Listing all results (28)

Plan your own scheme of work - Jamble

2 different versions of editable schemes of work, supporting the quick planning of lessons.

CADW Castles North Wales

Cadw Castles in North Wales

G2G Communities CIC has produced a range of free STEAM related resources in partnership with Cadw for four Cadw Castles & Monuments in North Wales. You can access all the materials by clicking any of the module contents you’re interested in or by...

A Kindernet - digital telecomms exercise using children in lieu of electronics.

A Kindernet

A simple, low-cost, 45 minute, fun participation exercise for a group of children aged 9 to 16 (or older) which teaches them how digital images are transmitted from one device to another remote device e.g. mobile phones.  It covers all the essential stages and...

The Peruvian Coin Flip - Cryptographic Protocols

This activity shows how to accomplish a simple, but nevertheless seemingly impossible task -making a fair random choice by flipping a coin, between two people who don’t necessarily trust each other, and are connected only by a telephone. The resource begins with a detailed explanation of the activity and...

Primary Computing Lesson celebrating Ada Lovelace

Teach primary computing with history. This teacher-led activity involves conducting online research about Ada Lovelace a female pioneer in STEM and the world’s first computer programmer!

Children present their findings using basic HTML and CSS to create a multimedia webpage all about Ada.

More free...

STEM and STEAM for Cartography

Mini Map Makers is creating a Poster for STEM and STEAM for Cartography. How Cartography interacts with the elements! 

This is working progress and a draft copy will be out soon!

Conversations with Computers - The Turing Test

This activity aims to stimulate discussion on the question of whether computers can exhibit ’intelligence’, or are ever likely to do so in the future. Based on a pioneering computer scientist’s view of how one might recognize artificial intelligence if it ever appeared, it conveys something of what is currently...

Kid Krypto - public key encryption

Encryption is the key to information security. The key to modern encryption is that using only public information, a sender can lock up their message in such a way that it can only be unlocked by the intended recipient. The resource begins with a detailed explanation of the activity and how the process of...

Sharing Secrets - Information Hiding Protocols

Cryptographic techniques enable information to be shared with other people, yet still maintain a surprisingly high level of privacy. This activity illustrates a situation where information is shared, and yet none of it is revealed: a group of students will calculate their average age without anyone having to reveal...

What is Simulation?

This guide sheet from the Barefoot project explains simulation for the benefit of teachers, including what it is and why it is used. The use of simulations in the primary computing curriculum is explained, with links to the National Curriculum in each primary school key stage. The guide links to, and supports, a...

Pages

View all publishers