Updating search results...

Search Resources

817 Results

View
Selected filters:
  • Computer Science
CS SOL 3.17 Vocabulary Crossword Puzzle
Unrestricted Use
CC BY
Rating
0.0 stars

This is a crossword puzzle designed on Flippity.net that has the essential vocabulary from the Computer Science SOL 3.17 in Networking and the Internet.

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Dana Smith
Date Added:
12/21/2021
CS SOL 8.9 Public and Private Information Game on Gamilab
Unrestricted Use
Public Domain
Rating
0.0 stars

This game created on Gamilab is from CS SOL 8.9 and is titled, “Public and Private Information.”
It is a bike race game where students must correctly answer questions to advance regarding online information from the Computer Science SOL 8.9 from the strand of Impacts of Computing. To start, press the up arrow a couple of times. Please enter code G8471Tto play if you have any problems with the link.

Subject:
Computer Science
Impacts of Computing
Material Type:
Game
Author:
Dana Smith
Date Added:
08/12/2021
CS Strand Pocket Guides
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

These Pocket Guides are a quick summary of each of the 6 computer science strands for grades K-8. The pocket guides explain what the strand is about and how it increases in complexity from Kindergarten to 8th grade.

Subject:
Algorithms and Programming
Computer Science
Computing Systems
Cybersecurity
Data and Analysis
Impacts of Computing
Networking and the Internet
Material Type:
Teaching/Learning Strategy
Author:
CodeVA Curriculum
Valerie Fawley
Date Added:
11/18/2022
CS Unplugged: Binary Bracelets/Bookmarks
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

One of the fundamental computer science concepts is that everything we do on a computer is really just turning binary digits on and off. Even though this sounds simple, it can be a concept that is hard to wrap one's head around. This activity brings the binary concept to reality through the creation of binary bracelets or bookmarks.

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Kim Wilkens
Date Added:
02/29/2020
CS Unplugged: Robot Zine
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

With advances in AI, it is more important than ever that we consider how humans and computers will interact. How do you want the robots of the future to behave towards you and others? For this activity, students will make a “robot zine” where they will sketch an original robot design, identify how their robot will sense the world around it and write a code of conduct to describe how their robot will interact with humans.

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Kim Wilkens
Date Added:
03/01/2020
CS Unplugged: Security Avatars
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Every day our privacy is at risk with data being collected about us as we share and live more of our lives online. For this activity, you will explore how you do and do not protect your privacy online and then create a security avatar to help you battle for your privacy.

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Kim Wilkens
Date Added:
03/02/2020
Caesar Cipher - Unplugged
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This unplugged lesson will allow students to encrypt and decrypt message using the Caesar Cipher letter shift method of encryption. Cover the process of how this method works by doing an example and explaining the process of shifting the plaintext by the letter shift value to create the encrypted cipher text.

Subject:
Computer Science
Cybersecurity
Data and Analysis
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
05/23/2022
Caesar Cipher in Python
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson is designed to teach students basic encryption using the Caesar cipher method. This is a simple letter shift cipher that takes a plaintext message and encrypts it into cipher text by shifting each letter of the message by a value between 1 and 25 (1 less than the total number of letters in the English alphabet). This technique was used by Julius Caesar to encrypt messages by shifting each letter of the message by 3 letters. The message would be decrypted by taking each letter and shifting back 3 letters to reveal the plaintext message.

Subject:
Algorithms and Programming
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
05/23/2022
Caring is NOT Sharing
Read the Fine Print
Educational Use
Rating
0.0 stars

The students will consider what it would be like to have someone use a favorite possession without their approval. The students will then learn what personal information is and why they should keep it private. At the end of the lesson, the students will determine what information is safe to share with others and what is not safe to share.

Subject:
Computer Science
Material Type:
Lesson Plan
Provider:
ACSE Regional Partnership
Provider Set:
Central Virginia Computer Science Integration Team 2023
Author:
CVCSI Team
Date Added:
07/08/2023
Causes of the American Revolution
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will apply their knowledge of the causes of the American Revolution to create an interactive story via Twine. The interactive story will be based on the pre-revolutionary war period from the point of view of a loyalist or a patriot. As a warm-up students will look at an optical illusion picture and as a class discuss point of view and perspective. Students will work in heterogeneous pairs/groups to research, outline, and create a pre-revolutionary story about a patriot or loyalist.

Subject:
Algorithms and Programming
American History
Computer Science
History/Social Sciences
Material Type:
Lesson
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
11/17/2022
Choctaw Code Talkers
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will examine the history and culture of the Choctaw Native Americans, as well as the story of the Code Talkers in WW1, in order to memorialize one of the Choctaw Code Talkers. 

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
11/30/2023
Choice Boards & Hyperdocs (VaSCL/Adam Seipel)
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This presentation focuses on the hows and whys of using Choice Board and Hyperdocs. It is about 54 minutes long and the accompanying slide deck is included.

Subject:
CTE
Computer Science
Cross-Curricular
ESL
English
Fine Arts
Health/Physical Education
History/Social Sciences
Mathematics
Science
Special Education
World Languages
Material Type:
Visual Media
Author:
#GoOpenVA Administrator
Date Added:
09/29/2020
Choose Your Own Adventure Story
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Create an American Revolution adventure story with your class! Students will be able to step back into time and think of the various perspectives of the American Revolution by creating scenarios the different characters might have gone through.

Subject:
Computer Science
Virginia History
Material Type:
Activity/Lab
Author:
Andrea Lee
Date Added:
10/24/2023
Chromebook Keyboard 1.7
Unrestricted Use
CC BY
Rating
0.0 stars

A common component most computing devices include is a keyboard (either physical or screen-based) for inputting information. A common computing device is a Chromebook which is similar to a laptop.Students will use a crayon to answer the questions for each Chromebook keyboard on the handout by coloring in the correct keys they would press on an actual Chromebook.

Subject:
Computer Science
Computing Systems
Material Type:
Activity/Lab
Author:
Robert Underwood
Date Added:
04/08/2022
Civil War Planning
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will be competing to win a “grant.” Students will be creating a Canva presentation about what battle of the Civil War was the most important. Students should include important dates, people, and details about the specific battle. The students will use a planning paper prior to starting their presentation to create a step-by-step plan for their presentation. Their presentation should give clear information (dates, people, and details) about why the battle site they chose is the most important battle of the Civil War. Students will share the load in their project and split tasks among group members. Each group will be assessed with a rubric.

Subject:
Computer Science
Social Sciences
Material Type:
Activity/Lab
Lesson Plan
Author:
Andrea Lee
Date Added:
10/05/2023