This is a fifteen question assessment from the Computer Science standard, 8.13: The student …
This is a fifteen question assessment from the Computer Science standard, 8.13: The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues. An answer key is also attached.
This resources maps out each day and includes resources for both synchronous and …
This resources maps out each day and includes resources for both synchronous and asynchronous activities to support CS Education Week. The document also includes a Computer Science word of the day to help promote the integration of the CS SOLs. This lesson is part of the Virginia K-12 Computer Science Pipeline which is partly funded through a GO Virginia grant in partnership with Chesapeake Public Schools, Loudoun County Public Schools, and the Loudoun Education Foundation.
Grade Level: 2nd GradeSubject: Social Studies and Computer Science IntegrationTopic: Natural, human, and capital …
Grade Level: 2nd GradeSubject: Social Studies and Computer Science IntegrationTopic: Natural, human, and capital resourcesDuration: 2 (30 minute lessons) or (1- 60-minute lesson)Objective: Students will identify and categorize natural, human, and capital resources by creating a digital or physical model. They will demonstrate understanding by accurately representing these resources in a model using basic shapes and labels.
This is a lesson plan based on the Computer Science standard, 2.12, …
This is a lesson plan based on the Computer Science standard, 2.12, where students will create a model. The students will visit a website first to see how a digital model looks and then will create their own digital models of the solar system by using Google Jamboard.
This is a PowerPoint based on the Computer Science standard 2.9 that …
This is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint presentation that is based on the Computer Science standard in Cybersecurity, SOL C.S. 2.9 where students will be reminded of the rules of how to use and handle their computers safely and responsibly.
This is a crossword puzzle designed on Flippity.net that has the essential …
This is a crossword puzzle designed on Flippity.net that has the essential vocabulary from the Computer Science SOL 3.17 in Networking and the Internet.
This activity, created on Quizalize, is from the essential knowledge and vocabulary …
This activity, created on Quizalize, is from the essential knowledge and vocabulary from the Computer Science SOL 5.7, from the strand Computing Systems.
This is a crossword puzzle that is comprised of the essential vocabulary from …
This is a crossword puzzle that is comprised of the essential vocabulary from the Computer Science SOL 8.7 in Cybersecurity. It was made at Flippity.net.
This game created on Gamilab is from CS SOL 8.9 and is …
This game created on Gamilab is from CS SOL 8.9 and is titled, “Public and Private Information.” It is a bike race game where students must correctly answer questions to advance regarding online information from the Computer Science SOL 8.9 from the strand of Impacts of Computing. To start, press the up arrow a couple of times. Please enter code G8471Tto play if you have any problems with the link.
These Pocket Guides are a quick summary of each of the 6 …
These Pocket Guides are a quick summary of each of the 6 computer science strands for grades K-8. The pocket guides explain what the strand is about and how it increases in complexity from Kindergarten to 8th grade.
One of the fundamental computer science concepts is that everything we do …
One of the fundamental computer science concepts is that everything we do on a computer is really just turning binary digits on and off. Even though this sounds simple, it can be a concept that is hard to wrap one's head around. This activity brings the binary concept to reality through the creation of binary bracelets or bookmarks.
The Card Flip Magic trick helps to demonstrate how computers detect errors …
The Card Flip Magic trick helps to demonstrate how computers detect errors in the binary data they send and receive using parity checks. Inspired by Parity magic from CS Unplugged
When you make an LED card, you are bringing together the fundamentals …
When you make an LED card, you are bringing together the fundamentals of electronics that make up computing devices - power (battery), input (using a pressure sensor to open or close a circuit) and output (LED light). It’s also a great way to reinforce the binary states of on and off that are at the core of how all computing devices work.
Inspired by Dear Data, a book that highlights a year-long data drawing …
Inspired by Dear Data, a book that highlights a year-long data drawing project between two friends, this activity helps students go through the process of telling a story with their own data by formulating a question, collecting the data, analyzing the data, and interpreting and communicating their story.
With advances in AI, it is more important than ever that we …
With advances in AI, it is more important than ever that we consider how humans and computers will interact. How do you want the robots of the future to behave towards you and others? For this activity, students will make a “robot zine” where they will sketch an original robot design, identify how their robot will sense the world around it and write a code of conduct to describe how their robot will interact with humans.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.