Filters
Clear allSubject
Age range
Type
- Activity sheet (9) Apply Activity sheet filter
- Group work (1) Apply Group work filter
- Information sheet (2) Apply Information sheet filter
- Presentation (1) Apply Presentation filter
- Teacher guidance (11) Apply Teacher guidance filter
- Include Physical Resources (22945) Apply Include Physical Resources filter
Showing 17 results
This resource has been developed by the Royal Society of Edinburgh (RSE) and the BCS Academy of Computing. It will seek to consolidate learners’ understanding of modern information systems concepts, through study of web technologies, including HTML.
Whilst this resource has been designed to be used as a...
The cs4fn magazine is a magazine on the fun side of all things to do with computer science. The authors write up computing research in a fun and accessible way that puts across their enthusiasm for the subject. Unplugged computing, computational thinking and practical applications of computers in many areas are...
"Computing isn't about computers" - this quote from one of the CS4FN authors, Paul Curzon, should give you an idea about the resources in this collection. Designed to inspire, these activities are about people, solving puzzles, creativity, changing the future and, most of all, having fun. Magic tricks, philosophy,...
This booklet is an example of a programme of study for ICT and Computing produced by Matt Britland. The programme contains details of the ICT strands and aims and fourteen original projects for students in years 7-9. Each project includes a link to a presentation that...
A class set of 15 different e-safety scenarios for students to act out in. This could be used in a PSHE or computing lesson to reinforce ways to keep safe online.
Katrina Morris is the author of this resource.
These resources constitute a range of infographics (posters) about various...
This lesson activity introduces children to HTML. They learn that webpages are constructed using HTML and investigate the code used to create an example website. They then use the free 'web remix' software, Mozilla X-Ray Goggles, to change aspects of the page. An extension activity encourages remixing of popular...
Encryption is the key to information security. The key to modern encryption is that using only public information, a sender can lock up their message in such a way that it can only be unlocked by the intended recipient. The resource begins with a detailed explanation of the activity and how the process of...
This resource provides an overview for a lesson where students in Year 7 choose a blogging platform (if they are allowed to choose for themselves this comparing and contrasting the various offerings could be a lesson in itself), and set up a blog. They are also given various prompts to help with evaluating what...
This Challenge Pack, from the British Science Association, aims to give students aged 11-16 and their teachers and educators support to create a science, technology, engineering or maths (STEM) project that they can enter into the National Science + Engineering Competition.
Through creating a project, young...
A scheme of work which although aimed at the upper end of Key Stage 2, is also suitable for delivery at the bottom end of Key Stage 3. The scheme contains a whole host of unplugged and plugged activities surrounding networks and communications, including the difference between the internet and the world wide web,...
Students would find this Computing at School community resource useful as a revision resource for the topics of networks and the internet. It is suitable to be issued as a sequence of homework tasks.
These materials have been developed to give teachers a creative and engaging set of resources for use in the classroom, supplying the tools needed to raise awareness of key issues around personal information.
The primary school lesson plans explore what is meant by personal information, and give students the...
This Barefoot Computing primary school resource helps children to Understand how search engines work. By acting as a ‘web crawler’ and collecting information across a small selection of web pages, they learn what in data is indexed by search engines and how this is used when a search query is received. As well as...
Cryptographic techniques enable information to be shared with other people, yet still maintain a surprisingly high level of privacy. This activity illustrates a situation where information is shared, and yet none of it is revealed: a group of students will calculate their average age without anyone having to reveal...