About this community
Welcome to the CSER Years 7 & 8 Digital Technologies MOOC! It’s great to have you all involved.
This Community supports the CSER Years..
Resources for teaching a topic related to cyber ethics
Chapter 8 – Security and Ethics
In this chapter, there are different types of cyber-attacks that the students need..
Creating strong passwords, passcodes or passphrases.
Currently, a password is like a key to unlock your room or house. Without a password, you can’t enter to your property or room that you ow..
Encoding and decoding
What other interesting examples of codes from history or the modern-day (digital or non-digital) can you find to inspire or support a less..
Cyber security, cyber awareness and cyber safety
Explain what you think are some of the key differences between cyber security, cyber awareness and cyber safety. To what extent are you te..
Cyber Security, Cyber Awareness and Cyber Safety
Cyber security, cyber awareness and cyber safety are very much related to each other. Sometimes, these terms are used interchangeably. Thr..
Introduction
I am a new teacher to the Digital Technologies curriculum and I’m excited to be involved with the University of Adelaide’s MOOC.
My Sharing
Hello classmates, you can read my full name from my post. You can call me Kasem as my last name. I think it will be easier to call my last..
Unit 6 – Task
See lesson plan in OneNote about developing and implementing Apps here.
Unit 5 – Task
See attached resource.
Unit 4 – Task
Data cleansing is the process of detecting and correcting data quality issues. It typically includes both automatic steps such as queries ..
You must be logged in to post a comment.