GCSE Computer Science Resources
14-16 Years Old

48 modules covering every Computer Science topic needed for GCSE level, and each module contains:

  • An editable PowerPoint lesson presentation
  • Editable revision handouts
  • A glossary which covers the key terminologies of the module
  • Topic mindmaps for visualising the key concepts
  • Printable flashcards to help students engage active recall and confidence-based repetition
  • A quiz with accompanying answer key to test knowledge and understanding of the module
View the GCSE Resources →

KS3 Computing Resources
11-14 Years Old

We’ve created 45 modules covering every Computer Science topic needed for KS3 level, and each module contains:

  • An editable PowerPoint lesson presentation
  • Editable revision handouts
  • A glossary which covers the key terminologies of the module
  • Topic mindmaps for visualising the key concepts
  • Printable flashcards to help students engage active recall and confidence-based repetition
  • A quiz with accompanying answer key to test knowledge and understanding of the module
View the KS3 Resources →

Uniform Resource Locator (URL)

A link is more formally known as a URL, which stands for Uniform Resource Locator.  In the domain of computer science, there’s always been a debate about the difference between a URL and a URI.  Sometimes you’ll see the word web link and URL used interchangeably, and sometimes you’ll see the acronym URL and URI …

Read moreUniform Resource Locator (URL)

Programming Data Types

A data type is a means of classifying the type of data that a variable or object can hold in computer programming.  Data types are an important factor in all computer programming languages, including C#, C++, JavaScript, and Visual Basic.  When programmers develop computer software—whether that’s desktop or web-based—data types must be assigned and applied correctly in order to guarantee proper outcomes and an …

Read moreProgramming Data Types

Simplex, Half Duplex, Full Duplex

There are three modes of transmission, namely: simplex, half duplex, and full duplex.  The transmission mode defines the direction of signal flow between two connected devices. The primary difference between three modes of transmission is that in a simplex mode of transmission the communication is unidirectional, or one-way; whereas in the half duplex mode of transmission the communication is …

Read moreSimplex, Half Duplex, Full Duplex

Serial & Parallel Data Transmission

There are two ways to transfer data between computers: Serial Transmission and Parallel Transmission. Serial Transmission Data is sent bit by bit from one computer to another in two directions.  Each bit has a clock pulse rate.  Eight bits are transmitted at a time, with a start and stop bit known as a parity bit, …

Read moreSerial & Parallel Data Transmission


Phishing is a term used to describe a harmful individual, or group of individuals, that cheats users by sending emails or creating web pages that are intended to collect an individual’s online bank, credit card, or other login information. The emails and web pages look official, which is why users trust them and voluntarily part with their personal information. Phishing …

Read morePhishing

Selection In Programming

A selection is used to make choices depending on information.  An algorithm can be made smarter by using IF, THEN, and ELSE functions to reiterate instructions, or to move the process in question to different parts of the program. Selection is also called a decision.  It is one of the three basic logic assemblies in …

Read moreSelection In Programming

Variables and Constants

Variables and constants are two commonly used mathematical concepts.  A variable is a value that has the ability to change.  A constant is a value which remains unchanged. These concepts have branched out into other fields, like physics and computer science.  Variables In the mathematical framework, a variable is a quantity which has a dynamic …

Read moreVariables and Constants

Output Devices

Computer output devices receive information from the computer, and carry data that has been processed by the computer to the user.  Output devices provide data in myriad different forms, some of which include audio, visual, and hard copy media.  The devices are usually used for display, projection, or for physical reproduction.  Monitors and printers are two of the most commonly-known output devices used …

Read moreOutput Devices

Pharming & Pharming Attacks

What is a Pharming Attack? Over the years, human technology has steadily progressed from one level to the next.  As well as being true in general, this is unfortunately also true in the world of cybercrime.  As the techniques cyber criminals use to execute their deceitful acts are exposed and regulated, they advance to new …

Read morePharming & Pharming Attacks

Computer Security

Computer Security is, basically speaking, the preservation of computing systems and the information that they save and / or retrieve. Computer Security is important as it enables people to perform their work and study.  It helps in the execution of essential business processes, and Safeguards confidential and sensitive information. Computer Security is important enough that …

Read moreComputer Security

Primary Key (Primary Keyword)

A primary key, also known as primary keyword, is a key in a relational database which is specific for each record.  It is a unique attribute, like a driver’s license number, telephone number with area code, or vehicle identification number (VIN).  A relational database can only have one primary key.  Primary keys are usually displayed …

Read morePrimary Key (Primary Keyword)

Operating System (OS)

You and your computer speak different languages.  Computers don’t speak English, nor Spanish; they only speaks in 0s and 1s.  Man and computer cannot communicate directly, which is why an operating system is needed.  The operating system (OS) is a program that allows you to interact with the computer.  Together, the operating system and the …

Read moreOperating System (OS)

Web Browser

The most important program in your computer is the web browser, and yet most people are not sure which web browser they are using, or even what exactly a web browser is.  A web browser is not in itself all that different from Windows or Mac, which are systems that allow you to manage files …

Read moreWeb Browser

Testing and Test Data

Testing Testing is the name given to the process of discovering if something works, and if so, if it works well.  Testing is used in computer hardware and software development to determine whether objectives are being met.  It is done at significant checkpoints in the development process. Purposes of Testing To be able to assess …

Read moreTesting and Test Data

What is a Database?

A database is any collection of information that has been systematised for quick searching and retrieval via the use of a computer.  Databases are intended to provide the means for the modification, deletion, storage, and retrieval of data in connection with different operations.  A database management system (DBMS) utilises queries to pull out information from the database. A database can …

Read moreWhat is a Database?

Secure Sockets Layer (SSL)

Secure Sockets Layer (SSL) is a computer networking procedure for safeguarding connections between network application clients and servers over a vulnerable network, like the internet.  Because of several procedure and execution defects and weaknesses, SSL was disapproved for use on the internet by the Internet Engineering Task Force (IETF) in 2015, and has since been replaced by the Transport Layer …

Read moreSecure Sockets Layer (SSL)


Sensors are advanced devices that are used to sense and react to signals, either electrical or optical.  A sensor translates the physical characteristic of the input into a signal which can be calculated electrically.  For example, the mercury in a glass thermometer expands and compresses the liquid in order to represent the calculated temperature, which can be viewed …

Read moreSensors

Data Verification

There are a few kinds of standard errors that are often experienced when doing data entry. Two of the most common of these are transcription errors and transposition errors. Transcription Errors Every time data is manually entered into the system, there’s a possibility that an error will be committed. Human errors do occur, and there …

Read moreData Verification

IP and MAC Addresses

IP Address An Internet Protocol (IP) address is a rational numerical address which is allocated to every single computer and computer device that is a member of a given Transmission Control Protocol / Internet Protocol (TCP/IP)-based network. The IP address is the main element on which the networking architecture is made—no network occurs without it.  …

Read moreIP and MAC Addresses