Welcome to my TES shop, here you will find Computing and ICT related items which will be of use throughout the secondary context.
Feel free to have a browse of the resources available, which include:
-Individual Lessons
-Full Schemes of work
-Mock Exam Papers & Mark Schemes
-Revision Plans
All resources are available at a very reasonable price and have be used effectively to teach lessons.
Enjoy!
Welcome to my TES shop, here you will find Computing and ICT related items which will be of use throughout the secondary context.
Feel free to have a browse of the resources available, which include:
-Individual Lessons
-Full Schemes of work
-Mock Exam Papers & Mark Schemes
-Revision Plans
All resources are available at a very reasonable price and have be used effectively to teach lessons.
Enjoy!
Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.5 Network topologies, protocols and layers which includes:
star and mesh network topologies
Wifi:
frequency and channels
encryption
ethernet
the uses of IP addressing, MAC addressing, and protocols including:
TCP/IP (Transmission Control Protocol/Internet Protocol)
HTTP (Hyper Text Transfer Protocol)
HTTPS (Hyper Text Transfer Protocol Secure)
FTP (File Transfer Protocol)
POP (Post Office Protocol)
IMAP (Internet Message Access Protocol)
SMTP (Simple Mail Transfer Protocol)
the concept of layers
packet switching.
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Check out my shop to save on buying multiple sheets!!
Enjoy!
Here you will find the resources to complete unit 18 in the level 3 Cambridge Technicals.
All of the Learning Objectives have been covered and the lessons contain notes from the chief moderator from OCR.
Also attached is a sample of how you could complete the practical element to the assignment, although you can choose another method!
The assignment which has been used has also been checked using the Assignment Checking service from OCR. (Service is £30 per assignment)
Enjoy!
Here you will find the resources to complete Unit 19 in the level 3 Cambridge Technicals.
All of the Learning Objectives have been covered and the lessons contain notes from the chief moderator from OCR.
The assignment which has been used has also been checked using the Assignment Checking service from OCR. (Service is £30 per assignment)
Enjoy!
Here you will find easy to follow revision sheets which will help your students to recap the topics in 1.1 Enterprise and Entrepreneurship, these include:
-1.1.1 The dynamic nature of business
-1.1.2 Risk and reward
-1.1.3 The role of business enterprise
Attached at the end of the notes are revision questions which the students should be able to answer once they have studied the topic.
Enjoy!
Here you will find easy to follow revision sheets which will help your students to recap the topics in 1.5 Understanding External Influences On Business, these include:
1.5.1. Business Stakeholders
1.5.2. Technology & Business
1.5.3. Legislation & Business
1.5.4. The Economy & Business
1.5.5 External Influences
Attached at the end of the notes are revision questions which the students should be able to answer once they have studied the topic.
Enjoy!
Here you will find easy to follow revision sheets which will help your students to recap the topics in 2.1 Growing The Business, these include:
2.1.1. Business Growth
2.1.2. Changes In Business Aims And Objectives
2.1.3 Business and Globalisation
2.1.4 Ethics, Environment & Business
Attached at the end of the notes are revision questions which the students should be able to answer once they have studied the topic.
Enjoy!
Here you will find easy to follow revision sheets which will help your students to recap the topics in 2.2 Making Marketing Decisions, these include:
2.2.1 Product
2.2.2 Price
2.2.3 Promotion
2.2.4 Place
2.2.5. Using the marketing mix to make business decisions
Attached at the end of the notes are revision questions which the students should be able to answer once they have studied the topic.
Enjoy!
Here you will find easy to follow revision sheets which will help your students to recap the topic:
2.6 Data Representation
Units
bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte, petabyte
how data needs to be converted into a binary format to be processed by a computer.
Numbers
how to convert positive denary whole numbers (0–255) into 8 bit binary numbers and vice versa
how to add two 8 bit binary integers and explain overflow errors which may occur
binary shifts
how to convert positive denary whole numbers (0–255) into 2 digit hexadecimal numbers and vice
versa
how to convert from binary to hexadecimal equivalents and vice versa
check digits.
Characters
the use of binary codes to represent characters
the term ‘character-set’
the relationship between the number of bits per character in a character set and the number of
characters which can be represented (for example ASCII, extended ASCII and Unicode).
Images
how an image is represented as a series of pixels represented in binary
metadata included in the file
the effect of colour depth and resolution on the size of an image file.
Sound
how sound can be sampled and stored in digital form
how sampling intervals and other factors affect the size of a sound file and the quality of its playback:
sample size
bit rate
sampling frequency.
Compression
need for compression
types of compression:
lossy
lossless.
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Check out my shop to save on buying multiple sheets!!
Enjoy!
Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.6 Systems Security which includes:
forms of attack
threats posed to networks:
malware
phishing
people as the ‘weak point’ in secure systems (social engineering)
brute force attacks
denial of service attacks
data interception and theft
the concept of SQL injection
poor network policy
identifying and preventing vulnerabilities:
penetration testing
network forensics
network policies
anti-malware software
firewalls
user access levels
passwords
encryption.
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Check out my shop to save on buying multiple sheets!!
Enjoy!
NEW J277 SPECIFICATION
Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.3 Computer Networks, Connections and Protocols
1.3.1 Networks and topologies ¨ Types of network:
o LAN (Local Area Network)
o WAN (Wide Area Network)
¨ Factors that affect the performance of networks
¨ The different roles of computers in a client-server and a peer-topeer network
¨ The hardware needed to connect stand-alone computers into a
Local Area Network:
o Wireless access points
o Routers
o Switches
o NIC (Network Interface Controller/Card)
o Transmission media
¨ The Internet as a worldwide collection of computer networks:
o DNS (Domain Name Server)
o Hosting
o The Cloud
o Web servers and clients
¨ Star and Mesh network topologies
1.3.2 Wired and wireless networks, protocols and layers ¨ Modes of connection:
o Wired
• Ethernet
o Wireless
• Wi-Fi
• Bluetooth
¨ Encryption
¨ IP addressing and MAC addressing
¨ Standards
¨ Common protocols including:
o TCP/IP (Transmission Control Protocol/Internet Protocol)
o HTTP (Hyper Text Transfer Protocol)
o HTTPS (Hyper Text Transfer Protocol Secure)
o FTP (File Transfer Protocol)
o POP (Post Office Protocol)
o IMAP (Internet Message Access Protocol)
o SMTP (Simple Mail Transfer Protocol)
¨ The concept of layers
Here you will find easy to follow revision sheets which will help your students to recap the topic:
2.2 Programming techniques
the use of variables, constants, operators, inputs, outputs and assignments
the use of the three basic programming constructs used to control the flow of a program:
sequence
selection
iteration (count and condition controlled loops)
the use of basic string manipulation
the use of basic file handling operations:
open
read
write
close
the use of records to store data
the use of SQL to search for data
the use of arrays (or equivalent) when solving problems, including both one and two dimensional
arrays
how to use sub programs (functions and procedures) to produce structured code
the use of data types:
integer
real
Boolean
character and string
casting
the common arithmetic operators
the common Boolean operators.
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Check out my shop to save on buying multiple sheets!!
Enjoy!
NEW J277 SPEC
Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
¨ Impacts of digital technology on wider society including:
o Ethical issues
o Legal issues
o Cultural issues
o Environmental issues
o Privacy issues
¨ Legislation relevant to Computer Science:
o The Data Protection Act 2018
o Computer Misuse Act 1990
o Copyright Designs and Patents Act 1988
o Software licences (i.e. open source and proprietary)
NEW J277 SPECIFICATION:
Here you will find easy to follow revision sheets which will help your students to recap the topic:
2.3 Producing Robust Programs
¨ Defensive design considerations:
o Anticipating misuse
o Authentication
¨ Input validation
¨ Maintainability:
o Use of sub programs
o Naming conventions
o Indentation
o Commenting
¨ The purpose of testing
¨ Types of testing:
o Iterative
o Final/terminal
¨ Identify syntax and logic errors
¨ Selecting and using suitable test data:
o Normal
o Boundary
o Invalid/Erroneous
¨ Refining algorithms
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Enjoy!
Here you will find easy to follow revision sheets which will help your students to recap the topic:
2.4 Computational logic:
why data is represented in computer systems in binary form
simple logic diagrams using the operations AND, OR and NOT
truth tables
combining Boolean operators using AND, OR and NOT to two levels
applying logical operators in appropriate truth tables to solve problems
applying computing-related mathematics:
–
/
Exponentiation (^)
MOD
DIV
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Check out my shop to save on buying multiple sheets!!
Enjoy!
**NEW J277 SPECIFICATION:
**
Here you will find easy to follow revision sheets which will help your students to recap the topic:
2.5 – Programming languages and Integrated Development Environments
2.5.1 Languages
Characteristics and purpose of different levels of programming language:
o High-level languages
o Low-level languages
The purpose of translators
The characteristics of a compiler and an interpreter
2.5.2 The Integrated Development Environment (IDE)
Common tools and facilities available in an Integrated
Development Environment (IDE):
o Editors
o Error diagnostics
o Run-time environment
o Translators
NEW J277 SPECIFICATION:
Here you will find easy to follow revision sheets which will help your students to recap the topic:
2.4 – Boolean logic
Simple logic diagrams using the operators AND, OR and NOT
Truth tables
Combining Boolean operators using AND, OR and NOT
Applying logical operators in truth tables to solve problems
The revision sheets include exam questions at the end of each topic to help the students recap their revision and apply it to a question.
Enjoy!
An introduction to Python Programming which takes the students through the initial use of:
-Printing
-Variables
-Comments
It also explains the use of Syntax and the ways in which students should structure their work. Has been tried and tested many a time!
Look out for more lessons on Python soon! Including full SOWs
NEW J277 SPECIFICATION
Here you will find easy to follow revision sheets which will help your students to recap the topic:
1.4 Network Security
1.4.1 Threats to computer systems and networks ¨ Forms of attack:
o Malware
o Social engineering, e.g. phishing, people as the ‘weak point’
o Brute-force attacks
o Denial of service attacks
o Data interception and theft
o The concept of SQL injection
1.4.2 Identifying and preventing vulnerabilities
¨ Common prevention methods:
o Penetration testing
o Anti-malware software
o Firewalls
o User access levels
o Passwords
o Encryption
o Physical security
part of the BTEC Level 3 Diploma in Information Technology which i delivered to level 3 students, pack contains all resources that i used including assignments
A introduction to computer hardware for KS3, this was part of the Hardware and Software unit that was delivered. Lesson includes an introduction to the topic and tasks to complete. Extensions tasks also included. The full SOW can also be bought in the shop