Search results

Online

Connected via a network

This is a unit for Year 9 from the Scope and sequence resources from the DT Hub. The topic of digital systems is organised into four key elements. Use this flow of activities to plan and assess students against the relevant achievement standards. Students develop and understanding that digital systems must be robust and ...

Online

Data: Controlled and secured

This is a unit for Year 10 from the Scope and sequence resources from the DT Hub. The topic of digital systems is organised into four key elements. Use this flow of activities to plan and assess students against the relevant achievement standards. Students explore how data can be secured through various methods such as ...

Online

Systems thinking

Find out about Systems thinking. Use this topic from the Digital Technologies Hub to learn more, get ideas about how to teach about it, find out what other schools are doing and use the applications and games in the classroom.

Online

Working together

In this lesson sequence students, through role-play and other activities, develop understandings of the role of hardware and software in managing, controlling and securing the movement of and access to data in networked digital systems.

Online

Clever computers

In this sequence of lessons explore how to help students understand the elements of a digital system including hardware, software and some commonly used peripheral devices. Investigate how these elements work together.

Online

Hardware and software

This is a unit from the Scope and sequence resources from the DT Hub. The topic explores elements of a digital system which is organised into four key elements. Use this flow of activities to plan and assess students against the relevant achievement standards. At this level, students develop understandings of digital systems ...

Online

Keeping secrets

In this lesson sequence students examine cryptography and modern encryption methods for transmitting digital data securely. Encryption of data is a means of protecting data, one example being the use of secret and public keys.