F-10 Curriculum (V8)
F-10 Curriculum (V9)
Your search returned 168 results
This unit of work focuses on developing student understanding of the importance of being track safe and the key message 'Stop, Look, Listen, Think'. It builds students' familiarity with the vocabulary and key concepts related to rail safety and provides differentiated activities for writers at different stages of development ...
Find out about Systems thinking. Use this topic from the Digital Technologies Hub to learn more, get ideas about how to teach about it, find out what other schools are doing and use the applications and games in the classroom.
In this lesson sequence students, through role-play and other activities, develop understandings of the role of hardware and software in managing, controlling and securing the movement of and access to data in networked digital systems.
This iPad app is designed for Stage 2 students to use while on excursion in the Wild Australia area in Taronga Zoo Sydney and at the Taronga Western Plains Zoo, Dubbo. Students create a field report from observations and can email and review their editable summary poster for further study back at school. The app has intuitive ...
This is a collection of eight articles that mark the 60th anniversary of the first computer in an Australian university. The series covers topics from the history of computing, its role in studying global health or species conservation, and how computers can help understand the brain.
This iPad app provides an experience of Taronga Zoo's stunning Wild Asia rainforest trail. Guided by volunteer researcher Heidi Greentree and a GPS map, students create a PDF field report using the photographs they have taken, observations made and information collected. This can be emailed for further research and discussion ...
This is a collection of articles about cyber security. It includes articles on cyber-espionaage, cyber crime, data security, government policy around cyber security, and international perspectives including from US, China and UK. The articles are written in plain language and are authored by experts from universities in ...
This unit of work focuses on behaviour in and around tracks and rail infrastructure. Activities build subject-specific vocabulary and understanding of procedural text structures. Guided writing activities support students to develop a series of track safe procedures while a slogan writing activity focuses on effective ways ...
This unit of work focuses on the influences that impact on safe behaviours in and around tracks, platforms and trains. Guided activities build students' rail safety vocabulary including grammar and word building. Modelled writing activities support students to shape a research-based inquiry investigating factors that impact ...
Find out about User interface. Use this topic from the Digital Technologies Hub to learn more, get ideas about how to teach about it, find out what other schools are doing and use the applications and games in the classroom.
Learn to construct lower case letters and digits. Choose a letter to practise and choose a pen colour. Copy the blobble characters as they trace out the strokes to write the letters. The red dot shows you where to start. Free when reviewed 5/6/15.
What are some examples of cyber crime? Watch this clip to find out how viruses, denial of service attacks (DDoS) and phishing scams work. What is a botnet? And how are they used by hackers to bring down websites? Most of the time computers get hacked because of simple mistakes users make. What can users do to better protect ...
Meet Vint Cerf, the co-creator of the internet! In this clip, Vint and software engineer Paola Mejia explore the way computer networks talk to each other. Find out what an IP address is and why it's similar to a street address. What's the domain name system? And how does your computer find out the IP address of a website ...
Find out about Digital systems. Use this topic from the Digital Technologies Hub to learn more, get ideas about how to teach about it, find out what other schools are doing and use the applications and games in the classroom.
Lots of private data is exchanged over the internet. What are some examples? As Mia Epner explains, cryptography allows for the secure transfer of data online. How does encryption work? And what is a key? Today information is encrypted using 256 bit keys. This keeps information safe because it means there are way too many ...
Create your own news broadcast, fun movie or your own themed TV shows using this video-creation tool. Videos can be saved in app or published via Telestory's moderated video channel 'ToonTube'. Free when reviewed 5/6/15.
In this sequence of lessons explore how to help students understand the elements of a digital system including hardware, software and some commonly used peripheral devices. Investigate how these elements work together.
In this lesson sequence that focuses on input devices, students are explore the possibilities and new types of functionality enabled by these technologies over time.
In this sequence of lessons students grow a plant from seed, capturing each step and decision as an algorithmic process and recording data for future learning.
In this lesson sequence students examine cryptography and modern encryption methods for transmitting digital data securely. Encryption of data is a means of protecting data, one example being the use of secret and public keys.