Hero image

Got IT Covered

Average Rating4.60
(based on 5 reviews)

Complete units of work, paper based or for lessons with computer access. Individual and stand alone lesson plans that are ideal for cover lessons. All lesson plans and resources are suitable to be taught by a cover supervisor. All lessons identify RWCM links and opportunities to identify careers guidance support. Some include expert teacher commentary but all provide a framework for any teacher to follow. Lesson plans are built using an accelerated learning cycle.

51Uploads

11k+Views

16k+Downloads

Complete units of work, paper based or for lessons with computer access. Individual and stand alone lesson plans that are ideal for cover lessons. All lesson plans and resources are suitable to be taught by a cover supervisor. All lessons identify RWCM links and opportunities to identify careers guidance support. Some include expert teacher commentary but all provide a framework for any teacher to follow. Lesson plans are built using an accelerated learning cycle.
19 Character Sets
chalstarchalstar

19 Character Sets

(0)
This lesson plan forms part of a unit of work to develop student’s understanding of how data is represented on a computer. This lesson concerns the development of character sets, shares information about ASCII and Unicode and the associated learning mat encourages students to consider the fact that emojis can also form part of a character set. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
02 Caesar Cipher
chalstarchalstar

02 Caesar Cipher

(0)
This lesson builds on the first lesson about Morse Code, and challenges students to think about the reason why encryption is needed and then asks them to use a Caesar Cipher to code and decode secret messages.
03 Random Substitution Cipher
chalstarchalstar

03 Random Substitution Cipher

(0)
This is the third lesson in a series of lessons about ciphers and encryption. In this lesson, students consider why a simple cipher such as the Caesar cipher is inappropriate for internet encryption and look at a more complex cipher method. They are also introduced to the world of code breakers during World War II and the work of Alan Turing.
14 Two's Complement
chalstarchalstar

14 Two's Complement

(0)
This lesson is the sixth in a series of lessons on data representation and builds on lesson 5 to look at how computers process negative numbers. There are significant links with maths in this lesson and students need to be clear that adding a negative number is the same as subtracting the positive number. The teacher notes demonstrate two different ways to find the two’s complement of a binary number. The worksheet (learning mat) includes exercises to test students understanding of both processes. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
12 Binary Addition
chalstarchalstar

12 Binary Addition

(1)
This lesson is the fourth in a sequence of lessons on the topic of data representation. In this lesson students are introduced to the rules surrounding binary addition. There is a learning mat with questions of increasing difficulty. At the end of the lesson, the students are introduced to the idea of an overflow error. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
34 Utility Programs
chalstarchalstar

34 Utility Programs

(0)
This lesson is the 9th in a sequence of lessons that cover topic 3: computing of the Pearson Edexcel GCSE Computer Science course. In this lesson, students are asked to state, describe, explain and compare a range of utility programs and discuss how they interact with the operating system to make a computer system more efficient, secure and user-friendly. There is a significant amount of key vocabulary important for this lesson. The lesson plan is provided in PPTX, PPTS and PPT formats, while the learning mat is available as PDF, PPTX and PPT files. Note that some animation and image features are lost in the older version of PowerPoint.
A1d Cloud Storage
chalstarchalstar

A1d Cloud Storage

(0)
This is the fourth lesson in a sequence of lessons that consider the uses, benefits and drawbacks of modern technology. In this lesson students will consider how and why some files are stored on remote web servers, and discuss the benefits and drawbacks of using cloud storage. This discussion will include how to set and share files and the importance of access rights when saving to the cloud; how some devices can synchronise data between the device and the cloud, discuss the impact of 24/7 availability of online services such as this, and consider the benefits of scalability of cloud storage (plus the impact of payment for additional storage space) This lesson is appropriate for teaching component 3 of the BTEC Digital Information Technology course. The lesson plan (LP ) and learning mat (LM) are provided as PPTX and PPT and PDF formats, although some or all of the animation settings may be lost in the PPT and PDF formats.
04 Pig Pen Cipher
chalstarchalstar

04 Pig Pen Cipher

(0)
This is the fourth lesson in a sequence of lessons about encryption and cipher techniques. The pig pen cipher is a technique mainly developed by freemasons to code messages to each other. Students will investigate how the technique works and reflect on its effectiveness.
18 Convert from hex
chalstarchalstar

18 Convert from hex

(0)
This lesson builds on lesson 17, and asks students to convert from hexadecimal to both binary and denary. The learning mat includes exercises in both and includes some questions in context. The lesson plan is fully editable in PowerPoint and is broken into a 6-part lesson with recall and self-assessment activities. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
22 Data Storage Measures
chalstarchalstar

22 Data Storage Measures

(0)
This lesson is the penultimate lesson of a unit about data representation, file sizes and compression. In this lesson, students are introduced to ways of measuring file sizes and asked to familiarise themselves with the terms of measurement as well as convert between them. Ultimately, they should be able to write an expression to show the calculation needed to work out the size of a sound or image file. Learning Objective: To understand that data storage is measured in binary multiples. And to be able to construct expressions that calculate file sizes and data capacity requirements. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
15 Logical Binary Shifts
chalstarchalstar

15 Logical Binary Shifts

(1)
This lesson builds on learning from previous lessons related to binary numbers and binary arithmetic. In this lesson, students will consider how a computer can manipulate binary numbers and multiply or divide by powers of 2. This is a skill required for the Edexcel GCSE Computer Science course but the lesson can be adapted for other groups or courses. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
A1a Ad hoc networks
chalstarchalstar

A1a Ad hoc networks

(0)
This is the first lesson in a sequence of lessons about modern use of technology. Students will be introduced to the terms ad hoc network and open Wi-Fi. They will be asked to describe some of the issues with open networks and compare a range of scenarios that may affect network availability. The lesson plan (LP) and learning mat (LM) are available as PPTX, PPT and PDF formats to ensure compatibility. Note that some animation features may not be available in PPT format.
Encryption and Ciphers
chalstarchalstar

Encryption and Ciphers

7 Resources
A unit of work that does not require access to computers or the internet. Fully resourced with lesson plans (PPT) and worksheets for each lesson. 7 Lessons plus assessment and DIRT lesson. practical activities involving a range of cipher techniques written tasks related to internet encryption. solutions to tasks included in lesson plans. Lesson plans include teacher notes and guidance on where differentiation will be needed. Includes a range of activities including peer and self assessment, questioning and accelerated learning. Notes on professional development. Reading, Writing, Communication and Mathematics links are highlighted together with opportunities for career guidance.
05 Playfair Cipher
chalstarchalstar

05 Playfair Cipher

(0)
The fifth lesson in a sequence of lessons that challenge students to think about different ways that plain text can be converted, encrypted or coded into cipher text. This lesson introduces the Playfair cipher. This is a more challenging lesson to think about than the previous lessons and may need to be significantly differentiated for younger or students with additional educational needs.
01 Morse Code
chalstarchalstar

01 Morse Code

(0)
This lesson is the first of a sequence of lessons that challenge students to consider how plain English can be coded or ciphered. It builds on understanding of what Morse Code is used for and students have to cipher and decipher messages themselves. it is an introduction to a unit of work on ciphers and encryption.
23 Data Compression
chalstarchalstar

23 Data Compression

(0)
This lesson is close to the end of the unit of work on data presentation but can be run as a standalone lesson. In this lesson students are introduced to different types of compression and investigate the reasons why files need to be compressed for efficient computer use. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
20 Bitmap Images
chalstarchalstar

20 Bitmap Images

(0)
This lesson is a stand alone lesson that introduces students to the concept of hexadecimal and asks them to develop skills in converting between binary and denary and hexadecimal. Students will require knowledge of and skills with converting between binary and denary. It also starts to introduce the idea of colour and images being represented by computer code. It touches on high and low level programming languages. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
09 Binary Basics
chalstarchalstar

09 Binary Basics

(1)
This is the first lesson in a sequence of lessons considering the basics of data representation and binary mathematics. This lesson introduces students to the reasons why computer scientists need to understand and use binary mathematics and introduces the terms kibibyte, mebibyte and so on. There is a fully detailed lesson plan with reading, writing, communication and maths links and careers guidance links are also highlighted. There is an accompanying learning mat or worksheet for students to complete. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats.
42 Internet and www
chalstarchalstar

42 Internet and www

(0)
This lesson is the 3rd in a series of lessons designed to improve students’ understanding of how networks are organised. This is a ‘back to basics’ lesson that challenges students to use technical language about the internet and world wide web accurately. It also covers basic understanding of the role of the router, what a browser is, distinguishing it from a search engine. Additionally this lesson covers information about connection cables needed for the BTEC Digital Information Technology course. This lesson is provided in PPTX, PPTS, PPT formats. The learning mat is provided in PPTX, PPT and PDF formats. Some animation and image features may be lost in PPT formats.
26 Hardware
chalstarchalstar

26 Hardware

(1)
This lesson is an introduction to a third unit of work that challenges students to consider the hardware and software on a computer system and how they interact. The unit will follow the GCSE specification for Pearson Edexcel Computer Science, but each lesson can stand independently. In this lesson, students must identify and describe a range of peripherals, and explain the difference between hardware and software. This lesson is suitable for key stage 3 and key stage 4. The teacher’s notes would enable a non-specialist to lead the lesson. It is suitable as a cover lesson to preempt delivery of the more detailed lessons in future. The lesson plan is provided in PPTX, PPT and PPS format. The accompanying learning mat is provided in PPT, PPX and PDF formats.