Discussion
CategoryUnit 5
Patricia Polacco’s book ‘Bully’, suitable for grades 3-5 focusses on themes of friendship, popularity and cyberbullying. A great discussio..
Unit 4
To teach students about creating strong passwords ask them to create a phrase using a line from their favourite song. They can use the fir..
Unit 3
There are many ways humans can leave traces of information through the use of technologies. Other ways include using bluetooth or GPS func..
Task 5
5 code of ethic statements
- Integrity.
- Objectivity.
- Professional competence.
- Confidentiality.
- Professional behavior.
Yo..
Task 2
There are a few key differences between cyber security, cyber awareness and cyber safety. Cyber security protects our digital system from ..
Task 4
There are many scenarios of scams and in this case studennts should be concerned and taught not to click on pop ups as they can install vi..
Task 3
There are many dangers involved in posting online in which students must understand what they may result in.
Students must know that an..
Task 1
Cyber Security speaks to solutions that make you free from danger or threat. Cyber Awareness speaks to solutions that actively resist atta..
Unit 4
With the movement of hackers on the rise, cyber-attacks are becoming more frequent, destructive and intrusive. While scammers and hackers ..
Task 7: Visual Programming
We use visual timetables to explain to chn what is happening in that day.
“Task 6: Algorithms & Programming”.
Task 5
Option 3: The Digital Technologies curriculum encourages students to ‘create and share information in safe online environments’. What are ..
Task 4 Digital Systems
Option 1
Why has technology changed in computers so much over the years and how has the changes made things easier to peoples lives?
..
Task 3 Option 1
Lesson idea- Data Representation
Yr 1-4
Students collect data about their peers families. This then can be made into a graph using i..
Data Option 1
https://infogram.com/app/#/download/42509574-544c-4f7d-8620-db032a6320c9
Using infogram to represent family make up
Task 1
https://www.atascientific.com.au/technologies-forensic-sciences/
Forensic Scientists are using Phenom Desktop SEM to analyze evidence ..
Hello from NT
Hi My name is Rachael and I am a digital technology teacher in the NT. This is my 8th year of Teaching. My goals for this course are to ge..
Unit 3
There are many ways that information can be extracted online. Information that is shared about yourself online can allow you to be identif..
Unit 5
- Use a strong paraphrase password
- Do not show or tell anyone your password
- Teachers need to ensure any inappropriate websites are..
Unit 4