Primary Catalogue
- Content Catalogue
- Primary
- Information and Communications Technology
×
Categories
- Civics and Citizenship
- Dance
- Design and Technology
- Drama
- Economics and Business
- English
- Food Technology
- General Capabilities
- Geography
- History
- Information and Communications Technology
- Languages
- Mathematics
- Music
- PDHPE
- Philosophy
- Religion
- Science
- Teacher Professional Development
- Visual Arts
- Aboriginal and Torres Strait Islander Histories and Cultures
- Agriculture
- Arts
- Civics and Citizenship
- Economics & Business
- English
- Geography
- History
- Languages
- Legal Studies
- Mathematics
- Personal Development
- Physical Education
- Psychology, Religion, Society & Culture
- Science
- Teacher Professional Development
- Technologies
- VET
- Agriculture
- Animal Care
- Anthropology and Sociology
- Arts and Culture
- Botany
- Business
- Construction and Property
- Education and Training
- Food Production
- Foundation Skills
- Health and Community Services
- Information and Communication Technology
- Manufacturing and Engineering
- Music
- Natural Resources and Mining
- Public Sector, Safety, and Defence
- Services
- Sports and Recreation
- Textiles, Clothing, and Footwear
- Transport and Logistics
- Video and Media Production
- Visual Arts, Crafts, and Design
Series: Information and Communications Technology
Avoiding Plagiarism: Bibliographies
Most of us always try to abide by the law. But did you know that just by submitting a research report, you could be committing a crime? That is, if you have used the work or intellectual property of others without acknowledging it. Plagiarism is...Show More
Most of us always try to abide by the law. But did you know that just by submitting a research report, you could be committing a crime? That is, if you have used the work or intellectual property of others without acknowledging it. Plagiarism is theft and it has serious consequences in schools and workplaces alike. The good news is that it’s not hard to research ethically and compile a bibliography that cites the work of others and strengthens your own! Show Less
Codes and Canines: Data Transmission and Storage
This creative programme takes students on a journey as Kat teaches them about data storage and communication. Powerful visual diagrams and animations are used throughout, in order to aid students’ understanding of the concepts that are...Show More
This creative programme takes students on a journey as Kat teaches them about data storage and communication. Powerful visual diagrams and animations are used throughout, in order to aid students’ understanding of the concepts that are explored. Students will learn about the role of binary in communicating and storing data, the standard units for file sizes, ASCII, and the differences between a variety of audio and visual file types. Show Less
Conditionals in Plain English
A presenter explains the use of conditionals within programming and how to teach it in the classroom
Copyright: Creative Commons and Attribution
A person’s intellectual property does not just refer to their ideas or words. It also means any images, music and videos that they have created. These types of works are protected online by a licence that tells us if and how we can use or...Show More
A person’s intellectual property does not just refer to their ideas or words. It also means any images, music and videos that they have created. These types of works are protected online by a licence that tells us if and how we can use or modify them. Understanding these licences is important not only for accessing great media for your research projects, but for making sure you're a respectful digital citizen. Show Less
Designing Programs with Flowcharts
Even the most experienced programmers use simple visual models and techniques to plan an effective algorithmic solution. In this video, students are introduced to the IPO model and flowcharts as two such methods to abstract unnecessary...Show More
Even the most experienced programmers use simple visual models and techniques to plan an effective algorithmic solution. In this video, students are introduced to the IPO model and flowcharts as two such methods to abstract unnecessary information in a problem, decompose it into smaller tasks, a recognise patterns and repetition, and program a series of simple steps for a computer to follow. Show Less
Designing Programs with Pseudocode
Using the analogy problem of washing dirty dishes, this video explores the IPO model and pseudocode as tools to guide computational thinking. Students of lower secondary digital technologies will understand how using pseudocode can be an...Show More
Using the analogy problem of washing dirty dishes, this video explores the IPO model and pseudocode as tools to guide computational thinking. Students of lower secondary digital technologies will understand how using pseudocode can be an accessible preliminary step in the design process before attempting to write a program in their chosen syntax. Show Less
How Computer Data Is Stored
Files are stored on a hard drive and are different sizes. In this clip, cartoon dinosaurs are used to demonstrate the size of files. It begins with bits that are made up of 1s and 0s. Eight bits make a byte, 1000 bytes make a kilobyte, 1000...Show More
Files are stored on a hard drive and are different sizes. In this clip, cartoon dinosaurs are used to demonstrate the size of files. It begins with bits that are made up of 1s and 0s. Eight bits make a byte, 1000 bytes make a kilobyte, 1000 kilobytes make a megabyte, 1000 megabytes makes a gigabyte and 1000 gigabytes make a terabyte. Show Less
How Computers Have Changed
This episode takes a brief journey through time, showing how computers have changed over the years. From the mechanical calculator invented by Charles Babbage and programmed by Ada Lovelace, to Alan Turing’s algorithms which are still used in...Show More
This episode takes a brief journey through time, showing how computers have changed over the years. From the mechanical calculator invented by Charles Babbage and programmed by Ada Lovelace, to Alan Turing’s algorithms which are still used in computers today, we see the evolution of what we know today as computers. We learn that coded messages were used during World War Two and the World Wide Web was invented in the 1990s! Show Less
How do Computers Think?
Introducing the concepts of abstraction, decomposition, algorithm design and pattern recognition, this video gets inside the ‘mind’ of a computer to understand why computational thinking this is a crucial first step to designing a successful...Show More
Introducing the concepts of abstraction, decomposition, algorithm design and pattern recognition, this video gets inside the ‘mind’ of a computer to understand why computational thinking this is a crucial first step to designing a successful program. Students and teachers of lower secondary digital technologies will find this an approachable foundation to computational thinking. Show Less
How Does the Internet Work?
How the Internet works is explained using the example of pigeons in their nests. All the pigeons, or computers, are connected together, and this is called a network. The rules of how the messages are sent are called protocols, and large messages...Show More
How the Internet works is explained using the example of pigeons in their nests. All the pigeons, or computers, are connected together, and this is called a network. The rules of how the messages are sent are called protocols, and large messages are broken into small parts called packets. Each pigeon’s nest has a number called an IP address, and these numbers can be found on a domain name server which is like a computer address book. Students will also learn that it is the routers that send the message to the computer. Show Less
How Search Works
Discover how search engines work through the example of a bear searching for honey in the woods. A search engine uses web crawlers to find information and send back a copy of each page. Algorithms are used to find the best match, and then the...Show More
Discover how search engines work through the example of a bear searching for honey in the woods. A search engine uses web crawlers to find information and send back a copy of each page. Algorithms are used to find the best match, and then the sites are ranked according to many factors, including how well the site is written, how frequently it is used and how popular it is. Students will learn that the algorithms are like the bees searching for the best honey. Show Less
How to Break Down Problems
Decomposition is the process of breaking down a problem into smaller parts. Mr Moose’s problem is that he is hungry, and students find out how he could break down and solve his problem.
How to Make a Computer Game
There are many different elements that go into making a computer game: deciding on the type of game, designing the pictures, animating the characters and choosing what will happen. We learn about why it's important to make sure that the game gets...Show More
There are many different elements that go into making a computer game: deciding on the type of game, designing the pictures, animating the characters and choosing what will happen. We learn about why it's important to make sure that the game gets progressively harder and rewards are given. The use of code and algorithms is explained. Show Less
How to Make an Animation
This programme provides a basic introduction to animation, demonstrating how lots of pictures that are slightly different are put together to make it look as if a picture is moving. Pictures of a cat are shown in slightly different positions and...Show More
This programme provides a basic introduction to animation, demonstrating how lots of pictures that are slightly different are put together to make it look as if a picture is moving. Pictures of a cat are shown in slightly different positions and when shown quickly one after the other, it looks like it is walking. Students will discover that animations can also be made using code! Show Less
How to Write Complex Programs
Complex programming is introduced using an example of a kangaroo that needs to have a drink without being eaten by a crocodile. The kangaroo needed to check that the crocodile was not near the water before she had a drink and she needed more than...Show More
Complex programming is introduced using an example of a kangaroo that needs to have a drink without being eaten by a crocodile. The kangaroo needed to check that the crocodile was not near the water before she had a drink and she needed more than one drink during the day. The kangaroo sequences steps that she needs to take to have a drink without the crocodile getting to her. She uses algorithms that include selection and a loop. Making sure that the steps are done in the correct order is important and so is repeating the algorithm. Show Less
Let's Build the Internet: Networking
In this animated programme, our character Sam shows students the basics of networking and data transmission. Engaging graphics are used to explain concepts clearly and visually, depicting how data is transmitted via cables and fibre optics, and...Show More
In this animated programme, our character Sam shows students the basics of networking and data transmission. Engaging graphics are used to explain concepts clearly and visually, depicting how data is transmitted via cables and fibre optics, and why switches and routers are important. Students will also learn about binary, LANs, WANs, and why protocols are used. Show Less
Loops in Plain English
A presenter explains that loops are a set of instructions which are carried out repeatedly and how they are used in the Kano coding classroom.
Online Databases
It is easy to feel overwhelmed when we perform a search online. Often, we get millions of results, only a fraction of which will be appropriate for our research. Enter: databases, and using them is simpler than you might think. This programme...Show More
It is easy to feel overwhelmed when we perform a search online. Often, we get millions of results, only a fraction of which will be appropriate for our research. Enter: databases, and using them is simpler than you might think. This programme explains how you can save time, frustration and level up your research skills by making the most of databases. Show Less
Online Research Skills
Search engines are a useful tool, but how can students get the best results from them? Join the fictional Professor Doogle as she looks at skills including: selecting and searching search engines and databases; using precise keywords; predicting...Show More
Search engines are a useful tool, but how can students get the best results from them? Join the fictional Professor Doogle as she looks at skills including: selecting and searching search engines and databases; using precise keywords; predicting expected results to assess credibility of the information, and assessing website credibility. This programme helps students develop a critical approach to conducting online research. Show Less
Ring! Wring!
Students read, sing and learn about technology and the earliest inventions, such as the wheel. They also gain appreciation for the importance of using technology respectfully.
This curriculum-aligned song targets outcomes of curriculum...Show More
Students read, sing and learn about technology and the earliest inventions, such as the wheel. They also gain appreciation for the importance of using technology respectfully.
This curriculum-aligned song targets outcomes of curriculum documents and supports and integrates classroom learning across key subject areas. Show Less
SMS
After Tom Thomas’ friend, Kayta, leaves her mobile phone at his apartment, he wants to read her text messages. Simka and Nolik know it’s wrong and try to stop him from reading messages that aren’t his to read. He also learns that when the...Show More
After Tom Thomas’ friend, Kayta, leaves her mobile phone at his apartment, he wants to read her text messages. Simka and Nolik know it’s wrong and try to stop him from reading messages that aren’t his to read. He also learns that when the power is off, or if something is blocking the battery, the phone and texts will not work. Show Less
Using Computers at Work
Students will watch some examples of how computers are used day to day by ordinary people. They are used in shops, for taking photographs, in sport, for making music and films, to help us to learn, in aeroplanes and for going into space. What do...Show More
Students will watch some examples of how computers are used day to day by ordinary people. They are used in shops, for taking photographs, in sport, for making music and films, to help us to learn, in aeroplanes and for going into space. What do you use your computer for? Show Less
Using the Catalogue
Our school and local libraries have a wealth of information to help us research just about any topic we can think of. But where do you start? Understanding online library catalogues, classification systems and signage is a fundamental library...Show More
Our school and local libraries have a wealth of information to help us research just about any topic we can think of. But where do you start? Understanding online library catalogues, classification systems and signage is a fundamental library skill that can mean the difference between hopelessly trawling the shelves and a quick, focused library search that leaves more time for research! Show Less
Variables in Plain English
A presenter explains what variables are in coding and gives some examples.
Welcome to Faceschool
"Welcome to Faceschool" follows thirteen-year-old Toby as he is introduced to a strange world of social media where its users are face-to-face but behave as if they were online.
With the guidance of Navigator Milly, Toby meets many unusual...Show More
"Welcome to Faceschool" follows thirteen-year-old Toby as he is introduced to a strange world of social media where its users are face-to-face but behave as if they were online.
With the guidance of Navigator Milly, Toby meets many unusual characters along the way and learns through their example, what behaviours to avoid, and what safety measures he can take in making sure his social media experience is a positive one.
After meeting and getting past characters that include The Anybodies, Me-Me’s, Fakers, Copy-Creeps, Keyboard Warriors and Keyboard Sheep, Toby must resist the horrible Trolls in joining Milly at the hangout of the Navigators - smart social media users who know how to stay safe online. Show Less