About this community
Welcome to the CSER Digital Technologies F-6 Community! It’s great to have you all involved.
This Community is for participants enrolle..
Unit 2 Task 1.
QUESTION: Explain what you think are some of the key differences between cyber security, cyber awareness and cyber safety. To what extent ..
Task 5: Option 1
With COVID-19 changing the landscape of education last year, I feel that it is a good area to investigate with our class. Online communica..
Ethics
1. While learning, ensure you are using an appropriate and safe site for searching.
2. Keep electronic communications professional in man..
MY toy
To help students understand the importance of a strong password and why they are needed and should be kept private, I have created a class..
Digital Footprint
Our digital footprint is all the information we leave behind when using the internet. Credit/Debit cards, connecting to wireless internet,..
The 3 Cybers.
Cyber Security is ensuring such networks are safe and secure to prevent attacks, to secure the safety of information and data, whereas Cyb..
Data-Patterns and Play Q3
An activity that could be introduced into a primary classroom setting that helps students distinguish the difference between private and p..
Task 3:
What other interesting examples of codes from history or the modern-day (digital or non-digital) can you find to inspire or support a less..
Task 2
- Explain what you think are some of the key differences between cyber security, cyber awareness and cyber safety. To what extent are yo..
Task 5: Option 1
I found this safety tips on how to use the internet safely and ethically to be a great resource for a classroom!
Task 4: Option 2
TIPS FOR SECURE PASSWORDS:
- Never use personal information such as your name, birthday, user name, or email address. This type of info..
Task 3 – Leaving traces
Every-time we use the internet we leave behind a trace of us using our device no matter if it’s our iPhone, iPad or tablet. Other ways we ..
Task 2: option 3
This lesson introduces primary students to o..
Unit 5
5-10 code of ethics statements for using technology in the classroom
- Don’t share your password
- Only go to websites that teachers a..
Unit 2: Task
Responding to
Explain what you think are some of the key differences between cyber security, cyber awareness and cyber safety. To what ..
Task 4: Option 2
The activity I am thinking of running is called “Future Person”. Get the students in pairs to draw the outline of a person on a sheet of p..
Task 2: Watch YouTube Video
https://www.youtube.com/watch?v=i7ovB72YXPc
Confused
I’m Terry, at 47 I am a total Neanderthal when it comes to technology. Pen and paper work well for me me and cut and paste should be done ..
Task 3: Option 3
I would use this workshop as a summative assessment for Grades 5/6. After a series of lessons on binary (background, purpose, understading..
Task 2: Data-Patterns and play
The task I have chosen is to summarise the class make up. This could be a good activity at the start of the year as a ‘get to know you’ ac..