Computing, Computer Science, and Information Technology resources for GCSE, IGCSE, IB, and GCE A-Level
Revision notes, activities, lesson plans, teaching ideas, and other resources for GCSE, A-Level, and IB Computer Science teachers and students.
Emergency Management System Explainer Video
This short video gives an overview of some EMIS features. It includes many ...
Geographic Information Systems (GIS)
For some functionality, an EMIS may also be connected to a GIS (Geographic ...
Programming languages - from Scratch to machine code
The CS Field Guide has a very comprehensive guide to different types of pro...
Assembly language simulators
There are several assembly language simulators available for use online. Si...
Little Man Computer (LMC)
The Little Man Computer (LMC) is a software simulator of a simple computer ...
Lesson - Data representation - sound
This download contains all lesson resources necessary to teach students how...
Predictive placement is a feature of some CAD systems that enables more e...
AI to help emergency dispatch phone operators
The Singapore Civil Defence Force (SCDF) may trial an AI system to help tra...
Mobile Data Terminals (MDT)
MDT technology is referenced in the case study booklet, with such systems b...
5.2 Network Security
5.2.1 Validation and Authentication techniques
5.2.2 Cloud storage security
5.2.3 Types of Cyberattack
Types of Malware
This video explains the various types of malware including viruses and trojans, as well as explaining related terminology such as vector and payload.
Video: Network Security #1
This video gives an overview of the threats to networked computer systems, including a huge range of vectors from software exploits and code injections to malware to social engineering and misconfigured software.
5.2.4 Identifying Vulnerabilities
Video: Network Security #2
The second video in this series covers Identifying Vulnerabilities & Security Measures. This covers the techniques used to identify weaknesses in computer security before potential malefactors do: penetration testing and ethical hacking.
5.2.5 Protecting systems from cyberattack
Protecting against Malware
Following on from the Types of Malware video, this video explains techniques for preventing and removing malware - both technological and human based solutions.