Search results

Listed under:  Technologies
Interactive

Fliplets

This is an eLearning resource designed to introduce students to the operations and terminology used in kitchens in the hospitality industry as a precursor to undertaking the VET Certificate I Kitchen Operations. The resource consists of nine interactive flip books for students, nine teacher guides, and a course overview. ...

Video

Growing exotic fruit - a niche market enterprise

This is a video(3:15 min) about John and Lyndall Piccone’s exotic fruit orchard at Tyagarah in New South Wales. The resource describes how the property produces more than 200 different tropical and sub-tropical fruits with the harvest beginning in early spring. Successive harvests serve to maintain customer interest in ...

Online

Robotics: STEM careers

This is a unit of work about Robotics, the occupations and industries that use robotics and the current applications and future of robotics. The resource includes: An introduction with teacher notes, student tasks, embedded videos and links to additional resources. Specific topics explored include: What is a robot; applications ...

Online

3D Printing: STEM careers

This is a unit of work about 3D printing, the occupations that use 3D printing and the future of this technology. The resource includes: An introduction with teacher notes, student tasks, embedded videos and links to additional resources. Specific topics explored include: what is 3D printing; applications of 3D printing; ...

Online

Forensics: STEM careers

This is a unit of work about forensic science, the occupations that use forensic science and the future and ethics of forensics. The resource includes: An introduction with teacher notes, student tasks, embedded videos and links to additional resources. Specific topics explored include what is forensic science and how ...

Video

How is your personal information kept secret on the internet?

Lots of private data is exchanged over the internet. What are some examples? As Mia Epner explains, cryptography allows for the secure transfer of data online. How does encryption work? And what is a key? Today information is encrypted using 256 bit keys. This keeps information safe because it means there are way too many ...

Video

How do computers get hacked?

What are some examples of cyber crime? Watch this clip to find out how viruses, denial of service attacks (DDoS) and phishing scams work. What is a botnet? And how are they used by hackers to bring down websites? Most of the time computers get hacked because of simple mistakes users make. What can users do to better protect ...

Video

What are IP addresses?

Meet Vint Cerf, the co-creator of the internet! In this clip, Vint and software engineer Paola Mejia explore the way computer networks talk to each other. Find out what an IP address is and why it's similar to a street address. What's the domain name system? And how does your computer find out the IP address of a website ...

Text

The Conversation: innovation

A series of articles exploring the concept of innovation, including how governments can promote innovation, investment, science, and technology. The articles are authored by experts from universities in Australia and around the world. The collection is regularly updated with new contributions.The articles are clearly written ...

Video

What are pixels?

Meet Kevin Systrom and Piper Hanson as they explain how digital images work. What are pixels, those tiny dots of light, made from? How are colours created and represented? What does Kevin say about the way mathematical functions are used to create different image filters. What is the difference between image resolution ...

Text

Computing turns 60

This is a collection of eight articles that mark the 60th anniversary of the first computer in an Australian university. The series covers topics from the history of computing, its role in studying global health or species conservation, and how computers can help understand the brain.