Teach Computing

Revision notes, activities, lesson plans, teaching ideas, and other resources for GCSE, A-Level, and IB Computer Science teachers and students.

What's New

Emergency Management System Explainer Video

This short video gives an overview of some EMIS features. It includes many ...

Geographic Information Systems (GIS)

For some functionality, an EMIS may also be connected to a GIS (Geographic ...

Programming languages - from Scratch to machine code

The CS Field Guide has a very comprehensive guide to different types of pro...

Assembly language simulators

There are several assembly language simulators available for use online. Si...

Little Man Computer (LMC)

The Little Man Computer (LMC) is a software simulator of a simple computer ...

Lesson - Data representation - sound

This download contains all lesson resources necessary to teach students how...

Predictive placement

Predictive placement is a feature of some CAD systems that enables more e...

AI to help emergency dispatch phone operators

The Singapore Civil Defence Force (SCDF) may trial an AI system to help tra...

Mobile Data Terminals (MDT)

MDT technology is referenced in the case study booklet, with such systems b...

Resources discount offer

A.3 Further aspects of database management

Click here for recommended IB Computer Science textbooks.
Data security

Examples of database security problems

The news articles below cover some of the major risks of malicious actions such as hacking or malware. Myriad examples of these problems exist (and new ones seem to appear every few weeks), but the examples below highlight some of the more famous cases (and the greatest losses).


Updated: 2015-04-18
Data mining

Nuggets of Data Gold

This videos provides an introduction into data mining, explaining why analysis of big data is necessary and how can we go about finding hidden patterns in large volumes of data. The end of the video includes some good examples of data analysis in the medical field, and the difficulties of finding correlation and causation with the data sets.


Updated: 2015-05-19
ACLU Data matching video

Ordering Pizza in 2015

This video from the ACLU takes a very simple task - ordering a pizza on the telephone - and highlights how data mining could it into a privacy nightmare. By carefully watching the screen as well as listening to the audio, many realistic examples of potentially privacy-breaching data matching spring up. The video was created by the ACLU a few years ago, but the issues it represents are still very relevant.


Updated: 2015-05-19