Search results

Online

TrackSAFE Education Primary School Resources: Year 3 and Year 4 English

This unit of work focuses on behaviour in and around tracks and rail infrastructure. Activities build subject-specific vocabulary and understanding of procedural text structures. Guided writing activities support students to develop a series of track safe procedures while a slogan writing activity focuses on effective ways ...

Online

TrackSAFE Education Primary School Resources: Year 5 and Year 6 English

This unit of work focuses on the influences that impact on safe behaviours in and around tracks, platforms and trains. Guided activities build students' rail safety vocabulary including grammar and word building. Modelled writing activities support students to shape a research-based inquiry investigating factors that impact ...

Video

How do computers get hacked?

What are some examples of cyber crime? Watch this clip to find out how viruses, denial of service attacks (DDoS) and phishing scams work. What is a botnet? And how are they used by hackers to bring down websites? Most of the time computers get hacked because of simple mistakes users make. What can users do to better protect ...

Online

TrackSAFE Education Primary School Resources: Foundation, Year 1 and Year 2 English

This unit of work focuses on developing student understanding of the importance of being track safe and the key message 'Stop, Look, Listen, Think'. It builds students' familiarity with the vocabulary and key concepts related to rail safety and provides differentiated activities for writers at different stages of development ...

Interactive

Bear and Chook by the Sea

This learning object is designed around a series of videos with Lisa Shanahan, author, and Emma Quay, illustrator, including a reading experience of their collaborative work, Bear and Chook by the Sea. Taken as a whole, this sequence of lessons is a Stage 1 unit of work that results in students working in pairs to produce ...

Text

Keeping secrets

In this lesson sequence students examine cryptography and modern encryption methods for transmitting digital data securely. Encryption of data is a means of protecting data, one example being the use of secret and public keys.

Text

The Conversation: Algorithm

A series of explanatory articles about how algorithms work, be it applied to chess, the spread of social media, art, conservation, or artificial intelligence. Articles are authored by recognised experts on the topic. Resource can be used to develop a broad understanding of algorithms and their role in everyday life. The ...

Text

Computing turns 60

This is a collection of eight articles that mark the 60th anniversary of the first computer in an Australian university. The series covers topics from the history of computing, its role in studying global health or species conservation, and how computers can help understand the brain.

Text

Taronga Zoo - Wild Australia: iPad app

This iPad app is designed for Stage 2 students to use while on excursion in the Wild Australia area in Taronga Zoo Sydney and at the Taronga Western Plains Zoo, Dubbo. Students create a field report from observations and can email and review their editable summary poster for further study back at school. The app has intuitive ...

Text

Classroom ideas F-10: Aboriginal and Torres Strait Islander connections to Digital Technologies

This resource provides examples of ways Aboriginal and Torres Strait Islander Histories and Cultures can be integrated into Digital Technologies. Examples include 'classification and sorting data' and 'designing solutions'.

Text

Books for exploring Digital Technologies concepts

This PDF provides a list of suggested books or similar that identify and discuss key concepts, key ideas and related ways of thinking about Digital Technologies.

Text

Digital systems cards

This PDF and accompanying cards provide suggestions for ways in which students can identify and explain digital systems in their environment. Students determine whether digital systems include inputs, outputs, or both, and whether they feature software, hardware or peripheral devices. The resource includes useful links ...

Text

Years 7–8: Hardware, networks and cyber threats

This scope and sequence unit explores how the performance of computer hardware – such as CPU and RAM – is determined by its specifications, and how digital networks (wired and wireless) can also be compared in terms of requirements. Students are introduced to the concepts of network protocols and cryptography for ensuring ...

Text

Years 5–6: Digital systems, safety and security

This scope and sequence unit explores the internal components of a digital device and their function. It explores computers connected via networks and how to use safe behaviours in a digital world.

Text

Years 9–10: Cybersecurity

This unit considers how and why data is kept secure on the internet. Students refresh and build on their understanding of network hardware and internet protocols. They examine the Australian Privacy Principles and their implications for individuals and organisations, providing a rationale to explore how cyberthreats can ...

Text

Years 3–4: Digital systems, safety and security

This scope and sequence unit explores peripherals of common digital systems and their function. Students investigate behaviours and protocols to stay safe online.

Text

Foundation: Using digital systems safely

This scope and sequence unit introduces students to common digital systems and builds an understanding of the role hardware and software play as students use digital systems for a purpose. They also learn about how to practice being safe users of digital systems.

Text

Teaching and supporting project management in the F-6 classroom

This PDF gives educators an overview of what project management is and ideas on how they can implement project management skills in the F-6 classroom.