Showing 25 results

Show
results per page

In this resource from the Construction Youth Trust, students are asked to work with percentage and decimal calculations when exploring the financial accounts of a small business. The materials have been written to help a non-teaching STEM professional to work with students in an educational setting.

The...

The cs4fn magazine is a magazine on the fun side of all things to do with computer science. The authors write up computing research in a fun and accessible way that puts across their enthusiasm for the subject. Unplugged computing, computational thinking and practical applications of computers in many areas are...

This resource contains a Lesson Plan centred on the Computer Misuse Act and the choices students might have to make with respect to the act and peer pressure. It helps make clear to students what activities are considered criminal ones with respect to the act as well as asking them to rank criminal activity online...

"Computing isn't about computers" - this quote from one of the CS4FN authors, Paul Curzon, should give you an idea about the resources in this collection. Designed to inspire, these activities are about people, solving puzzles, creativity, changing the future and, most of all, having fun. Magic tricks, philosophy,...

This booklet is an example of a programme of study for ICT and Computing produced by Matt Britland. The programme contains details of the ICT strands and aims and fourteen original projects for students in years 7-9. Each project includes a link to a presentation that...

This resource consists of two starter activities, the Cyber Security Diamond asks students to take 9 statements relating to Cyber Security and rank them (in a diamond layout) from most to least important. The Social Engineering Activity contains four definitions of types of social engineering activity and asks...

In this resource, the students are asked to look at various aspects of data security. In part this covers cyber security but it also looks at data integrity and ensuring that users data does not become corrupt through various means. There are a variety of activities provided, and all of the necessary resources are...

A class set of 15 different e-safety scenarios for students to act out in. This could be used in a PSHE or computing lesson to reinforce ways to keep safe online.

Katrina Morris is the author of this resource.

This resource consists of a presentation and some supporting materials to enable students to research and create their own presentation around the ideas that there are Ethical, Legal and Environmental Issues surrounding the use of ICT in Business and Educational surroundings. The presentation sets the scene,...

These resources constitute a range of infographics (posters) about various...

Encryption is the key to information security. The key to modern encryption is that using only public information, a sender can lock up their message in such a way that it can only be unlocked by the intended recipient. The resource begins with a detailed explanation of the activity and how the process of...

This resource provides an overview for a lesson where students in Year 7 choose a blogging platform (if they are allowed to choose for themselves this comparing and contrasting the various offerings could be a lesson in itself), and set up a blog. They are also given various prompts to help with evaluating what...

Developed by the National Centre for Computing Education, these question banks can be used with key stage 3 computing and GCSE computer science students.

The question banks linked below focus on safety and security

...

This Challenge Pack, from the British Science Association, aims to give students aged 11-16 and their teachers and educators support to create a science, technology, engineering or maths (STEM) project that they can enter into the National Science + Engineering Competition.

Through creating a project, young...

A scheme of work which although aimed at the upper end of Key Stage 2, is also suitable for delivery at the bottom end of Key Stage 3. The scheme contains a whole host of unplugged and plugged activities surrounding networks and communications, including the difference between the internet and the world wide web,...

Pages