F-10 Curriculum (V8)
F-10 Curriculum (V9)
Tools and resources
Related links
Your search returned 19 results
This cross-curriculum resource is designed to introduce Stage 2, 3 and 4 students to the design thinking process through a series of videos and interactive activities. This resource is also downloadable as a SCORM file: the downloaded version will only work if you upload it to a webserver, such as Moodle or Canvas.
In this lesson students explore slalom sports and how competitors maximise speed when completing a course. Students research different slalom sports and then share their findings with the class. Students investigate the impact of distance and friction on time to complete a course through digital and unplugged activities. ...
Embark on an exhilarating virtual adventure that will ignite young minds and equip them for the digital frontier. The Questacon Cyber Castle Challenge is a FREE Minecraft: Education game and resources to engage students in cyber security concepts and skills of the future.
In this lesson, students are asked to present a poem as a visual illusion. They explore holograms and visual illusions, and then delve into the mechanics of poetry construction by exploring the poetry of Banjo Paterson. They write their own poem or recite a poem and create a hologram illusion of themselves reciting a poem. ...
In this lesson, students explore the life, work and times of Rube Goldberg. The lesson uses Rube Goldberg’s work to teach students about simple machines, how they function and their design principles. Working in groups, the students then design and create a Rube Goldberg machine that can complete a simple task. Students ...
This is a collection of eight articles that mark the 60th anniversary of the first computer in an Australian university. The series covers topics from the history of computing, its role in studying global health or species conservation, and how computers can help understand the brain.
Listen as David McKinnon from UNSW describes some of the skills that are useful to have if you want to program robots. David explains an activity that exercises problem solving skills. Why don't you try doing it? Look at a map and find some towns that are close to yours. Use the scale on the map to work out the distances ...
Grab a deck of cards and a bunch of friends and create your own card game. What sort of rules will you decide on? Get a pen and some paper out and brainstorm some possibilities. You might decide on something like 'If I draw a red card, I get a point' and 'If I draw a black card, you get a point.' What other rules can you ...
This is a unit of work comprising five sequences of activities in which students investigate cattle and sheep production systems and present a documentary, song, poster or brochure in response. In the first sequence, students engage with the industries, sources of information and possible forms of response. In the second ...
Meet Vint Cerf, the co-creator of the internet! In this clip, Vint and software engineer Paola Mejia explore the way computer networks talk to each other. Find out what an IP address is and why it's similar to a street address. What's the domain name system? And how does your computer find out the IP address of a website ...
Watch this clip to see software engineer Lynn Root and co-creator of the internet Vint Cerf explain what keeps the internet running reliably. When information is sent on the internet, it is broken down into packets that are able to take a number of routes to get from one computer to another. Why might this be important? ...
A series of articles exploring the concept of innovation, including how governments can promote innovation, investment, science, and technology. The articles are authored by experts from universities in Australia and around the world. The collection is regularly updated with new contributions.The articles are clearly written ...
Lots of private data is exchanged over the internet. What are some examples? As Mia Epner explains, cryptography allows for the secure transfer of data online. How does encryption work? And what is a key? Today information is encrypted using 256 bit keys. This keeps information safe because it means there are way too many ...
What are some examples of cyber crime? Watch this clip to find out how viruses, denial of service attacks (DDoS) and phishing scams work. What is a botnet? And how are they used by hackers to bring down websites? Most of the time computers get hacked because of simple mistakes users make. What can users do to better protect ...
Meet Kevin Systrom and Piper Hanson as they explain how digital images work. What are pixels, those tiny dots of light, made from? How are colours created and represented? What does Kevin say about the way mathematical functions are used to create different image filters. What is the difference between image resolution ...
What happens when you type a web address or url into your computer and press enter? Watch this clip to find out! Computers and servers talk to each other in a language called HTTP. What are the messages they send and recieve mostly about? HTML is another language, one that tells a web browser how to make a web page look. ...
This lesson plan introduces students to the practice and applications of using drones to take aerial photographs. Students learn safety procedures regarding the use of drones then capture images of simulated disaster areas. Students observe the use of drones in science and technology-based endeavours and suggest new applications ...
Ever wondered how your photos, emails and messages get sent between devices? Watch as software engineer Tess Winlock explains what binary information is, and how it gets from one place to another. Can you explain what 'bits' are? How about 'bytes'? In the past, binary information was sent using physical systems like semaphore ...
This integrated lesson sequence will allow students to explore how and why people choose to remember significant events of the past, specifically Anzac Day and the Legend of the ANZACs.