Teach Computing

Revision notes, activities, lesson plans, teaching ideas, and other resources for GCSE, A-Level, and IB Computer Science teachers and students.

What's New

Examples of Local Cryptocurrencies

Digital Money for Local Communities covers three examples of country-wide c...

Hash function A hash function takes arbitrary sized input data (e.g. a fil...

Cryptocurrencies vs regular currencies

What is Bitcoin and How Does it Work? is a high level overview of the Bitco...

Examples of Cryptocurrencies

Bitcoin is by far the most well known cryptocurrency. The Bitcoin website w...

Practice paper 3 exam questions

One of the drawbacks of the yearly case study is that there are no past p...

Emergency Management System Explainer Video

This short video gives an overview of some EMIS features. It includes many ...

Geographic Information Systems (GIS)

For some functionality, an EMIS may also be connected to a GIS (Geographic ...

Programming languages - from Scratch to machine code

The CS Field Guide has a very comprehensive guide to different types of pro...

Assembly language simulators

There are several assembly language simulators available for use online. Si...

Resources discount offer

A.2 The relational database model

Click here for recommended IB Computer Science textbooks.
Ethical case studies

Database ethics case study

Should Companies Admit They've Been Hacked? This is an extremely relevant case study as the past few years as seen a slew of high-profile companies attacked by criminals intent on stealing sensitive customer details (usually credit card details and passwords) from their databases. Some companies chose to hide the breaches from their customers while others were open about being compromised. This case study discusses the ethics of each approach.


Updated: 2015-04-29