Hero image

Got IT Covered

Average Rating4.50
(based on 4 reviews)

Complete units of work, paper based or for lessons with computer access. Individual and stand alone lesson plans that are ideal for cover lessons. All lesson plans and resources are suitable to be taught by a cover supervisor. All lessons identify RWCM links and opportunities to identify careers guidance support. Some include expert teacher commentary but all provide a framework for any teacher to follow. Lesson plans are built using an accelerated learning cycle.

52Uploads

7k+Views

14k+Downloads

Complete units of work, paper based or for lessons with computer access. Individual and stand alone lesson plans that are ideal for cover lessons. All lesson plans and resources are suitable to be taught by a cover supervisor. All lessons identify RWCM links and opportunities to identify careers guidance support. Some include expert teacher commentary but all provide a framework for any teacher to follow. Lesson plans are built using an accelerated learning cycle.
37 Translators
chalstarchalstar

37 Translators

(0)
This lesson is the 12th in a sequence of lessons that looks at how hardware and software are integrated on a computer system. This lesson looks at how programs written as high level programming languages can be translated into object or machine code. The lesson plan is provided in PPTX, PPTS and PPT formats, while the learning mat is available as PDF, PPTX and PPT files.
07 Asymmetric Encryption
chalstarchalstar

07 Asymmetric Encryption

(0)
This lesson builds on lesson 6 in this unit, and describes the difference between symmetric and asymmetric encryption. The lesson includes the full cycle of activities and includes recall activities such as brain dump, and assessment for learning strategies such as a hinge question.
03 Random Substitution Cipher
chalstarchalstar

03 Random Substitution Cipher

(0)
This is the third lesson in a series of lessons about ciphers and encryption. In this lesson, students consider why a simple cipher such as the Caesar cipher is inappropriate for internet encryption and look at a more complex cipher method. They are also introduced to the world of code breakers during World War II and the work of Alan Turing.
01 Morse Code
chalstarchalstar

01 Morse Code

(0)
This lesson is the first of a sequence of lessons that challenge students to consider how plain English can be coded or ciphered. It builds on understanding of what Morse Code is used for and students have to cipher and decipher messages themselves. it is an introduction to a unit of work on ciphers and encryption.
11 Denary to Binary
chalstarchalstar

11 Denary to Binary

(0)
This lesson is the third in a sequence of lessons that introduces students to look at how data is stored and manipulated on a computer system. This lesson reverses the process of learning from the previous lesson and looks at two methods for converting denary (base 10) numbers to binary (base 2) numbers. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
24 Encryption
chalstarchalstar

24 Encryption

(0)
This lesson also covers material needed for learning about networks and cyber security, but also fits nicely in a unit of work about data representation. In this lesson, students are given the opportunity to reflect on what encryption is and why it is needed as well as practice skills with a Caesar Cipher. There are a range of activities that allow students to read out loud, discuss with other pupils and communicate learning in written activities. There are practical puzzles to investigate encryption algorithms, and a careers guidance discussion about being an ethical hacker. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
21 Digital Sound Files
chalstarchalstar

21 Digital Sound Files

(0)
This lesson forms part of a unit of work that enables students to understand how text, images and sound are stored and edited on a computer. This lesson focuses on sound recordings and asks students to understand how a digital sound recording can never be as high quality as original sound, and tests them on how the sound recording can be improved in quality. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
17 Hexadecimal
chalstarchalstar

17 Hexadecimal

(0)
This lesson is a stand alone lesson that introduces students to the concept of hexadecimal and asks them to develop skills in converting between binary and denary and hexadecimal. Students will require knowledge of and skills with converting between binary and denary. It also starts to introduce the idea of colour and images being represented by computer code. It touches on high and low level programming languages. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
45 Wired and Wireless Networks
chalstarchalstar

45 Wired and Wireless Networks

(0)
This lesson is the 5th in a series of lessons designed to improve students’ understanding of how networks are organised. In this lesson students consider a range of different features of wired and wireless networks and how they impact on the performance of the network. Students should be taught to be critical about real life situations and apply their learning in this lesson to explain which type of network is best for which type of situation. This lesson is provided in PPTX, PPTS, PPT formats. The learning mat is provided in PPTX, PPT and PDF formats. Some animation and image features may be lost in PPT formats.
27 Von Neumann Stored Program Concept.
chalstarchalstar

27 Von Neumann Stored Program Concept.

(0)
This lesson builds on learning from the introductory lesson for this unit. In the previous lesson, students were asked to complete a homework research activity, so if you have not run this lesson you will need to delete or change this activity. The content of this lesson is a core part of the learning for the GCSE computer science course and asks students to understand that while the computer is running a program, the data and instructions need to be stored / held. You can extend students to understand that this disappears when the program stops or the computer is switched off. This lesson has been created with the Pearson Edexcel specification in mind, but is appropriate for other exam boards. Lesson plans are provided in PPTX, PPT and PPS format, while learning mats are provided in PPTX, PPT and PDF formats.
31 Secondary Storage
chalstarchalstar

31 Secondary Storage

(0)
This is the sixth lesson in a sequence of lessons that cover Topic 3: Computers on the Pearson Edexcel GCSE Computer Science course. In this lesson students are reminded about the core model for a computer system, and discuss the need for secondary storage. They are introduced to the history of the development of secondary storage and are asked to compare the functionality, use and benefits and drawbacks of optical, magnetic and solid state storage. Lesson plans are saved in PPTX, PPTS and PPT format. The learning mat (worksheet) and starter activity are saved in PPTX, PPTS and PDF format. Note that PPT files have lost some of the functionality of the animation settings and images.
A1b Security Issues with Open Networks
chalstarchalstar

A1b Security Issues with Open Networks

(0)
This is the second lesson in a sequence of lessons about modern use of technology. Students will be given the opportunity to build on learning from lesson 1 and to consider in greater detail the issues surrounding the use of open networks and mobile internet access. In this lesson, students will develop understanding of reasons why some networks are more secure than others, and be able to describe the impact on performance of ad hoc networks of distance, amount of data traffic and type of device. The lesson plan (LP) and learning mat (LM) are provided as PPTX, PPT and PDF formats, although animation and other features are limited in PPT and PDF formats.
A1C Network Availability
chalstarchalstar

A1C Network Availability

(0)
The third lesson in a sequence of lessons that consider use of modern technology by businesses and individuals. This lesson builds on learning about ad hoc networks and focuses on mobile network coverage and the reasons why people do not or cannot access the internet. The lesson leads a discussion about network availability (rural versus city locations, developed versus developing countries, available infrastructure, mobile network coverage as well as issues surrounding the digital divide. The main task is to write a newspaper article about these issues and factors.
A1e Cloud Computing
chalstarchalstar

A1e Cloud Computing

(0)
This is the fifth lesson in a sequence of lessons that consider how business organisations use modern technology to improve their working practice. In this lesson students clarify the difference between cloud storage and cloud computing, learn about the different tools and features in cloud computing applications and discuss the benefits of collaborative working using cloud computing tools. The practical activity that is planned for in this lesson asks students to create a tutorial / user manual for a student entering their school on how to use any VLE or cloud computing softtware that you use in school. The lesson plan and learning mat are provided in PPTX, PPT and PDF formats although animation settings are altered in older PPT software.
32 Embedded Systems
chalstarchalstar

32 Embedded Systems

(0)
This is the 7th lesson in a sequence of lessons covering Topic 3: computers of the Pearson Edexcel GCSE Computer Science (2020) course. The lesson introduces students to different devices that are computer controlled, and defines the term ‘embedded processor’. There are a range of activities that allow students to compare embedded and general purpose computer systems, and investigate the hardware used. This lesson includes a ‘matching pairs’ card game for the bell work activity. Learning mat and starter activity are provided as PDF, PPTX and PPT format. The lesson plan is saved as PPTX, PPT and PPTS formats. Note that some features are lost in PPT formats.
08 Assessment & DIRT Lesson
chalstarchalstar

08 Assessment & DIRT Lesson

(0)
This is the assessment related to the unit of work on encryption. There is an associated DIRT lesson that follows the assessment and a tracker to check class achievement. Grades are related to approximate achievement expected by a year 7 group and should be amended or differentiated for other year groups. The assessment includes practical decryption activities, multiple choice questions and explain/describe questions as well as state / identify questions.
05 Playfair Cipher
chalstarchalstar

05 Playfair Cipher

(0)
The fifth lesson in a sequence of lessons that challenge students to think about different ways that plain text can be converted, encrypted or coded into cipher text. This lesson introduces the Playfair cipher. This is a more challenging lesson to think about than the previous lessons and may need to be significantly differentiated for younger or students with additional educational needs.
06 Internet Encryption
chalstarchalstar

06 Internet Encryption

(0)
This lesson draws together the learning from the previous 5 lessons and looks at encryption in practice and for data that is transmitted via the internet. It includes an opportunity to clarify the difference between the internet and the www. It looks at the purpose of encryption and focusses on key terminology related to this aspect of algorithm and computational thinking.
35 Robust Software
chalstarchalstar

35 Robust Software

(0)
This lesson is the 10th in a sequence of lessons that looks at how hardware and software are integrated on a computer system. This lesson looks at the reasons why computer programmers must make sure that their programs can cope with errors and the ways that they do this. There is a significant amount of new key vocabulary in this lesson, and it would be a good idea to set a homework that asks students to reinforce the terms introduced in this lesson. The lesson plan is provided in PPTX, PPTS and PPT formats, while the learning mat is available as PDF, PPTX and PPT files.
09 Binary Basics
chalstarchalstar

09 Binary Basics

(1)
This is the first lesson in a sequence of lessons considering the basics of data representation and binary mathematics. This lesson introduces students to the reasons why computer scientists need to understand and use binary mathematics and introduces the terms kibibyte, mebibyte and so on. There is a fully detailed lesson plan with reading, writing, communication and maths links and careers guidance links are also highlighted. There is an accompanying learning mat or worksheet for students to complete. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats.