Close message Scootle has stopped supporting resources that use the Adobe Flash plug-in from 18 Dec 2020. Learning paths that include these resources will have alerts to notify teachers and students that one or more of the resources will be unavailable. Click here for more info.

Digital technologies / Year 9 and 10 / Digital Technologies Knowledge and Understanding

View on Australian Curriculum website Australian Curriculum, Assessment and Reporting Authority
Curriculum content descriptions

Investigate the role of hardware and software in managing, controlling and securing the movement of and access to data in networked digital systems (ACTDIK034)

Elaborations
  • explaining how an operating system manages the relationship between hardware, applications and system software
  • comparing the similarities and differences of two common operating systems
  • identifying how changes to the configuration of an operating system change the operation of hardware and software components in a networked digital system
  • explaining the role of hardware and software components in allowing people to interact with digital systems, for example using a mouse or touch pad or screen, speech, accelerometer
  • investigating the operation and use of robotic process control systems
  • explaining encryption of data as a means of protecting data, for example secret keys and ‘exclusive or’ (XOR) and hashing algorithms to digitally sign data
General capabilities
  • Literacy Literacy
  • Critical and creative thinking Critical and creative thinking
  • ICT capability Information and Communication Technology (ICT) capability
ScOT terms

Software,  Information management,  User interfaces,  Computers,  Transmission control protocols,  Internet

Video

How computers track your internet history

A computer keeps track of your internet browsing by using "cookies". Find out some of the good and bad ways your internet history can be used, and learn about "cookie" stories and how they work?

Video

Combatting hackers

Did you know that simply by being connected to the internet, your devices like computers, phones and TVs could be hacked? What are the implications of having your connected devices hacked? And why might some industry and governments want to encourage hackers within their own organisations?

Video

What happens to your online data?

There is an infinite amount of data online, but where does it all come from? Would you be surprised to learn that every time you go online you're contributing to the creation of new data? Find out how data is created, processed, stored and retrieved online.

Video

What are IP addresses?

Meet Vint Cerf, the co-creator of the internet! In this clip, Vint and software engineer Paola Mejia explore the way computer networks talk to each other. Find out what an IP address is and why it's similar to a street address. What's the domain name system? And how does your computer find out the IP address of a website ...

Online

Working together

In this lesson sequence students, through role-play and other activities, develop understandings of the role of hardware and software in managing, controlling and securing the movement of and access to data in networked digital systems.

Video

How is your personal information kept secret on the internet?

Lots of private data is exchanged over the internet. What are some examples? As Mia Epner explains, cryptography allows for the secure transfer of data online. How does encryption work? And what is a key? Today information is encrypted using 256 bit keys. This keeps information safe because it means there are way too many ...

Online

Systems thinking

Find out about Systems thinking. Use this topic from the Digital Technologies Hub to learn more, get ideas about how to teach about it, find out what other schools are doing and use the applications and games in the classroom.

Online

Connected via a network

This is a unit for Year 9 from the Scope and sequence resources from the DT Hub. The topic of digital systems is organised into four key elements. Use this flow of activities to plan and assess students against the relevant achievement standards. Students develop and understanding that digital systems must be robust and ...

Online

User interface

Find out about User interface. Use this topic from the Digital Technologies Hub to learn more, get ideas about how to teach about it, find out what other schools are doing and use the applications and games in the classroom.

Text

Cyber security analysis from The Conversation

This is a collection of articles about cyber security. It includes articles on cyber-espionaage, cyber crime, data security, government policy around cyber security, and international perspectives including from US, China and UK. The articles are written in plain language and are authored by experts from universities in ...

Video

How do computers get hacked?

What are some examples of cyber crime? Watch this clip to find out how viruses, denial of service attacks (DDoS) and phishing scams work. What is a botnet? And how are they used by hackers to bring down websites? Most of the time computers get hacked because of simple mistakes users make. What can users do to better protect ...

Online

Digital systems

Find out about Digital systems. Use this topic from the Digital Technologies Hub to learn more, get ideas about how to teach about it, find out what other schools are doing and use the applications and games in the classroom.

Online

Data: Controlled and secured

This is a unit for Year 10 from the Scope and sequence resources from the DT Hub. The topic of digital systems is organised into four key elements. Use this flow of activities to plan and assess students against the relevant achievement standards. Students explore how data can be secured through various methods such as ...

Online

A robot future

Have you ever met a robot? Visit the National Museum of Australia and you could meet Kasparov and Chesster, the robotic tour guides. They work using patented WiFi technology developed right here in Australia by the CSIRO. Let's explore the impact of robots and other WiFi innovations in science and in our lives today.

Text

Computing turns 60

This is a collection of eight articles that mark the 60th anniversary of the first computer in an Australian university. The series covers topics from the history of computing, its role in studying global health or species conservation, and how computers can help understand the brain.

Online

Keeping secrets

In this lesson sequence students examine cryptography and modern encryption methods for transmitting digital data securely. Encryption of data is a means of protecting data, one example being the use of secret and public keys.

Online

Talk to me!

In this lesson sequence that focuses on input devices, students are explore the possibilities and new types of functionality enabled by these technologies over time.

Text

The Conversation: Algorithm

A series of explanatory articles about how algorithms work, be it applied to chess, the spread of social media, art, conservation, or artificial intelligence. Articles are authored by recognised experts on the topic. Resource can be used to develop a broad understanding of algorithms and their role in everyday life. The ...

Video

Imagining other uses for robotics technology

It's cool to program robots to play football, but there are many more useful applications for programming robots to react to what they are seeing. What are some of the examples David McKinnon gives? Can you think of some more examples?

Audio

Jurij Semkiw remembers Australia's first computer, 2006

This is an edited sound recording of 77-year-old Jurij Semkiw talking about Australia's first computer, known as CSIRAC (pronounced 'sigh-rack'), which ran its first simple program in 1949. Semkiw, who was a maintenance engineer on CSIRAC, describes the excitement of being involved in a completely new technology. He also ...