Uncategorized
CategoryResources for teaching a topic related to cyber ethics
Chapter 8 – Security and Ethics
In this chapter, there are different types of cyber-attacks that the students need..
Creating strong passwords, passcodes or passphrases.
Currently, a password is like a key to unlock your room or house. Without a password, you can’t enter to your property or room that you ow..
Encoding and decoding
What other interesting examples of codes from history or the modern-day (digital or non-digital) can you find to inspire or support a less..
The differences bewteen cyber security, cyber awareness and cyber safety
The differences between cyber security, cy awareness and cyber safety: Cyber security is protecting computers, networks, programs and data..
Task 1 Option 2
https://brainhub.eu/library/digital-innovation-examples/
This website outlines some companies who are using innovative digital tools in..
Task 1: AI
#SecondaryAI
I am hoping to learn about how to explain AI to my students and its current use in the world that we are all a part of.
Digital Technologies in Society (Task 2)
Understanding Functions (Task 1)
an example of a daily activity consisting of multiple steps that could be replaced by a function
if water is boiled {
teabag in ;
..
Unit 3 Task 3 – Lesson idea for an app
Hi all,
My lesson idea for an app revolves around designing a companion app to our schools massive open fair day. The day includes stal..
Rick Walkerâ–¸ Years 7 – 8 Digital Technologies MOOC
The drawing of the flowchart is usually a problem for most students, as a mistake means a complete redraw. I have created a series of basic flowchart shapes, on laminated sheets and put a small magnet on the back of them. The students can then use a soluble OHP pen to fill in the details, but easily build the flowchart on the board, and move the pieces and review very easily. The whole structure is easy to see as it is much larger than on a piece of paper and less frustration on the rewrites.
You must be logged in to post a comment.