Search results

Online

When I post something online how permanent is it?

Students engage in a photo rip up activity to emphasize the permanency of online information, they explore factor trees, doubling and line graphs through the lens of sharing information, and they collaboratively develop a set of protocols around sharing information online.

Text

Computational thinking poster

This infographic provides an overview overview of the concepts related to computational thinking.

Text

Australian Curriculum: Digital Technologies key concepts mapping: yrs F-2

This PDF uses colour coding to provide a line of sight between key concepts, content descriptions and achievement standards in the Digital Technologies subject in the Australian Curriculum.

Text

Newsletter – April 2018

This newsletter from the Digital Technologies in Focus project includes information about schools' projects, the Australian Curriculum and useful resources.

Text

Faith Lutheran School

Faith Lutheran College is a secondary co-educational independent school in Plainland, Queensland. It has more than 700 students and was established in 1999. Sarah Atkins is the curriculum officer who works with the school to support implementation of the Australian Curriculum: Digital Technologies. Teachers at the school ...

Interactive

A New Kind of Alchemy

'A New Kind of Alchemy' is an interactive online graphic novel about a future world threatened by extinction. It is based on a short story by Australian writer, James Roy. The graphics can be downloaded and used to create your own story.

Text

Australian Curriculum: Digital Technologies Years F-6 achievement standards and aligned content descriptions on a page

This PDF presents content descriptions and achievement standards for the Digital Technologies subject in the Australian Curriculum

Video

DTiF in conversation with Kevin Bradley and Cassandra Arkinstall from Save the Bilby Fund – Using Digital Technologies to help save bilbies

Kevin Bradley, CEO of Save the Bilby Fund, and Cassandra Arkinstall, a researcher and volunteer at Save the Bilby Fund explain how important digital technologies are in the campaign to save the bilby from extinction. The video explains how digital systems are used to collect and visualise data and help eradicate threats ...

Text

Newsletters

This webpage features newsletters from the Digital Technologies in Focus project. The newsletters include information about schools' projects, assessment tasks, the Australian Curriculum and resources.

Text

Newsletter – December 2019

This newsletter from the Digital Technologies in Focus project includes information about schools' projects, information for parents and teachers, the Australian Curriculum, and useful resources.

Text

Books for exploring Digital Technologies concepts

This PDF provides a list of suggested books or similar that identify and discuss key concepts, key ideas and related ways of thinking about Digital Technologies.

Video

How is your personal information kept secret on the internet?

Lots of private data is exchanged over the internet. What are some examples? As Mia Epner explains, cryptography allows for the secure transfer of data online. How does encryption work? And what is a key? Today information is encrypted using 256 bit keys. This keeps information safe because it means there are way too many ...

Video

What are IP addresses?

Meet Vint Cerf, the co-creator of the internet! In this clip, Vint and software engineer Paola Mejia explore the way computer networks talk to each other. Find out what an IP address is and why it's similar to a street address. What's the domain name system? And how does your computer find out the IP address of a website ...

Video

Learning about computer languages

What happens when you type a web address or url into your computer and press enter? Watch this clip to find out! Computers and servers talk to each other in a language called HTTP. What are the messages they send and recieve mostly about? HTML is another language, one that tells a web browser how to make a web page look. ...

Video

BTN Podclass using podcasts in school video

Have you ever used a YouTube video or podcast on the internet to learn a new skill? Perhaps to learn how to play the guitar or to do new skateboard tricks or dance moves? Find out how one school in Italy uses podcasts to jazz up its lessons.

Video

Precision Sheep Management: video

This is a video (4:09 min) about the University of New England’s Kirby Research Station and how its work with sheep has been transformed by technology, particularly the Radio Frequency Identification (RFID) tag. The video is presented by members of the Enhanced sheep wellbeing and productivity research program and includes ...

Video

What are pixels?

Meet Kevin Systrom and Piper Hanson as they explain how digital images work. What are pixels, those tiny dots of light, made from? How are colours created and represented? What does Kevin say about the way mathematical functions are used to create different image filters. What is the difference between image resolution ...

Online

Digital Technologies Hub

The Digital Technologies Hub is a website that supports Australian primary teachers, secondary teachers, students, school leaders and school communities in engaging with the Australian Curriculum: Digital Technologies. The hub provides scaffolded support for teachers and many of the resources will assist those getting started ...

Video

Powerful words: Gough Whitlam's dismissal

Gough Whitlam is the only Australian prime minister to have been sacked from office - along with his entire government. After learning of his dismissal, Mr Whitlam addressed the Australian public and uttered a line that has resonated throughout Australian politics since 1975. Words can be immensely powerful and, as you ...

Video

How do computers get hacked?

What are some examples of cyber crime? Watch this clip to find out how viruses, denial of service attacks (DDoS) and phishing scams work. What is a botnet? And how are they used by hackers to bring down websites? Most of the time computers get hacked because of simple mistakes users make. What can users do to better protect ...