Hero image

Edulito

Average Rating4.13
(based on 37 reviews)

I started out as a science teacher and made the transition to teaching ICT and Computer Science, which I have now been doing for over 20 years. I have also worked with primary school teachers to support their delivery of the national curriculum in computing. Edulito is a UK based educational publishing company that provides learning resources for school-aged children. All of the available resources have been tested in UK schools.

117Uploads

70k+Views

18k+Downloads

I started out as a science teacher and made the transition to teaching ICT and Computer Science, which I have now been doing for over 20 years. I have also worked with primary school teachers to support their delivery of the national curriculum in computing. Edulito is a UK based educational publishing company that provides learning resources for school-aged children. All of the available resources have been tested in UK schools.
4 PRACTICE EXAM PAPERS - GCSE COMPUTER SCIENCE OCR J277 (FROM 2020)
edulitolearnedulitolearn

4 PRACTICE EXAM PAPERS - GCSE COMPUTER SCIENCE OCR J277 (FROM 2020)

(1)
This pack includes four practice exam papers with mark schemes for OCR GCSE Computer Science (9–1) specification (first teaching September 2020, examinations from 2022). These papers provide students with an opportunity to familiarise themselves with the look and feel of an OCR paper. The digital pack includes: · two practice papers for Computer Systems (Paper 1) · two practice papers for Computational thinking, algorithms and programming (Paper 2) The papers combined cover all aspects of the computer science curriculum. You will also receive a comprehensive mark scheme for each paper.
Five Christmas Coding Activities using Scratch 3.0
edulitolearnedulitolearn

Five Christmas Coding Activities using Scratch 3.0

(1)
This activity pack contains five Christmas themed coding activities which can be used by students in KS2 and KS3. Students learn about sequence, selection and iteration, as well as how to use variables and arrays. All instructions on how to develop the code using Scratch 3.0 have been included, as well as several challenges for each activity. The pack is 35 pages and will take around 3 hours to complete all activities and challenges. Activity 1 - Decorating the living room ready for Christmas - Make the Christmas decorations sparkle! Activity 2 - Dancing Santa - Get Santa to dance - simple dances to choreographed dances. Activity 3 - Christmas Gift Game - Christmas presents float around the screen and if you can click on a present you get to see what’s inside! Activity 4 - Catch the Reindeer Game - In this game Santa has lost his reindeer (including Rudolph) and he has to catch them. At the same time he must avoid the dog pretending to be a reindeer. Activity 5 - Naughty or Nice - In this activity Santa must check the Nice list before he gives a present. The Python Programming Christmas Activities is designed for KS4.
13 TOPIC TESTS - AQA GCSE COMPUTER SCIENCE 8525 (FROM 2020)
edulitolearnedulitolearn

13 TOPIC TESTS - AQA GCSE COMPUTER SCIENCE 8525 (FROM 2020)

(0)
This pack consists of 13 end of topic tests that can be used to support your delivery of the course. In addition, the topic test bundle also contains a mark scheme for each test. Unit 3.1 – 1 Test Unit 3.2 – 2 Tests Unit 3.3 – 1 Test Unit 3.4 – 4 Tests Unit 3.5 - 2 Test Unit 3.6 – 1 Test Unit 3.7 – 1 Test Unit 3.8 – 1 Test
TEACHER POWERPOINTS: UNIT 2.1 ALGORITHMS J277 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 2.1 ALGORITHMS J277 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (86 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 2.1. It includes: Teaching PowerPoints (includes checkpoint questions and answers) Student PowerPoints (Includes checkpoint questions, but omits the answers) Content Covered: Principles of computational thinking: Abstraction Decomposition Algorithmic thinking Identify the inputs, processes, and outputs for a problem Structure diagrams Create, interpret, correct, complete, and refine algorithms using: Pseudocode Flowcharts Reference language/high-level programming language Identify common errors Trace tables Standard searching algorithms: Binary search Linear search Standard sorting algorithms: Bubble sort Merge sort Insertion sort
37 HOMEWORK ACTIVITIES - OCR GCSE COMPUTER SCIENCE J277 (FROM 2020)
edulitolearnedulitolearn

37 HOMEWORK ACTIVITIES - OCR GCSE COMPUTER SCIENCE J277 (FROM 2020)

(0)
This pack consists of 37 editable homework/classwork activities that can be used to support your delivery of the Computer Science GCSE course. In addition, the homework bundle also contains a suggested mark scheme for each activity. Unit 1.1 · Components of a CPU · CPU Performance · Embedded Systems Unit 1.2 · ROM & RAM · Flash Memory & Virtual Memory · Data Capacity · Storage Comparison · Data Storage · Compression Unit 1.3 · LANS & WANS · Wired & Wireless Networks · Star & Mesh Topology · Network Protocols · The Concept of Layers Unit 1.4 · Malware · Network Threats · Network Vulnerabilities Unit 1.5 · Operating Systems · Utility Software Unit 1.6 · The Impacts of Technology · The Digital Divide · Legislation + Proprietary and Open Source Software Unit 2.1 · Decomposition & Abstraction · Flowcharts & Programs · Sorting Data · Sorting & Searching Programs Unit 2.2 · Selection · Iteration · Arrays (Lists) · Functions Unit 2.3 · Authentication · Maintainability · Testing Unit 2.4 · Boolean Logic & Truth Tables · Logic Gates Unit 2.5 · Programming Languages · IDEs
TEACHER POWERPOINTS: UNIT 3.2 PROGRAMMING 8525 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 3.2 PROGRAMMING 8525 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (188 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.2. Python is used as the programming language in this unit. It includes: Teaching PowerPoints (including checkpoint questions and answers) Student PowerPoints (Includes checkpoint questions, but omits the answers) Content Covered: Understand the concept of a data type. Understand and use the following appropriately: • integer • real • Boolean • character • string. Use, understand and know how the following statement types can be combined in programs: • variable declaration • constant declaration • assignment • iteration • selection • subroutine (procedure/function). Use definite (count controlled) and indefinite (condition controlled) iteration, including indefinite iteration with the condition(s) at the start or the end of the iterative structure. Use nested selection and nested iteration structures. Use meaningful identifier names and know why it is important to use them. Be familiar with and be able to use: • addition • subtraction • multiplication • real division • integer division, including remainders. Be familiar with and be able to use: • equal to • not equal to • less than • greater than • less than or equal to • greater than or equal to. Be familiar with and be able to use: • NOT • AND • OR Understand the concept of data structures. Use arrays (or equivalent) in the design of solutions to simple problems. Use records (or equivalent) in the design of solutions to simple problems. Be able to obtain user input from the keyboard. Be able to output data and information from a program to the computer display. Understand and be able to use: • Length • Position • Sub-string • Concatenation • convert character to character code • convert character code to character • string conversion operations. Be able to use random number generation. Understand the concept of subroutines. Explain the advantages of using subroutines in programs. Describe the use of parameters to pass data within programs. Use subroutines that return values to the calling routine. Know that subroutines may declare their own variables, called local variables, and that local variables usually: • only exist while the subroutine is executing • are only accessible within the subroutine. Use local variables and explain why it is good practice to do so. Describe the structured approach to programming. Explain the advantages of the structured approach. Be able to write simple data validation routines. Be able to write simple authentication routines. Understand what is meant by testing in the context of algorithms and programs. Be able to correct errors within algorithms and programs. Understand what test data is and describe the following types of test data: • normal (typical) • boundary (extreme) • erroneous data.
Python Games - Crystal Ball
edulitolearnedulitolearn

Python Games - Crystal Ball

(0)
This photocopiable resource has been produced to provide 7 to 14 year olds with exciting and engaging opportunities to learn coding concepts using Python in a fun standalone project. Mystery of the Crystal Ball - Students have fun looking into their future. Students learn to use the time and random modules, Variables and IF-ELIF statements. The project takes around one hour to complete and includes a series of activities to extend learning.
TEACHER POWERPOINTS: UNIT 3.6 CYBER SECURITY 8525 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 3.6 CYBER SECURITY 8525 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (54 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.6. It includes: Teaching PowerPoint Presentations (includes checkpoint questions and answers) Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers) Content Covered: Be able to define the term cyber security and be able to describe the main purposes of cyber security. Students should know that cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access. Understand and be able to explain the following cyber security threats: • social engineering techniques • malicious code (malware) • pharming • weak and default passwords • misconfigured access rights • removable media • unpatched and/or outdated software. Explain what penetration testing is and what it is used for. Define the term social engineering. Describe what social engineering is and how it can be protected against. Explain the following forms of social engineering: • blagging (pretexting) • phishing • shouldering (or shoulder surfing). Define the term malware. Describe what malware is and how it can be protected against. Describe the following forms of malware: • computer virus • trojan • spyware. Understand and be able to explain the following security measures: • biometric measures (particularly for mobile devices) • password systems • CAPTCHA (or similar) • using email confirmations to confirm a user’s identity • automatic software updates.
TEACHER POWERPOINTS: UNIT 3.8 IMPACTS OF DIGITAL TECHNOLOGY 8525 (FROM (20
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 3.8 IMPACTS OF DIGITAL TECHNOLOGY 8525 (FROM (20

(0)
These adaptable PowerPoint Presentations (38 Slides) cover all aspects of the specification in relation to AQA GCSE Computer Science 8525 (from 2020) component 3.8. It includes: Teaching PowerPoint Presentations (includes checkpoint questions and answers) - 38 slides Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers) Content Covered: Explain the current ethical, legal and environmental impacts and risks of digital technology on society. Where data privacy issues arise, these should be considered. Exam questions will be taken from the following areas: • cyber security • mobile technologies • wireless networking • cloud storage • hacking (unauthorised access to a computer system) • wearable technologies • computer-based implants • autonomous vehicles.
7 Python Programming Christmas Activities
edulitolearnedulitolearn

7 Python Programming Christmas Activities

(1)
This resource includes 7 Christmas themed, stand alone activities for students learning how to program using Python. The activities go from basic activities to more complex tasks. Some of the skills and knowledge tested includes using input, FOR and WHILE loops, string manipulation, lists, exporting to an external file and importing from an external file.
TEACHER POWERPOINTS: UNIT 1.5 SYSTEMS SOFTWARE J277 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 1.5 SYSTEMS SOFTWARE J277 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (33 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 1.5. It includes: Teaching PowerPoints (includes checkpoint questions and answers) Student PowerPoints (Includes checkpoint questions, but omits the answers) Content Covered: The purpose and functionality of operating systems: User interface Memory management and multitasking Peripheral management and drivers User management File management The purpose and functionality of utility software Utility system software: Encryption software Defragmentation Data compression
TEACHER POWERPOINTS: UNIT 1.3 COMPUTER NETWORKS, CONNECTIONS AND PROTOCOLS J277 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 1.3 COMPUTER NETWORKS, CONNECTIONS AND PROTOCOLS J277 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (111 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 1.3. It includes: Teaching PowerPoint Presentations (including checkpoint questions and answers) Part 1 – Networks & Topologies (66 slides) Part 2 - Wired & Wireless Networks, Protocols & Layers (45 slides) Student PowerPoint Presentations (Including checkpoint questions, but omits the answers) Part 1 – Networks & Topologies Part 2 - Wired & Wireless Networks, Protocols & Layers Content Covered: Types of network: LAN (Local Area Network) WAN (Wide Area Network) Factors that affect the performance of networks The different roles of computers in a client-server and a peer-to-peer network The hardware needed to connect stand-alone computers into a Local Area Network: Wireless access points Routers Switches NIC (Network Interface Controller/Card) Transmission media The Internet as a worldwide collection of computer networks: DNS (Domain Name Server) Hosting The Cloud Web servers and clients Star and Mesh network topologies Modes of connection: Wired - Ethernet Wireless Wi-Fi & Bluetooth Encryption IP addressing and MAC addressing Standards Common protocols including: TCP/IP (Transmission Control Protocol/Internet Protocol) HTTP (Hyper Text Transfer Protocol) HTTPS (Hyper Text Transfer Protocol Secure) FTP (File Transfer Protocol) o POP (Post Office Protocol) IMAP (Internet Message Access Protocol) SMTP (Simple Mail Transfer Protocol) The concept of layers
TEACHER POWERPOINTS: TOPIC 5 ISSUES AND IMPACTS 1CP2 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: TOPIC 5 ISSUES AND IMPACTS 1CP2 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (79 Slides) cover all aspects of the specification in relation to Edexcel GCSE Computer Science 1CP2 (from 2020) topic 5. It includes: Teaching PowerPoints (including checkpoint questions and answers) Student PowerPoints (Including checkpoint questions, but omits the answers) Content Covered: · understand environmental issues associated with the use of digital devices (energy consumption, manufacture, replacement cycle, disposal) · understand ethical and legal issues associated with the collection and use of personal data (privacy, ownership, consent, misuse, data protection) · understand ethical and legal issues associated with the use of artificial intelligence, machine learning and robotics (accountability, safety, algorithmic bias, legal liability) · understand methods of intellectual property protection for computer systems and software (copyright, patents, trademarks, licencing) · understand the threat to digital systems posed by malware (viruses, worms, Trojans, ransomware, key loggers) and how hackers exploit technical vulnerabilities (unpatched software, out-of-date anti-malware) and use social engineering to carry out cyberattacks · understand methods of protecting digital systems and data (anti-malware, encryption, acceptable use policies, backup and recovery procedures)
KS3 Unit - Computer Hardware - What is a Computer?
edulitolearnedulitolearn

KS3 Unit - Computer Hardware - What is a Computer?

(0)
This unit provides at least 6 hours of KS3 lessons on the use computer hardware components in a computer system. At the end of the units students are provided with an assessment to assess their progress. This unit includes a: PowerPoint presentation (56 Slides) PDF teaching file Unit Test (including mark scheme) These resources can be used by a computing teacher or a non-specialist teacher to teach “What is a Computer?”. This unit can be taught in a classroom with no computers. What will students learn? ALL STUDENTS • I can identify the main hardware components (CPU, RAM, Motherboard, HDD, SSD, PSU and GPU) and software components (operating system, application software) that make up a computer system. • I understand that devices such as smart phones and tablets are computer systems MOST STUDENTS • I can explain the role the main hardware components (CPU, RAM, Motherboard, HDD, PSU and GPU) and software components (operating system, application software) that make up a computer system. • I understand the role of input, output and storage devices. SOME STUDENTS • I can select the components of a computer system to ensure that they meet the needs of a user.
TEACHER POWERPOINTS: UNIT 2.3 PRODUCING ROBUST PROGRAMS J277 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 2.3 PRODUCING ROBUST PROGRAMS J277 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (50 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 2.3. It includes: Teaching PowerPoint Presentations (includes checkpoint questions and answers) Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers) Content Covered: Defensive design considerations: Anticipating misuse Authentication Input validation Maintainability: Use of sub programs Naming conventions Indentation Commenting The purpose of testing Types of testing: Iterative Final/terminal Identify syntax and logic errors Selecting and using suitable test data: Normal Boundary Invalid Erroneous Refining algorithms
TEACHER POWERPOINTS: UNIT 2.5 PROGRAMMING LANGUAGES AND IDES J277 (FROM 2020)
edulitolearnedulitolearn

TEACHER POWERPOINTS: UNIT 2.5 PROGRAMMING LANGUAGES AND IDES J277 (FROM 2020)

(0)
These adaptable PowerPoint Presentations (31 Slides) cover all aspects of the specification in relation to OCR GCSE Computer Science J277 (from 2020) component 2.5. It includes: Teaching PowerPoint Presenations (includes checkpoint questions and answers) Student PowerPoint Presentations (Includes checkpoint questions, but omits the answers) Content Covered: Characteristics and purpose of different levels of programming language: High-level languages Low-level languages The purpose of translators The characteristics of a compiler and an interpreter Common tools and facilities available in an Integrated Development Environment (IDE): Editors Error diagnostics Run-time environment Translators
34 HOMEWORK ACTIVITIES - AQA GCSE COMPUTER SCIENCE 8525 (FROM 2020)
edulitolearnedulitolearn

34 HOMEWORK ACTIVITIES - AQA GCSE COMPUTER SCIENCE 8525 (FROM 2020)

(0)
This pack consists of 34 editable homework/classwork activities that can be used to support your delivery of the course. In addition, the homework bundle also contains a suggested mark scheme for each activity. Unit 3.1 · Decomposition and Abstraction · Flowcharts and High-Level Languages · Sorting Data · Sorting & Searching Programs Unit 3.2 · Selection · Iteration · Arrays (Lists) · Functions · Improving Programs · Testing Unit 3.3 · Data Capacity · Conversions · Compression Unit 3.4 · Components of a CPU · CPU Performance · Embedded Systems · Operating Systems · Utility Software · Boolean Logic and Truth Tables · Logic Gates · Programming Languages Unit 3.5 · LANs and WANs · Wired & Wireless Networks · Star & Bus Topology · Network Protocols · The Concept of Layers Unit 3.6 · Malware · Cyber Threats · Network Vulnerabilities Unit 3.7 · Relational Databases · Relational Databases and SQL Unit 3.8 · The Impact of Technology · The Digital Divide · Impact of New Technology
Python Video Tutorials #6 - The Use of Sequence and Selection
edulitolearnedulitolearn

Python Video Tutorials #6 - The Use of Sequence and Selection

(0)
In this lesson you are introduced to two programming concepts - Sequence and Selection. You will learn how to use IF statements, IF then ELSE statements, IF and ELSE-IF statements and Nested IF. Python and the Python Logo are trademarks or registered trade marks of the Python Software Foundation.
KS3 Computing National Curriculum Assessment Criteria
edulitolearnedulitolearn

KS3 Computing National Curriculum Assessment Criteria

(2)
The assessment criteria shown below have been developed to provide a broader range of assessment opportunities for students of all abilities. Each national curriculum statement has been broken down into three distinct levels from bronze (A) to silver (B) to gold ©. Individual student performance can be recorded, providing a map of progress across the whole curriculum. Students can use this mapping to independently identify how they are progressing and this data can also be shared with parents.
Python Video Tutorial #1 An Introduction to Python
edulitolearnedulitolearn

Python Video Tutorial #1 An Introduction to Python

(0)
This is the first lesson in a series teaching Python Programming. It really starts at the very beginning. It’s designed to be used by children and adults with no experience of programming. Python and the Python Logo are trademarks or registered trade marks of the Python Software Foundation.