Close message Scootle has stopped supporting resources that use the Adobe Flash plug-in from 18 Dec 2020. Learning paths that include these resources will have alerts to notify teachers and students that one or more of the resources will be unavailable. Click here for more info.

Digital technologies / Year 9 and 10 / Digital Technologies Processes and Production Skills

View on Australian Curriculum website Australian Curriculum, Assessment and Reporting Authority
Curriculum content descriptions

Develop techniques for acquiring, storing and validating quantitative and qualitative data from a range of sources, considering privacy and security requirements (ACTDIP036)

Elaborations
  • developing strategies and techniques for capturing accurate and usable qualitative and quantitative data of different formats, for example using text entry for open-ended questions to acquire qualitative data; using radio buttons or checkboxes for closed questions to acquire quantitative data
  • identifying strengths and weaknesses of collecting data using different methods, for example online surveys, face-to-face interviews, phone interviews, observation, blog entries in response to a posting, phone logs, browser history and online webcam systems
  • developing strategies to ensure the privacy and security of survey data, for example using numbers rather than names as identifiers; password protecting files to reduce risks of modifying data and using CAPTCHAâ„¢ to confirm human responses
  • extracting specific data from an external source and storing it in a format that is more useful for analysis, for example combining mapping data from multiple electronic data sets to build a composite representation
General capabilities
  • Literacy Literacy
  • Critical and creative thinking Critical and creative thinking
  • ICT capability Information and Communication Technology (ICT) capability
  • Ethical understanding Ethical understanding
ScOT terms

Security,  Data analysis,  Information management,  Collation,  Data storage,  Information protection

Refine by resource type

Refine by year level


Refine by learning area


Refine by topic

Related topic * No suggestions
Video

How do computers get hacked?

What are some examples of cyber crime? Watch this clip to find out how viruses, denial of service attacks (DDoS) and phishing scams work. What is a botnet? And how are they used by hackers to bring down websites? Most of the time computers get hacked because of simple mistakes users make. What can users do to better protect ...

Text

Cyber security analysis from The Conversation

This is a collection of articles about cyber security. It includes articles on cyber-espionaage, cyber crime, data security, government policy around cyber security, and international perspectives including from US, China and UK. The articles are written in plain language and are authored by experts from universities in ...

Online

Digital Technologies Hub

The Digital Technologies Hub is a website that supports Australian primary teachers, secondary teachers, students, school leaders and school communities in engaging with the Australian Curriculum: Digital Technologies. The hub provides scaffolded support for teachers and many of the resources will assist those getting started ...