The Australian Curriculum: Digital Technologies
Complete Teacher Resource: Package Two
The Australian Curriculum: Digital Technologies
The Australian Curriculum: Digital Technologies strand incorporates systems and computational thinking. It requires stuednts to use information systems to define, design and implement digital solutions (The Australian Curriculum, Assessment and Reporting Authority (ACARA), 2016). Within this unit, students will be given opportunities to identify and use digital systems and consider safety while working in online environments (ACARA, 2016).
The complimentary content descriptions that have been chosen for year two students includes:
Knowledge and Understanding:
Process and Production Skills:
The complimentary content descriptions that have been chosen for year two students includes:
Knowledge and Understanding:
- Recognise and explore digital systems (hardware and software components) for a purpose (ACTDIK001)
Process and Production Skills:
- Create and organise ideas and information using information systems independently and with others, and share these with known people in safe online environments
The unit plan below integrates various aspects of the Australian Curriculum: Technologies. Please refer to the unit plan to view this information.
The Cross-Curriculum Priorities integrated include:
The Cross-Curriculum Priorities integrated include:
- Aboriginal and Torres Strait Islander Histories and Cultures
The General Capabilities integrated include:
- Literacy
- Ethical Understanding
- Critical and Creative Thinking
- Information and Communication Technology (ICT)
The Key Ideas integrated include:
- Safety - Cyber Safety
*Differentiation has been integrated throughout the unit. Please refer to the unit plan below to view this information.*
Background Readings
Students will gain knowledge and understanding for this area of the curriculum by exploring (adapted from ACARA, 2016):
- The intended uses of various digital systems
- Hands-on digital equipment for transferring and capturing data like cameras and recording devices to create a digital timeline of students’ lives (summative assessment)
- Digital systems for downloading and storing information – saving and retrieving data
Students will gain their process and production skills for this area of the curriculum by (adapted from ACARA, 2016):
- Creating information to share online using a secure class blog (formative assessment)
- Making ethical decisions when viewing the work of others
- Participating in safe online environments
|
This educational video explores the way in which technology has evolved over time. Its engaging and interactive through the use of cartoons. Intended uses of certain technologies, like laptops, are also explained. This is a great resource for educators and students.
This interactive game has been recorded and uploaded to YouTube. It identifies various types of technologies in an interactive setting. It is advised that if you use this during class, pause the video to allow students to identify technologies and then play the clip to view the correct answers. Refer to unit plan to identify when this game is to be used. |
|
|
This website consists of ways in which technology is used for all different purposes, including education, business and communication. It also displays ways in which technology has evolved over time to make our everyday lives easier. Click on the image to visit the website.
This website is created by the Global Digital Citizen Foundation and discusses seven different ways that technology is used with a purpose and the intended uses for each type of device. Click on the image to visit the website.
|
|
|
The Bullying: No Way! website has provided teachers with many resources educating students about cyber safety for teachers in early childhood, primary and secondary sectors. There are also activities for students and resources for parents.
This resource can be used with your students. E-Safety, a government driven initiative has created in interactive, online quiz in which 'Sam' takes you through a range of scenarios regarding cyber safety. |
|
|
|
|
|
|
|
|