Patricia Polacco’s book ‘Bully’, suitable for grades 3-5 focusses on themes of friendship, popularity and cyberbullying. A great discussio..
To teach students about creating strong passwords ask them to create a phrase using a line from their favourite song. They can use the fir..
There are many ways humans can leave traces of information through the use of technologies. Other ways include using bluetooth or GPS func..
5 code of ethic statements
- Professional competence.
- Professional behavior.
There are a few key differences between cyber security, cyber awareness and cyber safety. Cyber security protects our digital system from ..
There are many scenarios of scams and in this case studennts should be concerned and taught not to click on pop ups as they can install vi..
There are many dangers involved in posting online in which students must understand what they may result in.
Students must know that an..
Cyber Security speaks to solutions that make you free from danger or threat. Cyber Awareness speaks to solutions that actively resist atta..
With the movement of hackers on the rise, cyber-attacks are becoming more frequent, destructive and intrusive. While scammers and hackers ..
We use visual timetables to explain to chn what is happening in that day.
Option 3: The Digital Technologies curriculum encourages students to ‘create and share information in safe online environments’. What are ..
Why has technology changed in computers so much over the years and how has the changes made things easier to peoples lives?
Lesson idea- Data Representation
Students collect data about their peers families. This then can be made into a graph using i..
Using infogram to represent family make up
Forensic Scientists are using Phenom Desktop SEM to analyze evidence ..
Hi My name is Rachael and I am a digital technology teacher in the NT. This is my 8th year of Teaching. My goals for this course are to ge..
There are many ways that information can be extracted online. Information that is shared about yourself online can allow you to be identif..
- Use a strong paraphrase password
- Do not show or tell anyone your password
- Teachers need to ensure any inappropriate websites are..