A trojan horse is a program that appears useful but is, in fact, malicious that tricks a user to install it. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, […]
A start-up sequence that starts the operating system of a computer when it is turned on.
Here is a collection of tasks I created to go along with the Microbit tutorials (see the Microbit tutorials category). My learners all had access in their OneNote notebooks, I am sharing this with whoever […]
Qi (pronounced “chee”) is a wireless charging technology used to wirelessly power electronic devices such as smartphones, tablets and wearable computing products.
By Charlotte Fourie For the first three years of being an IT and CAT teacher, I scheduled extra classes for learners who missed lessons (you know, those that always have to leave school early for […]
Courtesy of Michelle Meyer. Tips and tricks to maximise marks in Prac and Theory exams. This useful PPT may come in handy for your students when it comes to preparing them for exams.
Tutorial 11b – Using logical decision-making such as IF THEN ELSE This video was made for my Grade 10 students doing microbit coding for the first time. The microbit tutorials are presented in their OneNote […]
In 2015 I won the Tech Teacher of the Year award. This year (2019), I did it again! I submitted my Minecraft world and lesson plans as part of the ISPA SuperTeacher competition. At a […]
Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.