Listing all results (320)

Raspberry Pi Recipe Card – Operating Systems

This document introduces students to the Linux operating system by allowing them to learn and use a number of shell commands using a Raspberry Pi computer. Activities allow them to gain an understanding of how resources are managed and levels of access controlled.

RISC and CISC Architectures

This document compares the Reduced Instruction Set Computer (RISC) and Complex Instruction Set Computer (CISC) approaches. It provides a useful background and can be used as a reference or for producing revision resources.

Hacktivism

A resource from the Institute for Security and Open Methodologies and part of the Hacker High School series.  This programme aims to educate students about issues relating to how hacking takes place, how to protect against it and ethical issues. This activity explores issues surrounding so-called hacktivism. This...

Object oriented programming with Greenfoot

Greenfoot is an object oriented programming language based on Java. This resource uses a skeleton crab game program to teach the principles of Greenfoot programming. Students complete the activities to complete the program. The resource includes a greenfoot project and a completed project. These are aimed at...

Teaching Java and object oriented programming - creating a snake game

This is a very comprehensive package from Sean Cullinane which consists of lessons to teach the basics of object oriented programming. Students will produce a playable snake game as the outcome. Note: It is recommended that this is only delivered to students with some previous programming experience, ideally some...

Being a hacker

This resource is developed by the Hacker High School site to improve online security for students by increasing their knowledge of cybersecurity. This lesson plan focuses on what hackers do and how attacks happen. The lesson includes discussions, scenarios and research which will help students to evaluate the harm...

Social engineering

Social engineering attacks are a vulnerability of corporate networks and personal data and identity. This lesson plan from Cybersecurity Challenge UK outlines different methods of social engineering

Penetration testing

Penetration testing is a vital part of any organisation’s security procedures. Students will learn what it is and why organisations carry it out. There are no practical activities attached to this lesson from Cybersecurity Challenge UK.

Cybersecurity threats

This document outlines categories of network threat and how they can be detected. The resource is produced by Cybersecurity Challenge UK and is aimed at GCSE students however, is also a valuable resource for A level students as a starting point for further investigation and discussion. 

Hypertext Preprocessor (PHP) and My SQL Guide

A Computing at School community resource which provides a very comprehensive introduction to PHP and MySQL including setting up and configuring. This is useful as a “how to” guide for students.

Pages

View all publishers