Teach Computing

Revision notes, activities, lesson plans, teaching ideas, and other resources for GCSE, A-Level, and IB Computer Science teachers and students.

What's New

Boolean logic worksheet pack

These three Boolean logic worksheets have exam style questions on logic sta...

Edexcel Computer Science (9-1)

by Ann Weidmann et al Amazon.com | Amazon.co.uk | Book Depository This bo...

Dijkstra's algorithm video

This video is probably the best explanation of Dijkstra's algorithm for IB ...

Input-Process-Output (IPO) Model

The Input-Process-Output model is a simple topic but some students sometime...


A comprehensive review of hexadecimal. The video covers not only how to u...

Subprograms, Local Variables & Structured Programming

Subprograms are known by several different names - methods, functions, proc...

Utility Software and Models

Some students find the difference between operating system software and ut...

Data Structures

This video explains different types of data structures - 1 dimensional ar...

Operating System (OS) - GCSE Computer Science

A detailed overview of operating systems, starting with the general tasks t...

A.3 Further aspects of database management

Click here for recommended IB Computer Science textbooks.
Data security

Examples of database security problems

The news articles below cover some of the major risks of malicious actions such as hacking or malware. Myriad examples of these problems exist (and new ones seem to appear every few weeks), but the examples below highlight some of the more famous cases (and the greatest losses).

Updated: 2015-04-18
Data mining

Nuggets of Data Gold

This videos provides an introduction into data mining, explaining why analysis of big data is necessary and how can we go about finding hidden patterns in large volumes of data. The end of the video includes some good examples of data analysis in the medical field, and the difficulties of finding correlation and causation with the data sets.

Updated: 2015-05-19
ACLU Data matching video

Ordering Pizza in 2015

This video from the ACLU takes a very simple task - ordering a pizza on the telephone - and highlights how data mining could it into a privacy nightmare. By carefully watching the screen as well as listening to the audio, many realistic examples of potentially privacy-breaching data matching spring up. The video was created by the ACLU a few years ago, but the issues it represents are still very relevant.

Updated: 2015-05-19