Filters
Clear allSubject
- Careers (80) Apply Careers filter
- Climate Change (3) Apply Climate Change filter
- Creative arts and media (9) Apply Creative arts and media filter
- Cross curricular (64) Apply Cross curricular filter
- Design and technology (275) Apply Design and technology filter
- Engineering (164) Apply Engineering filter
- Food Preparation and Nutrition (4) Apply Food Preparation and Nutrition filter
- Leadership (2) Apply Leadership filter
- Mathematics (223) Apply Mathematics filter
- Personal development (5) Apply Personal development filter
- Psychology (1) Apply Psychology filter
- Science (250) Apply Science filter
- Space (4) Apply Space filter
- STEM Ambassadors (5) Apply STEM Ambassadors filter
- STEM Clubs (19) Apply STEM Clubs filter
Age range
Type
- Activity sheet (224) Apply Activity sheet filter
- Article (88) Apply Article filter
- Assessment (3) Apply Assessment filter
- Audio (5) Apply Audio filter
- Data set (3) Apply Data set filter
- Demonstration (4) Apply Demonstration filter
- Experiment (3) Apply Experiment filter
- Game (8) Apply Game filter
- Group work (9) Apply Group work filter
- Image (43) Apply Image filter
- Information sheet (55) Apply Information sheet filter
- Interactive resource (13) Apply Interactive resource filter
- Open-ended task (1) Apply Open-ended task filter
- Poster (13) Apply Poster filter
- Presentation (116) Apply Presentation filter
- Quiz (2) Apply Quiz filter
- Research (43) Apply Research filter
- Self assessment (1) Apply Self assessment filter
- Simulation (2) Apply Simulation filter
- Teacher guidance (343) Apply Teacher guidance filter
- Textbook (24) Apply Textbook filter
- Video (70) Apply Video filter
- Include Physical Resources (26285) Apply Include Physical Resources filter
Showing 1011 results
This set of activities introduces children to cryptography techniques, showing how the use of computers can make encryption quicker and more effective. Some notable examples of the use of encryption in history are mentioned, leading to the use of calculation machines for code-making and code-breaking.
A...
The ability to extract and summarise information is a very valuable skill for students to develop. This document is a report published in 2011 by the University of Cambridge. It investigates social impacts of technology use on different cultures. This resource could be used as a source document for students to scan...
STEM Learning has worked with IBM to increase the accessibility of its SkillsBuild e-learning resources. We have created guides to show which SkillsBuild content supports the specific learning objectives within a range of computing qualification specifications to help save teachers time when planning their...
This resource consists of two starter activities, the Cyber Security Diamond asks students to take 9 statements relating to Cyber Security and rank them (in a diamond layout) from most to least important. The Social Engineering Activity contains four definitions of types of social engineering activity and asks...
Explore cyber control through this activity pack, looking at networks of connected devices. It covers:
- The benefits of devices connected via the internet and scenarios to consider
- The dangers of hacking
- A programming task using the micro:bit using Bluetooth
- A sorting images...
An interactive presentation on cyber security for GCSE students. The presentation follows the three strands of the GCSE syllabus, malicious code , social engineering and detect and prevent. Each of the sections has examples and definitions and can be navigated easily by the student. A pre...
This collection of resources is to support teams participating in the CyberCenturion competition.
CyberCenturion is a national cyber education initiative for 12-18 year-olds in the UK. The program is designed to excite, educate and motivate students to...
The CyberCenturion demo provides an introduction to the CyberCenturion competition and using virtual images. The...
This activity gives SEND pupils the opportunity to make up a dance routine and create a clear algorithm for a partner to follow. Pupils will learn to follow instructions, create a sequence of instructions for people to follow and to understand that the order of instructions is important. Dance move cards will...
Published by BEAM, this collection provides a selection of resources for teachers of primary mathematics. Included are a number of challenging problems and puzzles, open-ended investigations, cross-curricular activities, and resources to develop, practise and consolidate students' understanding of handling data...
This task is a real-world example of how spreadsheets can be utilised effectively to simplify data handling and calculation tasks.
Pupils are provided with information about the number of items being transported in a lorry and their individual value. Pupils have to create a spreadsheet to calculate the total...
The first video explains why computers use binary to store data. The difference between a bit, nibble, byte, kilobyte, megabyte, gigabyte, terabyte and petabyte is explained. These are known as measurements of capacity, or how much data can be stored either in memory or on secondary storage devices.
The...
This resource, aimed at lower ability Key Stage 4 students, introduces the concept of data compression, specifically Run Length Encoding. Students are asked to use an online tool to convert names into binary (ASCII), this binary data is then subjected to Run Length Encoding and encoded binary compared to the...
Using a spreadsheet as a grid of 'pixels', this computing activity teachers how 1's and 0's can store image data. The classroom exercises use images with increasing pixel resolution, looking at how this affects the clarity of the image. Moving from black-and-white images, the students then use grids of colour...