Revision notes, activities, lesson plans, teaching ideas, and other resources for GCSE, A-Level, and IB Computer Science teachers and students.
Examples of Local Cryptocurrencies
Digital Money for Local Communities covers three examples of country-wide c...
A hash function takes arbitrary sized input data (e.g. a fil...
Cryptocurrencies vs regular currencies
What is Bitcoin and How Does it Work? is a high level overview of the Bitco...
Examples of Cryptocurrencies
Bitcoin is by far the most well known cryptocurrency. The Bitcoin website w...
Practice paper 3 exam questions
One of the drawbacks of the yearly case study is that there are no past p...
Emergency Management System Explainer Video
This short video gives an overview of some EMIS features. It includes many ...
Geographic Information Systems (GIS)
For some functionality, an EMIS may also be connected to a GIS (Geographic ...
Programming languages - from Scratch to machine code
The CS Field Guide has a very comprehensive guide to different types of pro...
Assembly language simulators
There are several assembly language simulators available for use online. Si...
Click here for recommended IB Computer Science textbooks.
3.1.1 Network fundamentals
Computer Networks: Crash Course Computer Science
This 12 minute video gives a rapid overview of computer networks. Despite its short running time, a lot of topics are covered, including MAC addresses, ethernet cables, and networking hardware. Some of the concepts (e.g. collisions) may not be relevant to all Computer Science courses, but their explanations are often linked to other related concepts (for example, collisions is linked to bandwidth which in turn is linked to switches).
Video: How does the internet work? - James May's Q&A
This video with James May takes a while to get going, but about half way through it starts to put concepts together and make it clear how the Internet works. Everything is explained clearly and in easy to understand language.
3.1c.3 Network layers (OSI model)
3.1.6 and 3.1.7 Protocols and Data Packets
Parity and Checksums activity
The card flip 'magic' game is a great idea from Computer Science Unplugged. The teacher sets up a grid of black/white cards and asks students to turn over one card without the teacher seeing. Using parity rules, the teacher is able to 'magically' determine which card the students turned over. This is a really fun game which demonstrates how simple techniques like odd/even partity can be used to solve significant problems.
The Computer Science Unplugged page has a range of support material: instructions for teachers, videos of the activity being performed, and a PDF download with extension activities and details about check digits in ISBNs.
3.1.8 Transmission speeds
Image, audio, and text compression
This very comprehensive page from the Computer Science Field Guide has extensive but clear notes on lossless and lossy compression. The page is well written and designed for a high school audience, with easy to understand examples, video, and even interactive sections. There are also extension "Extra for Experts" sections. The page covers image compression, audio compression, and text compression.
A short Computerphile video which explains basic compression techniques and how they can be applied to text files and image files. The video also addresses the differences between lossy and lossless compression.
Compression: Crash Course Computer Science
This video explains compression techniques in the context of images. It is recommended that students have an understanding of how image data is stored (e.g. bit depths) before watching this video. The video is very comprehensive and so it may take a couple of viewings to fully understand the details of the examples being presented, but it is worth it.
3.1.10 Network transmission media
Video: There and Back Again: A Packet's Tale. How Does the Internet Work?
A really accessible overview of packet switching, using the example of accessing a web page. The steps are broken down and explained with real life examples, as a web page hosted in the US is fetched by a computer in the UK.
3.1.12, 3.1.13, 3.1.14 Wireless networking
3.1.15 and 3.1.16 Network security