Hero image

Got IT Covered

Average Rating4.50
(based on 4 reviews)

Complete units of work, paper based or for lessons with computer access. Individual and stand alone lesson plans that are ideal for cover lessons. All lesson plans and resources are suitable to be taught by a cover supervisor. All lessons identify RWCM links and opportunities to identify careers guidance support. Some include expert teacher commentary but all provide a framework for any teacher to follow. Lesson plans are built using an accelerated learning cycle.

52Uploads

6k+Views

13k+Downloads

Complete units of work, paper based or for lessons with computer access. Individual and stand alone lesson plans that are ideal for cover lessons. All lesson plans and resources are suitable to be taught by a cover supervisor. All lessons identify RWCM links and opportunities to identify careers guidance support. Some include expert teacher commentary but all provide a framework for any teacher to follow. Lesson plans are built using an accelerated learning cycle.
26 Hardware
chalstarchalstar

26 Hardware

(1)
This lesson is an introduction to a third unit of work that challenges students to consider the hardware and software on a computer system and how they interact. The unit will follow the GCSE specification for Pearson Edexcel Computer Science, but each lesson can stand independently. In this lesson, students must identify and describe a range of peripherals, and explain the difference between hardware and software. This lesson is suitable for key stage 3 and key stage 4. The teacher’s notes would enable a non-specialist to lead the lesson. It is suitable as a cover lesson to preempt delivery of the more detailed lessons in future. The lesson plan is provided in PPTX, PPT and PPS format. The accompanying learning mat is provided in PPT, PPX and PDF formats.
09 Binary Basics
chalstarchalstar

09 Binary Basics

(1)
This is the first lesson in a sequence of lessons considering the basics of data representation and binary mathematics. This lesson introduces students to the reasons why computer scientists need to understand and use binary mathematics and introduces the terms kibibyte, mebibyte and so on. There is a fully detailed lesson plan with reading, writing, communication and maths links and careers guidance links are also highlighted. There is an accompanying learning mat or worksheet for students to complete. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats.
15 Logical Binary Shifts
chalstarchalstar

15 Logical Binary Shifts

(1)
This lesson builds on learning from previous lessons related to binary numbers and binary arithmetic. In this lesson, students will consider how a computer can manipulate binary numbers and multiply or divide by powers of 2. This is a skill required for the Edexcel GCSE Computer Science course but the lesson can be adapted for other groups or courses. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
12 Binary Addition
chalstarchalstar

12 Binary Addition

(1)
This lesson is the fourth in a sequence of lessons on the topic of data representation. In this lesson students are introduced to the rules surrounding binary addition. There is a learning mat with questions of increasing difficulty. At the end of the lesson, the students are introduced to the idea of an overflow error. Learning Mat (LM) Worksheet is supplied as PPT, PPTX and PDF formats. Lesson Plan (LP) is supplied as PPT, PPTX and PPT Slideshow. Note that PPT files may lose some functionality.
34 Utility Programs
chalstarchalstar

34 Utility Programs

(0)
This lesson is the 9th in a sequence of lessons that cover topic 3: computing of the Pearson Edexcel GCSE Computer Science course. In this lesson, students are asked to state, describe, explain and compare a range of utility programs and discuss how they interact with the operating system to make a computer system more efficient, secure and user-friendly. There is a significant amount of key vocabulary important for this lesson. The lesson plan is provided in PPTX, PPTS and PPT formats, while the learning mat is available as PDF, PPTX and PPT files. Note that some animation and image features are lost in the older version of PowerPoint.
37 Translators
chalstarchalstar

37 Translators

(0)
This lesson is the 12th in a sequence of lessons that looks at how hardware and software are integrated on a computer system. This lesson looks at how programs written as high level programming languages can be translated into object or machine code. The lesson plan is provided in PPTX, PPTS and PPT formats, while the learning mat is available as PDF, PPTX and PPT files.
A1b Security Issues with Open Networks
chalstarchalstar

A1b Security Issues with Open Networks

(0)
This is the second lesson in a sequence of lessons about modern use of technology. Students will be given the opportunity to build on learning from lesson 1 and to consider in greater detail the issues surrounding the use of open networks and mobile internet access. In this lesson, students will develop understanding of reasons why some networks are more secure than others, and be able to describe the impact on performance of ad hoc networks of distance, amount of data traffic and type of device. The lesson plan (LP) and learning mat (LM) are provided as PPTX, PPT and PDF formats, although animation and other features are limited in PPT and PDF formats.
A1d Cloud Storage
chalstarchalstar

A1d Cloud Storage

(0)
This is the fourth lesson in a sequence of lessons that consider the uses, benefits and drawbacks of modern technology. In this lesson students will consider how and why some files are stored on remote web servers, and discuss the benefits and drawbacks of using cloud storage. This discussion will include how to set and share files and the importance of access rights when saving to the cloud; how some devices can synchronise data between the device and the cloud, discuss the impact of 24/7 availability of online services such as this, and consider the benefits of scalability of cloud storage (plus the impact of payment for additional storage space) This lesson is appropriate for teaching component 3 of the BTEC Digital Information Technology course. The lesson plan (LP ) and learning mat (LM) are provided as PPTX and PPT and PDF formats, although some or all of the animation settings may be lost in the PPT and PDF formats.
A1C Network Availability
chalstarchalstar

A1C Network Availability

(0)
The third lesson in a sequence of lessons that consider use of modern technology by businesses and individuals. This lesson builds on learning about ad hoc networks and focuses on mobile network coverage and the reasons why people do not or cannot access the internet. The lesson leads a discussion about network availability (rural versus city locations, developed versus developing countries, available infrastructure, mobile network coverage as well as issues surrounding the digital divide. The main task is to write a newspaper article about these issues and factors.
A1e Cloud Computing
chalstarchalstar

A1e Cloud Computing

(0)
This is the fifth lesson in a sequence of lessons that consider how business organisations use modern technology to improve their working practice. In this lesson students clarify the difference between cloud storage and cloud computing, learn about the different tools and features in cloud computing applications and discuss the benefits of collaborative working using cloud computing tools. The practical activity that is planned for in this lesson asks students to create a tutorial / user manual for a student entering their school on how to use any VLE or cloud computing softtware that you use in school. The lesson plan and learning mat are provided in PPTX, PPT and PDF formats although animation settings are altered in older PPT software.
33 Operating Systems
chalstarchalstar

33 Operating Systems

(0)
This lesson is the 8th in a sequence of lessons that cover topic 3: computing of the Pearson Edexcel GCSE Computer Science course. In this lesson, students investigate the role of the operating system software in a computer system. By the end of the lesson they should be able to list examples of operating systems, state or describe the functions of an operating system and explain how the operating system manages the CPU in scheduling actions. There is a significant amount of key vocabulary important for this lesson. The lesson plan is provided in PPTX, PPTS and PPT formats, while the learning mat is available as PDF, PPTX and PPT files. Note that some animation features are lost in the PPT formatted files. The lesson includes a ‘bingo’ bell work starter activity. The learning mat is designed to be printed in A3.
32 Embedded Systems
chalstarchalstar

32 Embedded Systems

(0)
This is the 7th lesson in a sequence of lessons covering Topic 3: computers of the Pearson Edexcel GCSE Computer Science (2020) course. The lesson introduces students to different devices that are computer controlled, and defines the term ‘embedded processor’. There are a range of activities that allow students to compare embedded and general purpose computer systems, and investigate the hardware used. This lesson includes a ‘matching pairs’ card game for the bell work activity. Learning mat and starter activity are provided as PDF, PPTX and PPT format. The lesson plan is saved as PPTX, PPT and PPTS formats. Note that some features are lost in PPT formats.
07 Asymmetric Encryption
chalstarchalstar

07 Asymmetric Encryption

(0)
This lesson builds on lesson 6 in this unit, and describes the difference between symmetric and asymmetric encryption. The lesson includes the full cycle of activities and includes recall activities such as brain dump, and assessment for learning strategies such as a hinge question.
Encryption and Ciphers
chalstarchalstar

Encryption and Ciphers

8 Resources
A unit of work that does not require access to computers or the internet. Fully resourced with lesson plans (PPT) and worksheets for each lesson. 7 Lessons plus assessment and DIRT lesson. practical activities involving a range of cipher techniques written tasks related to internet encryption. solutions to tasks included in lesson plans. Lesson plans include teacher notes and guidance on where differentiation will be needed. Includes a range of activities including peer and self assessment, questioning and accelerated learning. Notes on professional development. Reading, Writing, Communication and Mathematics links are highlighted together with opportunities for career guidance.
08 Assessment & DIRT Lesson
chalstarchalstar

08 Assessment & DIRT Lesson

(0)
This is the assessment related to the unit of work on encryption. There is an associated DIRT lesson that follows the assessment and a tracker to check class achievement. Grades are related to approximate achievement expected by a year 7 group and should be amended or differentiated for other year groups. The assessment includes practical decryption activities, multiple choice questions and explain/describe questions as well as state / identify questions.
05 Playfair Cipher
chalstarchalstar

05 Playfair Cipher

(0)
The fifth lesson in a sequence of lessons that challenge students to think about different ways that plain text can be converted, encrypted or coded into cipher text. This lesson introduces the Playfair cipher. This is a more challenging lesson to think about than the previous lessons and may need to be significantly differentiated for younger or students with additional educational needs.
02 Caesar Cipher
chalstarchalstar

02 Caesar Cipher

(0)
This lesson builds on the first lesson about Morse Code, and challenges students to think about the reason why encryption is needed and then asks them to use a Caesar Cipher to code and decode secret messages.
03 Random Substitution Cipher
chalstarchalstar

03 Random Substitution Cipher

(0)
This is the third lesson in a series of lessons about ciphers and encryption. In this lesson, students consider why a simple cipher such as the Caesar cipher is inappropriate for internet encryption and look at a more complex cipher method. They are also introduced to the world of code breakers during World War II and the work of Alan Turing.
01 Morse Code
chalstarchalstar

01 Morse Code

(0)
This lesson is the first of a sequence of lessons that challenge students to consider how plain English can be coded or ciphered. It builds on understanding of what Morse Code is used for and students have to cipher and decipher messages themselves. it is an introduction to a unit of work on ciphers and encryption.
06 Internet Encryption
chalstarchalstar

06 Internet Encryption

(0)
This lesson draws together the learning from the previous 5 lessons and looks at encryption in practice and for data that is transmitted via the internet. It includes an opportunity to clarify the difference between the internet and the www. It looks at the purpose of encryption and focusses on key terminology related to this aspect of algorithm and computational thinking.