Hero image

Free Educational Resources from Mr. Noureddine Tadjerout

Average Rating4.58
(based on 23 reviews)

Experienced school bilingual Evaluator and Author; Teacher Trainer, Examiner , HOD Computer Science and Virtual Teaching worked both in the UK , UAE, Qatar and Central Asian also skilled computer science and Mathematics teacher along with curriculum development specialist in the ICT/CS and Engineering subject and Microsoft Office specialist. I love developing STEAM and STEM projects. I am passionate about helping teachers to reduce spending time on the things they don't enjoy.

145Uploads

36k+Views

108k+Downloads

Experienced school bilingual Evaluator and Author; Teacher Trainer, Examiner , HOD Computer Science and Virtual Teaching worked both in the UK , UAE, Qatar and Central Asian also skilled computer science and Mathematics teacher along with curriculum development specialist in the ICT/CS and Engineering subject and Microsoft Office specialist. I love developing STEAM and STEM projects. I am passionate about helping teachers to reduce spending time on the things they don't enjoy.
AS/A level - Computer Science - Chapter 8:  Databases
TadjeroutTadjerout

AS/A level - Computer Science - Chapter 8: Databases

(0)
8.1 Database Concepts 8.2 Database Management System (DBMS) 8.3 Data Definition Language (DDL) and Data Manipulation Language (DML) Show understanding of the limitations of using a file-based approach for the storage and retrieval of data Describe the features of a relational database that address the limitations of a file-based approach Show understanding of and use the terminology associated with a relational database model: Including entity, table, record, field, tuple, attribute, primary key, candidate key, secondary key, foreign key, relationship (one-to-many, one-to-one, many-to-many), referential integrity, indexing Use an entity-relationship (E-R) diagram to document a database design Show understanding of the normalization process: First Normal Form(1NF), Second Normal Form (2NF) and Third Normal Form (3NF) Explain why a given set of database tables are, or are not, in 3NF Produce a normalized database design for a description of a database, a given set of data, or a given set of tables Show understanding of the features provided by a Database Management System (DBMS) that address the issues of a file based approach Including: data management, including maintaining a data dictionary data modelling logical schema data integrity data security, including backup procedures and the use of access rights to individuals / groups of users Show understanding of how software tools found within a DBMS are used in practice, Including the use and purpose of: developer interface query processor Show understanding that DBMS carries out all creation / modification of the database structure using its Data Definition Language (DDL) Show understanding that the DBMS carries out all queries and maintenance of data using its DML Show understanding that the industry standard for both DDL and DML is Structured Query Language (SQL): Understand a given SQL script Understand given SQL (DDL) commands and be able to write simple SQL (DDL) commands using a sub-set of commands Create a database (CREATE DATABASE) Create a table definition (CREATE TABLE), including the creation of attributes with appropriate data types: CHARACTER,VARCHAR(n), BOOLEAN,INTEGER,REAL,DATE,TIME change a table definition (ALTER TABLE) add a primary key to a table (PRIMARY KEY (field)) add a foreign key to a table (FOREIGN KEY (field) REFERENCES Table (Field)) Write an SQL script to query or modify data (DML) which are stored in (at most two) database tables : Queries including SELECT… FROM, WHERE, ORDER BY, GROUP BY, INNER JOIN, SUM, COUNT, AVG Data maintenance including. INSERT INTO, DELETE FROM, UPDATE
AS/A level - Computer Science  - Chapter 11 – Programming
TadjeroutTadjerout

AS/A level - Computer Science - Chapter 11 – Programming

(0)
11.1 Programming Basics 11.2 Constructs 11.3 Structured Programming 11.1 Programming Basics Implement and write pseudocode from a given design presented as either a program flowchart or structured English Write pseudocode statements for: • the declaration of variables and constants • the assignment of values to variables and constants • expressions involving any of the arithmetic or logical operators input from the keyboard and boutput to the console. Use built-in functions and library routines Any functions not given in the pseudocode guide will be provided String manipulation functions will always be given 11.2 Constructs Use pseudocode to write: • an ‘IF’ statement including the ‘ELSE’ clause and nested IF statements • a ‘CASE’ structure • a ‘count-controlled’ loop: • a ‘post-condition’ loop • a ‘pre-condition’ loop Justify why one loop structure may be better suited to solve a problem than the others **11.3 Structured Programming ** Define and use a procedure Explain where in the construction of an algorithm it would be appropriate to use a procedure. Use parameters: A procedure may have none, one or more parameters and A parameter can be passed by reference or by value. Define and use a function Explain where in the construction of an algorithm it is appropriate to use a function. A function is used in an expression, e.g. the return value replaces the call. Use the terminology associated with procedures and functions: including Procedure / function header, procedure / function interface, parameter, argument, return value Write efficient pseudocode
AS/A level - Computer Science  -Chapter 10 - Data Types and structures
TadjeroutTadjerout

AS/A level - Computer Science -Chapter 10 - Data Types and structures

(0)
10.1 Data Types and Records: Select and use appropriate data types for a problem solution including integer, real, char, string, Boolean, date (pseudocode will use the following data types: INTEGER, REAL, CHAR, STRING, BOOLEAN, DATE, ARRAY, FILE) Show understanding of the purpose of a record structure to hold a set of data of different data types under one identifier Write pseudocode to define a record structure. Write pseudocode to read data from a record structure and save data to a record structure 10.2 Arrays: Use the technical terms associated with arrays (Including index, upper and lower bound) Select a suitable data structure (1D or 2D array) to use for a given task Write pseudocode for 1D and 2D arrays Write pseudocode to process array data Sort using a bubble sort Search using a linear search 10.3 Files: Show understanding of why files are needed Write pseudocode to handle text files that consist of one or more lines 10.4 Introduction to Abstract Data Types (ADT): Show understanding that an ADT is a collection of data and a set of operations on those data. Show understanding that a stack, queue and linked list are examples of ADTs Describe the key features of a stack, queue and linked list and justify their use for a given situation Use a stack, queue and linked list to store data (You will not be required to write pseudocode for these structures, but they should be able to add, edit and delete data from these structures) Describe how a queue, stack and linked list can be implemented using arrays
AS/A level - Computer Science  -Chapter 3- Hardware
TadjeroutTadjerout

AS/A level - Computer Science -Chapter 3- Hardware

(0)
Show understanding of the need for input, output, primary memory and secondary (including removable) storage. Describe the principal operations of hardware devices Show understanding of the use of buffers Explain the differences between Random Access Memory (RAM) and Read Only Memory (ROM) Explain the differences between Static RAM (SRAM) and Dynamic RAM (DRAM) Explain the difference between Programmable ROM (PROM), Erasable Programmable ROM (EPROM) and Electrically Erasable Programmable ROM (EEPROM) Show an understanding of monitoring and control systems Candidates should be able to: Use the following logic gate symbols: Understand and define the functions of: NOT, AND, OR, NAND, NOR and XOR (EOR) gates Construct a logic circuit Construct a truth table Construct a logic expression
HTML for Beginner
TadjeroutTadjerout

HTML for Beginner

(0)
This HTML Beginner’s Guide assumes that you have no previous knowledge of HTML. It should be quite easy to follow if you work through each step, which are all brought together at the end of this lesson.
AS/A level Computer Science - Chapter 12 – Software Development
TadjeroutTadjerout

AS/A level Computer Science - Chapter 12 – Software Development

(0)
Learning Objectives: 12.1 Program Development Life cycle Show understanding of the purpose of a development life cycle Show understanding of the need for different development life cycles depending on the program being developed (Including, waterfall, iterative, rapid application development (RAD) Describe the principles, benefits and drawbacks of each type of life cycle Show understanding of the analysis, design, coding, testing and maintenance stages in the program development life cycle. 12.2 Program Design Use a structure chart to decompose a problem into sub-tasks and express the parameters passed between the various modules / procedures / functions which are part of the algorithm design Describe the purpose of a structure chart Construct a structure chart for a given problem Derive equivalent pseudocode from a structure chart. Show understanding of the purpose of state-transition diagrams to document an algorithm. 12.3 Program Testing and maintenance Show understanding of ways of exposing and avoiding faults in programs. Locate and identify the different types of errors: syntax errors logic errors run-time errors Correct identified errors Show understanding of the methods of testing available and select appropriate data for a given method (Including dry run, walkthrough, white-box, black-box, integration, alpha, beta, acceptance, stub) Show understanding of the need for a test strategy and test plan and their likely contents. Choose appropriate test data for a test plan (Including normal, abnormal and extreme/boundary) Show understanding of the need for continuing maintenance of a system and the differences between each type of maintenance (Including perfective, adaptive, corrective) Analyze an existing program and make amendments to enhance functionality
AS/A level - Computer Science  -  Chapter 1-Information Representation
TadjeroutTadjerout

AS/A level - Computer Science - Chapter 1-Information Representation

(0)
1 Data Representation Show understanding of binary magnitudes and the difference between binary prefixes and decimal prefixes Understand the difference between and use: •• kibi and kilo •• mebi and mega •• gibi and giga •• tebi and tera Show understanding of the basis of different number systems Use the binary, denary, hexadecimal number bases and Binary Coded Decimal (BCD) and one’s and two’s complement representation for binary numbers Convert an integer value from one number base / representation to another Perform binary addition and subtraction: Using positive and negative binary integers. Show understanding of how overflow can occur. Describe practical applications where Binary Coded Decimal (BCD) and Hexadecimal are used Show understanding of and be able to represent character data in its internal binary form, depending on the character set used Familiar with ASCII (American Standard Code for Information Interchange), extended ASCII and Unicode. Students will not be expected to memorise any particular character codes. Use and understand the terms: pixel, file header, image resolution, screen resolution, colour depth, bit depth Perform calculations to estimate the file size for a bitmap image Show understanding of the effects of changing elements of a bitmap image on the image quality and file size Show understanding of how data for a vector graphic are encoded: Use the terms: drawing object, property, drawing list. Justify the use of a bitmap image or a vector graphic for a given task. 2 Multimedia – Graphics and Sound. Show understanding of how sound is represented and encoded: Use the terms: sampling, sampling rate, sampling resolution, analogue and digital data Show understanding of how data for a bitmapped image are encoded. 3 Compression Show understanding of the need for and examples of the use of compression Show understanding of lossy and lossless compression and justify the use of a method in a given situation. Show understanding of how a text file, bitmap image, vector graphic and sound file can be compressed Including the use of run-length encoding (RLE)
AS/A level - Computer Science  -Chapter 7_Ethics and Ownership
TadjeroutTadjerout

AS/A level - Computer Science -Chapter 7_Ethics and Ownership

(0)
Chapter 7: Ethics and Ownership 7.1 Legal, Moral, Ethical and Cultural implication 7.2 Copyright issues 7.3 Artificial Intelligence Show understanding of the need for and purpose of ethics as a computing professional Understand the importance of joining a professional ethical body including BCS (British Computer Society), IEEE (Institute of Electrical and Electronic Engineers). Show understanding of the need to act ethically and the impact of acting ethically or unethically for a given situation. Show understanding of the need for copyright legislation Show understanding of the different types of software licensing and justify the use of a license for a given situation. Licenses to include free Software Foundation, the Open Source Initiative, shareware and commercial software. Show understanding of Artificial Intelligence (AI) Understand the impact of AI including social, economic and environmental issues Understand the applications of AI
AS/A level - Computer Science -Chapter_4_Processor Fundamentals
TadjeroutTadjerout

AS/A level - Computer Science -Chapter_4_Processor Fundamentals

(0)
4.1 Central Processing Unit (CPU) Architecture: Show understanding of the basic Von Neumann model for a computer system and the stored program concept Show understanding of the purpose and role of registers, including the difference between general purpose and special purpose registers. Special purpose registers including: • Program Counter (PC) • Memory Data Register (MDR) • Memory Address Register (MAR) • The Accumulator (ACC) • Index Register (IX) • Current Instruction Register (CIR) • Status Register Show understanding of the purpose and roles of the Arithmetic and Logic Unit (ALU), Control Unit (CU) and system clock, Immediate Access Store (IAS) Show understanding of how data are transferred between various components of the computer system using the address bus, data bus and control bus 4.2: Assembly Language: Show understanding of the relationship between assembly language and machine code. Describe the different stages of the assembly process for a two-pass assembler Trace a given simple assembly language program Show understanding that a set of instructions are grouped Including the following groups: Data movement Input and output of data Arithmetic operations Unconditional and conditional instructions Compare instructions Show understanding of the different modes of addressing Including Immediate, direct, indirect, indexed, relative 4.3: Bit manipulation: Show understanding of and perform binary shifts logical, arithmetic and cyclic Left shift, right shift Show understanding of how bit manipulation can be used to monitor / control a device Carry out bit manipulation operations Test and set a bit (using bit masking)
AS/A level - Computer Science  - Chapter 6: Security, privacy and data integrity
TadjeroutTadjerout

AS/A level - Computer Science - Chapter 6: Security, privacy and data integrity

(0)
6.1 Data Security 6.2 Data Integrity Explain the difference between the terms security , privacy and integrity of data Show appreciation of the need for both the security of data and the security of the computer system Describe security measures designed to protect computer systems, ranging from the stand alone PC to a network of computers. Including user accounts, passwords, authentication techniques such as digital signatures, firewall, antivirus software, anti spyware, encryption. Show understanding of the threats to computer and data security posed by networks and the internet. Including malware (virus, spyware), hackers, phishing, pharming. Describe methods that can be used to restrict the risks posed by threats Describe security methods designed to protect the security of data Including encryption, access rights
AS/A level - Computer Science  -Chapter 9 - Algorithm design and problem-solving
TadjeroutTadjerout

AS/A level - Computer Science -Chapter 9 - Algorithm design and problem-solving

(0)
9.1 Computational Thinking Skills: Show an understanding of abstraction Need for and benefits of using abstraction Describe the purpose of abstraction Produce an abstract model of a system by only including essential details Describe and use decomposition Break down problems into sub-problems leading to the concept of a program module (procedure / function) 9.2 Algorithms: Show understanding that an algorithm is a solution to a problem expressed as a sequence of defined steps. Use suitable identifier names for the representation of data used by a problem and represent these using an identifier table Write pseudocode that contains input, process and output Write pseudocode using the three basic constructs of sequence, selection and iteration (repetition) Document a simple algorithm using pseudocode Write pseudocode from: a structured English description a flowchart Describe and use the process of stepwise refinement to express an algorithm to a level of detail from which the task may be programmed Use logic statements to define parts of an algorithm solution
AS/A level - Computer Science  - Chapter 2-Communication
TadjeroutTadjerout

AS/A level - Computer Science - Chapter 2-Communication

(1)
Students should be able to: Roles of the different computers within the network and subnetwork models Benefits and drawbacks of each model Justify the use of a model for a given situation Understand how packets are transmitted between two hosts for a given topology Justify the use of a topology for a given situation Including the use of public and private clouds. Benefits and drawbacks of cloud computing Describe the characteristics of copper cable, fibreoptic cable, radio waves (including WiFi), microwaves, satellites Including switch, server, Network Interface Card (NIC), Wireless Network Interface Card (WNIC), Wireless Access Points (WAP), cables, bridge, repeater Including Carrier Sense Multiple Access / Collision Detection (CSMA / CD) Methods of bit streaming, i.e. real-time and on-demand Importance of bit rates / broadband speed on bit streaming Including modems, PSTN (Public Switched Telephone Network), dedicated lines, cell phone network • format of an IP address including IPv4 and IPv6 • use of subnetting in a network • how an IP address is associated with a device on a network • difference between a public IP address and a private IP address and the implications for security • difference between a static IP address and a dynamic IP address
Computer Science Year 11 - Student Project - Pre-Release Material for Paper 2
TadjeroutTadjerout

Computer Science Year 11 - Student Project - Pre-Release Material for Paper 2

(0)
For all Teacher attached a student project for you attention: Please before you solve any pre-release material for students. It is better to let them try to solve it first. please give this project to your student for a period of a month therefore you can measure students progress and attainment. IGCSE Pre- release material for Computer Science paper 2 - Student Project Attached the Pre-release material for paper 2 exams , Please ask the students to open the PDF and watch the video and it will give students a starting point how to solve task 1/2/3 for this year exam. Thank you But before that. student should start attempting pre-release paper 2 for last year May/June 2021, Please ask the student to go straight to slide 11 and do the last year exam paper 2 May/June 2021 , Students will find the questions/answers and the python programming code for task 1 / 2 and 3 . I included python programming code for last year paper 2 exams for task 1/2/3 . Please make sure students practice using last year exam paper 2 before they start solving this year paper 2 . Thank you Ask the students to solve and provide the following three tasks for this year exam: pseudo code and python programming for Task 1 pseudo code and python programming for Task 2 pseudo code and python programming for Task 3
AS/A level - Computer Science -Chapter 5: System Software
TadjeroutTadjerout

AS/A level - Computer Science -Chapter 5: System Software

(0)
Lesson Objectives: 5.1 Operating System Explain why a computer system requires an Operating System (OS) Explain the key management tasks carried out by the Operating System: Including memory management, file management, security management, hardware management (input / output / peripherals), process management. Show understanding of the need for typical utility software provided with an Operating System: Including disk formatter, virus checker, defragmentation software, disk contents analysis/disk repair software, file compression, back-up software. Show understanding of program libraries: Including: • software under development is often constructed using existing code from program libraries • the benefits to the developer of software constructed using library files, including Dynamic Link Library (DLL) files. Learning Objective: 5.2 Language Translators Show understanding of the need for: • assembler software for the translation of an assembly language program • a compiler for the translation of a high-level language program • an interpreter for translation and execution of a high-level language program Explain the benefits and drawbacks of using either a compiler or interpreter and justify the use of each Show awareness that high-level language programs may be partially compiled and partially interpreted, such as Java Describe features found in a typical Integrated Development Environment (IDE) Including: • for coding, including context-sensitive prompts • for initial error detection, including dynamic syntax checks • for presentation, including prettyprint, expand and collapse code blocks • for debugging, including single stepping, breakpoints, i.e. variables, expressions, report window
ICT -YEAR 9- END OF YEAR EXAMINATION and EoY Revision ( MS Word/PowerPoint/Excel/Database
TadjeroutTadjerout

ICT -YEAR 9- END OF YEAR EXAMINATION and EoY Revision ( MS Word/PowerPoint/Excel/Database

(1)
ICT -YEAR 9- END OF YEAR EXAMINATION and EoY Revision ( MS Word/PowerPoint/Excel/Database IMPORTANT INSTRUCTIONS:  This Exam consists of four parts.  You must attempt all questions in the exam. – You have to prepare a word processing file using MS Office Word. – You have to prepare a presentation file using MS Office PowerPoint. – You have to prepare a presentation file using MS Office Excel – You have to prepare a presentation file using MS Office Access