Filters

Clear all
Find a publisher

Showing 430 results

Show
results per page

This resource by Pedagogics explores subtle adjustments to teacher's language in order to be less emotive, more objective-led and promote progress.

This resource features a number of links to other resources relevant to the topic of networks, protocols and security. The Stone Tablet activity itself is an unplugged activity where students model how packets are transferred across a network. It also includes the possibility that some packets do not arrive at...

The first video explains why a computer needs secondary storage, and explains what is meant by primary and tertiary storage.

The second video explains what is meant by the term “capacity” of storage devices.  The relative size of different types of files is introduced.  (More detailed explanations of this...

This guide, for more advanced users of LINUX, shows how BASH scripts can be used for operations on strings and for arithmetical operations. The syntax for BASH is clearly explained.

This resource consists of two presentations on the structure of the CPU.  As well as detailing the different components e.g. ALU, registers and buses it compares different types of processor and different architectures e.g. CISC vs RISC. This topic is dealt with in more detail in the second presentation.

...

A useful handbook for setting up a student-led STEM club, with exemplars from three schools.

It is increasingly recognised that giving students opportunities to act as ambassadors and mentors for STEM subjects outside of school can be of great benefit to the individual, their institution, and to the broader...

In this video from Osiris Educational Bill Rodgers discusses his...

Students who refuse to follow instructions are among the most...

This document from the Department of Education looks at how Saint Benedict Academy supports pupils who persistently misbehave in their turnaround centre and deal with poor behaviour consistently. The resource explores the school's turnaround centre and it's 'C' system, as part of the managing behaviour and bullying...

This activity follows on from a previous graphics surface project. Previously a single graphics surface was created - this Python program uses multiple surfaces to build more complex graphics and to create effective animations.

Students are encouraged to experiment with the behaviour of the program, and to...

Using a set of simple ‘swap puzzles’, this CS4FN activity helps students to learn, fundamentally, what an algorithm is and how they can be made more efficient. Students are encouraged to create algorithms for solving the puzzles which can be used by future players to win, with no understanding of the game, in as...

To play a simple game called Hexapawn, an ‘artificially intelligent’ computer is created made entirely from sweets. The game is like a mini version of chess; the rules are explained fully, and a playing board drawn. The ‘machine’ then ‘learns’ how to improve its playing of the game by trial and error and by ‘...

The Computing at School newsletter is published three times a year. It is full of practical ideas for teachers of computing in primary and secondary schools, with articles contributed by a number of CAS members. With input from teachers, academics, advisors and industry professionals, it provides a varied source of...

The first video introduces the variety of threats to system security.  Malware, phishing, brute force attacks, denial of service, data interception/theft and SQL injection are all considered and explained.  Simple notes on each of these are presented toward the end of the video.

The second video explores...

This resource contains two sets of triominoes, based around the theme of internet security. A simple set with only 4 cards, where three definitions and their key words need to be matched. The set also has two extra definitions and key words to act as distractors from the actual answers, an extension might be to get...

Pages