Updating search results...

Search Resources

8097 Results

View
Selected filters:
Current Events Assignment
Unrestricted Use
CC BY
Rating
0.0 stars

Students choose a newsworthy article about something happening at the international, national, state, or local level. Students use the model below to set up a current event that includes summary, evidence, commentary, and citations. 

Subject:
Writing
Material Type:
Homework/Assignment
Author:
Susan Rowland
Date Added:
05/27/2021
Curriculum Mapping Tool
Unrestricted Use
CC BY
Rating
0.0 stars

Intentional planning of Tier I supports provides all students essential opportunities to acquire new skills and more powerful opportunities for development when immersed throughout collaborative daily learning.  Using the Curriculum Map is a great way for staff to combine efforts that focus on strengthening skills, knowledge and behaviors which often makes a greater impact on overall student development.

Subject:
Social Development Instruction
Material Type:
Teaching/Learning Strategy
Author:
Sarah Bazemore
Date Added:
04/12/2022
Curve Fitting (AR)
Unrestricted Use
CC BY
Rating
0.0 stars

With your mouse, drag data points and their error bars, and watch the best-fit polynomial curve update instantly. You choose the type of fit: linear, quadratic, cubic, or quartic. The reduced chi-square statistic shows you when the fit is good. Or you can try to find the best fit by manually adjusting fit parameters.

Subject:
Mathematics
Material Type:
Simulation
Provider:
University of Colorado Boulder
Provider Set:
PhET Interactive Simulations
Author:
Michael Dubson
Patricia Loblein
Date Added:
08/02/2012
Curve Fitting Remix
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

With your mouse, drag data points and their error bars, and watch the best-fit polynomial curve update instantly. You choose the type of fit: linear, quadratic, cubic, or quartic. The reduced chi-square statistic shows you when the fit is good. Or you can try to find the best fit by manually adjusting fit parameters.

Subject:
Algebra I & II
Mathematics
Probability and Statistics
Material Type:
Activity/Lab
Date Added:
12/03/2019
Curve of Best Fit
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Developing a curve of best fit for dataMathematics Instructional Plans (MIPs) help teachers align instruction with the 2016 Mathematics Standards of Learning (SOL) by providing examples of how the knowledge, skills and processes found in the SOL and curriculum framework can be presented to students in the classroom.

Subject:
Algebra I & II
Mathematics
Material Type:
Lesson Plan
Author:
Virginia Hodge
Tina Mazzacane
Date Added:
04/24/2020
Curve of Best Fit
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Collecting and analyzing data, using curve of best fit Mathematics Instructional Plans (MIPs) help teachers align instruction with the 2016 Mathematics Standards of Learning (SOL) by providing examples of how the knowledge, skills and processes found in the SOL and curriculum framework can be presented to students in the classroom.

Subject:
Algebra I & II
Mathematics
Material Type:
Lesson Plan
Author:
Virginia Hodge
Tina Mazzacane
Date Added:
05/15/2020
Curve of Best Fit 2
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Determining a curve of best fit Mathematics Instructional Plans (MIPs) help teachers align instruction with the 2016 Mathematics Standards of Learning (SOL) by providing examples of how the knowledge, skills and processes found in the SOL and curriculum framework can be presented to students in the classroom.

Subject:
Algebra I & II
Mathematics
Material Type:
Lesson Plan
Author:
Virginia Hodge
Tina Mazzacane
Date Added:
04/24/2020
Cyber-Bullying
Unrestricted Use
CC BY
Rating
0.0 stars

This lesson is designed to assist & help students recognize & handle Cyberbullying.  https://goopenva.org/

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Melissa Wilcox
Date Added:
06/14/2021
Cyber Careers
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

PDF resource of different Cyber Careers from NICERC. The document details 15 different cyber related careers which can be used to aid students in choosing a career path in Cybersecurity. Good way to discuss with students the opportunities available in the growing field. The document details the job profile, education requirements, median salary, job growth percent, and common job duties. 

Subject:
Computer Science
Cybersecurity
Impacts of Computing
Material Type:
Activity/Lab
Author:
Ronald Sparks
Date Added:
06/14/2022
Cyber Security
Read the Fine Print
Educational Use
Rating
0.0 stars

Students will learn about cyber security and keeping their information safe. They will then create a presentation for younger students to teach them about cyber security.

Subject:
English
Material Type:
Lesson Plan
Provider:
ACSE Regional Partnership
Provider Set:
Central Virginia Computer Science Integration Team 2023
Author:
CVCSI Team
Date Added:
02/05/2024
Cyber Security Sotrytelling
Read the Fine Print
Educational Use
Rating
0.0 stars

Students will identify and work to solve various cyber security concerns by answering a rEnglishted prompt and working through the problem.

Subject:
English
Material Type:
Lesson Plan
Provider:
ACSE Regional Partnership
Provider Set:
Central Virginia Computer Science Integration Team 2023
Author:
CVCSI Team
Date Added:
03/10/2024
#CyberSmarts (3 Lessons by Scholastic)
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

The lessons provided are presented by Scholastic and sponsored by Norton Lifelock.
All rights reserved by Scholastic.
Below is an overview of the three lessons provided.
The lessons do not coincide with one another.
The teacher can choose to use all three or select the best option for the classroom needs.

The PDF Links includes:
Lesson 1: Understanding Online Safety (45 minutes)
- Students will analyze text, citing evidence and summarizing central ideas. They will make inferences to create their own cybersecurity protection plan.
- Students will use the provided copy of #Cybersmarts student magazine to create their personalized online protection plan.

Lesson 2: Identifying Preventive Technologies (45 minutes + presentation time)
- Students will conduct research on preventive technologies built and used by professionals in the cybersecurity field (e.g., firewalls, ad blocker apps, antivirus software, voice recognition software, virtual private network (VPN), etc.).
- Students will then prepare a presentation - the given choices are a skit or interview. Presentation options can be easily adapted to best fit your classroom needs.
- Research planning/ gathering page is provided.

Lesson 3: Making Online Profiles More Secure (2 part lesson - 90 minutes total)
- Students will use analytical and reasoning skills to identify areas of vulnerability in an online profile and come up with strategies for how to make them more secure by applying information from a text.
- First, students will analyze their own personal profiles (if applicable). Then, they will analyze a provided “profile” to identify security holes. Last, discuss the answers and reasonings as a class.
*This lesson can be shortened to fit into one class period.
*(Optional) An extension idea is provided. It includes information from all lessons. Students will use what they have learned to create their own cybersecurity device.

Subject:
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Lesson Plan
Reading
Author:
Norton Lifelock
Scholastic
Date Added:
02/02/2022
CyberTipline
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Making a report of child exploitation is secure and easy. The form can be completed in just a few minutes, and you decide if you want to share your contact information. In fact, many of the fields are optional so what information you provide, is up to you.

Subject:
Cross-Curricular
Material Type:
Interactive
Primary Source
Provider:
Virginia Internet Safety Advisory Council
Provider Set:
2024
Date Added:
03/15/2024
Cyberbiosecurity Who-Dun-It
Unrestricted Use
CC BY
Rating
0.0 stars

This activity aims to engage middle-school students with cyberbiosecurity topics through a murder mystery-style puzzle. As the narrator, you will set the cybercrime scene and provide breadcrumbs along the way. Your students will serve as investigators, drawing connections between agricultural and computer science topics while they solve the crime. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurityThis work is supported by the USDA National Institute of Food and Agriculture, Women and Minorities in Science, Technology, Engineering, and Mathematics Fields (WAMS) Grants Program, award #2020-38503-31950.

Subject:
Agricultural Education
Communication Skills
Computer Science
Cybersecurity
STEM/STEAM
Science
Technology Education
Material Type:
Activity/Lab
Module
Teaching/Learning Strategy
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
04/04/2022
Cyberbiosecurity Who-Dun-It: The Tasty Treat Transgression
Unrestricted Use
CC BY
Rating
0.0 stars

This activity aims to engage middle-school students with cyberbiosecurity topics through a murder mystery-style puzzle. As the narrator, you will set the cybercrime scene and provide breadcrumbs along the way. Your students will serve as investigators, drawing connections between agricultural and computer science topics while they solve the crime. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurityThis work is supported by the USDA National Institute of Food and Agriculture, Women and Minorities in Science, Technology, Engineering, and Mathematics Fields (WAMS) Grants Program, award #2020-38503-31950.

Subject:
Agricultural Education
Communication Skills
Computer Science
Cybersecurity
STEM/STEAM
Science
Technology Education
Material Type:
Activity/Lab
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
07/27/2022
Cyberbullying
Unrestricted Use
CC BY
Rating
0.0 stars

 Students describe the dynamics of online cruelty and how it affects all the people involved.  Students explain the difference between being a passive bystander versus a brave upstander in cyberbullying situations.      

Subject:
Communication Instruction
Communication Skills
Health Education
Material Type:
Lesson
Author:
Sharon Opeka
Date Added:
07/15/2020
Cyberbullying Research Center
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

This website serves as a clearinghouse of information concerning the ways adolescents use and misuse technology. It is intended to be a resource for parents, educators, mental health professionals, law enforcement officers, counselors, and others who work with youth (as well as for youth themselves!). Here you will find facts, figures, and detailed stories from those who have been directly impacted by online aggression. In addition, the site includes numerous resources to help you prevent and respond to cyberbullying incidents. All of the information on this site is informed by over fifteen years of research.

Subject:
Cross-Curricular
Material Type:
Case Study
Data Set
Lesson
Student Guide
Provider:
Virginia Internet Safety Advisory Council
Provider Set:
2024
Date Added:
03/15/2024