Close message Scootle has stopped supporting resources that use the Adobe Flash plug-in from 18 Dec 2020. Learning paths that include these resources will have alerts to notify teachers and students that one or more of the resources will be unavailable. Click here for more info.

Search results

Text

Cyber security analysis from The Conversation

This is a collection of articles about cyber security. It includes articles on cyber-espionaage, cyber crime, data security, government policy around cyber security, and international perspectives including from US, China and UK. The articles are written in plain language and are authored by experts from universities in ...

Video

Australia's National Broadband Network

You might have heard about the NBN, or National Broadband Network. In this clip from October 2010, explore how a current affairs story is structured to explain current events and issues, such as the NBN, to its audience.

Video

Internet filters: a good idea?

Have you ever been confronted with something you didn't want to see while surfing the internet? When governments propose laws to filter the internet they can cause quite a stir, as shown in this clip from 2010. Many people think it's a great idea that will protect children, while others argue that such censorship limits ...

Video

How 'binary information' is communicated via the internet

Ever wondered how your photos, emails and messages get sent between devices? Watch as software engineer Tess Winlock explains what binary information is, and how it gets from one place to another. Can you explain what 'bits' are? How about 'bytes'? In the past, binary information was sent using physical systems like semaphore ...

Video

What makes the internet run reliably?

Watch this clip to see software engineer Lynn Root and co-creator of the internet Vint Cerf explain what keeps the internet running reliably. When information is sent on the internet, it is broken down into packets that are able to take a number of routes to get from one computer to another. Why might this be important? ...

Video

What happens to your online data?

There is an infinite amount of data online, but where does it all come from? Would you be surprised to learn that every time you go online you're contributing to the creation of new data? Find out how data is created, processed, stored and retrieved online.

Video

How do computers get hacked?

What are some examples of cyber crime? Watch this clip to find out how viruses, denial of service attacks (DDoS) and phishing scams work. What is a botnet? And how are they used by hackers to bring down websites? Most of the time computers get hacked because of simple mistakes users make. What can users do to better protect ...

Online

Cybersafety

Try some of these games, videos, activities and tools to help your students make the right decisions when using the Internet. These links are from the Digital Technologies Hub which is a website that supports Australian primary teachers, secondary teachers, students, school leaders and school communities in engaging with ...

Video

What are IP addresses?

Meet Vint Cerf, the co-creator of the internet! In this clip, Vint and software engineer Paola Mejia explore the way computer networks talk to each other. Find out what an IP address is and why it's similar to a street address. What's the domain name system? And how does your computer find out the IP address of a website ...

Video

Learning about computer languages

What happens when you type a web address or url into your computer and press enter? Watch this clip to find out! Computers and servers talk to each other in a language called HTTP. What are the messages they send and recieve mostly about? HTML is another language, one that tells a web browser how to make a web page look. ...

Video

How is your personal information kept secret on the internet?

Lots of private data is exchanged over the internet. What are some examples? As Mia Epner explains, cryptography allows for the secure transfer of data online. How does encryption work? And what is a key? Today information is encrypted using 256 bit keys. This keeps information safe because it means there are way too many ...

Online

Digital Technologies Hub

The Digital Technologies Hub is a website that supports Australian primary teachers, secondary teachers, students, school leaders and school communities in engaging with the Australian Curriculum: Digital Technologies. The hub provides scaffolded support for teachers and many of the resources will assist those getting started ...

Video

Combatting hackers

Did you know that simply by being connected to the internet, your devices like computers, phones and TVs could be hacked? What are the implications of having your connected devices hacked? And why might some industry and governments want to encourage hackers within their own organisations?

Audio

Evolving English: the role of social media

How many times have you heard teenagers berated for using the term 'like'? Yet this term has existed at least since 1586 when the term, 'Yon man is like out of his mind' was written into history. The truth is, our language is constantly evolving, with new words added, others dying off and some resurfacing again. In this ...

Video

Photonic Chip

This 12 minute video segment from Catalyst explains why photonics promises to remove bottlenecks and speed up the entire Internet by sending information with light rather than tardy little electrons. An excellent source of information on the current science for students of information systems.