Showing 10 results

Show
results per page

The cs4fn magazine is a magazine on the fun side of all things to do with computer science. The authors write up computing research in a fun and accessible way that puts across their enthusiasm for the subject. Unplugged computing, computational thinking and practical applications of computers in many areas are...

This resource contains a Lesson Plan centred on the Computer Misuse Act and the choices students might have to make with respect to the act and peer pressure. It helps make clear to students what activities are considered criminal ones with respect to the act as well as asking them to rank criminal activity online...

"Computing isn't about computers" - this quote from one of the CS4FN authors, Paul Curzon, should give you an idea about the resources in this collection. Designed to inspire, these activities are about people, solving puzzles, creativity, changing the future and, most of all, having fun. Magic tricks, philosophy,...

This resource consists of a presentation and some supporting materials to enable students to research and create their own presentation around the ideas that there are Ethical, Legal and Environmental Issues surrounding the use of ICT in Business and Educational surroundings. The presentation sets the scene,...

Encryption is the key to information security. The key to modern encryption is that using only public information, a sender can lock up their message in such a way that it can only be unlocked by the intended recipient. The resource begins with a detailed explanation of the activity and how the process of...

This Challenge Pack, from the British Science Association, aims to give students aged 11-16 and their teachers and educators support to create a science, technology, engineering or maths (STEM) project that they can enter into the National Science + Engineering Competition.

Through creating a project, young...

Note - These lessons use the book 'Ready Player One' as a starting point, teachers will need to obtain a copy of the book before using the content, the school library may have a copy that could be used.

...

Cryptographic techniques enable information to be shared with other people, yet still maintain a surprisingly high level of privacy. This activity illustrates a situation where information is shared, and yet none of it is revealed: a group of students will calculate their average age without anyone having to reveal...

The Computing at School newsletter is published three times a year. It is full of practical ideas for teachers of computing in primary and secondary schools, with articles contributed by a number of CAS members. With input from teachers, academics, advisors and industry professionals, it provides a varied source of...

This activity shows how to accomplish a simple, but nevertheless seemingly impossible task -making a fair random choice by flipping a coin, between two people who don’t necessarily trust each other, and are connected only by a telephone. The resource begins with a detailed explanation of the activity and...