Filters

Clear all
Find a publisher

Showing 1000 results

Show
results per page

Quantum computers will revolutionise secure communications, and will make some current encryption methods obsolete. This activity, takes in cutting-edge research at the UK Quantum Technology hubs...

This set of activities introduces children to cryptography techniques, showing how the use of computers can make encryption quicker and more effective. Some notable examples of the use of encryption in history are mentioned, leading to the use of calculation machines for code-making and code-breaking.

A...

The ability to extract and summarise information is a very valuable skill for students to develop. This document is a report published in 2011 by the University of Cambridge. It investigates social impacts of technology use on different cultures. This resource could be used as a source document for students to scan...

...

STEM Learning has worked with IBM to increase the accessibility of its SkillsBuild e-learning resources. We have created guides to show which SkillsBuild content supports the specific learning objectives within a range of computing qualification specifications to help save teachers time when planning their...

This resource consists of two starter activities, the Cyber Security Diamond asks students to take 9 statements relating to Cyber Security and rank them (in a diamond layout) from most to least important. The Social Engineering Activity contains four definitions of types of social engineering activity and asks...

The Royal Academy of Engineering explores cyber control through this activity pack, looking at networks of connected devices. It covers:

  • The benefits of devices connected via the internet and scenarios to consider
  • The dangers of hacking
  • A programming task using the micro:bit using...

An interactive presentation on cyber security for GCSE students. The presentation follows the three strands of the GCSE syllabus, malicious code , social engineering and detect and prevent. Each of the sections has examples and definitions and can be navigated easily by the student. A pre...

This collection of resources is to support teams participating in the CyberCenturion competition.

CyberCenturion is a national cyber education initiative for 12-18 year-olds in the UK. The program is designed to excite, educate and motivate students to...

The CyberCenturion demo provides an introduction to the CyberCenturion competition and using virtual images. The...

This activity gives SEND pupils the opportunity to make up a dance routine and create a clear algorithm for a partner to follow. Pupils will learn to follow instructions, create a sequence of instructions for people to follow and to understand that the order of instructions is important. Dance move cards will...

Published by BEAM, this collection provides a selection of resources for teachers of primary mathematics. Included are a number of challenging problems and puzzles, open-ended investigations, cross-curricular activities, and resources to develop, practise and consolidate students' understanding of handling data...

The first video explains why computers use binary to store data.  The difference between a bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte and petabyte is explained.  These are known as measurements of capacity, or how much data can be stored either in memory or on secondary storage devices.

The...

This resource, aimed at lower ability Key Stage 4 students, introduces the concept of data compression, specifically Run Length Encoding. Students are asked to use an online tool to convert names into binary (ASCII), this binary data is then subjected to Run Length Encoding and encoded binary compared to the...

Using a spreadsheet as a grid of 'pixels', this computing activity teachers how 1's and 0's can store image data. The classroom exercises use images with increasing pixel resolution, looking at how this affects the clarity of the image. Moving from black-and-white images, the students then use grids of colour...

Pages