Updating search results...

Search Resources

817 Results

View
Selected filters:
  • Computer Science
Constructing Programs, Debugging and Looping
Unrestricted Use
Public Domain
Rating
0.0 stars

Students will construct a program to help their friend safely retrieve their stuffed animal.  They will debug their program if needed.  They then will observe whether there are patterns in their codes which could be looped.  AS they discuss their programs, they will be encouraged to use ordinal numbers.

Subject:
Computer Science
Mathematics
Material Type:
Lesson Plan
Provider:
VDOE
Author:
Bambi Feigner
Date Added:
09/20/2023
Convex Polygons and Sphero Robots
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will program a Sphero robot to travel around the exterior of a convex polygon. Students will then use the information in their code to determine the sum of the interior angles in a convex polygon.

Subject:
Computer Science
Measurement and Geometry
Material Type:
Activity/Lab
Author:
Andrea Lee
Date Added:
10/05/2023
Convex Polygons and Sphero Robots
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will program a Sphero robot to travel around the exterior of a convex polygon. Students will then use the information in their code to determine the sum of the interior angles in a convex polygon.

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
jDiOrio@ycsd.york.va.us
Date Added:
10/10/2023
Counting Money with Brute Force vs. Decrease-and-Conquer Problem Solving
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

With this lesson, students will practice the Math Standards of Learning around counting and comparing values of money and creating equations while also learning computer science terminology for problem solving. Students will learn to start counting change with the highest value coin possible.

Subject:
Algorithms and Programming
Computer Science
Mathematics
Material Type:
Activity/Lab
Lesson Plan
Author:
Tara Williams
Date Added:
04/15/2022
Create an Algorithm to Find the Area of a Rectangle
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will work in groups to plan the process they will use to first determine the perimeter and then the area of a rectangle. Students will write out a detailed step by step process that can be used in different situations.

Subject:
Algorithms and Programming
Computer Science
Cross-Curricular
Mathematics
Material Type:
Lesson Plan
Author:
James Baker
Date Added:
12/14/2021
Creating Community from Home with Google Meet & Flipgrid (VaSCL/Adam Seipel)
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Adam Seipel, with VaSCL (Virginia School Consortium for Learning), provides this recorded presentation and slide deck for creating a learning community with your students who are at home using Google Meet and Flipgrid.

Subject:
CTE
Computer Science
Cross-Curricular
ESL
English
Fine Arts
Health/Physical Education
History/Social Sciences
Mathematics
Science
Special Education
World Languages
Material Type:
Visual Media
Author:
#GoOpenVA Administrator
Date Added:
09/29/2020
Creating a Formula Calculator
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

This resource will show how to teach your students to make their own "formula calculator" using Java programming, and it has handouts for your students or your own use. It is ideal for Grade 7 and Grade 8 Math.The video in this resource walks you through the steps to teach your students to program their "formula calculator" using Java programming after they have been taught about geometric formulas. They can then use their calculator to help them solve their math problems. It will reinforce critical thinking skills and create a deeper understanding of how the formulas work.Students can use any Java IDE or even an online IDE. The lesson can be customized based on your familiarity with Java and your students' computer skills.The handouts show how to use arithmetic operators in Java as well as some Math class methods that will be helpful. The attached program can be used as a starting point for their programs. 

Subject:
Algorithms and Programming
Computer Science
Mathematics
Measurement and Geometry
Material Type:
Activity/Lab
Lesson Plan
Author:
Tara Williams
Date Added:
07/30/2021
Crytography Breakout (US History I)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This breakout activity provides teachers and students an interactive way to demonstrate their learning about cryptography, code-breaking, and historic ciphers. Clues are provided, along with additional hints you can choose to provide to students so that students solve ciphers and learn what time their army is planning to raid the enemy camp.

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Thea Clark
Date Added:
11/30/2023
Culper Spy Ring
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students will learn about one of the most significant and successful spy rings in American History. They will also actually conduct some of the same techniques and demonstrate them to the rest of the class.

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Thea Clark
Date Added:
11/30/2023
Cyber Careers
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

PDF resource of different Cyber Careers from NICERC. The document details 15 different cyber related careers which can be used to aid students in choosing a career path in Cybersecurity. Good way to discuss with students the opportunities available in the growing field. The document details the job profile, education requirements, median salary, job growth percent, and common job duties. 

Subject:
Computer Science
Cybersecurity
Impacts of Computing
Material Type:
Activity/Lab
Author:
Ronald Sparks
Date Added:
06/14/2022
#CyberSmarts (3 Lessons by Scholastic)
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

The lessons provided are presented by Scholastic and sponsored by Norton Lifelock.
All rights reserved by Scholastic.
Below is an overview of the three lessons provided.
The lessons do not coincide with one another.
The teacher can choose to use all three or select the best option for the classroom needs.

The PDF Links includes:
Lesson 1: Understanding Online Safety (45 minutes)
- Students will analyze text, citing evidence and summarizing central ideas. They will make inferences to create their own cybersecurity protection plan.
- Students will use the provided copy of #Cybersmarts student magazine to create their personalized online protection plan.

Lesson 2: Identifying Preventive Technologies (45 minutes + presentation time)
- Students will conduct research on preventive technologies built and used by professionals in the cybersecurity field (e.g., firewalls, ad blocker apps, antivirus software, voice recognition software, virtual private network (VPN), etc.).
- Students will then prepare a presentation - the given choices are a skit or interview. Presentation options can be easily adapted to best fit your classroom needs.
- Research planning/ gathering page is provided.

Lesson 3: Making Online Profiles More Secure (2 part lesson - 90 minutes total)
- Students will use analytical and reasoning skills to identify areas of vulnerability in an online profile and come up with strategies for how to make them more secure by applying information from a text.
- First, students will analyze their own personal profiles (if applicable). Then, they will analyze a provided “profile” to identify security holes. Last, discuss the answers and reasonings as a class.
*This lesson can be shortened to fit into one class period.
*(Optional) An extension idea is provided. It includes information from all lessons. Students will use what they have learned to create their own cybersecurity device.

Subject:
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Lesson Plan
Reading
Author:
Norton Lifelock
Scholastic
Date Added:
02/02/2022
Cyberbiosecurity Who-Dun-It
Unrestricted Use
CC BY
Rating
0.0 stars

This activity aims to engage middle-school students with cyberbiosecurity topics through a murder mystery-style puzzle. As the narrator, you will set the cybercrime scene and provide breadcrumbs along the way. Your students will serve as investigators, drawing connections between agricultural and computer science topics while they solve the crime. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurityThis work is supported by the USDA National Institute of Food and Agriculture, Women and Minorities in Science, Technology, Engineering, and Mathematics Fields (WAMS) Grants Program, award #2020-38503-31950.

Subject:
Agricultural Education
Communication Skills
Computer Science
Cybersecurity
STEM/STEAM
Science
Technology Education
Material Type:
Activity/Lab
Module
Teaching/Learning Strategy
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
04/04/2022
Cyberbiosecurity Who-Dun-It: The Tasty Treat Transgression
Unrestricted Use
CC BY
Rating
0.0 stars

This activity aims to engage middle-school students with cyberbiosecurity topics through a murder mystery-style puzzle. As the narrator, you will set the cybercrime scene and provide breadcrumbs along the way. Your students will serve as investigators, drawing connections between agricultural and computer science topics while they solve the crime. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurityThis work is supported by the USDA National Institute of Food and Agriculture, Women and Minorities in Science, Technology, Engineering, and Mathematics Fields (WAMS) Grants Program, award #2020-38503-31950.

Subject:
Agricultural Education
Communication Skills
Computer Science
Cybersecurity
STEM/STEAM
Science
Technology Education
Material Type:
Activity/Lab
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
07/27/2022
Cybersecurity
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students will learn about why their personal information is important and how they can keep it safe. They will also learn to pull out other people’s personal information and how that character/person can keep it safe. 

Subject:
Computer Science
Cross-Curricular
Cybersecurity
Government and Civics
History/Social Sciences
Humanities
Social Sciences
Material Type:
Interactive
Lecture
Lesson
Lesson Plan
Author:
Jessica Leake
Date Added:
03/11/2024
Cybersecurity and The Constitution
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students will review the development of the Constitution.  To experience what this might be like,  students will work together to create a set of rules, procedures, rights, and responsibilities needed to safely use computing devices and networks in our school. When they have finished they will compare their list to the school’s Acceptable Use Policy.

Subject:
American History
Computer Science
Cross-Curricular
Cybersecurity
History/Social Sciences
STEM/STEAM
Material Type:
Activity/Lab
Lesson
Lesson Plan
Author:
Kristin Vaughn
Date Added:
02/15/2024
Cybersecurity for All
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will use predetermined materials to create prototypes of badge covers to try to block RFID signals from being read.

Subject:
Computer Science
Science
Material Type:
Activity/Lab
Lesson Plan
Author:
Julia DiOrio
Andrea Lee
Evita Moody
Date Added:
02/27/2024