Hero image

Besimmustafa1980's Shop

I am lead teacher in Computer Science and Science with over 15 years of experience developing all inclusive and stretch and challenge lesson resources.

I am lead teacher in Computer Science and Science with over 15 years of experience developing all inclusive and stretch and challenge lesson resources.
GCSE OCR Computer Systems Revision Booklet
besimmustafa1980besimmustafa1980

GCSE OCR Computer Systems Revision Booklet

(0)
A complete student revision booklet that covers the theory for Paper 1 - Computer Systems. This is for the OCR Sepcification. The booklet covers all topics and includes student activities to complete. These can be printed and given to students. Booklet consists of 17 pages of revision material and activities for students.
KS3 Science Electromagnetic Spectrum (PHYSICS)
besimmustafa1980besimmustafa1980

KS3 Science Electromagnetic Spectrum (PHYSICS)

(0)
A full lesson aimed at KS3 on the Electromagnetic spectrum that covers the following topics: What is the electromagnetic spectrum The different types of Electromagnetic waves Typical uses/examples of the different Electromagnetic waves Dangers of the different Electromagnetic waves Lesson includes pre-starter literacy activity, student activities and theory.
OCR GCSE Computer Science System Security 1.6
besimmustafa1980besimmustafa1980

OCR GCSE Computer Science System Security 1.6

(0)
A comprehensive lesson that covers all 1.6 content on system security including lesson activities (with answers) and exam questions (with answers and exam tips for students). This can also be used by students wanting to work through and revise 1.6 System security independently. The lesson covers: forms of attack threats posed to networks: > malware > phishing > people as the ‘weak point’ in secure systems (social engineering) > brute force attacks > denial of service attacks > data interception and theft > the concept of SQL injection > poor network policy • identifying and preventing vulnerabilities: > penetration testing > network forensics > network policies > anti-malware software > firewalls > user access levels > passwords > encryption.