{"id":1127,"date":"2021-05-21T11:12:33","date_gmt":"2021-05-21T10:12:33","guid":{"rendered":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/?p=1127"},"modified":"2021-06-04T10:59:38","modified_gmt":"2021-06-04T09:59:38","slug":"programme-your-own-password-generator-microbit","status":"publish","type":"post","link":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/2021\/05\/21\/programme-your-own-password-generator-microbit\/","title":{"rendered":"PROGRAMME YOUR OWN PASSWORD GENERATOR &#8211; MICRO:BIT"},"content":{"rendered":"<p>micro:bit have created this series of three lessons (designed for learners aged 11-14 years) to introduce cyber security. Learners explore the need to create strong passwords before writing algorithms and programs to create their own \u2018strong password generator\u2019 using the BBC micro:bit.<\/p>\n<p><a id=\"ttfmake-1621591500\" class=\"ttfmake-button\" style=\"background-color: #fcff45;color: #000000;font-size: 20px;font-weight: bold;padding: 4px 10px;border-radius: 100px\" href=\"https:\/\/www.microbit.org\/lessons\/?filters=d572e1e8-8423-4e51-9518-74ee79e02f61\" target=\"_blank\" rel=\"noopener noreferrer\" data-hover-background-color=\"#cccf44\" data-hover-color=\"#000000\">Go to micro:bit lessons<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>micro:bit have created this series of three lessons (designed for learners aged 11-14 years) to introduce cyber security. Learners explore the need to create strong passwords before writing algorithms and programs to create their own \u2018strong password generator\u2019 using the BBC micro:bit. Go to micro:bit lessons<\/p>\n","protected":false},"author":61927,"featured_media":1128,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[25,57],"class_list":["post-1127","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-microbit","tag-onlineplatforms"],"jetpack_featured_media_url":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/computingscience\/uploads\/sites\/9355\/2021\/05\/21111219\/58.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/posts\/1127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/users\/61927"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/comments?post=1127"}],"version-history":[{"count":2,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/posts\/1127\/revisions"}],"predecessor-version":[{"id":1164,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/posts\/1127\/revisions\/1164"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/media\/1128"}],"wp:attachment":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/media?parent=1127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/categories?post=1127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/computingscience\/wp-json\/wp\/v2\/tags?post=1127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}