Filters
Clear allAge range
Showing 10 results
In this resource from the Construction Youth Trust, students are asked to work with percentage and decimal calculations when exploring the financial accounts of a small business. The materials have been written to help a non-teaching STEM professional to work with students in an educational setting.
The...
The cs4fn magazine is a magazine on the fun side of all things to do with computer science. The authors write up computing research in a fun and accessible way that puts across their enthusiasm for the subject. Unplugged computing, computational thinking and practical applications of computers in many areas are...
"Computing isn't about computers" - this quote from one of the CS4FN authors, Paul Curzon, should give you an idea about the resources in this collection. Designed to inspire, these activities are about people, solving puzzles, creativity, changing the future and, most of all, having fun. Magic tricks, philosophy,...
These resources constitute a range of infographics (posters) about various...
Encryption is the key to information security. The key to modern encryption is that using only public information, a sender can lock up their message in such a way that it can only be unlocked by the intended recipient. The resource begins with a detailed explanation of the activity and how the process of...
This Challenge Pack, from the British Science Association, aims to give students aged 11-16 and their teachers and educators support to create a science, technology, engineering or maths (STEM) project that they can enter into the National Science + Engineering Competition.
Through creating a project, young...
This article from the CS4FN Magazine, looks into the ideas surrounding Intellectual Property, copyright, copyleft and patents and how these all apply (or don't) in the realm of computer programming and software. These ideas can be used as...
Cryptographic techniques enable information to be shared with other people, yet still maintain a surprisingly high level of privacy. This activity illustrates a situation where information is shared, and yet none of it is revealed: a group of students will calculate their average age without anyone having to reveal...
This resource contains two sets of triominoes, based around the theme of internet security. A simple set with only 4 cards, where three definitions and their key words need to be matched. The set also has two extra definitions and key words to act as distractors from the actual answers, an extension might be to get...
This activity shows how to accomplish a simple, but nevertheless seemingly impossible task -making a fair random choice by flipping a coin, between two people who don’t necessarily trust each other, and are connected only by a telephone. The resource begins with a detailed explanation of the activity and...