Teach Computing
Revision notes, activities, lesson plans, teaching ideas, and other resources for GCSE, A-Level, and IB Computer Science teachers and students.
What's New
UK Computing Laws
This video from Computer Science Tutor covers the main UK computing laws re...
Wireless Networking (Wi-Fi, Security, and Hardware)
This video about wireless networking includes everything that is needed for...
Network topology videos
These four excellent videos from Computer Science tutor cover the four ma...
Network protocols
These four videos explain the main networking protocols that students are l...
Embedded Systems video
This short video is a good over of embedded systems, covering the main poin...
Representing Text in Binary
This video clearly explains the two main ways of representing text in binar...
Types of Malware
This video explains the various types of malware including viruses and troj...
Protecting against Malware
Following on from the Types of Malware video, this video explains technique...
Video: Network Security #1
This video gives an overview of the threats to networked computer systems, ...
A.2 The relational database model
Click here for recommended IB Computer Science textbooks.
Database ethics case study
Should Companies Admit They've Been Hacked? This is an extremely relevant case study as the past few years as seen a slew of high-profile companies attacked by criminals intent on stealing sensitive customer details (usually credit card details and passwords) from their databases. Some companies chose to hide the breaches from their customers while others were open about being compromised. This case study discusses the ethics of each approach.
Updated: 2015-04-29