Skip to content
  • Home
  • Resources
    • Premium Resources
    • KS3
      • Year 7
      • Year 8
      • Year 9
    • KS4
      • IGCSE CS (Coming Soon)
      • IGCSE ICT
        • C1 Types & Components of Computers
        • C2 Input Output Devices
        • C3 Storage Devices
        • C4 Networks & the effects
        • C5 The effects of ICT
        • C6 ICT Applications
    • KS5
      • IB Computer Science
        • Standard Level
        • Higher Level
        • Revision
    • Programming
    • Links
  • IT Training
    • MD-100: Windows Client
    • Network+
    • Security+
  • Posts
    • Computational Thinking
    • Computer Systems
    • Cybersecurity
    • Data and information
    • GCSE CS
    • IBDP CS
    • Programming fundamentals
  • About
    • Contact Me
    • Curriculums
    • Privacy
    • Cookies
  • Subscribe
  • Login
  • Home
  • Resources
    • Premium Resources
    • KS3
      • Year 7
      • Year 8
      • Year 9
    • KS4
      • IGCSE CS (Coming Soon)
      • IGCSE ICT
        • C1 Types & Components of Computers
        • C2 Input Output Devices
        • C3 Storage Devices
        • C4 Networks & the effects
        • C5 The effects of ICT
        • C6 ICT Applications
    • KS5
      • IB Computer Science
        • Standard Level
        • Higher Level
        • Revision
    • Programming
    • Links
  • IT Training
    • MD-100: Windows Client
    • Network+
    • Security+
  • Posts
    • Computational Thinking
    • Computer Systems
    • Cybersecurity
    • Data and information
    • GCSE CS
    • IBDP CS
    • Programming fundamentals
  • About
    • Contact Me
    • Curriculums
    • Privacy
    • Cookies
  • Subscribe
  • Login

Machine Learning Techniques Explained

  • Mr Teasdale Mr Teasdale
  • Artificial Intelligence, Machine Learning

Machine learning (ML) is a core discipline within artificial intelligence, enabling systems to learn from… Read More »Machine Learning Techniques Explained

Command Line tools (Nmap and more)

  • Mr Teasdale Mr Teasdale
  • Cybersecurity

Introduction Conducting penetration testing is a vital procedure for organizations to uncover vulnerabilities within their… Read More »Command Line tools (Nmap and more)

Create a security infrastructure design document for a fictional organisation

  • Mr Teasdale Mr Teasdale
  • Cybersecurity

Demystifying the OSI Model

  • Mr Teasdale Mr Teasdale
  • Computer networks

The OSI (Open Systems Interconnection) model serves as a conceptual framework to standardize the functions… Read More »Demystifying the OSI Model

Computational Thinking – what is it?

  • Mr Teasdale Mr Teasdale
  • Computational Thinking, GCSE CS

Introduction Computational thinking is a problem-solving approach that involves breaking down complex problems into smaller,… Read More »Computational Thinking – what is it?

Resource Update!!

  • Mr Teasdale Mr Teasdale
  • General

21/9/23 Update This site is an ongoing project and will see new developments through time.… Read More »Resource Update!!

Basic SQL Commands

  • Mr Teasdale Mr Teasdale
  • GCSE CS, Programming fundamentals

Structured Query Language (SQL) is a programming language specifically designed for managing and manipulating relational… Read More »Basic SQL Commands

Unleashing the Power of AI: Navigating the Ethical Frontier

  • Mr Teasdale Mr Teasdale
  • Artificial Intelligence

Hey there, tech enthusiasts! After watching this TED Talk by Sam Harris (Link), I thought… Read More »Unleashing the Power of AI: Navigating the Ethical Frontier

Cybersecurity in the Digital Age: Protecting Your Digital Footprint

  • Mr Teasdale Mr Teasdale
  • Cybersecurity, E-Safety

In this post I will address the importance of cybersecurity in today’s interconnected world, offer… Read More »Cybersecurity in the Digital Age: Protecting Your Digital Footprint

Programming Basics – Data Types and Variables

  • Mr Teasdale Mr Teasdale
  • Programming fundamentals

In Python, data types define the type of values that can be assigned to variables.… Read More »Programming Basics – Data Types and Variables

  • 1
  • 2
  • 3
  • Next »
  • _Home
  • Resources
  • KS3
  • KS4
  • KS5
  • IT Training
  • Posts
  • Cookies
  • Privacy
linkedin

Neve | Powered by WordPress

  • _Home
  • Resources
  • KS3
  • KS4
  • KS5
  • IT Training
  • Posts
  • Cookies
  • Privacy
linkedin

Neve | Powered by WordPress

Scroll Up
Welcome to CS with Mr Teasdale!
This site uses cookies ( ) to enable essential functionality. Click "I accept" if you are okay with that! :)
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}