Search results

Refine by year level


Refine by learning area


Refine by topic

Video

What are IP addresses?

Meet Vint Cerf, the co-creator of the internet! In this clip, Vint and software engineer Paola Mejia explore the way computer networks talk to each other. Find out what an IP address is and why it's similar to a street address. What's the domain name system? And how does your computer find out the IP address of a website ...

Online

Working together

In this lesson sequence students, through role-play and other activities, develop understandings of the role of hardware and software in managing, controlling and securing the movement of and access to data in networked digital systems.

Video

How is your personal information kept secret on the internet?

Lots of private data is exchanged over the internet. What are some examples? As Mia Epner explains, cryptography allows for the secure transfer of data online. How does encryption work? And what is a key? Today information is encrypted using 256 bit keys. This keeps information safe because it means there are way too many ...

Video

How do computers get hacked?

What are some examples of cyber crime? Watch this clip to find out how viruses, denial of service attacks (DDoS) and phishing scams work. What is a botnet? And how are they used by hackers to bring down websites? Most of the time computers get hacked because of simple mistakes users make. What can users do to better protect ...

Text

Cyber security analysis from The Conversation

This is a collection of articles about cyber security. It includes articles on cyber-espionaage, cyber crime, data security, government policy around cyber security, and international perspectives including from US, China and UK. The articles are written in plain language and are authored by experts from universities in ...

Text

Computing turns 60

This is a collection of eight articles that mark the 60th anniversary of the first computer in an Australian university. The series covers topics from the history of computing, its role in studying global health or species conservation, and how computers can help understand the brain.

Online

Talk to me!

In this lesson sequence that focuses on input devices, students are explore the possibilities and new types of functionality enabled by these technologies over time.

Online

Keeping secrets

In this lesson sequence students examine cryptography and modern encryption methods for transmitting digital data securely. Encryption of data is a means of protecting data, one example being the use of secret and public keys.