Showing 21 results

Show
results per page

Note - These lessons use the book 'Ready Player One' as a starting point, teachers will need to obtain a copy of the book before using the content, the school library may have a copy that could be used.

...

Cryptographic techniques enable information to be shared with other people, yet still maintain a surprisingly high level of privacy. This activity illustrates a situation where information is shared, and yet none of it is revealed: a group of students will calculate their average age without anyone having to reveal...

The Computing at School newsletter is published three times a year. It is full of practical ideas for teachers of computing in primary and secondary schools, with articles contributed by a number of CAS members. With input from teachers, academics, advisors and industry professionals, it provides a varied source of...

This resource contains two sets of triominoes, based around the theme of internet security. A simple set with only 4 cards, where three definitions and their key words need to be matched. The set also has two extra definitions and key words to act as distractors from the actual answers, an extension might be to get...

This activity shows how to accomplish a simple, but nevertheless seemingly impossible task -making a fair random choice by flipping a coin, between two people who don’t necessarily trust each other, and are connected only by a telephone. The resource begins with a detailed explanation of the activity and...

This lesson focuses on the reliability of computer systems, and specifically how this applies in the case of self driving cars, and what some of the implications might be if this reliability is not demonstrated. Students begin by...

Pages