Filters

Clear all
Find a publisher

Showing 1002 results

Show
results per page

To play a simple game called Hexapawn, an ‘artificially intelligent’ computer is created made entirely from sweets. The game is like a mini version of chess; the rules are explained fully, and a playing board drawn. The ‘machine’ then ‘learns’ how to improve its playing of the game by trial and error and by ‘...

The Computing at School newsletter is published three times a year. It is full of practical ideas for teachers of computing in primary and secondary schools, with articles contributed by a number of CAS members. With input from teachers, academics, advisors and industry professionals, it provides a varied source of...

The first video introduces the variety of threats to system security.  Malware, phishing, brute force attacks, denial of service, data interception/theft and SQL injection are all considered and explained.  Simple notes on each of these are presented toward the end of the video.

The second video explores...

This resource contains two sets of triominoes, based around the theme of internet security. A simple set with only 4 cards, where three definitions and their key words need to be matched. The set also has two extra definitions and key words to act as distractors from the actual answers, an extension might be to get...

The first video explores the first computers that had stored programs in the same memory space as the data required for them.  This is known as the von Neumann architecture and is still the foundation principle on which most computers are still built today.  We take the lid off a central processing unit and explain...

The first video outlines the purpose of systems software: the operating system and utilities.  It consider the role of systems software in providing a user interface and abstraction to the physical hardware.  A variety of different types of user interface are explained in more detail.

The second video...

This document from the Department of Education looks at how St Gregory's Catholic School Science College educates pupils and parents about cyberbullying through newsletters, their 'Parent Zone' and curriculum. The resource explores the school's resources for parents, mobile phone and behaviour polices as part of...

This infographic gives a clear overview and summary of the progression of the Teach Computing Curriculum through each key stage and year group from the beginning of key stage 1 through to the end of key stage 4 with suggestions for post-16 options.

The Teach Computing Curriculum resources contain everything...

This is a very comprehensive package from Sean Cullinane which consists of lessons to teach the basics of object oriented programming. Students will produce a playable snake game as the outcome. Note: It is recommended that this is only delivered to students with some previous programming experience, ideally some...

Using analogies to teach the topic of the TCP/IP networking is often a very useful strategy. This Computing at School community resource consist of three documents. The first provides a theory overview of the communication process. The second provides a range of links and activities, although some are aimed at...

This resource contains a variety of activities and teacher resources to help students develop their problem solving skills, these are mostly through the use of unplugged activities which also encourage the development of skills associated with creating algorithms. The resources consist of teacher guides for each of...

A series of five lesson plans aimed at students with no knowledge of Python. In the description it is stated that depending on the students' level of ability these might be adapted to take up to eight lessons. The resource contains some discussion about how and why one might want to start using Python as their...

This booklet contains all the IET teaching resources for the BBC micro:bit.

...

Tech We Can provide free learning materials to educators to inspire all pupils about a future in computing and technology careers. The resources in this collection show how technology can be used in manufacturing and to enhance security.

Pages