Teach Computing

Revision notes, activities, lesson plans, teaching ideas, and other resources for GCSE, A-Level, and IB Computer Science teachers and students.

What's New

Examples of Local Cryptocurrencies

Digital Money for Local Communities covers three examples of country-wide c...

Hash function A hash function takes arbitrary sized input data (e.g. a fil...

Cryptocurrencies vs regular currencies

What is Bitcoin and How Does it Work? is a high level overview of the Bitco...

Examples of Cryptocurrencies

Bitcoin is by far the most well known cryptocurrency. The Bitcoin website w...

Practice paper 3 exam questions

One of the drawbacks of the yearly case study is that there are no past p...

Emergency Management System Explainer Video

This short video gives an overview of some EMIS features. It includes many ...

Geographic Information Systems (GIS)

For some functionality, an EMIS may also be connected to a GIS (Geographic ...

Programming languages - from Scratch to machine code

The CS Field Guide has a very comprehensive guide to different types of pro...

Assembly language simulators

There are several assembly language simulators available for use online. Si...

Resources discount offer

A.3 Further aspects of database management

Click here for recommended IB Computer Science textbooks.
Data security

Examples of database security problems

The news articles below cover some of the major risks of malicious actions such as hacking or malware. Myriad examples of these problems exist (and new ones seem to appear every few weeks), but the examples below highlight some of the more famous cases (and the greatest losses).

Updated: 2015-04-18
Data mining

Nuggets of Data Gold

This videos provides an introduction into data mining, explaining why analysis of big data is necessary and how can we go about finding hidden patterns in large volumes of data. The end of the video includes some good examples of data analysis in the medical field, and the difficulties of finding correlation and causation with the data sets.

Updated: 2015-05-19
ACLU Data matching video

Ordering Pizza in 2015

This video from the ACLU takes a very simple task - ordering a pizza on the telephone - and highlights how data mining could it into a privacy nightmare. By carefully watching the screen as well as listening to the audio, many realistic examples of potentially privacy-breaching data matching spring up. The video was created by the ACLU a few years ago, but the issues it represents are still very relevant.

Updated: 2015-05-19