F-10 Curriculum (V8)
F-10 Curriculum (V9)
Tools and resources
Related links
Your search returned 71 results
Jennifer Hemer from Natural Resource Management Tasmania explains what's happening in the seafood industry in her state and how digital technologies are used to make the industry more sustainable.
This PDF lists seven characteristics of good teaching practice in the Digital Technologies curriculum.
This PDF provides a list of books that are useful for exploring key concepts and ideas in Digital Technologies.
These matrices allow teachers to self-assess their proficiency with Digital Technologies. They include a notes section for teachers to plan future professional learning.
This PDF presents content descriptions and achievement standards for the Digital Technologies subject in the Australian Curriculum
This newsletter from the Digital Technologies in Focus project includes information about schools' projects, information for parents and teachers, the Australian Curriculum, and useful resources.
Meet Vint Cerf, the co-creator of the internet! In this clip, Vint and software engineer Paola Mejia explore the way computer networks talk to each other. Find out what an IP address is and why it's similar to a street address. What's the domain name system? And how does your computer find out the IP address of a website ...
Meet Kevin Systrom and Piper Hanson as they explain how digital images work. What are pixels, those tiny dots of light, made from? How are colours created and represented? What does Kevin say about the way mathematical functions are used to create different image filters. What is the difference between image resolution ...
This is a video (4:09 min) about the University of New England’s Kirby Research Station and how its work with sheep has been transformed by technology, particularly the Radio Frequency Identification (RFID) tag. The video is presented by members of the Enhanced sheep wellbeing and productivity research program and includes ...
Lots of private data is exchanged over the internet. What are some examples? As Mia Epner explains, cryptography allows for the secure transfer of data online. How does encryption work? And what is a key? Today information is encrypted using 256 bit keys. This keeps information safe because it means there are way too many ...
What are some examples of cyber crime? Watch this clip to find out how viruses, denial of service attacks (DDoS) and phishing scams work. What is a botnet? And how are they used by hackers to bring down websites? Most of the time computers get hacked because of simple mistakes users make. What can users do to better protect ...