Search results

Listed under:  Technologies  >  Information and communication technologies  >  Telecommunications  >  Internet
Video

Photonic Chip

This 12 minute video segment from Catalyst explains why photonics promises to remove bottlenecks and speed up the entire Internet by sending information with light rather than tardy little electrons. An excellent source of information on the current science for students of information systems.

Audio

Big Ideas: Evolving English and the role of social media

How many times have you heard teenagers berated for using the term 'like'? Yet this term has existed at least since 1586 when the term, 'Yon man is like out of his mind' was written into history. The truth is, our language is constantly evolving, with new words added, others dying off and some resurfacing again. In this ...

Video

How 'binary information' is communicated via the internet

Ever wondered how your photos, emails and messages get sent between devices? Watch as software engineer Tess Winlock explains what binary information is, and how it gets from one place to another. Can you explain what 'bits' are? How about 'bytes'? In the past, binary information was sent using physical systems like semaphore ...

Video

What makes the internet run reliably?

Watch this clip to see software engineer Lynn Root and co-creator of the internet Vint Cerf explain what keeps the internet running reliably. When information is sent on the internet, it is broken down into packets that are able to take a number of routes to get from one computer to another. Why might this be important? ...

Text

Cyber security analysis from The Conversation

This is a collection of articles about cyber security. It includes articles on cyber-espionaage, cyber crime, data security, government policy around cyber security, and international perspectives including from US, China and UK. The articles are written in plain language and are authored by experts from universities in ...

Video

How do computers get hacked?

What are some examples of cyber crime? Watch this clip to find out how viruses, denial of service attacks (DDoS) and phishing scams work. What is a botnet? And how are they used by hackers to bring down websites? Most of the time computers get hacked because of simple mistakes users make. What can users do to better protect ...

Video

Learning about computer languages

What happens when you type a web address or url into your computer and press enter? Watch this clip to find out! Computers and servers talk to each other in a language called HTTP. What are the messages they send and recieve mostly about? HTML is another language, one that tells a web browser how to make a web page look. ...

Text

Years 5–6: Digital systems, safety and security

This scope and sequence unit explores the internal components of a digital device and their function. It explores computers connected via networks and how to use safe behaviours in a digital world.

Text

Years 7–8: Hardware, networks and cyber threats

This scope and sequence unit explores how the performance of computer hardware – such as CPU and RAM – is determined by its specifications, and how digital networks (wired and wireless) can also be compared in terms of requirements. Students are introduced to the concepts of network protocols and cryptography for ensuring ...

Text

Years 9–10: Cybersecurity

This unit considers how and why data is kept secure on the internet. Students refresh and build on their understanding of network hardware and internet protocols. They examine the Australian Privacy Principles and their implications for individuals and organisations, providing a rationale to explore how cyberthreats can ...

Assessment

Network infographic

Throughout the lesson sequence, students keep and maintain a reflection log with key content to inform the development of an infographic.