Buying and maintaining a car is a project designed to help students …
Buying and maintaining a car is a project designed to help students understand the financial implications and budgeting of purchasing and maintaining a car. This project was designed by Pam Spots of Powhatan County Public SchoolsEssential Knowledge, Skills, and Processes: Research, some math skills, and being able to find basic information on the internet. Primary SOL: DE.21
CATCH Healthy Smiles is a program for grades Pre-K – 2 that …
CATCH Healthy Smiles is a program for grades Pre-K – 2 that is designed to improve the oral health of students by teaching about and encouraging proper toothbrushing and flossing techniques, a nutritious diet, and regular visits to a dentist.
Through the program, students learn about the major factors that cause tooth decay and develop the skills needed to maintain a healthy smile. The CATCH Healthy Smiles program is designed to help students:
* Discover the causes of tooth decay, including dietary choices and poor oral health habits in our oral health education programs; * Develop skills for brushing, flossing, and choosing tooth-healthy foods & drinks; * Recognize the importance of regular dental visits; and, * Create personal oral health care goals.
CATCH Healthy Smiles was developed by researchers at the Michael & Susan Dell Center for Healthy Living at The University of Texas Health Science Center at Houston (UTHealth) School of Public Health, with funding support from the National Institutes of Health.
This is a lesson plan where students will collect data using a …
This is a lesson plan where students will collect data using a survey, record their findings using a pictograph, and make predictions about their findings. This is from the essential knowledge of the Comptuer Science standard 2.11.
This is a lesson plan based on the Computer Science standard, 2.12, …
This is a lesson plan based on the Computer Science standard, 2.12, where students will create a model. The students will visit a website first to see how a digital model looks and then will create their own digital models of the solar system by using Google Jamboard.
This is a crossword puzzle designed on Flippity.net that has the essential …
This is a crossword puzzle designed on Flippity.net that has the essential vocabulary from the Computer Science SOL 3.17 in Networking and the Internet.
This activity, created on Quizalize, is from the essential knowledge and vocabulary …
This activity, created on Quizalize, is from the essential knowledge and vocabulary from the Computer Science SOL 5.7, from the strand Computing Systems.
This is a crossword puzzle that is comprised of the essential vocabulary from …
This is a crossword puzzle that is comprised of the essential vocabulary from the Computer Science SOL 8.7 in Cybersecurity. It was made at Flippity.net.
One of the fundamental computer science concepts is that everything we do …
One of the fundamental computer science concepts is that everything we do on a computer is really just turning binary digits on and off. Even though this sounds simple, it can be a concept that is hard to wrap one's head around. This activity brings the binary concept to reality through the creation of binary bracelets or bookmarks.
The Card Flip Magic trick helps to demonstrate how computers detect errors …
The Card Flip Magic trick helps to demonstrate how computers detect errors in the binary data they send and receive using parity checks. Inspired by Parity magic from CS Unplugged
When you make an LED card, you are bringing together the fundamentals …
When you make an LED card, you are bringing together the fundamentals of electronics that make up computing devices - power (battery), input (using a pressure sensor to open or close a circuit) and output (LED light). It’s also a great way to reinforce the binary states of on and off that are at the core of how all computing devices work.
Inspired by Dear Data, a book that highlights a year-long data drawing …
Inspired by Dear Data, a book that highlights a year-long data drawing project between two friends, this activity helps students go through the process of telling a story with their own data by formulating a question, collecting the data, analyzing the data, and interpreting and communicating their story.
With advances in AI, it is more important than ever that we …
With advances in AI, it is more important than ever that we consider how humans and computers will interact. How do you want the robots of the future to behave towards you and others? For this activity, students will make a “robot zine” where they will sketch an original robot design, identify how their robot will sense the world around it and write a code of conduct to describe how their robot will interact with humans.
Every day our privacy is at risk with data being collected about …
Every day our privacy is at risk with data being collected about us as we share and live more of our lives online. For this activity, you will explore how you do and do not protect your privacy online and then create a security avatar to help you battle for your privacy.
This unplugged lesson will allow students to encrypt and decrypt message using …
This unplugged lesson will allow students to encrypt and decrypt message using the Caesar Cipher letter shift method of encryption. Cover the process of how this method works by doing an example and explaining the process of shifting the plaintext by the letter shift value to create the encrypted cipher text.
This lesson is designed to teach students basic encryption using the Caesar …
This lesson is designed to teach students basic encryption using the Caesar cipher method. This is a simple letter shift cipher that takes a plaintext message and encrypts it into cipher text by shifting each letter of the message by a value between 1 and 25 (1 less than the total number of letters in the English alphabet). This technique was used by Julius Caesar to encrypt messages by shifting each letter of the message by 3 letters. The message would be decrypted by taking each letter and shifting back 3 letters to reveal the plaintext message.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.