
Teaching the Bubble Sort Algorithm using Pringles
Teaching the Bubble Sort Algorithm using Pringles
Creative Commons Simon Rundell CC NC-BY-SA 2025. Use freely. Or make your own. I just did it on my phone.
Creative Commons Simon Rundell CC NC-BY-SA 2025. Use freely. Or make your own. I just did it on my phone.
A network layer model helps break down communication into smaller, more manageable functions. The most common model is the OSI (Open Systems Interconnection) Model, which has seven layers, each responsible for a specific role in data transmission.
TCP/IP Model (Simplified Version)
The TCP/IP Model is a simpler version of OSI with four layers:
Network Protocols
Protocols are rules and standards that define how data is transmitted across networks.
Think of network communication like sending a letter through a postal service. Each network layer has a role similar to steps in delivering a letter.
🔹 Example: Your letter is put into a satchel and carried by a van to the sorting office.
🔹 Example: If the letter is missing a stamp, it gets rejected.
🔹 Example: Your letter is sent from London to New York based on the address.
🔹 Example: If using TCP (tracked mail), the sender gets a notification when the letter arrives.
🔹 Example: You keep sending letters back and forth in an ongoing conversation.
🔹 Example: If the message is encrypted (TLS), only the intended recipient can read it.
🔹 Example: The recipient reads a web page (HTTP) or opens an email (SMTP/IMAP).
Summary of the Postal System Analogy
OSI Layer | Postal System Equivalent |
Application | Reading the letter (Web, Email) |
Presentation | Translating the letter (Encryption, Formatting) |
Session | Keeping communication open (Back-and-forth letters) |
Transport | Ensuring delivery (Regular vs. Tracked Mail) |
Network | Choosing the best route (Sorting Office) |
Data Link | Addressing & Stamping (MAC Address, Error Checking) |
Physical | Delivering the letter (Postman’s Satchel, Roads, Aeroplanes) |
Tablet-based tracker for in-Classroom use.
Tracking pupils mid lesson is hard. I am sure that as I become more accomplished as a teacher I can keep all this stuff in my memory, but I like objective records and I like React Apps. This therefore is a solution, orginally designed to support my pre-cataract surgery eyesight deficit, which gives me a list of students to call, to award credits or decredits to, to record any disciplinary actions or warnings which I might have to give and to record notes for each student. It also has flags to warn me of students who might need some kind of additional support, so I can check their confidential record and getn it right. It is designed to work on a tablet (such as my Surface Pro or an iPad) in landscape mode.
Here are some screenshots:
For confidentiality reasons, all data is protected behind a password system and data is transmitted between the server and client using a secure transport layer.
The user only has access to thir own data.
The main timetable page. This is test data, so don’t think I only work half the week! On each page there is a real-time clock, mainly because so many classrooms I am in have broken clocks and I want to just be able to glance at my tablet and see the time quickly.
This is the main in-class screen. It shows on the left the list of students to call. When they are called, and I record that with the “Call” button, they are moved to the bottom of the list. The red number indicates the number of times they have been called that lesson.
The + and – buttons add or subtract credits, and if I have a disciplinary issue, I can record the status of that by clicking on the discipline status. I can make any additional notes for each lesson and each one is timestamped and added to my student record.
Unfortunately in this scenario, I have had to give a minor warning to Velma to stop looking at Tik Tok in the lesson and so I have marked the first disciplinary stage and made a note in her record.
At the end of the lesson, the number of times called, the number of credits awarded and the disciplinary status at the end of the lesson is recorded in the student notes.
This gives me a record of cumultive achievement and will contribute to the reports on the students that I write.
For each class I can allocate a couple of images of the classroom layout for my seating plan. This is better and bigger than the ClassCharts one which is almost illegible.
(Obviously, I was just using any image I had to hand for testing)
In this Edit Class screen I can add students using a combination of search and a dropdown
When managing student records I can see a summary of all their notes (again useful for report-writing)
Given that a College might have a thousand students, the search facility is useful.
This project is uploaded to github at: https://github.com/SimonRundell/ClassAssistant
If anyone would like to try it out, then please let me know. I can provide the facility for a very very low price (I’m talking a tenner a year) or you can compile and implement it at your school for free. I’d be available to consult if you needed any help, support or advice on that.
This is the lesson plan which got me the job. I couldn’t be sure of the resources I would have available, so I opted to teach about the CIA Model (set by the College) without anything more than a PowerPoint and a bunch of envelopes and cards. Use freely. Expand as you wish. Post improvements in the comments.
File Name: Microteach-CIA-model.pptx
Triad means 3, so there are 3 parts to the CIA triad model
Confidentiality, Integrity and Availability.
Let me illustrate with a bunch of envelopes…
I have a list of people who are allowed the data. I ask a requesting student for their name and password which I check on a clipboard and if they are correct I give them the envelope.
I give another student the wrong password card and they ask 3 times which I reject and throw them out, showing that brute force password attacks can be foiled.
Another student has a clipboard and a piece of paper with “Permission” on it. The requesting student gives their name and password to the clipboard student who gives me the “Permission” paper and I give the requesting student the envelope.
One issue can be the Man in the Middle attack with these two, so a student stands in between us and takes the envelope. He might not pass it on if he is a bad router and open it himself, so we must ensure the data is safe if it falls into the wrong hands with encryption.
I have another envelope which I show as having something in code inside it. A student who is unauthorised asks for the envelope and I give them the one without the solution inside it. It doesn’t make sense. An authorised requesting student asks me for the envelope, and I give the one with the decrypted side to them, which they open and turn over which has the message on it decrypted.
The requesting student asks for the envelope, I give them an envelope and tell them that the checksum of this data should be 1024, but on the outside of this envelope the checksum says “63”. I ask them if the checksum is correct and they will say no, so I give them an envelope with “1024” on it and ask if it is correct. If it is, they can open the envelope and get the data confident that it is correct.
Malware such as viruses and trojans often affect the checksum of a file, so the discarded envelopes could contain infected files.
I give the requesting student an envelope when they ask for it which I have signed. The first envelope isn’t my name. I ask them if it is correct and they say no, so they should discard it as it isn’t properly signed. I sign another one with my own signature and they can confirm it is correct and again can open it in the knowledge that it is correct.
I create two envelopes. A student is given an envelope, and another student is encouraged to take it off them and throw it away. That is a cyber-attack. I ask him for the envelope, but it is lost. I have a second envelope somewhere, but I have to search for a moment before I hand it to them. This is restoring from a backup.
I create two envelopes. A student is given an envelope and then is told to throw it away. I ask him for the envelope, but it is lost. Luckily, I have a second envelope, and I give it to them immediately. This is redundancy.
These two deal with disaster recovery after systems failure, malicious damage or user error.
The requesting student asks for the envelope, but all the other students start asking for the envelope at the same time, and I don’t know who to give it to. I ask the requesting student for a token, and they give me the card which says “Permission” on it and so I can give it to them, explaining that without the right token, a firewall or rate limiter will ignore all the other requests and only give the data to the right person.
Many schools often ban Mobile Phones as a distraction, but in Computing we view them as tools – both a platform for development and a means of using technology to enhance our learning. In the more relaxed environment of Further Education (16+ in the UK), we do not automatically ban Mobiles, and I want to take it further to embrace them as a tool for engagement in the Classroom, Computer Lab and Lecture Theatre.
There are tools out there but they are almost exclusively web based and this doesn’t always chime well with the workflow as the teacher has to Alt-Tab to a web page to garner student reactions and answers. This has been my main issue with Mentimeter – a great product but with a cost and an interface limited by the web browser. I wanted something which worked within Microsoft PowerPoint, so I wrote Kallbak.
Kallback is a low cost solution for Educators to have integrated interactions with the Students in their Classroom or Lecture Theatre. With the aid of a QR code or a 6-letter shortcode, students can answer an open question, a multiple choice question, create a word cloud or respond to an image. This is displayed in the Powerpoint Presentation Slide in real time.
What’s more, you can then ask Google Gemini AI to summarise and correct the answers given.
The Presenter/Teacher/Lecturer has his own control panel to enable and disable submissions to the page shown over his presentation screen.
…thus enabling them to Start the Presentation and run multiple slides with Kallbaks on them.
The whole add-in runs separately from your Slideshow template, so you can customise the look and feel of the displayed page to match your own needs.
The kallbak.com website enables you to create your own questions, use other submitted questions and create QR codes and the necessary links to be able to take Kallbaks from your classes.
I’ve been having fun with AI image generation to support my recent revision lessons. All are available for free under the Creative Commons Licence: CC NC-BY-SA. If you are unsure of what this means please read the definition here.
Right-Click and select “Save As…”
ChatGPT Sora Simon Rundell CC NC-BY-SA 2025
ChatGPT Sora Simon Rundell CC NC-BY-SA 2025
ChatGPT Sora Simon Rundell CC NC-BY-SA 2025
Cambridge Technicals Level 3 IT
Simon Rundell CC NC-BY-SA 2025
Cambridge Technicals Level 3 IT
Simon Rundell CC NC-BY-SA 2025
Cambridge Technicals Level 3 IT
Simon Rundell CC NC-BY-SA 2025
Cambridge Nationals iMedia
Simon Rundell CC NC-BY-SA 2025
Cambridge Technicals Level 3 IT
Simon Rundell CC NC-BY-SA 2025
Cambridge Technicals Level 3 IT
Simon Rundell CC NC-BY-SA 2025
Cambridge Technicals Level 3 IT
Simon Rundell CC NC-BY-SA 2025
Cambridge Technicals Level 3 IT
Simon Rundell CC NC-BY-SA 2025
Cambridge Technicals Level 3 IT
Simon Rundell CC NC-BY-SA 2025
Cambridge Technicals Level 3 IT
Simon Rundell CC NC-BY-SA 2025
Cambridge Technicals Level 3 IT
Simon Rundell CC NC-BY-SA 2025
Image from ChatGPT Sora
Cambridge Technicals Level 3 IT
Simon Rundell CC NC-BY-SA 2025
Cambridge Technicals Level 3 IT
Simon Rundell CC NC-BY-SA 2025
Cambridge Technicals Level 3 IT
Simon Rundell CC NC-BY-SA 2025
Cambridge Technicals Level 3 IT
Simon Rundell CC NC-BY-SA 2025
Cambridge Nationals iMedia
Simon Rundell CC NC-BY-SA 2025
Cambridge Nationals iMedia
Simon Rundell CC NC-BY-SA 2025
Cambridge Nationals iMedia
Simon Rundell CC NC-BY-SA 2025
Cambridge Nationals iMedia
Simon Rundell CC NC-BY-SA 2025
Cambridge Nationals iMedia
Simon Rundell CC NC-BY-SA 2025
ChatGPT Sora Simon Rundell CC NC-BY-SA 2025
ChatGPT Sora Simon Rundell CC NC-BY-SA 2025
ChatGPT Sora Simon Rundell CC NC-BY-SA 2025
OSI Model expressed analogous to the Postal Service by Simon Rundell CC NC-BY-SA 2025
Inspirational quote by Steve Jobs
Photo from Public Domain
This offered by Simon Rundell CC NC-BY-SA 2025
AI Generated dummy image for use as student pictures.
Simon Rundell CC NC-BY-SA 2025
AI Generated dummy image for use as student pictures.
Simon Rundell CC NC-BY-SA 2025
AI Generated dummy image for use as student pictures.
Simon Rundell CC NC-BY-SA 2025
AI Generated dummy image for use as student pictures.
Simon Rundell CC NC-BY-SA 2025
AI Generated dummy image for use as student pictures.
Simon Rundell CC NC-BY-SA 2025
AI Generated dummy image for use as student pictures.
Simon Rundell CC NC-BY-SA 2025
AI Generated dummy image for use as student pictures.
Simon Rundell CC NC-BY-SA 2025
ChatGPT Sora Simon Rundell CC NC-BY-SA 2025
ChatGPT Sora Simon Rundell CC NC-BY-SA 2025
Cambridge Technicals Level 3 IT
Simon Rundell CC NC-BY-SA 2025
The following images are drawn from other sources, and I am not necessarily sure of their copyright status. However, if you use them in an educational setting, I am sure you will be fine. Unlike those above, I do not assert any control over the images below.
These images are all memes from t’internet. I use them to spice up slides, give encouragement or make a humorous point.