Tailor Made Resources for Business, Computing + Humanities
Average Rating4.43
(based on 30 reviews)
We have a passion for teaching and learning and provide the full set of resources for lessons that have been tried and tested over the years to make life easier for other teachers (including mark schemes, lesson plans, and model answers where appropriate!)
With specialists contributing resources for Business Studies / Economics / Computer Science / Science / History / Geography / Psychology / Sociology.
Our specialist contributors specialize in GCSE / A Level / and IB.
We have a passion for teaching and learning and provide the full set of resources for lessons that have been tried and tested over the years to make life easier for other teachers (including mark schemes, lesson plans, and model answers where appropriate!)
With specialists contributing resources for Business Studies / Economics / Computer Science / Science / History / Geography / Psychology / Sociology.
Our specialist contributors specialize in GCSE / A Level / and IB.
This lesson is one of a series (scheme of work) to teach Binary Overflows and Binary Shifts.
⠀
It has been especially designed for GCSE.
⠀
This lesson has the following Learning Objectives:
Understand Overflows in binary
Know what problems an overflow can cause.
Understand what a Binary Shift is and how to use it
⠀
All necessary resources to run the lesson(s) are included in this download:
Full Lesson Powerpoint
Reading Activity
Two Printable Worksheets with answers
⠀
The aim of all my resources is to provide lessons / activities of good quality that will add value to your lessons / schemes of work.
⠀
All activities and resources have been used in classes and any errors will be fixed and resources updated as soon as I am aware them. I have priced my resources at what I consider to be a reasonable cost based upon the amount of effort and work I have put into them but all comments and suggestions are very welcome and will be used to improve future resources.
⠀
If you have an idea for a topic / resource that you would like to see, feel free to leave a comment.
⠀
The contents of this page and all downloaded materials are copyrighted Taylor Teaching Resources.
⠀
To see other resources in my shop, click here
This lesson is one of a series (scheme of work) to teach Top Down Design and Structure Diagrams.
It has been especially designed for GCSE.
⠀
This lesson has the following Learning Objectives:
Understand every computer program is made up of systems, which in turn are made up of sub-systems
Know what Top-down Design and Structure Diagrams are
Know how to create a Structure Diagram
⠀
All necessary resources to run the lessons are included in this download:
Full Lesson Powerpoint
Full worked examples
⠀
This lesson is part of a full series on Algorithms
Introduction to Alogorithms
Top-Down Design and Structure Diagrams
Introduction to Flowcharts
Simple Flowcharts
Advanced Flowcharts
Introduction to Pseudocode
Advanced Pseudocode
⠀
The aim of all my resources is to provide lessons / activities of good quality that will add value to your lessons / schemes of work.
⠀
All activities and resources have been used in classes and any errors will be fixed and resources updated as soon as I am aware them. I have priced my resources at what I consider to be a reasonable cost based upon the amount of effort and work I have put into them but all comments and suggestions are very welcome and will be used to improve future resources.
⠀
If you have an idea for a topic / resource that you would like to see, feel free to leave a comment.
⠀
The contents of this page and all downloaded materials are copyrighted Taylor Teaching Resources.
⠀
To see other resources in my shop, click here
This lesson is one of a series (scheme of work) to teach Definite Loops..
⠀
There is enough content here for 3 double lessons for very advanced students (or a small class) but there is enough challenge here for around 6-7 hours of teaching time.
⠀
It has been especially designed for GCSE Computer Science.
⠀
This lesson has the following Learning Objectives:
Understand the meaning of ITERATION
Know the difference between a Definite and Indefinite Loop
Understand how to use a variety of Definite Loops for different purposes
Know how to look through a series of numbers to:
COUNT
Calculate the LARGEST and SMALLEST numbers
TOTAL a series of numbers
Calculate the AVERAGE (mean)
⠀
Resources to run the lesson(s) included in this download:
Lesson presentation with examples of the code
Possible solutions for each of the challenges
Original Python files to allow you to run the programs to see how the programs work
⠀
⠀
The aim of all my resources is to provide lessons / activities of good quality that will add value to your lessons / schemes of work.
⠀
All activities and resources have been used in classes and any errors will be fixed and resources updated as soon as I am aware them. I have priced my resources at what I consider to be a reasonable cost based upon the amount of effort and work I have put into them but all comments and suggestions are very welcome and will be used to improve future resources.
⠀
If you have an idea for a topic / resource that you would like to see, feel free to leave a comment.
⠀
The contents of this page and all downloaded materials are copyrighted Taylor Teaching Resources.
⠀
See our other resources for Business Studies, Computer Science and ICT here
This is printable resource to support students in Grades 7-9 to practice the different number systems - Binary, Denary, and Hexadecimal
⠀
It has been especially designed for KS 3 Computer Science / ICT.
⠀
I have also used this resource for weaker students at GCSE level to give them opportunity to practice.
⠀
This download includes 9 Different Tasks with Full Teacher Solutions:
Binary to Decimal Practice
4 Bit Binary Crossword
Binary Box
Binary to Decimal Extension
Binary Crossword with some 8 Bit Questions
Denary to Binary Practice
Binary to Hex
Hex Words
Binary Adding
⠀
The aim of all my resources is to provide lessons / activities of good quality that will add value to your lessons / schemes of work.
⠀
All activities and resources have been used in classes and any errors will be fixed and resources updated as soon as I am aware them. I have priced my resources at what I consider to be a reasonable cost based upon the amount of effort and work I have put into them but all comments and suggestions are very welcome and will be used to improve future resources.
⠀
If you have an idea for a topic / resource that you would like to see, feel free to leave a comment.
⠀
The contents of this page and all downloaded materials are copyrighted Taylor Teaching Resources.
⠀
See our other resources for Business Studies, Economics, Computer Science and ICT here
This download covers the most common Keyboard Shortcuts.
This version is for Mac computers, for the Windows Version, please click here.
It has been especially designed for KS2/3 Computer Science and ICT.
⠀
This download covers the following Keyboard Shortcuts:
Copy
Cut
Paste
Save
Print
Undo
Redo
Select All
Bold
Italic
Underline
Find
Replace
Insert Hyperlink
⠀
The aim of all my resources is to provide lessons / activities of good quality that will add value to your lessons / schemes of work.
⠀
All activities and resources have been used in classes and any errors will be fixed and resources updated as soon as I am aware them. I have priced my resources at what I consider to be a reasonable cost based upon the amount of effort and work I have put into them but all comments and suggestions are very welcome and will be used to improve future resources.
⠀
If you have an idea for a topic / resource that you would like to see, feel free to leave a comment.
⠀
The contents of this page and all downloaded materials are copyrighted Taylor Teaching Resources.
⠀
See our other resources for Business Studies, Economics, Computer Science and ICT here
This lesson is one of a series (scheme of work) to teach Networking and carries on from the following lessons:
Lesson 1: What is a Network?
Lesson 2: Network Topologies
Lesson 3: Network Hardware
Lesson 4: Network Addressing
⠀
Resources to run the lesson(s) included in this download:
Printable Test
Comprehensive and complete mark scheme
⠀
The aim of all my resources is to provide lessons / activities of good quality that will add value to your lessons / schemes of work.
⠀
All activities and resources have been used in classes and any errors will be fixed and resources updated as soon as I am aware them. I have priced my resources at what I consider to be a reasonable cost based upon the amount of effort and work I have put into them but all comments and suggestions are very welcome and will be used to improve future resources.
⠀
If you have an idea for a topic / resource that you would like to see, feel free to leave a comment.
⠀
The contents of this page and all downloaded materials are copyrighted Taylor Teaching Resources.
⠀
See our other resources for Business Studies, Computer Science and ICT here
This worksheet on Inputs and Outputs lets students practice their understanding of key terms.
⠀
Very useful as a revision or spaced practice activity. Also very useful for ESL / EAL students.
⠀
Answer key is also included.
⠀
The aim of all my resources is to provide lessons / activities of good quality that will add value to your lessons / schemes of work.
⠀
All activities and resources have been used in classes and any errors will be fixed and resources updated as soon as I am aware them. I have priced my resources at what I consider to be a reasonable cost based upon the amount of effort and work I have put into them but all comments and suggestions are very welcome and will be used to improve future resources.
⠀
If you have an idea for a topic / resource that you would like to see, feel free to leave a comment.
⠀
The contents of this page and all downloaded materials are copyrighted Taylor Teaching Resources.
⠀
See our other resources for Business Studies, Economics, Computer Science and ICT here
This worksheet is a crossword that covers Computer Security Threats and is part of a series of differentiated resources to easily scaffold key terms for learners or can be used to introduce the topic of Computer Security Threats, revise the key words or just to bring spaced practice into lessons. The full range of activities (from easy to more difficult) are:
⠀
Word Search (two versions - one with and one without the word bank) - Available as a free download here
Crossword
Fallen Phrase Puzzle
Word Scramble
⠀
The full set Computer Security Threat Activities can be found as a bundle here
⠀
The aim of all my resources is to provide lessons / activities of good quality that will add value to your lessons / schemes of work.
⠀
All activities and resources have been used in classes and any errors will be fixed and resources updated as soon as I am aware them. I have priced my resources at what I consider to be a reasonable cost based upon the amount of effort and work I have put into them but all comments and suggestions are very welcome and will be used to improve future resources.
⠀
If you have an idea for a topic / resource that you would like to see, feel free to leave a comment.
⠀
The contents of this page and all downloaded materials are copyrighted Taylor Teaching Resources.
⠀
See our other resources for Business Studies, Computer Science and ICT here
This set brings together all the different careers collections (published so far) and contains the following:
⠀
Business Careers
Computer Science Careers
Music Careers
Physical Education Careers
Science Careers
⠀
All necessary resources are included in this download and all resources are for a double lesson (or two single lessons) i.e. there should be enough to content to cover around 1 hour and fifty minutes.
⠀
The aim of all my resources is to provide lessons / activities of good quality that will add value to your lessons / schemes of work without any extra planning.
⠀
All activities and resources have been used in class and any errors will be fixed and resources updated as soon as I am aware of any errors. I have priced my resources at what I consider to be a reasonable cost based upon the amount of effort and work I have put into them but all comments and suggestions are very welcome and will be used to improve future resources.
⠀
Please do leave a review and if you have an idea for a topic / resource that you would like to see (or improvement for this resource), feel free to contact me.
The contents of this page and all downloaded materials are copyrighted Taylormade Resources.
This worksheet is a Fallen Phrase Puzzle that covers Computer Security Threats and is part of a series of differentiated resources to easily scaffold key terms for learners or can be used to introduce the topic of Computer Security Threats, revise the key words or just to bring spaced practice into lessons. The full range of activities (from easy to more difficult) are:
⠀
Word Search (two versions - one with and one without the word bank) - Available as a free download here
Crossword
Fallen Phrase Puzzle
Word Scramble
⠀
The full set Computer Security Threat Activities can be found as a bundle here
⠀
The aim of all my resources is to provide lessons / activities of good quality that will add value to your lessons / schemes of work.
⠀
All activities and resources have been used in classes and any errors will be fixed and resources updated as soon as I am aware them. I have priced my resources at what I consider to be a reasonable cost based upon the amount of effort and work I have put into them but all comments and suggestions are very welcome and will be used to improve future resources.
⠀
If you have an idea for a topic / resource that you would like to see, feel free to leave a comment.
⠀
The contents of this page and all downloaded materials are copyrighted Taylor Teaching Resources.
⠀
See our other resources for Business Studies, Computer Science and ICT here
This lesson is one of a series (scheme of work) to teach Two’s Complement.
It has been especially designed for GCSE Computer Science.
⠀
This lesson has the following Learning Objectives:
Know how binary can be used to represent negative integers
Understand Two’s Complement
⠀
Resources to run the lesson(s) included in this download:
Full Lesson Presentation
Two printable worksheets with solutions in the presentation
⠀
All necessary resources to run the lessons are included in this download and all resources are for a double lesson (or two single lessons) i.e. there should be enough to content to cover around 1 hour and fifty minutes.
⠀
This lesson is part of the topic of Binary and Number systems
⠀
The aim of all my resources is to provide lessons / activities of good quality that will add value to your lessons / schemes of work.
⠀
All activities and resources have been used in classes and any errors will be fixed and resources updated as soon as I am aware them. I have priced my resources at what I consider to be a reasonable cost based upon the amount of effort and work I have put into them but all comments and suggestions are very welcome and will be used to improve future resources.
⠀
If you have an idea for a topic / resource that you would like to see, feel free to leave a comment.
⠀
The contents of this page and all downloaded materials are copyrighted Taylor Teaching Resources.
⠀
See our other resources for Business Studies, Computer Science and ICT here
This worksheet is a word scramble that covers Computer Security Threats and is part of a series of differentiated resources to easily scaffold key terms for learners or can be used to introduce the topic of Computer Security Threats, revise the key words or just to bring spaced practice into lessons. The full range of activities (from easy to more difficult) are:
⠀
Word Search (two versions - one with and one without the word bank) - Available as a free download here
Crossword
Fallen Phrase Puzzle
Word Scramble
⠀
The full set Computer Security Threat Activities can be found as a bundle here
⠀
The aim of all my resources is to provide lessons / activities of good quality that will add value to your lessons / schemes of work.
⠀
All activities and resources have been used in classes and any errors will be fixed and resources updated as soon as I am aware them. I have priced my resources at what I consider to be a reasonable cost based upon the amount of effort and work I have put into them but all comments and suggestions are very welcome and will be used to improve future resources.
⠀
If you have an idea for a topic / resource that you would like to see, feel free to leave a comment.
⠀
The contents of this page and all downloaded materials are copyrighted Taylor Teaching Resources.
⠀
See our other resources for Business Studies, Computer Science and ICT here
This a collection of activities that cover Computer Security Threats and is part of a series of differentiated resources to easily scaffold key terms for learners or can be used to introduce the topic of Computer Security Threats, revise the key words or just to bring spaced practice into lessons. The full range of activities (from easy to more difficult) are:
⠀
Word Search (two versions - one with and one without the word bank) - Available as a free download here
Crossword
Fallen Phrase Puzzle
Word Scramble
⠀
The aim of all my resources is to provide lessons / activities of good quality that will add value to your lessons / schemes of work.
⠀
All activities and resources have been used in classes and any errors will be fixed and resources updated as soon as I am aware them. I have priced my resources at what I consider to be a reasonable cost based upon the amount of effort and work I have put into them but all comments and suggestions are very welcome and will be used to improve future resources.
⠀
If you have an idea for a topic / resource that you would like to see, feel free to leave a comment.
⠀
The contents of this page and all downloaded materials are copyrighted Taylor Teaching Resources.
⠀
See our other resources for Business Studies, Computer Science and ICT here
This worksheet is a word search that covers Computer Security Threats and is part of a series of differentiated resources to easily scaffold key terms for learners or can be used to introduce the topic of Computer Security Threats, revise the key words or just to bring spaced practice into lessons. The full range of activities (from easy to more difficult) are:
⠀
Word Search (two versions - one with and one without the word bank) - Available as a free download here
Crossword
Fallen Phrase Puzzle
Word Scramble
⠀
The full set Computer Security Threat Activities can be found as a bundle here
⠀
The aim of all my resources is to provide lessons / activities of good quality that will add value to your lessons / schemes of work.
⠀
All activities and resources have been used in classes and any errors will be fixed and resources updated as soon as I am aware them. I have priced my resources at what I consider to be a reasonable cost based upon the amount of effort and work I have put into them but all comments and suggestions are very welcome and will be used to improve future resources.
⠀
If you have an idea for a topic / resource that you would like to see, feel free to leave a comment.
⠀
The contents of this page and all downloaded materials are copyrighted Taylor Teaching Resources.
⠀
See our other resources for Business Studies, Computer Science and ICT here
This resource is a poster / reference sheet ASCII Codes.
⠀
This resource contains all of the Denary, Hexadecimal and Binary codes for the original 128 ASCII characters, alongside the character symbols.
⠀
To see our full scheme of work for Key Stage 3, please click here.
For GCSE, please click here
⠀
The aim of all my resources is to provide lessons / activities of good quality that will add value to your lessons / schemes of work.
⠀
All activities and resources have been used in classes and any errors will be fixed and resources updated as soon as I am aware them. I have priced my resources at what I consider to be a reasonable cost based upon the amount of effort and work I have put into them but all comments and suggestions are very welcome and will be used to improve future resources.
⠀
If you have an idea for a topic / resource that you would like to see, feel free to leave a comment.
⠀
The contents of this page and all downloaded materials are copyrighted Taylor Teaching Resources.
⠀
See our other resources for Business Studies, Computer Science and ICT here
These posters show all numbers from 0 - 15 (Decimal) / 0 - 1111 (Binary) / 0 - F (Hexadecimal)
I print them out and put them around the classroom for Computing when students are learning the different numbering systems (and it really does help those weaker students in the class!)
The aim of all my resources is to provide lessons / activities of good quality that will add value to your lessons / schemes of work.
⠀
All activities and resources have been used in classes and any errors will be fixed and resources updated as soon as I am aware them. I have priced my resources at what I consider to be a reasonable cost based upon the amount of effort and work I have put into them but all comments and suggestions are very welcome and will be used to improve future resources.
⠀
If you have an idea for a topic / resource that you would like to see, feel free to leave a comment.
⠀
The contents of this page and all downloaded materials are copyrighted Taylor Teaching Resources.
⠀
To see other resources in my shop, click here