{"id":28075,"date":"2024-10-07T04:41:38","date_gmt":"2024-10-07T04:41:38","guid":{"rendered":"https:\/\/www.orbeducation.com\/au\/?post_type=product&#038;p=28075"},"modified":"2025-03-10T14:37:53","modified_gmt":"2025-03-10T14:37:53","slug":"digital-systems-and-networks-2024-yrs-7-8","status":"publish","type":"product","link":"https:\/\/www.orbeducation.com\/au\/product\/digital-systems-and-networks-2024-yrs-7-8\/","title":{"rendered":"Digital Systems and Networks 2024 (Yrs 7-8)"},"content":{"rendered":"<h3><strong>Curriculum Information<\/strong><\/h3>\n<p><strong>0. Checklist<\/strong><\/p>\n<p><strong>1. Wordlist<\/strong><\/p>\n<p><strong>2. Digital Systems<\/strong><br \/>\nAC V9.0 (Recap 5-6): \u00b7        investigate the main internal components of common digital systems and their function (AC9TDI6K01)<br \/>\nNSW Comp Tech (2024) -UE:  \u00a4   explains how data is stored, transmitted and secured in digital systems and how information is communicated in a range of contexts CT5-DAT-01:<br \/>\nAC V9.0 (Recap 5-6):  &#8211;       explaining how digital systems are made up of parts that perform specific functions, for example the processor controls the tablet, performs calculations and manipulates data<\/p>\n<p><strong>3. Inputs and Outputs<\/strong><br \/>\nNSW Comp Tech (2024) -Net:  \u00a4   Describe inputs, storage, processes and outputs in connecting people and systems:<br \/>\nNSW DT(Tech Mand):  LS &#8211; \u00b7  recognise that everyday tasks are supported by digital technologies, for example:<br \/>\n&#8211;  use augmentative and alternative communication aids<br \/>\nNSW Comp Tech (2024) -UE:  \u00a4   Explore how UIs or interactive media have evolved in response to people&#8217;s needs and opportunities:  Development of input and output technology.<br \/>\nNSW DT(Tech Mand):  LS &#8211; \u00b7  recognise digital systems used for everyday purposes, eg assistive technology<\/p>\n<p><strong>4. Working Together<\/strong><br \/>\nAC V9.0 (Recap 5-6):  &#8211;       exploring how the central processing unit (CPU), memory and input\/output components work together to perform a simple calculation<\/p>\n<p><strong>5. Types of Computers<\/strong><br \/>\nNSW DT(Tech Mand):  LS &#8211; \u00b7  recognise digital systems used for everyday purposes, eg mobile devices<br \/>\nNSW DT(Tech Mand):  \u2013  high-powered systems for gaming and computation<\/p>\n<p><strong>6. The Evolution of Technology<\/strong><\/p>\n<p><strong>7. System Performance<\/strong><br \/>\nAC V9.0 (7-8): \u00b7        explain how hardware specifications affect performance and select appropriate hardware for particular tasks and workloads (AC9TDI8K01)<br \/>\nNSW DT(Tech Mand):  \u00b7  evaluate the suitability of hardware with particular performance characteristics against the needs of different users, for example: (ACTDIK023)<br \/>\n \u2013  energy-efficient systems for travel and productivity<br \/>\n\u2013  small and light systems for health monitoring<br \/>\nAC V9.0 (7-8):  &#8211;       explaining how hardware specifications affect what, and how quickly, a digital system can perform tasks, for example how different bandwidth networks affect download speed and lag or how much random access memory (RAM) is needed for multimedia authoring<br \/>\nAC V9.0 (7-8):  &#8211;       selecting appropriate hardware for particular tasks, for example choosing a powerful graphics card for computer gaming or large external storage for video editing<\/p>\n<p><strong>8. Connecting Systems<\/strong><br \/>\nAC V9.0 (Recap 5-6):  &#8211;       explaining how separate systems can be connected in different ways to exchange data, for example how a laptop can be connected to a network via a cable or radio waves<br \/>\nNSW DT(Tech Mand):  LS &#8211; \u00b7  use digital technologies to communicate<br \/>\nAC V9.0 (7-8): \u00b7        investigate how data is transmitted and secured in wired and wireless networks including the internet (AC9TDI8K02)<br \/>\nNSW DT(Tech Mand):  \u00b7  explore how data is transmitted and secured in wired, wireless and mobile networks, for example: (ACTDIK023)<br \/>\nNSW DT(Tech Mand):  LS &#8211; \u00b7  phone calls<\/p>\n<p><strong>9. Building Networks<\/strong><br \/>\nAC V9.0 (Recap 5-6):   Securely access and use multiple digital systems and describe their components and how they interact to process and transmit data.<br \/>\nNSW DT(Tech Mand):  \u203a       identifies how information is communicated by digital systems TELS-8DI<br \/>\nAC V9.0 (Recap 5-6): \u00b7        examine how digital systems form networks to transmit data (AC9TDI6K02)<\/p>\n<p><strong>10. Using Networks<\/strong><br \/>\nAC V9.0 (Recap 5-6):  &#8211;       investigating the main components in a video conferencing system and their functions, for example a telehealth system used by Aboriginal and Torres Strait Islander communities to access ultrasound and other imagery services<br \/>\nNSW DT(Tech Mand):  LS &#8211; \u00b7  recognise that digital technologies can be used to communicate with others<br \/>\nNSW Comp Tech (2024) -Net:  \u00a4   Explore careers in connecting people and systems:<br \/>\nNSW DT(Tech Mand):  LS &#8211; \u00b7  recognise that everyday tasks are supported by digital technologies, for example:<br \/>\nNSW DT(Tech Mand):  LS &#8211;  &#8211;  money withdrawal<br \/>\nNSW DT(Tech Mand):  LS &#8211;  &#8211;  online shopping<br \/>\nNSW DT(Tech Mand):  LS &#8211; \u00b7  use digital technologies to communicate, for example:<br \/>\n\u2013  use mobile devices to send messages<\/p>\n<p><strong>11. Network Design<\/strong><br \/>\nAC V9.0 (7-8): Select appropriate hardware for particular tasks, explain how data is transmitted and secured in networks, and identify cyber security threats.<br \/>\nNSW DT(Tech Mand):  TE4-7DI explains how data is represented in digital systems and transmitted in networks<br \/>\nNSW Comp Tech (2024) -Net:  \u00a4   Describe common network hardware for wired, wireless and mobile networks:<br \/>\nAC V9.0 (Recap 5-6):  &#8211;       investigating the use of satellite phones where mobile phone networks are not available, inaccessible or unreliable, for example many homeland communities of Arnhem Land have limited access to mainstream communication networks<\/p>\n<p><strong>12. Network Speed<\/strong><br \/>\nAC V9.0 (Recap 5-6):   Examine how data is broken up and sent through networks.<br \/>\nAC V9.0 (7-8):  &#8211;       describing physical networks and comparing their properties, for example the bandwidth, latency and reliability of wired versus wireless networks<br \/>\nNSW DT(Tech Mand):  \u2013  how transmission media affects the reliability and speed of data transfer<br \/>\nAC V9.0 (7-8):  &#8211;       considering how First Nations Australians communities in areas classified as remote often share access to smartphone and internet services, and how the hardware specifications of these devices affect performance, for example where immediate and extended families share and access data through a single smartphone or device<\/p>\n<p><strong>13. Packets and Protocols<\/strong><br \/>\nAC V9.0 (Recap 5-6):  &#8211;       describing the way data is structured and transmitted through a network, for example broken up\u202finto packets (small pieces) and passed from the source, through multiple devices, to the\u202fdestination<br \/>\nAC V9.0 (7-8):  &#8211;       explaining how problems occur in network communication and how they can be solved, for example routers can drop packets and how Transmission Control Protocol (TCP) uses acknowledgements to confirm packets have been\u202freceived<br \/>\nNSW DT(Tech Mand):  \u2013  how data is transferred over the internet with TCP\/IP<\/p>\n<p><strong>14. Network Security<\/strong><br \/>\nAC V9.0 (7-8): Investigate how data is transmitted via wired and wireless networks and explain the need for encryption to protect and secure data.<br \/>\nNSW DT(Tech Mand):  \u2013  how data is secured in wireless networks with WPA<br \/>\nNSW Comp Tech (2024) -Net:  \u00a4   Explore how people\u2019s changing expectations and concerns for security and privacy have shaped computer technology<\/p>\n<p><strong>15. Encryption<\/strong><br \/>\nAC V9.0 (7-8): Select appropriate hardware for particular tasks, explain how data is transmitted and secured in networks, and identify cyber security threats.<br \/>\nAC V9.0 (7-8):  &#8211;       explaining why cryptography is necessary for securing data, for example transmitting credit card details over the internet<br \/>\nAC V9.0 (7-8):  &#8211;       exploring simple encryption and decryption algorithms, for example ROT13 and XOR<\/p>\n<p><strong>16. Encryption Spreadsheets<\/strong><\/p>\n<h3><strong>By Curriculum<\/strong><\/h3>\n<p><strong>Australian Curriculum V9.0 (2024)<\/strong><br \/>\nAC V9.0 (Recap 5-6): \u00b7        investigate the main internal components of common digital systems and their function (AC9TDI6K01)<br \/>\nAC V9.0 (Recap 5-6):  &#8211;       explaining how digital systems are made up of parts that perform specific functions, for example the processor controls the tablet, performs calculations and manipulates data<br \/>\nAC V9.0 (Recap 5-6):  &#8211;       exploring how the central processing unit (CPU), memory and input\/output components work together to perform a simple calculation<br \/>\nAC V9.0 (7-8): \u00b7        explain how hardware specifications affect performance and select appropriate hardware for particular tasks and workloads (AC9TDI8K01)<br \/>\nAC V9.0 (7-8):  &#8211;       explaining how hardware specifications affect what, and how quickly, a digital system can perform tasks, for example how different bandwidth networks affect download speed and lag or how much random access memory (RAM) is needed for multimedia authoring<br \/>\nAC V9.0 (7-8):  &#8211;       selecting appropriate hardware for particular tasks, for example choosing a powerful graphics card for computer gaming or large external storage for video editing<br \/>\nAC V9.0 (Recap 5-6):  &#8211;       explaining how separate systems can be connected in different ways to exchange data, for example how a laptop can be connected to a network via a cable or radio waves<br \/>\nAC V9.0 (7-8): \u00b7        investigate how data is transmitted and secured in wired and wireless networks including the internet (AC9TDI8K02)<br \/>\nAC V9.0 (Recap 5-6):   Securely access and use multiple digital systems and describe their components and how they interact to process and transmit data.<br \/>\nAC V9.0 (Recap 5-6): \u00b7        examine how digital systems form networks to transmit data (AC9TDI6K02)<br \/>\nAC V9.0 (Recap 5-6):  &#8211;       investigating the main components in a video conferencing system and their functions, for example a telehealth system used by Aboriginal and Torres Strait Islander communities to access ultrasound and other imagery services<br \/>\nAC V9.0 (7-8): Select appropriate hardware for particular tasks, explain how data is transmitted and secured in networks, and identify cyber security threats.<br \/>\nAC V9.0 (Recap 5-6):  &#8211;       investigating the use of satellite phones where mobile phone networks are not available, inaccessible or unreliable, for example many homeland communities of Arnhem Land have limited access to mainstream communication networks<br \/>\nAC V9.0 (Recap 5-6):   Examine how data is broken up and sent through networks.<br \/>\nAC V9.0 (7-8):  &#8211;       describing physical networks and comparing their properties, for example the bandwidth, latency and reliability of wired versus wireless networks<br \/>\nAC V9.0 (7-8):  &#8211;       considering how First Nations Australians communities in areas classified as remote often share access to smartphone and internet services, and how the hardware specifications of these devices affect performance, for example where immediate and extended families share and access data through a single smartphone or device<br \/>\nAC V9.0 (Recap 5-6):  &#8211;       describing the way data is structured and transmitted through a network, for example broken up\u202finto packets (small pieces) and passed from the source, through multiple devices, to the\u202fdestination<br \/>\nAC V9.0 (7-8):  &#8211;       explaining how problems occur in network communication and how they can be solved, for example routers can drop packets and how Transmission Control Protocol (TCP) uses acknowledgements to confirm packets have been\u202freceived<br \/>\nAC V9.0 (7-8): Investigate how data is transmitted via wired and wireless networks and explain the need for encryption to protect and secure data.<br \/>\nAC V9.0 (7-8): Select appropriate hardware for particular tasks, explain how data is transmitted and secured in networks, and identify cyber security threats.<br \/>\nAC V9.0 (7-8):  &#8211;       explaining why cryptography is necessary for securing data, for example transmitting credit card details over the internet<br \/>\nAC V9.0 (7-8):  &#8211;       exploring simple encryption and decryption algorithms, for example ROT13 and XOR<\/p>\n<p><strong>NSW Digital Technologies (Tech Mandatory)<\/strong><br \/>\nNSW DT(Tech Mand):  LS &#8211; \u00b7  recognise that everyday tasks are supported by digital technologies, for example:<br \/>\n&#8211;  use augmentative and alternative communication aids<br \/>\nNSW DT(Tech Mand):  LS &#8211; \u00b7  recognise digital systems used for everyday purposes, eg assistive technology<br \/>\nNSW DT(Tech Mand):  LS &#8211; \u00b7  recognise digital systems used for everyday purposes, eg mobile devices<br \/>\nNSW DT(Tech Mand):  \u2013  high-powered systems for gaming and computation<br \/>\nNSW DT(Tech Mand):  \u00b7  evaluate the suitability of hardware with particular performance characteristics against the needs of different users, for example: (ACTDIK023)<br \/>\n\u2013  energy-efficient systems for travel and productivity<br \/>\n\u2013  small and light systems for health monitoring<br \/>\nNSW DT(Tech Mand):  LS &#8211; \u00b7  use digital technologies to communicate<br \/>\nNSW DT(Tech Mand):  \u00b7  explore how data is transmitted and secured in wired, wireless and mobile networks, for example: (ACTDIK023)<br \/>\nNSW DT(Tech Mand):  LS &#8211; \u00b7  phone calls<br \/>\nNSW DT(Tech Mand):  \u203a       identifies how information is communicated by digital systems TELS-8DI<br \/>\nNSW DT(Tech Mand):  LS &#8211; \u00b7  recognise that digital technologies can be used to communicate with others<br \/>\nNSW DT(Tech Mand):  LS &#8211; \u00b7  recognise that everyday tasks are supported by digital technologies, for example:<br \/>\nNSW DT(Tech Mand):  LS &#8211;  &#8211;  money withdrawal<br \/>\nNSW DT(Tech Mand):  LS &#8211;  &#8211;  online shopping<br \/>\nNSW DT(Tech Mand):  LS &#8211; \u00b7  use digital technologies to communicate, for example:<br \/>\n\u2013  use mobile devices to send messages<br \/>\nNSW DT(Tech Mand):  TE4-7DI explains how data is represented in digital systems and transmitted in networks<br \/>\nNSW DT(Tech Mand):  \u2013  how transmission media affects the reliability and speed of data transfer<br \/>\nNSW DT(Tech Mand):  \u2013  how data is transferred over the internet with TCP\/IP<br \/>\nNSW DT(Tech Mand):  \u2013  how data is secured in wireless networks with WPA<\/p>\n<p><strong>NSW Computing Technology (2024)<\/strong><br \/>\nNSW Comp Tech (2024) -UE:  \u00a4   explains how data is stored, transmitted and secured in digital systems and how information is communicated in a range of contexts CT5-DAT-01:<br \/>\nNSW Comp Tech (2024) -Net:  \u00a4   Describe inputs, storage, processes and outputs in connecting people and systems:<br \/>\nNSW Comp Tech (2024) -UE:  \u00a4   Explore how UIs or interactive media have evolved in response to people&#8217;s needs and opportunities:  Development of input and output technology.<br \/>\nNSW Comp Tech (2024) -Net:  \u00a4   understands how innovation, enterprise and automation have inspired the evolution of computing technology CT5-EVL-01:<br \/>\nNSW Comp Tech (2024) -Net:  \u00a4   Explore careers in connecting people and systems:<br \/>\nNSW Comp Tech (2024) -Net:  \u00a4   Describe common network hardware for wired, wireless and mobile networks:  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Students study the main internal components of common digital systems.  They consider a range of input\/output devices (including augmentative and alternative communication aids) and investigate how the CPU and memory work together to perform calculations and process information.  They identify everyday uses of these systems and consider how they are affecting our lives at work and at home.  They look at the wide range of computers and consider how hardware specifications affect performance, selecting suitable systems for a range of users.<\/p>\n<p>Students learn about why computers were first connected together and investigate how data is transmitted and secured in wired and wireless networks (including the internet).  They learn how to put together the basics of a simple network and get an idea about how larger networks function.  They consider the network technology behind phone calls, ATM withdrawals and transport apps and consider the bandwidth and other speed limitations when downloading.<\/p>\n<p>Students learn about protocols and how data is packaged for delivery through the internet.  They study how TCP works and what happens when packets are dropped en route.  They consider network security and explore simple encryption and decryption algorithms such as ROT13 and XOR.<\/p>\n<p>The targeted curriculum outcomes were gathered from the new Australian Curriculum V9.0 as well as the NSW Digital Technologies (mandatory) curriculum and the new Computing Technology course (2024). The relevant curriculum statements are listed below.<\/p>\n<p>Files: Cover \/ Checklist \/ Wordlist \/ Digital Systems \/ Inputs and Outputs \/ Working Together \/ Types of Computers \/ Evolution of Technology \/ System Performance \/ Connecting Systems \/ Building Networks \/ Using Networks \/ Network Design \/ Network Speed \/ Packets and Protocols \/ Network Security \/ Encryption \/ Encryption Spreadsheets<\/p>\n<p><em>84 pages of tasks and answers, plus spreadsheet solutions for the encryption activities.<br \/>\n<\/em><\/p>\n<p><a href='http:\/\/www.orbeducation.com\/Previews\/Co\/CoP060_Digital_Systems_and_Networks.pdf' target='_blank' rel='noopener noreferrer'>Sample Pages<\/a><\/p>\n","protected":false},"featured_media":27881,"comment_status":"open","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"product_brand":[],"product_cat":[19],"product_tag":[],"class_list":{"0":"post-28075","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-years-7-8-digital-technologies","7":"desktop-align-left","8":"tablet-align-left","9":"mobile-align-left","11":"first","12":"instock","13":"taxable","14":"shipping-taxable","15":"purchasable","16":"product-type-variable","17":"has-default-attributes"},"_links":{"self":[{"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/product\/28075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/comments?post=28075"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/media\/27881"}],"wp:attachment":[{"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/media?parent=28075"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/product_brand?post=28075"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/product_cat?post=28075"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/product_tag?post=28075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}