Skip to content
Technologies · Year 6

Active learning ideas

How Information Travels Online

Active learning helps students grasp how information travels online because abstract concepts like data transmission and security become tangible through role play, investigation, and visual creation. When students simulate real-world scenarios, they confront practical questions about privacy and safety in ways that lectures cannot.

ACARA Content DescriptionsAC9TDI6K02
25–35 minPairs → Whole Class3 activities

Activity 01

Role Play25 min · Pairs

Role Play: The Phishing Detective

In pairs, one student 'sends' a suspicious email (written on a card) to the other. The 'detective' must look for red flags like urgent language, strange links, or poor spelling, and explain why they would or wouldn't click on it.

Explain why sending information in small pieces might be a good idea.

Facilitation TipDuring Role Play: The Phishing Detective, give students time to rehearse their responses before performing for the class to reduce performance anxiety.

What to look forPresent students with a scenario: 'Imagine you are sending a large drawing to a friend online. Why is it better to send it as many small pieces instead of one giant file?' Have students write down two reasons.

ApplyAnalyzeEvaluateSocial AwarenessSelf-Awareness
Generate Complete Lesson

Activity 02

Inquiry Circle30 min · Small Groups

Inquiry Circle: Password Crackers

Groups are given a set of 'weak' passwords (e.g., 'password123' or 'fluffy'). They must use a set of 'security rules' to transform them into 'strong' passwords and then present their 'before and after' to the class, explaining the changes.

Compare sending a letter directly to someone versus sending it through many different post offices.

Facilitation TipFor Collaborative Investigation: Password Crackers, assign roles explicitly (e.g., recorder, investigator, presenter) to ensure all students contribute.

What to look forAsk students to compare the internet to the postal service. 'If you wanted to send a secret message to someone across the country, would you send one big envelope or many small, numbered envelopes? What are the pros and cons of each method for both the internet and the post?'

AnalyzeEvaluateCreateSelf-ManagementSelf-Awareness
Generate Complete Lesson

Activity 03

Gallery Walk35 min · Whole Class

Gallery Walk: Digital Footprint Mural

Students draw a 'footprint' and fill it with types of data they share online (photos, locations, game scores). They display these and walk around to discuss which pieces of data are 'safe' to share and which might be risky if seen by a stranger.

Predict what might happen if one path for information is blocked on the internet.

Facilitation TipDuring Gallery Walk: Digital Footprint Mural, provide sentence starters on the wall to scaffold discussions about privacy choices.

What to look forGive students a diagram showing a simple network with a few routers. Ask them to draw a possible path for a data packet from computer A to computer B. Then, ask: 'What might happen if the connection between Router 1 and Router 2 was cut?'

UnderstandApplyAnalyzeCreateRelationship SkillsSocial Awareness
Generate Complete Lesson

A few notes on teaching this unit

Experienced teachers approach this topic by connecting technical details to students’ lived experiences, such as comparing online passwords to house keys. Avoid overwhelming students with jargon; focus instead on analogies they can test themselves. Research suggests that students retain concepts better when they physically manipulate materials or act out processes, as seen in the role play and mural activities.

Successful learning looks like students confidently explaining how data moves through networks, why strong passwords matter, and how to spot digital threats. They should also articulate their own digital footprint choices and justify them to peers.


Watch Out for These Misconceptions

  • During Gallery Walk: Digital Footprint Mural, watch for students who believe posts can be fully erased.

    Use the mural’s layers to show that each digital action leaves traces. Ask students to cover a post with a blank paper and discuss whether the original is still visible underneath.

  • During Collaborative Investigation: Password Crackers, watch for students who think hackers only target ‘important’ people.

    Have students run a mock password-cracking simulation using a simple list of passwords. Track how long it takes for weak passwords to be guessed, emphasizing that automated bots target any weak account.


Methods used in this brief