Hero image

Free Educational Resources from Mr. Noureddine Tadjerout

Average Rating4.62
(based on 33 reviews)

I am a versatile professional with a diverse skill set and a strong background in education and technology. As an accomplished Author, Teacher Trainer, Examiner, and certified Apple Teacher and VEX Robotics. I have honed my expertise in Computer Science and Mathematics education. Additionally, I hold the role of Curriculum Development Specialist, focusing on Computer Science, Engineering, and Microsoft Office. I am passionate about creating educational resources and assisting fellow educators.

243Uploads

89k+Views

231k+Downloads

I am a versatile professional with a diverse skill set and a strong background in education and technology. As an accomplished Author, Teacher Trainer, Examiner, and certified Apple Teacher and VEX Robotics. I have honed my expertise in Computer Science and Mathematics education. Additionally, I hold the role of Curriculum Development Specialist, focusing on Computer Science, Engineering, and Microsoft Office. I am passionate about creating educational resources and assisting fellow educators.
Computer Science for Year 10 and 11 -Chapter 3.2 -Computer architecture and the fetch-execute cycle
TadjeroutTadjerout

Computer Science for Year 10 and 11 -Chapter 3.2 -Computer architecture and the fetch-execute cycle

(0)
Describe the purpose of an operating system (You will be required to understand the purpose and function of an operating system and why it is needed. you will not be required to understand how operating system work.) Show understanding of the need for interrupts Show understanding of the basic Von Neumann model for a computer system and the stored program concept (program instructions and data are stored in main memory and instructions are fetched and executed one after another) Describe the stages of the fetch-execute cycle, including the use of registers and buses
AS/A level - Computer Science -Chapter 5: System Software
TadjeroutTadjerout

AS/A level - Computer Science -Chapter 5: System Software

(0)
Lesson Objectives: 5.1 Operating System Explain why a computer system requires an Operating System (OS) Explain the key management tasks carried out by the Operating System: Including memory management, file management, security management, hardware management (input / output / peripherals), process management. Show understanding of the need for typical utility software provided with an Operating System: Including disk formatter, virus checker, defragmentation software, disk contents analysis/disk repair software, file compression, back-up software. Show understanding of program libraries: Including: • software under development is often constructed using existing code from program libraries • the benefits to the developer of software constructed using library files, including Dynamic Link Library (DLL) files. Learning Objective: 5.2 Language Translators Show understanding of the need for: • assembler software for the translation of an assembly language program • a compiler for the translation of a high-level language program • an interpreter for translation and execution of a high-level language program Explain the benefits and drawbacks of using either a compiler or interpreter and justify the use of each Show awareness that high-level language programs may be partially compiled and partially interpreted, such as Java Describe features found in a typical Integrated Development Environment (IDE) Including: • for coding, including context-sensitive prompts • for initial error detection, including dynamic syntax checks • for presentation, including prettyprint, expand and collapse code blocks • for debugging, including single stepping, breakpoints, i.e. variables, expressions, report window
MS PowerPoint for year 6/ 7 /8 and 9
TadjeroutTadjerout

MS PowerPoint for year 6/ 7 /8 and 9

(0)
Creating Slideshows Using the Master Slide Manipulating Individual Slides Manipulating Images Using Charts/ Graphs on a PowerPoint Presenter Notes, Slide Animations and Slide Transitions Printing Slideshows
Computer Science for Year 10 and 11- Security
TadjeroutTadjerout

Computer Science for Year 10 and 11- Security

(0)
Show understanding of how data are kept safe when stored and transmitted, including: use of passwords, both entered at a keyboard and biometric use of firewalls, both software and hardware, including proxy servers use of security protocols such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) use of symmetric encryption (plain text, cypher text and use of a key) showing understanding that increasing the length of a key increases the strength of the encryption Show understanding of the need to keep online systems safe from attacks including denial of service attacks, phishing, pharming. Describe how security can be applied to real-life scenarios including, for example, online banking, shopping or safeguards when carrying out online transactions .
AS/A level - Computer Science -Chapter_4_Processor Fundamentals
TadjeroutTadjerout

AS/A level - Computer Science -Chapter_4_Processor Fundamentals

(0)
4.1 Central Processing Unit (CPU) Architecture: Show understanding of the basic Von Neumann model for a computer system and the stored program concept Show understanding of the purpose and role of registers, including the difference between general purpose and special purpose registers. Special purpose registers including: • Program Counter (PC) • Memory Data Register (MDR) • Memory Address Register (MAR) • The Accumulator (ACC) • Index Register (IX) • Current Instruction Register (CIR) • Status Register Show understanding of the purpose and roles of the Arithmetic and Logic Unit (ALU), Control Unit (CU) and system clock, Immediate Access Store (IAS) Show understanding of how data are transferred between various components of the computer system using the address bus, data bus and control bus 4.2: Assembly Language: Show understanding of the relationship between assembly language and machine code. Describe the different stages of the assembly process for a two-pass assembler Trace a given simple assembly language program Show understanding that a set of instructions are grouped Including the following groups: Data movement Input and output of data Arithmetic operations Unconditional and conditional instructions Compare instructions Show understanding of the different modes of addressing Including Immediate, direct, indirect, indexed, relative 4.3: Bit manipulation: Show understanding of and perform binary shifts logical, arithmetic and cyclic Left shift, right shift Show understanding of how bit manipulation can be used to monitor / control a device Carry out bit manipulation operations Test and set a bit (using bit masking)
Computer Science for Year 10 and 11-Memory, storage devices and media
TadjeroutTadjerout

Computer Science for Year 10 and 11-Memory, storage devices and media

(0)
Show understanding of the difference between: primary, secondary and off-line storage and provide examples of each, such as: Primary: Read Only Memory (ROM) and Random Access Memory (RAM) Secondary: hard disk drive (HDD) and Solid State Drive (SSD); off-line: Digital Versatile Disc (DVD), Compact Disc (CD), Blu-ray disc, USB flash memory and removable HDD Describe the principles of operation of a range of types of storage device and media including magnetic, optical and solid state. Describe how these principles are applied to currently available storage solutions, such as SSDs, HDDs, USB flash memory, DVDs, CDs and Blu-ray discs. Calculate the storage requirement of a file.
Computer Science for Year 10 and 11 -Input and output devices
TadjeroutTadjerout

Computer Science for Year 10 and 11 -Input and output devices

(0)
In this chapter you will learn about: 1.3.3 Input devices •• describe the principles of operation (how each device works) of these input devices: 2D and 3D scanners, barcode readers, Quick Response (QR) code readers, digital cameras, keyboards, mice, touch screens, interactive whiteboards, microphones. •• describe how these principles are applied to real-life scenarios, for example: scanning of passports at airports, barcode readers at supermarket checkouts, and touch screens on mobile devices. •• describe how a range of sensors can be used to input data into a computer system, including light, temperature, magnetic field, gas, pressure, moisture, humidity, pH and motion •• describe how these sensors are used in real-life scenarios, for example: street lights, security devices, pollution control, games, and household and industrial applications. 1.3.4 Output device •• describe the principles of operation of the following output devices: inkjet, laser and 3D printers; 2D and 3D cutters; speakers and headphones; actuators; flat-panel display screens, such as Liquid Crystal Display (LCD) and Light-Emitting Diodes (LED) display; LCD projectors and Digital Light Projectors (DLP). •• describe how these principles are applied to real-life scenarios, for example: printing single items on demand or in large volumes; use of small screens on mobile devices.
Computer Science for Year 10 and 11 - Operating systems and computer architecture
TadjeroutTadjerout

Computer Science for Year 10 and 11 - Operating systems and computer architecture

(0)
Describe the purpose of an operating system (You will be required to understand the purpose and function of an operating system and why it is needed. you will not be required to understand how operating system work.) Show understanding of the need for interrupts Show understanding of the basic Von Neumann model for a computer system and the stored program concept (program instructions and data are stored in main memory and instructions are fetched and executed one after another) Describe the stages of the fetch-execute cycle, including the use of registers and buses
AS/A level - Computer Science  -Chapter 3- Hardware
TadjeroutTadjerout

AS/A level - Computer Science -Chapter 3- Hardware

(0)
Show understanding of the need for input, output, primary memory and secondary (including removable) storage. Describe the principal operations of hardware devices Show understanding of the use of buffers Explain the differences between Random Access Memory (RAM) and Read Only Memory (ROM) Explain the differences between Static RAM (SRAM) and Dynamic RAM (DRAM) Explain the difference between Programmable ROM (PROM), Erasable Programmable ROM (EPROM) and Electrically Erasable Programmable ROM (EEPROM) Show an understanding of monitoring and control systems Candidates should be able to: Use the following logic gate symbols: Understand and define the functions of: NOT, AND, OR, NAND, NOR and XOR (EOR) gates Construct a logic circuit Construct a truth table Construct a logic expression
Computer Science  for Year 10 and 11 - Data Representation
TadjeroutTadjerout

Computer Science for Year 10 and 11 - Data Representation

(0)
***Data representation: ** 1.1.1 Binary systems •• recognise the use of binary numbers in computer systems •• convert positive denary integers into binary and positive binary integers into denary (a maximum of 16 bits will be used) •• show understanding of the concept of a byte and how the byte is used to measure memory size •• use binary in computer registers for a given application (such as in robotics, digital instruments and counting systems) 1.1.2 Hexadecimal •• represent positive numbers in hexadecimal notation •• show understanding of the reasons for choosing hexadecimal notation to represent numbers •• convert positive hexadecimal integers to and from denary (a maximum of four hexadecimal digits will be required) •• convert positive hexadecimal integers to and from binary (a maximum of 16 bit binary numbers will be required) •• represent numbers stored in registers and main memory as hexadecimal •• identify current uses of hexadecimal numbers in computing, such as defining colours in Hypertext Markup Language (HTML), Media Access Control (MAC) addresses, assembly languages and machine code, debugging 1.1.3 Data storage •• show understanding that sound (music), pictures, video, text and numbers are stored in different formats •• identify and describe methods of error detection and correction, such as parity checks, check digits, checksums and Automatic Repeat reQuests (ARQ) •• show understanding of the concept of Musical Instrument Digital Interface (MIDI) files, JPEG files, MP3 and MP4 files •• show understanding of the principles of data compression (lossless and lossy) applied to music/video, photos and text files
AS/A level - Computer Science  - Chapter 2-Communication
TadjeroutTadjerout

AS/A level - Computer Science - Chapter 2-Communication

(1)
Students should be able to: Roles of the different computers within the network and subnetwork models Benefits and drawbacks of each model Justify the use of a model for a given situation Understand how packets are transmitted between two hosts for a given topology Justify the use of a topology for a given situation Including the use of public and private clouds. Benefits and drawbacks of cloud computing Describe the characteristics of copper cable, fibreoptic cable, radio waves (including WiFi), microwaves, satellites Including switch, server, Network Interface Card (NIC), Wireless Network Interface Card (WNIC), Wireless Access Points (WAP), cables, bridge, repeater Including Carrier Sense Multiple Access / Collision Detection (CSMA / CD) Methods of bit streaming, i.e. real-time and on-demand Importance of bit rates / broadband speed on bit streaming Including modems, PSTN (Public Switched Telephone Network), dedicated lines, cell phone network • format of an IP address including IPv4 and IPv6 • use of subnetting in a network • how an IP address is associated with a device on a network • difference between a public IP address and a private IP address and the implications for security • difference between a static IP address and a dynamic IP address