I started out as a science teacher and made the transition to teaching ICT and Computer Science, which I have now been doing for over 20 years. I have also worked with primary school teachers to support their delivery of the national curriculum in computing.
Edulito is a UK based educational publishing company that provides learning resources for school-aged children. All of the available resources have been tested in UK schools.
I started out as a science teacher and made the transition to teaching ICT and Computer Science, which I have now been doing for over 20 years. I have also worked with primary school teachers to support their delivery of the national curriculum in computing.
Edulito is a UK based educational publishing company that provides learning resources for school-aged children. All of the available resources have been tested in UK schools.
These resource has been produced to teach 7 to 14 year olds about programming concepts by creating fun games using the text-based programming language Python. The activities and challenges have been designed to provide a stimulating, engaging and effective way of improving students’ knowledge of the core programming concepts.
These adaptable PowerPoint Presentations (107 Slides) cover all aspects of the specification in relation to Edexcel GCSE Computer Science 1CP2 (from 2020) topic 2.
It includes a:
Teaching PowerPoint Presentations (includes checkpoint questions and answers)
Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers)
Content Covered:
· understand that computers use binary to represent data (numbers, text, sound, graphics) and program instructions and be able to determine the maximum number of states that can be represented by a binary pattern of a given length
· understand how computers represent and manipulate unsigned integers and two’s complement signed integers
· be able to convert between denary and 8-bit binary numbers (0 – 255, -127 – 128)
· be able to add together two positive binary patterns and apply logical and arithmetic binary shifts
· understand the concept of overflow in relation to the number of bits available to store a value
· understand why hexadecimal notation is used and be able to convert between hexadecimal and binary
· understand how computers encode characters using 7-bit ASCII
· understand how bitmap images are represented in binary (pixels, resolution, colour depth)
· understand how analogue sound is represented in binary (amplitude, sample rate, bit depth, sample interval)
· understand the limitations of binary representation of data (sampling frequency, resolution) when constrained by the number of available bits
· understand that data storage is measured in binary multiples (bit, nibble, byte, kibibyte, mebibyte, gibibyte, tebibyte) and be able to construct expressions to calculate file sizes and data capacity requirements
· understand the need for data compression and methods of compressing data (lossless, lossy)
This pack consists of 30 editable homework/classwork activities that can be used to support your delivery of the course. In addition, the homework pack also contains a suggested mark scheme for each activity.
Topic 1 & 6
· Decomposition and Abstraction
· Flowcharts and Programs
· Sorting Data
· Sorting and Searching Programs
· Selection
· Arrays (Lists)
· Functions
· Improving Programs
· Testing
Topic 2
· Data Capacity
· Conversions
· Compression
Topic 3
· Components of a CPU
· CPU Performance
· Embedded Systems
· Storage Comparison
· Operating Systems
· Utility Software
· Authentication
· Programming Languages
Topic 4
· LANS and WANS
· Wired and Wireless Networks
· Star and Mesh Networks
· Network Protocols
· The Concept of Layers
Topic 5
· The Impact of Technology
· The Environment
· Social & Work Issues
· Network Vulnerabilities
These adaptable PowerPoint Presentations (23 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.7.
It includes:
Teaching PowerPoint Presentations (includes checkpoint questions and answers) - 23 slides
Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers)
Content Covered:
Explain the concept of a database.
Explain the concept of a relational database.
Understand the following database concepts:
• table
• record
• field
• primary key
• foreign key.
Understand that the use of a relational database facilitates the elimination of data inconsistency and data redundancy.
Be able to use SQL to retrieve data from a relational database, using the commands:
• SELECT
• FROM
• WHERE
• ORDER BY…ASC | DESC
Be able to use SQL to insert data into a relational database using the commands.
INSERT INTO table_name (column1, column 2 …)
VALUES (value1, value2 …)
Be able to use SQL to edit and delete data in a database using the commands.
UPDATE table name
SET column1 = value1, column2 = value2 …
WHERE condition
DELETE FROM table_name WHERE condition
These adaptable PowerPoint Presentations (188 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.2. Python is used as the programming language in this unit.
It includes:
Teaching PowerPoints (including checkpoint questions and answers)
Student PowerPoints (Includes checkpoint questions, but omits the answers)
Content Covered:
Understand the concept of a data type.
Understand and use the following appropriately:
• integer
• real
• Boolean
• character
• string.
Use, understand and know how the following
statement types can be combined in programs:
• variable declaration
• constant declaration
• assignment
• iteration
• selection
• subroutine (procedure/function).
Use definite (count controlled) and indefinite (condition controlled) iteration, including indefinite iteration with the condition(s) at the start or the end of the iterative structure.
Use nested selection and nested iteration structures.
Use meaningful identifier names and know why it is important to use them.
Be familiar with and be able to use:
• addition
• subtraction
• multiplication
• real division
• integer division, including remainders.
Be familiar with and be able to use:
• equal to
• not equal to
• less than
• greater than
• less than or equal to
• greater than or equal to.
Be familiar with and be able to use:
• NOT
• AND
• OR
Understand the concept of data structures.
Use arrays (or equivalent) in the design of solutions to simple problems.
Use records (or equivalent) in the design of solutions to simple problems.
Be able to obtain user input from the keyboard.
Be able to output data and information from a program to the computer display.
Understand and be able to use:
• Length
• Position
• Sub-string
• Concatenation
• convert character to character code
• convert character code to character
• string conversion operations.
Be able to use random number generation.
Understand the concept of subroutines.
Explain the advantages of using subroutines in programs.
Describe the use of parameters to pass data within programs.
Use subroutines that return values to the calling routine.
Know that subroutines may declare their own variables, called local variables, and that local
variables usually:
• only exist while the subroutine is executing
• are only accessible within the subroutine.
Use local variables and explain why it is good practice to do so.
Describe the structured approach to programming.
Explain the advantages of the structured approach.
Be able to write simple data validation routines.
Be able to write simple authentication routines.
Understand what is meant by testing in the context of algorithms and programs.
Be able to correct errors within algorithms and programs.
Understand what test data is and describe the following types of test data:
• normal (typical)
• boundary (extreme)
• erroneous data.
This unit provides at least 6 hours of KS3 lessons on the use computer hardware components in a computer system. At the end of the units students are provided with an assessment to assess their progress.
This unit includes a:
PowerPoint presentation (56 Slides)
PDF teaching file
Unit Test (including mark scheme)
These resources can be used by a computing teacher or a non-specialist teacher to teach “What is a Computer?â€. This unit can be taught in a classroom with no computers.
What will students learn?
ALL STUDENTS
• I can identify the main hardware components (CPU, RAM, Motherboard, HDD, SSD, PSU and GPU) and software components (operating system, application software) that make up a computer system.
• I understand that devices such as smart phones and tablets are computer systems
MOST STUDENTS
• I can explain the role the main hardware components (CPU, RAM, Motherboard, HDD, PSU and GPU) and software components (operating system, application software) that make up a computer system.
• I understand the role of input, output and storage devices.
SOME STUDENTS
• I can select the components of a computer system to ensure that they meet the needs of a user.
These adaptable PowerPoint Presentations (42 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 1.4.
It includes:
Teaching PowerPoint (includes checkpoint questions and answers)
Student PowerPoint (Includes checkpoint questions, but omits the answers)
Content Covered:
Forms of attack:
Malware
Social engineering, e.g. phishing, people as the ‘weak point’
Brute-force attacks
Denial of service attacks
Data interception and theft
The concept of SQL injection
Common prevention methods:
Penetration testing
Anti-malware software
Firewalls
User access levels
Passwords
Encryption
Physical security
These adaptable PowerPoint Presentations (111 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 1.3.
It includes:
Teaching PowerPoint Presentations (including checkpoint questions and answers)
Part 1 – Networks & Topologies (66 slides)
Part 2 - Wired & Wireless Networks, Protocols & Layers (45 slides)
Student PowerPoint Presentations (Including checkpoint questions, but omits the answers)
Part 1 – Networks & Topologies
Part 2 - Wired & Wireless Networks, Protocols & Layers
Content Covered:
Types of network:
LAN (Local Area Network)
WAN (Wide Area Network)
Factors that affect the performance of networks
The different roles of computers in a client-server and a peer-to-peer network
The hardware needed to connect stand-alone computers into a Local Area Network:
Wireless access points
Routers
Switches
NIC (Network Interface Controller/Card)
Transmission media
The Internet as a worldwide collection of computer networks:
DNS (Domain Name Server)
Hosting
The Cloud
Web servers and clients
Star and Mesh network topologies
Modes of connection:
Wired - Ethernet
Wireless Wi-Fi & Bluetooth
Encryption
IP addressing and MAC addressing
Standards
Common protocols including:
TCP/IP (Transmission Control Protocol/Internet Protocol)
HTTP (Hyper Text Transfer Protocol)
HTTPS (Hyper Text Transfer Protocol Secure)
FTP (File Transfer Protocol) o POP (Post Office Protocol)
IMAP (Internet Message Access Protocol)
SMTP (Simple Mail Transfer Protocol)
The concept of layers
These adaptable PowerPoint Presentations (74 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.1.
It includes:
Teaching PowerPoint Presentations (includes checkpoint questions and answers) -74 Slides
Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers)
Content Covered:
Understand and explain the term algorithm.
Understand and explain the term decomposition.
Understand and explain the term abstraction.
Use a systematic approach to problem solving and algorithm creation representing those
algorithms using pseudo-code, program code and flowcharts.
Explain simple algorithms in terms of their inputs, processing and outputs.
Determine the purpose of simple algorithms.
Understand that more than one algorithm can be used to solve the same problem.
Compare the efficiency of algorithms explaining how some algorithms are more efficient than others in solving the same problem.
Understand and explain how the linear search algorithm works.
Understand and explain how the binary search algorithm works.
Compare and contrast linear and binary search algorithms.
Understand and explain how the merge sort algorithm works.
Understand and explain how the bubble sort algorithm works.
Compare and contrast merge sort and bubble sort algorithms.
These adaptable PowerPoint Presentations (125 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.3.
It includes:
Teaching PowerPoints (including checkpoint questions and answers) - 125 Slides
Student PowerPoints (Including checkpoint questions, but omits the answers)
Content Covered:
Understand the following number bases:
• decimal (base 10)
• binary (base 2)
• hexadecimal (base 16).
Understand that computers use binary to represent all data and instructions.
Explain why hexadecimal is often used in computer science.
Understand how binary can be used to represent whole numbers.
Understand how hexadecimal can be used to represent whole numbers.
Be able to convert in both directions between:
• binary and decimal
• binary and hexadecimal
• decimal and hexadecimal.
Know that:
• a bit is the fundamental unit of information
• a byte is a group of 8 bits.
Know that quantities of bytes can be described using prefixes. Know the names, symbols and corresponding values for the decimal prefixes: • kilo, 1 kB is 1,000 bytes
• mega, 1 MB is 1,000 kilobytes
• giga, 1 GB is 1,000 Megabytes
• tera, 1 TB is 1,000 Gigabytes.
Be able to compare quantities of bytes using the prefixes above.
Be able to add together up to three binary numbers.
Be able to apply a binary shift to a binary number.
Describe situations where binary shifts can be used.
Understand what a character set is and be able to describe the following character encoding methods:
• 7-bit ASCII
• Unicode.
Understand that character codes are commonly grouped and run in sequence within encoding tables.
Describe the purpose of Unicode and the advantages of Unicode over ASCII. Know that Unicode uses the same codes as ASCII up to 127.
Understand what a pixel is and be able to describe how pixels relate to an image and the way images are displayed.
Describe the following for bitmaps:
• image size
• colour depth.
Know that the size of a bitmap image is measured in pixels (width x height).
Describe how a bitmap represents an image using pixels and colour depth.
Describe using examples how the number of pixels and colour depth can affect the file size of a bitmap image.
Calculate bitmap image file sizes based on the number of pixels and colour depth.
Convert binary data into a bitmap image.
Convert a bitmap image into binary data.
Understand that sound is analogue and that it must be converted to a digital form for storage
and processing in a computer.
Understand that analogue signals are sampled to create the digital version of sound.
Describe the digital representation of sound in terms of:
• sampling rate
• sample resolution.
Calculate sound file sizes based on the sampling rate and the sample resolution.
Explain what data compression is.
Understand why data may be compressed and that there are different ways to compress data.
These adaptable PowerPoint Presentations (69 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.5.
It includes:
Teaching PowerPoints (including checkpoint questions and answers) - 69 slides
Student PowerPoints (Including checkpoint questions, but omits the answers)
Content Covered:
Define what a computer network is.
Discuss the advantages and disadvantages of computer networks.
Describe the main types of computer network including:
• Personal Area Network (PAN)
• Local Area Network (LAN)
• Wide Area Network (WAN).
Understand that networks can be wired or wireless.
Discuss the advantages and disadvantages of wireless networks as opposed to wired networks.
Describe the following common LAN topologies:
• star
• bus.
Define the term network protocol.
Explain the purpose and use of common network protocols including:
• Ethernet
• Wi-Fi
• TCP (Transmission Control Protocol)
• UDP (User Datagram Protocol)
• IP (Internet Protocol)
• HTTP (Hypertext Transfer Protocol)
• HTTPS (Hypertext Transfer Protocol Secure)
• FTP (File Transfer Protocol)
• email protocols:
• SMTP (Simple Mail Transfer Protocol)
• IMAP (Internet Message Access Protocol).
Understand the need for, and importance of, network security.
Explain the following methods of network security:
• authentication
• encryption
• firewall
• MAC address filtering.
Describe the 4-layer TCP/IP model:
• application layer
• transport layer
• internet layer
• link layer.
Understand that the HTTP, HTTPS, SMTP, IMAP and FTP protocols operate at the application layer.
Understand that the TCP and UDP protocols operate at the transport layer.
Understand that the IP protocol operates at the internet layer.
These adaptable PowerPoint Presentations (219 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.4.
It includes:
Teaching PowerPoints (including checkpoint questions and answers) -
Student PowerPoints (Including checkpoint questions, but omits the answers)
Content Covered:
Define the terms hardware and software and understand the relationship between them.
Construct truth tables for the following logic gates:
• NOT
• AND
• OR
• XOR.
Construct truth tables for simple logic circuits using combinations of NOT, AND, OR and XOR gates.
Interpret the results of simple truth tables.
Create, modify and interpret simple logic circuit diagrams.
Students will only need to use NOT, AND, OR and XOR gates within logic circuits.
Students will be expected to understand and use the standard logic circuit symbols.
Create and interpret simple Boolean expressions made up of NOT, AND, OR and XOR operations.
Create the Boolean expression for a simple logic circuit.
Create a logic circuit from a simple Booleanexpression.
Explain what is meant by:
• system software
• application software.
Give examples of both types of software.
Understand the need for, and functions of, operating systems (OS) and utility programs.
Understand that the OS handles management of the:
• processor(s)
• memory
• input/output (I/O) devices
• applications
• security.
Know that there are different levels of programming language:
• low-level language
• high-level language.
Explain the main differences between low-level and high-level languages.
Know that machine code and assembly language are considered to be low-level languages and explain the differences between them.
Understand that all programming code written in high-level or assembly languages must be translated.
Understand that machine code is expressed in binary and is specific to a processor or family of processors.
Understand the advantages and disadvantages of low-level language programming compared with high-level language programming.
Understand that there are three common types of program translator:
• interpreter
• compiler
• assembler.
Explain the main differences between these three types of translator.
Understand when it would be appropriate to use each type of translator.
Explain the role and operation of main memory and the following major components of a central processing unit (CPU) within the Von Neumann architecture:
• arithmetic logic unit
• control unit
• clock
• register
• bus.
Explain the effect of the following on the performance of the CPU:
• clock speed
• number of processor cores
• cache size.
Understand and explain the Fetch-Execute cycle.
Understand the different types of memory within a computer:
• RAM
• ROM
• Cache
• Register.
Know what the different types of memory are used for and why they are required.
etc
These adaptable PowerPoint Presentations (54 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.6.
It includes:
Teaching PowerPoint Presentations (includes checkpoint questions and answers)
Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers)
Content Covered:
Be able to define the term cyber security and be able to describe the main purposes of cyber security.
Students should know that cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
Understand and be able to explain the following cyber security threats:
• social engineering techniques
• malicious code (malware)
• pharming
• weak and default passwords
• misconfigured access rights
• removable media
• unpatched and/or outdated software.
Explain what penetration testing is and what it is used for.
Define the term social engineering.
Describe what social engineering is and how it can be protected against.
Explain the following forms of social engineering:
• blagging (pretexting)
• phishing
• shouldering (or shoulder surfing).
Define the term malware.
Describe what malware is and how it can be protected against.
Describe the following forms of malware:
• computer virus
• trojan
• spyware.
Understand and be able to explain the following security measures:
• biometric measures (particularly for mobile devices)
• password systems
• CAPTCHA (or similar)
• using email confirmations to confirm a user’s identity
• automatic software updates.
These adaptable PowerPoint Presentations (38 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.8.
It includes:
Teaching PowerPoint Presentations (includes checkpoint questions and answers) - 38 slides
Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers)
Content Covered:
Explain the current ethical, legal and environmental impacts and risks of digital technology on society. Where data privacy issues arise, these should be considered.
Exam questions will be taken from the following areas:
• cyber security
• mobile technologies
• wireless networking
• cloud storage
• hacking (unauthorised access to a computer system)
• wearable technologies
• computer-based implants
• autonomous vehicles.
These adaptable PowerPoint Presentations (121 Slides) cover all aspects of the specification in relation to Edexcel GCSE Computer Science 1CP2 (from 2020) topic 4.
It includes:
Teaching PowerPoints (including checkpoint questions and answers)
Student PowerPoint (Including checkpoint questions, but omits the answers)
Content Covered:
· understand why computers are connected in a network
· understand different types of networks (LAN, WAN)
· understand how the internet is structured (IP addressing, routers)
· understand how the characteristics of wired and wireless connectivity impact on performance (speed, range, throughput, bandwidth)
· understand that network speeds are measured in bits per second (kilobit, megabit, gigabit) and be able to construct expressions involving file size, transmission rate and time
· understand the role of and need for protocols (Ethernet, Wi-Fi, TCP/IP, HTTP, HTTPS, FTP and email (POP3, SMTP, IMAP))
· understand how the 4-layer (application, transport, network, data link) TCP/IP model handles data transmission over a network
· understand characteristics of network topologies (bus, star, mesh)
· understand the importance of network security, ways of identifying network vulnerabilities (penetration testing, ethical hacking) and methods of protecting networks (access control, physical security, firewalls)
These adaptable PowerPoint Presentations (79 Slides) cover all aspects of the specification in relation to Edexcel GCSE Computer Science 1CP2 (from 2020) topic 5.
It includes:
Teaching PowerPoints (including checkpoint questions and answers)
Student PowerPoints (Including checkpoint questions, but omits the answers)
Content Covered:
· understand environmental issues associated with the use of digital devices (energy consumption, manufacture, replacement cycle, disposal)
· understand ethical and legal issues associated with the collection and use of personal data (privacy, ownership, consent, misuse, data protection)
· understand ethical and legal issues associated with the use of artificial intelligence, machine learning and robotics (accountability, safety, algorithmic bias, legal liability)
· understand methods of intellectual property protection for computer systems and software (copyright, patents, trademarks, licencing)
· understand the threat to digital systems posed by malware (viruses, worms, Trojans, ransomware, key loggers) and how hackers exploit technical vulnerabilities (unpatched software, out-of-date anti-malware) and use social engineering to carry out cyberattacks
· understand methods of protecting digital systems and data (anti-malware, encryption, acceptable use policies, backup and recovery procedures)
This pack consists of 13 end of topic tests that can be used to support your delivery of the course. In addition, the topic test bundle also contains a mark scheme for each test.
Topic 1 & 6 - 3 Tests
Topic 2 – 1 Test
Topic 3 – 5 Tests
Topic 4 – 2 Tests
Topic 5 – 2 Tests
In this lesson you will learn how you can create functions and procedures. This is an essential skill if you want to create more complex problems.
Python and the Python Logo are trademarks or registered trade marks of the Python Software Foundation.
This lesson provides an introduction to the use of arrays in Python - These are called lists. The lesson goes through a range of techniques for manipulating and managing simple lists. The next lesson will cover 2D Arrays (2D Lists).
Python and the Python Logo are trademarks or registered trade marks of the Python Software Foundation.
In this lesson you are introduced to two programming concepts - Sequence and Selection.
You will learn how to use IF statements, IF then ELSE statements, IF and ELSE-IF statements and Nested IF.
Python and the Python Logo are trademarks or registered trade marks of the Python Software Foundation.