F-10 Curriculum (V8)
F-10 Curriculum (V9)
Your search returned 24 results
This unit of work focuses on developing student understanding of the importance of being track safe and the key message 'Stop, Look, Listen, Think'. It builds students' familiarity with the vocabulary and key concepts related to rail safety and provides differentiated activities for writers at different stages of development ...
This unit of work focuses on behaviour in and around tracks and rail infrastructure. Activities build subject-specific vocabulary and understanding of procedural text structures. Guided writing activities support students to develop a series of track safe procedures while a slogan writing activity focuses on effective ways ...
What are some examples of cyber crime? Watch this clip to find out how viruses, denial of service attacks (DDoS) and phishing scams work. What is a botnet? And how are they used by hackers to bring down websites? Most of the time computers get hacked because of simple mistakes users make. What can users do to better protect ...
This is a collection of articles about cyber security. It includes articles on cyber-espionaage, cyber crime, data security, government policy around cyber security, and international perspectives including from US, China and UK. The articles are written in plain language and are authored by experts from universities in ...
This unit of work focuses on the influences that impact on safe behaviours in and around tracks, platforms and trains. Guided activities build students' rail safety vocabulary including grammar and word building. Modelled writing activities support students to shape a research-based inquiry investigating factors that impact ...
Learn to construct lower case letters and digits. Choose a letter to practise and choose a pen colour. Copy the blobble characters as they trace out the strokes to write the letters. The red dot shows you where to start. Free when reviewed 5/6/15.
Create your own news broadcast, fun movie or your own themed TV shows using this video-creation tool. Videos can be saved in app or published via Telestory's moderated video channel 'ToonTube'. Free when reviewed 5/6/15.
In this lesson sequence students examine cryptography and modern encryption methods for transmitting digital data securely. Encryption of data is a means of protecting data, one example being the use of secret and public keys.
This learning object is designed around a series of videos with Lisa Shanahan, author, and Emma Quay, illustrator, including a reading experience of their collaborative work, Bear and Chook by the Sea. Taken as a whole, this sequence of lessons is a Stage 1 unit of work that results in students working in pairs to produce ...
A series of explanatory articles about how algorithms work, be it applied to chess, the spread of social media, art, conservation, or artificial intelligence. Articles are authored by recognised experts on the topic. Resource can be used to develop a broad understanding of algorithms and their role in everyday life. The ...
This iPad app provides an experience of Taronga Zoo's stunning Wild Asia rainforest trail. Guided by volunteer researcher Heidi Greentree and a GPS map, students create a PDF field report using the photographs they have taken, observations made and information collected. This can be emailed for further research and discussion ...
This iPad app is designed for Stage 2 students to use while on excursion in the Wild Australia area in Taronga Zoo Sydney and at the Taronga Western Plains Zoo, Dubbo. Students create a field report from observations and can email and review their editable summary poster for further study back at school. The app has intuitive ...
This is a collection of eight articles that mark the 60th anniversary of the first computer in an Australian university. The series covers topics from the history of computing, its role in studying global health or species conservation, and how computers can help understand the brain.
This scope and sequence unit explores the internal components of a digital device and their function. It explores computers connected via networks and how to use safe behaviours in a digital world.
This scope and sequence unit introduces students to common digital systems and builds an understanding of the role hardware and software play as students use digital systems for a purpose. They also learn about how to practice being safe users of digital systems.
This scope and sequence unit explores how the performance of computer hardware – such as CPU and RAM – is determined by its specifications, and how digital networks (wired and wireless) can also be compared in terms of requirements. Students are introduced to the concepts of network protocols and cryptography for ensuring ...
This PDF provides a list of suggested books or similar that identify and discuss key concepts, key ideas and related ways of thinking about Digital Technologies.
Embark on an exhilarating virtual adventure that will ignite young minds and equip them for the digital frontier. The Questacon Cyber Castle Challenge is a FREE Minecraft: Education game and resources to engage students in cyber security concepts and skills of the future.
This PDF and accompanying cards provide suggestions for ways in which students can identify and explain digital systems in their environment. Students determine whether digital systems include inputs, outputs, or both, and whether they feature software, hardware or peripheral devices. The resource includes useful links ...
This PDF provides suggestions for teaching digital systems to students in years F-2. The resource includes useful links to websites that provide information about digital systems as well as relevant teaching and learning material.