Teach Computing

Revision notes, activities, lesson plans, teaching ideas, and other resources for GCSE, A-Level, and IB Computer Science teachers and students.

What's New

UK Computing Laws

This video from Computer Science Tutor covers the main UK computing laws re...

Wireless Networking (Wi-Fi, Security, and Hardware)

This video about wireless networking includes everything that is needed for...

Network topology videos

These four excellent videos from Computer Science tutor cover the four ma...

Network protocols

These four videos explain the main networking protocols that students are l...

Embedded Systems video

This short video is a good over of embedded systems, covering the main poin...

Representing Text in Binary

This video clearly explains the two main ways of representing text in binar...

Types of Malware

This video explains the various types of malware including viruses and troj...

Protecting against Malware

Following on from the Types of Malware video, this video explains technique...

Video: Network Security #1

This video gives an overview of the threats to networked computer systems, ...

Resources discount offer

A.3 Further aspects of database management

Click here for recommended IB Computer Science textbooks.
Data security

Examples of database security problems

The news articles below cover some of the major risks of malicious actions such as hacking or malware. Myriad examples of these problems exist (and new ones seem to appear every few weeks), but the examples below highlight some of the more famous cases (and the greatest losses).


Updated: 2015-04-18
Data mining

Nuggets of Data Gold

This videos provides an introduction into data mining, explaining why analysis of big data is necessary and how can we go about finding hidden patterns in large volumes of data. The end of the video includes some good examples of data analysis in the medical field, and the difficulties of finding correlation and causation with the data sets.


Updated: 2015-05-19
ACLU Data matching video

Ordering Pizza in 2015

This video from the ACLU takes a very simple task - ordering a pizza on the telephone - and highlights how data mining could it into a privacy nightmare. By carefully watching the screen as well as listening to the audio, many realistic examples of potentially privacy-breaching data matching spring up. The video was created by the ACLU a few years ago, but the issues it represents are still very relevant.


Updated: 2015-05-19