display posts
Display posts stuff
Making Games: BAFTA Young Games Designer competition 2026 - Education Scotland is keen to support as many children and young people participate in playing and making games as possible. We are excited to work with Into Film and West College Scotland to deliver ideas, resources and live lessons to help children and young people participate in the BAFTA Young Games Designer (YGD) competition. YGD …
Evaluating your own practice (educators) – finding and checking information - Assessing your own practice It is important to not only develop effective information literacy skills but also to assess how these can impact our own everyday work. Understanding how information literacy development can bring positive benefits to our pedagogies and to our classrooms is a critical step towards embedding this into our wider everyday professional …
Evaluating information – finding and checking information - Evaluating information sources Here are a couple of ways children and young people can evaluate sources: Look for clues: Author (are they trustworthy?), Date (is the information still current?), Purpose (does the source inform, sell, persuade or entertain?) Strategy: SIFT – Stop, Investigate source, Find better coverage, Trace claims to original context. Children and young people should always remember to provide sources they use. As well as …
Trusted sources – finding and checking information - Trusted sources Children and young people should look for information that is reliable, accurate and credible. They should use sources that are transparent about their information, cite their evidence, and avoid bias or misinformation. This: is essential for learning accurate and reliable information develops critical thinking skills avoids spreading mis- or disinformation supports stronger research, …
CSW2025: Computing Science Week recap - Thank you to everyone who attended Computing Science week and made it a success again this year. Below is a playlist of some of the sessions we were fortunate to facilitate – a HUGE thank you to everyone who gave up their time to host a Teacher CLPL session or Live Lesson.
Building Digital Citizens: my experience with Scotland’s Curriculum Improvement Cycle by a primary digital lead - My decision to engage with Scotland’s Curriculum Improvement Cycle regarding digital literacy began primarily when I began to lead my school through the Digital Schools Award journey. This experience revealed the Dunning-Kruger effect in action early in my school’s digital journey – while I started the process full of confidence, I gradually realised how much …
Digital Schoolhouse: Festival of Play 2025 by Blackness Primary, Dundee City - We were lucky that a parent of a child in our class works with Digital School House and they let us know about the event. There were spaces available and the children were really enthusiastic and keen to go. It would be great to let more schools know about the event – I am sure …
CSW2025: ACE Cyber Security Competition (S3-S6) - See below for a team competition that learners can participate in. ACE Cyber Security Competition (S3-S6) Competition Sign up window is now open! Register Here Teams can include up to four students, with mixed ages and genders permitted. All team members must be aged 14–18 (S3-S6) and in full-time education. Each team must have …
Scottish Schools and Colleges Esports Competitions – Expression of Interest - Scottish Esports are the national body for gaming and esports in Scotland and are conducting a survey to assess the viability of a national esports competitions for Scotland’s schools and colleges. This initiative aims to provide a structured competitive framework that supports Curriculum for Excellence, develops learners’ meta-skills, enhances digital skills, and aligns with national …- Digital Skills Big Ideas - Digital technology Digital technology is used to store, process and share computer data about almost all aspects of our lives and society. This is underpinned by computer technology, including hardware, software and networks. It is essential that these systems and their data should be secured to protect them, and us, from cyber threats. …


You must be logged in to post a comment.