Updating search results...

Search Resources

286 Results

View
Selected filters:
  • Algorithms and Programming
Algorithm and Programming
Unrestricted Use
CC BY
Rating
0.0 stars

Students will write the algorithms to get from one point on the map to another.  They will then interchange with a partner and see if they can find the location. 

Subject:
Algorithms and Programming
Material Type:
Activity/Lab
Author:
Jennifer Woodlief
Date Added:
07/09/2022
Algorithms for Classroom Routines
Unrestricted Use
CC BY
Rating
0.0 stars

Students will collaborate with a partner to create algorithms for classroom routines.  They will create an illustrated anchor chart for all of the class to follow these algorithms.

Subject:
Algorithms and Programming
Communication and Multimodal Literacy
Material Type:
Activity/Lab
Author:
Erika Coble
Date Added:
06/27/2022
Algorithms with Hello Ruby Lesson Plan
Unrestricted Use
CC BY
Rating
0.0 stars

This lesson plan uses the Hello Ruby book, Adventures in Coding, by Linda Liukas, to teach students about algorithms and conditional loops. It contains an activity featured from the book as well as other resources that can be used in conjunction with the book. The lesson teaches 2nd grade students what an algorithm is and how they use them in everyday life. 

Subject:
Algorithms and Programming
Computer Science
Material Type:
Lesson Plan
Reading
Author:
Dana Smith
Date Added:
08/03/2021
Algortim and Programming Maze
Unrestricted Use
CC BY
Rating
0.0 stars

Students will give verbal cues to work through a maze of objects on the floor or ground.  Students could write an algorithm through the maze and see if the partner could get through without stepping on objects. 

Subject:
Algorithms and Programming
Material Type:
Activity/Lab
Author:
Jennifer Woodlief
Date Added:
07/09/2022
Anagram Program
Unrestricted Use
CC BY
Rating
0.0 stars

This lesson will have students write a program in Python to determine if 2 input words are anagrams of each other or not.

Subject:
Algorithms and Programming
Material Type:
Activity/Lab
Author:
Kimberly Emory
Date Added:
05/20/2022
Attribute Blocks
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will categorize attribute blocks based on their color, thickness and/or size. Optionally, connections to categorizing will be related to robots (e.g. looks, motions, sounds) and coding.

Subject:
Algorithms and Programming
Computer Science
Cross-Curricular
Mathematics
Science
Material Type:
Lesson Plan
Author:
Wendy S. Marticek
Date Added:
11/23/2021
Autonomous Cars: Human-computer Interaction
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This video explores autonomous cars with a research scientist, engineer, and team lead at the Virginia Tech Transportation Institute (VTTI).

Subject:
Algorithms and Programming
Computing Systems
Data and Analysis
Impacts of Computing
Material Type:
Activity/Lab
Author:
Kim Wilkens
Date Added:
08/02/2023
Brush Your Teeth Algorithm
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Using a Fluffy pancakes recipe students will identify a recipe as a type of algorithm.  Students will identify the part of the recipe that is numbered as the steps or algorithm is numbered.    Students are expected to identify that number one step is done before number 2 and so on.  Students will work in pairs to create their own algorithm for brushing teeth.  Students should work in pairs.  One student should create the algorithm and the other should debug the algorithm.  

Subject:
Algorithms and Programming
Material Type:
Homework/Assignment
Author:
Kevin Yates
Date Added:
06/01/2022
Brute Force Vs Decrease and Conquer Alogrithms
Unrestricted Use
CC BY
Rating
0.0 stars

The purpose of this lesson plan is to help students understand, using a practical approach, the difference between brute force and a decrease and conquer algorithm.  This approach will use an illustration from history to draw the student into the presentation and then utilize finding the GCF of a number to illustrate the difference in efficiencies

Subject:
Algorithms and Programming
Material Type:
Lesson Plan
Author:
Matthew Rose
Date Added:
06/08/2022
Brute Force and Divide and Conquer Multiples and Factors
Unrestricted Use
CC BY
Rating
0.0 stars

In the field of computer science, there are two approaches to solving a problem. One, being Brute Force, which is the method of just working out the problem until it is solved. This can be related to students with the idea of never giving up, or "I think I can, I think I can". Divide and Conquer is a problem solving method that braeks a larger problem into smaller problems. For example, if you have a big chore such as cleaning a house, start with one room at a time. This lesson applies these two methods to mathematics by using Brute Force to find multiples and common multiple of numbers. While the Divide and Conquer method is applied to fiding factors of a number through divisibility rules. 

Subject:
Algorithms and Programming
Mathematics
Material Type:
Assessment
Author:
Christopher McElraft
Date Added:
04/06/2022
Brute Force vs Divide and Conquer Sorting
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

 This activity will allow students to compare Brute Force and Divide and Conquer sorting algorithms.This activity will show the sorting process of a Brute Force algorithm and a Divide and Conquer algorithm that is used by a computer when sorting data.

Subject:
Algorithms and Programming
Material Type:
Activity/Lab
Author:
Ronald Sparks
Date Added:
04/18/2022
CS Strand Pocket Guides
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

These Pocket Guides are a quick summary of each of the 6 computer science strands for grades K-8. The pocket guides explain what the strand is about and how it increases in complexity from Kindergarten to 8th grade.

Subject:
Algorithms and Programming
Computer Science
Computing Systems
Cybersecurity
Data and Analysis
Impacts of Computing
Networking and the Internet
Material Type:
Teaching/Learning Strategy
Author:
CodeVA Curriculum
Valerie Fawley
Date Added:
11/18/2022
Caesar Cipher in Python
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson is designed to teach students basic encryption using the Caesar cipher method. This is a simple letter shift cipher that takes a plaintext message and encrypts it into cipher text by shifting each letter of the message by a value between 1 and 25 (1 less than the total number of letters in the English alphabet). This technique was used by Julius Caesar to encrypt messages by shifting each letter of the message by 3 letters. The message would be decrypted by taking each letter and shifting back 3 letters to reveal the plaintext message.

Subject:
Algorithms and Programming
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
05/23/2022