Hero image

Free Educational Resources from Mr. Noureddine Tadjerout

Average Rating4.62
(based on 33 reviews)

I am a versatile professional with a diverse skill set and a strong background in education and technology. As an accomplished Author, Teacher Trainer, Examiner, and certified Apple Teacher and VEX Robotics. I have honed my expertise in Computer Science and Mathematics education. Additionally, I hold the role of Curriculum Development Specialist, focusing on Computer Science, Engineering, and Microsoft Office. I am passionate about creating educational resources and assisting fellow educators.

243Uploads

89k+Views

231k+Downloads

I am a versatile professional with a diverse skill set and a strong background in education and technology. As an accomplished Author, Teacher Trainer, Examiner, and certified Apple Teacher and VEX Robotics. I have honed my expertise in Computer Science and Mathematics education. Additionally, I hold the role of Curriculum Development Specialist, focusing on Computer Science, Engineering, and Microsoft Office. I am passionate about creating educational resources and assisting fellow educators.
AS/A level - Computer Science  -Chapter 10 - Data Types and structures
TadjeroutTadjerout

AS/A level - Computer Science -Chapter 10 - Data Types and structures

(0)
10.1 Data Types and Records: Select and use appropriate data types for a problem solution including integer, real, char, string, Boolean, date (pseudocode will use the following data types: INTEGER, REAL, CHAR, STRING, BOOLEAN, DATE, ARRAY, FILE) Show understanding of the purpose of a record structure to hold a set of data of different data types under one identifier Write pseudocode to define a record structure. Write pseudocode to read data from a record structure and save data to a record structure 10.2 Arrays: Use the technical terms associated with arrays (Including index, upper and lower bound) Select a suitable data structure (1D or 2D array) to use for a given task Write pseudocode for 1D and 2D arrays Write pseudocode to process array data Sort using a bubble sort Search using a linear search 10.3 Files: Show understanding of why files are needed Write pseudocode to handle text files that consist of one or more lines 10.4 Introduction to Abstract Data Types (ADT): Show understanding that an ADT is a collection of data and a set of operations on those data. Show understanding that a stack, queue and linked list are examples of ADTs Describe the key features of a stack, queue and linked list and justify their use for a given situation Use a stack, queue and linked list to store data (You will not be required to write pseudocode for these structures, but they should be able to add, edit and delete data from these structures) Describe how a queue, stack and linked list can be implemented using arrays
AS/A level - Computer Science  -Chapter 9 - Algorithm design and problem-solving
TadjeroutTadjerout

AS/A level - Computer Science -Chapter 9 - Algorithm design and problem-solving

(0)
9.1 Computational Thinking Skills: Show an understanding of abstraction Need for and benefits of using abstraction Describe the purpose of abstraction Produce an abstract model of a system by only including essential details Describe and use decomposition Break down problems into sub-problems leading to the concept of a program module (procedure / function) 9.2 Algorithms: Show understanding that an algorithm is a solution to a problem expressed as a sequence of defined steps. Use suitable identifier names for the representation of data used by a problem and represent these using an identifier table Write pseudocode that contains input, process and output Write pseudocode using the three basic constructs of sequence, selection and iteration (repetition) Document a simple algorithm using pseudocode Write pseudocode from: a structured English description a flowchart Describe and use the process of stepwise refinement to express an algorithm to a level of detail from which the task may be programmed Use logic statements to define parts of an algorithm solution
AS/A level - Computer Science  -Chapter 7_Ethics and Ownership
TadjeroutTadjerout

AS/A level - Computer Science -Chapter 7_Ethics and Ownership

(0)
Chapter 7: Ethics and Ownership 7.1 Legal, Moral, Ethical and Cultural implication 7.2 Copyright issues 7.3 Artificial Intelligence Show understanding of the need for and purpose of ethics as a computing professional Understand the importance of joining a professional ethical body including BCS (British Computer Society), IEEE (Institute of Electrical and Electronic Engineers). Show understanding of the need to act ethically and the impact of acting ethically or unethically for a given situation. Show understanding of the need for copyright legislation Show understanding of the different types of software licensing and justify the use of a license for a given situation. Licenses to include free Software Foundation, the Open Source Initiative, shareware and commercial software. Show understanding of Artificial Intelligence (AI) Understand the impact of AI including social, economic and environmental issues Understand the applications of AI
AS/A level - Computer Science  - Chapter 6: Security, privacy and data integrity
TadjeroutTadjerout

AS/A level - Computer Science - Chapter 6: Security, privacy and data integrity

(0)
6.1 Data Security 6.2 Data Integrity Explain the difference between the terms security , privacy and integrity of data Show appreciation of the need for both the security of data and the security of the computer system Describe security measures designed to protect computer systems, ranging from the stand alone PC to a network of computers. Including user accounts, passwords, authentication techniques such as digital signatures, firewall, antivirus software, anti spyware, encryption. Show understanding of the threats to computer and data security posed by networks and the internet. Including malware (virus, spyware), hackers, phishing, pharming. Describe methods that can be used to restrict the risks posed by threats Describe security methods designed to protect the security of data Including encryption, access rights
AS/A level - Computer Science - Chapter 8:  Databases
TadjeroutTadjerout

AS/A level - Computer Science - Chapter 8: Databases

(0)
8.1 Database Concepts 8.2 Database Management System (DBMS) 8.3 Data Definition Language (DDL) and Data Manipulation Language (DML) Show understanding of the limitations of using a file-based approach for the storage and retrieval of data Describe the features of a relational database that address the limitations of a file-based approach Show understanding of and use the terminology associated with a relational database model: Including entity, table, record, field, tuple, attribute, primary key, candidate key, secondary key, foreign key, relationship (one-to-many, one-to-one, many-to-many), referential integrity, indexing Use an entity-relationship (E-R) diagram to document a database design Show understanding of the normalization process: First Normal Form(1NF), Second Normal Form (2NF) and Third Normal Form (3NF) Explain why a given set of database tables are, or are not, in 3NF Produce a normalized database design for a description of a database, a given set of data, or a given set of tables Show understanding of the features provided by a Database Management System (DBMS) that address the issues of a file based approach Including: data management, including maintaining a data dictionary data modelling logical schema data integrity data security, including backup procedures and the use of access rights to individuals / groups of users Show understanding of how software tools found within a DBMS are used in practice, Including the use and purpose of: developer interface query processor Show understanding that DBMS carries out all creation / modification of the database structure using its Data Definition Language (DDL) Show understanding that the DBMS carries out all queries and maintenance of data using its DML Show understanding that the industry standard for both DDL and DML is Structured Query Language (SQL): Understand a given SQL script Understand given SQL (DDL) commands and be able to write simple SQL (DDL) commands using a sub-set of commands Create a database (CREATE DATABASE) Create a table definition (CREATE TABLE), including the creation of attributes with appropriate data types: CHARACTER,VARCHAR(n), BOOLEAN,INTEGER,REAL,DATE,TIME change a table definition (ALTER TABLE) add a primary key to a table (PRIMARY KEY (field)) add a foreign key to a table (FOREIGN KEY (field) REFERENCES Table (Field)) Write an SQL script to query or modify data (DML) which are stored in (at most two) database tables : Queries including SELECT… FROM, WHERE, ORDER BY, GROUP BY, INNER JOIN, SUM, COUNT, AVG Data maintenance including. INSERT INTO, DELETE FROM, UPDATE
Computer Science  Year 10 and 11 - paper 2 - Problem-solving and design
TadjeroutTadjerout

Computer Science Year 10 and 11 - paper 2 - Problem-solving and design

(0)
Show understanding that every computer system is made up of sub-systems, which in turn are made up of further sub-systems Use top-down design, structure diagrams, flowcharts, pseudocode, library routines and sub-routines Work out the purpose of a given algorithm Explain standard methods of solution Suggest and apply suitable test data Understand the need for validation and verification checks to be made on input data (validation could include range checks, length checks, type checks and check digits) Use trace tables to find the value of variables at each step in an algorithm Identify errors in given algorithms and suggest ways of removing these errors Produce an algorithm for a given problem (either in the form of pseudocode or flowchart) Comment on the effectiveness of a given solution
Computer Science for Year 10 and 11- Ethics
TadjeroutTadjerout

Computer Science for Year 10 and 11- Ethics

(0)
Show understanding of computer ethics, including copyright issues and plagiarism Distinguish between free software, freeware and shareware Show understanding of the ethical issues raised by the spread of electronic communication and computer systems, including hacking, cracking and production of malware
Computer Science for Year 10 and 11 -Chapter 3.2 -Computer architecture and the fetch-execute cycle
TadjeroutTadjerout

Computer Science for Year 10 and 11 -Chapter 3.2 -Computer architecture and the fetch-execute cycle

(0)
Describe the purpose of an operating system (You will be required to understand the purpose and function of an operating system and why it is needed. you will not be required to understand how operating system work.) Show understanding of the need for interrupts Show understanding of the basic Von Neumann model for a computer system and the stored program concept (program instructions and data are stored in main memory and instructions are fetched and executed one after another) Describe the stages of the fetch-execute cycle, including the use of registers and buses
AS/A level - Computer Science -Chapter 5: System Software
TadjeroutTadjerout

AS/A level - Computer Science -Chapter 5: System Software

(0)
Lesson Objectives: 5.1 Operating System Explain why a computer system requires an Operating System (OS) Explain the key management tasks carried out by the Operating System: Including memory management, file management, security management, hardware management (input / output / peripherals), process management. Show understanding of the need for typical utility software provided with an Operating System: Including disk formatter, virus checker, defragmentation software, disk contents analysis/disk repair software, file compression, back-up software. Show understanding of program libraries: Including: • software under development is often constructed using existing code from program libraries • the benefits to the developer of software constructed using library files, including Dynamic Link Library (DLL) files. Learning Objective: 5.2 Language Translators Show understanding of the need for: • assembler software for the translation of an assembly language program • a compiler for the translation of a high-level language program • an interpreter for translation and execution of a high-level language program Explain the benefits and drawbacks of using either a compiler or interpreter and justify the use of each Show awareness that high-level language programs may be partially compiled and partially interpreted, such as Java Describe features found in a typical Integrated Development Environment (IDE) Including: • for coding, including context-sensitive prompts • for initial error detection, including dynamic syntax checks • for presentation, including prettyprint, expand and collapse code blocks • for debugging, including single stepping, breakpoints, i.e. variables, expressions, report window
MS PowerPoint for year 6/ 7 /8 and 9
TadjeroutTadjerout

MS PowerPoint for year 6/ 7 /8 and 9

(0)
Creating Slideshows Using the Master Slide Manipulating Individual Slides Manipulating Images Using Charts/ Graphs on a PowerPoint Presenter Notes, Slide Animations and Slide Transitions Printing Slideshows
Computer Science for Year 10 and 11- Security
TadjeroutTadjerout

Computer Science for Year 10 and 11- Security

(0)
Show understanding of how data are kept safe when stored and transmitted, including: use of passwords, both entered at a keyboard and biometric use of firewalls, both software and hardware, including proxy servers use of security protocols such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) use of symmetric encryption (plain text, cypher text and use of a key) showing understanding that increasing the length of a key increases the strength of the encryption Show understanding of the need to keep online systems safe from attacks including denial of service attacks, phishing, pharming. Describe how security can be applied to real-life scenarios including, for example, online banking, shopping or safeguards when carrying out online transactions .
AS/A level - Computer Science -Chapter_4_Processor Fundamentals
TadjeroutTadjerout

AS/A level - Computer Science -Chapter_4_Processor Fundamentals

(0)
4.1 Central Processing Unit (CPU) Architecture: Show understanding of the basic Von Neumann model for a computer system and the stored program concept Show understanding of the purpose and role of registers, including the difference between general purpose and special purpose registers. Special purpose registers including: • Program Counter (PC) • Memory Data Register (MDR) • Memory Address Register (MAR) • The Accumulator (ACC) • Index Register (IX) • Current Instruction Register (CIR) • Status Register Show understanding of the purpose and roles of the Arithmetic and Logic Unit (ALU), Control Unit (CU) and system clock, Immediate Access Store (IAS) Show understanding of how data are transferred between various components of the computer system using the address bus, data bus and control bus 4.2: Assembly Language: Show understanding of the relationship between assembly language and machine code. Describe the different stages of the assembly process for a two-pass assembler Trace a given simple assembly language program Show understanding that a set of instructions are grouped Including the following groups: Data movement Input and output of data Arithmetic operations Unconditional and conditional instructions Compare instructions Show understanding of the different modes of addressing Including Immediate, direct, indirect, indexed, relative 4.3: Bit manipulation: Show understanding of and perform binary shifts logical, arithmetic and cyclic Left shift, right shift Show understanding of how bit manipulation can be used to monitor / control a device Carry out bit manipulation operations Test and set a bit (using bit masking)