Listing all results (27)

Networks Role Play -Packet Routing

This resource contains some rules for an unplugged networking activity to model how routers and networks deal with transmitting packets of data. The activity is designed for 6 people to act as routers, who apply the routing rules to packets of data. There are 4 end points which send and receive packets according to...

Computer Misuse Act and Cyber Crime

This resource contains a Lesson Plan centred on the Computer Misuse Act and the choices students might have to make with respect to the act and peer pressure. It helps make clear to students what activities are considered criminal ones with respect to the act as well as asking them to rank criminal activity online...

Data Security

In this resource, the students are asked to look at various aspects of data security. In part this covers cyber security but it also looks at data integrity and ensuring that users data does not become corrupt through various means. There are a variety of activities provided, and all of the necessary resources are...

System Security - Tarsia Creator

This resource contains two sets of triominoes, based around the theme of internet security. A simple set with only 4 cards, where three definitions and their key words need to be matched. The set also has two extra definitions and key words to act as distractors from the actual answers, an extension might be to get...

Drawing a network diagram

This resource contains a presentation to use as the starting point for a lesson on drawing a diagram of the school network. It features alternate slides depending on whether a tour of the school network infrastructure is available or not. There is an example of a computer suite in diagrammatic form and suggestions...

Kid Krypto - public key encryption

Encryption is the key to information security. The key to modern encryption is that using only public information, a sender can lock up their message in such a way that it can only be unlocked by the intended recipient. The resource begins with a detailed explanation of the activity and how the process of...

Sharing Secrets - Information Hiding Protocols

Cryptographic techniques enable information to be shared with other people, yet still maintain a surprisingly high level of privacy. This activity illustrates a situation where information is shared, and yet none of it is revealed: a group of students will calculate their average age without anyone having to reveal...

Personal information

These materials have been developed to give teachers a creative and engaging set of resources for use in the classroom, supplying the tools needed to raise awareness of key issues around personal information.

The primary school lesson plans explore what is meant by personal information, and give students the...

E-safety scenario cards

A class set of 15 different e-safety scenarios for students to act out in. This could be used in a PSHE or computing lesson to reinforce ways to keep safe online.

Katrina Morris is the author of this resource.

Networks and communications unplugged

A scheme of work which although aimed at the upper end of Key Stage 2, is also suitable for delivery at the bottom end of Key Stage 3. The scheme contains a whole host of unplugged and plugged activities surrounding networks and communications, including the difference between the internet and the world wide web,...

Pages

View all publishers