Listing all results (18)

Ryde Academy STEM Blog

For some inspiration and to see how we have trialled and refined embedding STEM into the curriculum, please feel free to visit the blog I have created. 

www.rydestem.wordpress.com

 

Ready Player One - Introducing EMSL aspects of the curriculum

Note - These lessons use the book 'Ready Player One' as a starting point, teachers will need to obtain a copy of the book before using the content, the school library may have a copy that could be used.

...

The Peruvian Coin Flip - Cryptographic Protocols

This activity shows how to accomplish a simple, but nevertheless seemingly impossible task -making a fair random choice by flipping a coin, between two people who don’t necessarily trust each other, and are connected only by a telephone. The resource begins with a detailed explanation of the activity and...

Factors affecting the use of ICT

This resource consists of a presentation and some supporting materials to enable students to research and create their own presentation around the ideas that there are Ethical, Legal and Environmental Issues surrounding the use of ICT in Business and Educational surroundings. The presentation sets the scene,...

Computer Misuse Act and Cyber Crime

This resource contains a Lesson Plan centred on the Computer Misuse Act and the choices students might have to make with respect to the act and peer pressure. It helps make clear to students what activities are considered criminal ones with respect to the act as well as asking them to rank criminal activity online...

Kid Krypto - public key encryption

Encryption is the key to information security. The key to modern encryption is that using only public information, a sender can lock up their message in such a way that it can only be unlocked by the intended recipient. The resource begins with a detailed explanation of the activity and how the process of...

Sharing Secrets - Information Hiding Protocols

Cryptographic techniques enable information to be shared with other people, yet still maintain a surprisingly high level of privacy. This activity illustrates a situation where information is shared, and yet none of it is revealed: a group of students will calculate their average age without anyone having to reveal...

Networks and communications unplugged

A scheme of work which although aimed at the upper end of Key Stage 2, is also suitable for delivery at the bottom end of Key Stage 3. The scheme contains a whole host of unplugged and plugged activities surrounding networks and communications, including the difference between the internet and the world wide web,...

Mr Britland's computing curriculum

This resource provides an overview for a lesson where students in Year 7 choose a blogging platform (if they are allowed to choose for themselves this comparing and contrasting the various offerings could be a lesson in itself), and set up a blog. They are also given various prompts to help with evaluating what...

Computing curriculum: projects for students in Years 7 - 9

This booklet is an example of a programme of study for ICT and Computing produced by Matt Britland. The programme contains details of the ICT strands and aims and fourteen original projects for students in years 7-9. Each project includes a link to a presentation that can be used by teachers and by students. The...

Pages

View all publishers