Listing all results (136)

Python Programming Challenges

This booklet consists of 16 introductory programming challenges, some of the challenges also provide further extension challenges, for every challenge there is a "Self Review" section which asks students to comment on whether they managed to complete the task successfully, whether they had any errors initially and...

Python Beginners Challenges

This resource consists of a 50 page workbook with 39 different programming challenges listed, along with hints and suggestions for how to proceed with solving them along with explanations of various programming ideas. The workbook as a whole could be used as a detailed introduction to programming in Python, with...

Geocraft -Giant's Causeway

These resources consist of lesson plans, worksheets, Minecraft Maps (Raspberry Pi version) for the area around the Giant's Causeway in Northern Ireland, and some general how to guides. The guides take teachers through the steps to update a Raspberry Pi, and install one of the Giant's Causeway maps into the correct...

70 Programming Challenges

This resource contains a large number of activities which were originally aimed at students using Visual Basic, other than a few mentions of pressing a button to make something happen, they should all be readily implementable in plain python. The booklet has 7 or 8 missing challenges on Sorting and Searching, but...

Python Validation

This resource consists of an information sheet detailing various methods for validating user input in Python, these come in the form of a table consisting of some code in one column and an overview of what the corresponding code does. There is an associated zip file with code examples in it and a presentation which...

Computer Misuse Act and Cyber Crime

This resource contains a Lesson Plan centred on the Computer Misuse Act and the choices students might have to make with respect to the act and peer pressure. It helps make clear to students what activities are considered criminal ones with respect to the act as well as asking them to rank criminal activity online...

Data Security

In this resource, the students are asked to look at various aspects of data security. In part this covers cyber security but it also looks at data integrity and ensuring that users data does not become corrupt through various means. There are a variety of activities provided, and all of the necessary resources are...

Cyber Security Starter Activities

This resource consists of two starter activities, the Cyber Security Diamond asks students to take 9 statements relating to Cyber Security and rank them (in a diamond layout) from most to least important. The Social Engineering Activity contains four definitions of types of social engineering activity and asks...

System Security - Tarsia Creator

This resource contains two sets of triominoes, based around the theme of internet security. A simple set with only 4 cards, where three definitions and their key words need to be matched. The set also has two extra definitions and key words to act as distractors from the actual answers, an extension might be to get...

Microsoft Access Tutorial - My Holiday Home

This tutorial provides detailed instructions on creating a Microsoft Access database using an example that manages the lettings of a holiday villa in France or Spain.

It will provide students and teachers with an in-depth understanding of MS Access and an ability to design and construct their own databases...

Pages

View all publishers