problem-solving

(0)
9.1 Computational Thinking Skills: Show an understanding of abstraction Need for and benefits of using abstraction Describe the purpose of abstraction Produce an abstract model of a system by only including essential details Describe and use decomposition Break down problems into sub-problems leading to the concept of a program module (procedure / function) 9.2 Algorithms: Show understanding that an algorithm is a solution to a problem expressed as a sequence of defined steps. Use suitable identifier names for the representation of data used by a problem and represent these using an identifier table Write pseudocode that contains input, process and output Write pseudocode using the three basic constructs of sequence, selection and iteration (repetition) Document a simple algorithm using pseudocode Write pseudocode from: a structured English description a flowchart Describe and use the process of stepwise refinement to express an algorithm to a level of detail from which the task may be programmed Use logic statements to define parts of an algorithm solution