I started out as a science teacher and made the transition to teaching ICT and Computer Science, which I have now been doing for over 20 years. I have also worked with primary school teachers to support their delivery of the national curriculum in computing.
Edulito is a UK based educational publishing company that provides learning resources for school-aged children. All of the available resources have been tested in UK schools.
I started out as a science teacher and made the transition to teaching ICT and Computer Science, which I have now been doing for over 20 years. I have also worked with primary school teachers to support their delivery of the national curriculum in computing.
Edulito is a UK based educational publishing company that provides learning resources for school-aged children. All of the available resources have been tested in UK schools.
These adaptable PowerPoint Presentations (42 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 2.4.
It includes:
Teaching PowerPoint Presentations (includes checkpoint questions and answers)
Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers)
Content Covered:
Simple logic diagrams using the operators AND, OR and NOT
Truth tables
Combining Boolean operators using AND, OR and NOT
Applying logical operators in truth tables to solve problems
These adaptable PowerPoint Presentations (54 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.6.
It includes:
Teaching PowerPoint Presentations (includes checkpoint questions and answers)
Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers)
Content Covered:
Be able to define the term cyber security and be able to describe the main purposes of cyber security.
Students should know that cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
Understand and be able to explain the following cyber security threats:
• social engineering techniques
• malicious code (malware)
• pharming
• weak and default passwords
• misconfigured access rights
• removable media
• unpatched and/or outdated software.
Explain what penetration testing is and what it is used for.
Define the term social engineering.
Describe what social engineering is and how it can be protected against.
Explain the following forms of social engineering:
• blagging (pretexting)
• phishing
• shouldering (or shoulder surfing).
Define the term malware.
Describe what malware is and how it can be protected against.
Describe the following forms of malware:
• computer virus
• trojan
• spyware.
Understand and be able to explain the following security measures:
• biometric measures (particularly for mobile devices)
• password systems
• CAPTCHA (or similar)
• using email confirmations to confirm a user’s identity
• automatic software updates.
This photocopiable resource has been produced to provide 7 to 14 year olds with exciting and engaging opportunities to learn coding concepts using Python in a fun standalone project.
Mystery of the Crystal Ball - Students have fun looking into their future. Students learn to use the time and random modules, Variables and IF-ELIF statements. The project takes around one hour to complete and includes a series of activities to extend learning.
These adaptable PowerPoint Presentations (111 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 1.3.
It includes:
Teaching PowerPoint Presentations (including checkpoint questions and answers)
Part 1 – Networks & Topologies (66 slides)
Part 2 - Wired & Wireless Networks, Protocols & Layers (45 slides)
Student PowerPoint Presentations (Including checkpoint questions, but omits the answers)
Part 1 – Networks & Topologies
Part 2 - Wired & Wireless Networks, Protocols & Layers
Content Covered:
Types of network:
LAN (Local Area Network)
WAN (Wide Area Network)
Factors that affect the performance of networks
The different roles of computers in a client-server and a peer-to-peer network
The hardware needed to connect stand-alone computers into a Local Area Network:
Wireless access points
Routers
Switches
NIC (Network Interface Controller/Card)
Transmission media
The Internet as a worldwide collection of computer networks:
DNS (Domain Name Server)
Hosting
The Cloud
Web servers and clients
Star and Mesh network topologies
Modes of connection:
Wired - Ethernet
Wireless Wi-Fi & Bluetooth
Encryption
IP addressing and MAC addressing
Standards
Common protocols including:
TCP/IP (Transmission Control Protocol/Internet Protocol)
HTTP (Hyper Text Transfer Protocol)
HTTPS (Hyper Text Transfer Protocol Secure)
FTP (File Transfer Protocol) o POP (Post Office Protocol)
IMAP (Internet Message Access Protocol)
SMTP (Simple Mail Transfer Protocol)
The concept of layers
This photocopiable resource has been produced to ensure that your students are able to successfully complete their GCSE Computer Science GCSE (9-1), but can also be used by other exam systems.
This test has been designed to provide a stimulating, engaging and effective way of assessing the progress of your students. As well as the topic test, you are also provided with a comprehensive marking scheme.
Please be aware that there may be appropriate alternative answers to some of the questions, and it is therefore suggested that the teacher uses their discretion when marking students work.
These adaptable PowerPoint Presentations (188 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.2. Python is used as the programming language in this unit.
It includes:
Teaching PowerPoints (including checkpoint questions and answers)
Student PowerPoints (Includes checkpoint questions, but omits the answers)
Content Covered:
Understand the concept of a data type.
Understand and use the following appropriately:
• integer
• real
• Boolean
• character
• string.
Use, understand and know how the following
statement types can be combined in programs:
• variable declaration
• constant declaration
• assignment
• iteration
• selection
• subroutine (procedure/function).
Use definite (count controlled) and indefinite (condition controlled) iteration, including indefinite iteration with the condition(s) at the start or the end of the iterative structure.
Use nested selection and nested iteration structures.
Use meaningful identifier names and know why it is important to use them.
Be familiar with and be able to use:
• addition
• subtraction
• multiplication
• real division
• integer division, including remainders.
Be familiar with and be able to use:
• equal to
• not equal to
• less than
• greater than
• less than or equal to
• greater than or equal to.
Be familiar with and be able to use:
• NOT
• AND
• OR
Understand the concept of data structures.
Use arrays (or equivalent) in the design of solutions to simple problems.
Use records (or equivalent) in the design of solutions to simple problems.
Be able to obtain user input from the keyboard.
Be able to output data and information from a program to the computer display.
Understand and be able to use:
• Length
• Position
• Sub-string
• Concatenation
• convert character to character code
• convert character code to character
• string conversion operations.
Be able to use random number generation.
Understand the concept of subroutines.
Explain the advantages of using subroutines in programs.
Describe the use of parameters to pass data within programs.
Use subroutines that return values to the calling routine.
Know that subroutines may declare their own variables, called local variables, and that local
variables usually:
• only exist while the subroutine is executing
• are only accessible within the subroutine.
Use local variables and explain why it is good practice to do so.
Describe the structured approach to programming.
Explain the advantages of the structured approach.
Be able to write simple data validation routines.
Be able to write simple authentication routines.
Understand what is meant by testing in the context of algorithms and programs.
Be able to correct errors within algorithms and programs.
Understand what test data is and describe the following types of test data:
• normal (typical)
• boundary (extreme)
• erroneous data.
These adaptable PowerPoint Presentations (750 Slides) provide complete coverage of all aspects of the specification in relation to Edexcel GCSE Computer Science 1CP2 (from 2020) - Topics 1 to 6.
It includes:
Teaching PowerPoints (including checkpoint questions and answers) - 750+ slides
Student PowerPoints (Including checkpoint questions, but omits the answers)
A Complete Guide to Python Programming (including student activities)
The resources cover:
Topic 1: Computational thinking – understanding of what algorithms are, what they are used for and how they work; ability to follow, amend and write algorithms; ability to construct truth tables.
Topic 2: Data – understanding of binary, data representation, data storage and compression.
Topic 3: Computers – understanding of hardware and software components of computer systems and characteristics of programming languages.
Topic 4: Networks – understanding of computer networks and network security.
Topic 5: Issues and impact – awareness of emerging trends in computing technologies, and the impact of computing on individuals, society and the environment, including ethical, legal and ownership issues.
Topic 6: Problem solving with programming
This sample project is designed to provide a stimulating, engaging and effective way of preparing students for the Programming Project Component of the 9-1 GCSE in computer science.
Students use Python to create a Quiz Board Game.
Including:
Sample project scenario
Sample student solution
Sample Python code
This bundle will take you from the very basics of programming using Python through to making a simple board game and database.
It includes:
Using Variable, Data Types and String Manipulation
Sequences, Selection and Iteration (Loops)
Use of Lists (Arrays) and File Handling
Creating a Simple Board Game and a Database
These resource has been produced to teach 7 to 14 year olds about programming concepts by creating fun games using the text-based programming language Python. The activities and challenges have been designed to provide a stimulating, engaging and effective way of improving students’ knowledge of the core programming concepts.
These adaptable PowerPoint Presentations (62 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 1.1.
It includes:
· Teaching PowerPoint (includes checkpoint questions and answers)
· Student PowerPoint (Includes checkpoint questions, but omits the answers)
Content:
The purpose of the CPU:
The fetch-decode-execute cycle
Common CPU components and their function: ALU (Arithmetic Logic Unit)
CU (Control Unit)
Cache
Registers
Von Neumann architecture:
MAR (Memory Address Register)
MDR (Memory Data Register)
Program Counter
Accumulator
How common characteristics of CPUs affect their performance:
Clock speed
Cache size
Number of cores
These adaptable PowerPoint Presentations (33 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 1.5.
It includes:
Teaching PowerPoints (includes checkpoint questions and answers)
Student PowerPoints (Includes checkpoint questions, but omits the answers)
Content Covered:
The purpose and functionality of operating systems:
User interface
Memory management and multitasking
Peripheral management and drivers
User management
File management
The purpose and functionality of utility software
Utility system software:
Encryption software
Defragmentation
Data compression
These adaptable PowerPoint Presentations (148 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 2.2.
It includes:
Teaching PowerPoint Presentations (including checkpoint questions and answers)
Part 1 – Programming Fundamentals (62 Slides)
Part 2 – Data Types & Additional Programming techniques (86 Slides)
Student PowerPoint Presentations (Including checkpoint questions, but omits the answers)
Part 1 – Programming Fundamentals
Part 2 – Data Types & Additional Programming techniques
Content Covered:
The use of variables, constants, operators, inputs, outputs and assignments
The use of the three basic programming constructs used to control the flow of a program:
Sequence
Selection
Iteration (count-and condition-controlled loops)
The common arithmetic operators
The common Boolean operators AND, OR and NOT
The use of data types:
Integer
Real
Boolean
Character and string
Casting
The use of basic string manipulation
The use of basic file handling operations:
Open
Read
Write
Close
The use of records to store data
The use of SQL to search for data
The use of arrays (or equivalent) when solving problems, including both one-dimensional and two-dimensional arrays
How to use sub programs (functions and procedures) to produce structured code
Random number generation
These adaptable PowerPoint Presentations (42 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 1.4.
It includes:
Teaching PowerPoint (includes checkpoint questions and answers)
Student PowerPoint (Includes checkpoint questions, but omits the answers)
Content Covered:
Forms of attack:
Malware
Social engineering, e.g. phishing, people as the ‘weak point’
Brute-force attacks
Denial of service attacks
Data interception and theft
The concept of SQL injection
Common prevention methods:
Penetration testing
Anti-malware software
Firewalls
User access levels
Passwords
Encryption
Physical security
These adaptable PowerPoint Presentations (219 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.4.
It includes:
Teaching PowerPoints (including checkpoint questions and answers) -
Student PowerPoints (Including checkpoint questions, but omits the answers)
Content Covered:
Define the terms hardware and software and understand the relationship between them.
Construct truth tables for the following logic gates:
• NOT
• AND
• OR
• XOR.
Construct truth tables for simple logic circuits using combinations of NOT, AND, OR and XOR gates.
Interpret the results of simple truth tables.
Create, modify and interpret simple logic circuit diagrams.
Students will only need to use NOT, AND, OR and XOR gates within logic circuits.
Students will be expected to understand and use the standard logic circuit symbols.
Create and interpret simple Boolean expressions made up of NOT, AND, OR and XOR operations.
Create the Boolean expression for a simple logic circuit.
Create a logic circuit from a simple Booleanexpression.
Explain what is meant by:
• system software
• application software.
Give examples of both types of software.
Understand the need for, and functions of, operating systems (OS) and utility programs.
Understand that the OS handles management of the:
• processor(s)
• memory
• input/output (I/O) devices
• applications
• security.
Know that there are different levels of programming language:
• low-level language
• high-level language.
Explain the main differences between low-level and high-level languages.
Know that machine code and assembly language are considered to be low-level languages and explain the differences between them.
Understand that all programming code written in high-level or assembly languages must be translated.
Understand that machine code is expressed in binary and is specific to a processor or family of processors.
Understand the advantages and disadvantages of low-level language programming compared with high-level language programming.
Understand that there are three common types of program translator:
• interpreter
• compiler
• assembler.
Explain the main differences between these three types of translator.
Understand when it would be appropriate to use each type of translator.
Explain the role and operation of main memory and the following major components of a central processing unit (CPU) within the Von Neumann architecture:
• arithmetic logic unit
• control unit
• clock
• register
• bus.
Explain the effect of the following on the performance of the CPU:
• clock speed
• number of processor cores
• cache size.
Understand and explain the Fetch-Execute cycle.
Understand the different types of memory within a computer:
• RAM
• ROM
• Cache
• Register.
Know what the different types of memory are used for and why they are required.
etc
These adaptable PowerPoint Presentations (125 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.3.
It includes:
Teaching PowerPoints (including checkpoint questions and answers) - 125 Slides
Student PowerPoints (Including checkpoint questions, but omits the answers)
Content Covered:
Understand the following number bases:
• decimal (base 10)
• binary (base 2)
• hexadecimal (base 16).
Understand that computers use binary to represent all data and instructions.
Explain why hexadecimal is often used in computer science.
Understand how binary can be used to represent whole numbers.
Understand how hexadecimal can be used to represent whole numbers.
Be able to convert in both directions between:
• binary and decimal
• binary and hexadecimal
• decimal and hexadecimal.
Know that:
• a bit is the fundamental unit of information
• a byte is a group of 8 bits.
Know that quantities of bytes can be described using prefixes. Know the names, symbols and corresponding values for the decimal prefixes: • kilo, 1 kB is 1,000 bytes
• mega, 1 MB is 1,000 kilobytes
• giga, 1 GB is 1,000 Megabytes
• tera, 1 TB is 1,000 Gigabytes.
Be able to compare quantities of bytes using the prefixes above.
Be able to add together up to three binary numbers.
Be able to apply a binary shift to a binary number.
Describe situations where binary shifts can be used.
Understand what a character set is and be able to describe the following character encoding methods:
• 7-bit ASCII
• Unicode.
Understand that character codes are commonly grouped and run in sequence within encoding tables.
Describe the purpose of Unicode and the advantages of Unicode over ASCII. Know that Unicode uses the same codes as ASCII up to 127.
Understand what a pixel is and be able to describe how pixels relate to an image and the way images are displayed.
Describe the following for bitmaps:
• image size
• colour depth.
Know that the size of a bitmap image is measured in pixels (width x height).
Describe how a bitmap represents an image using pixels and colour depth.
Describe using examples how the number of pixels and colour depth can affect the file size of a bitmap image.
Calculate bitmap image file sizes based on the number of pixels and colour depth.
Convert binary data into a bitmap image.
Convert a bitmap image into binary data.
Understand that sound is analogue and that it must be converted to a digital form for storage
and processing in a computer.
Understand that analogue signals are sampled to create the digital version of sound.
Describe the digital representation of sound in terms of:
• sampling rate
• sample resolution.
Calculate sound file sizes based on the sampling rate and the sample resolution.
Explain what data compression is.
Understand why data may be compressed and that there are different ways to compress data.
These adaptable PowerPoint Presentations (23 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.7.
It includes:
Teaching PowerPoint Presentations (includes checkpoint questions and answers) - 23 slides
Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers)
Content Covered:
Explain the concept of a database.
Explain the concept of a relational database.
Understand the following database concepts:
• table
• record
• field
• primary key
• foreign key.
Understand that the use of a relational database facilitates the elimination of data inconsistency and data redundancy.
Be able to use SQL to retrieve data from a relational database, using the commands:
• SELECT
• FROM
• WHERE
• ORDER BY…ASC | DESC
Be able to use SQL to insert data into a relational database using the commands.
INSERT INTO table_name (column1, column 2 …)
VALUES (value1, value2 …)
Be able to use SQL to edit and delete data in a database using the commands.
UPDATE table name
SET column1 = value1, column2 = value2 …
WHERE condition
DELETE FROM table_name WHERE condition
In this lesson you will learn how you can create functions and procedures. This is an essential skill if you want to create more complex problems.
Python and the Python Logo are trademarks or registered trade marks of the Python Software Foundation.
This lesson provides an introduction to the use of arrays in Python - These are called lists. The lesson goes through a range of techniques for manipulating and managing simple lists. The next lesson will cover 2D Arrays (2D Lists).
Python and the Python Logo are trademarks or registered trade marks of the Python Software Foundation.
In this lesson you are introduced to two programming concepts - Sequence and Selection.
You will learn how to use IF statements, IF then ELSE statements, IF and ELSE-IF statements and Nested IF.
Python and the Python Logo are trademarks or registered trade marks of the Python Software Foundation.