The students will identify their own first and last name, while finding …
The students will identify their own first and last name, while finding their names around the room. They will begin to develop an understanding that they need to protect their personal information. Students will begin working with their computer identification login information.
This is a very quick lesson that introduces the students to computer …
This is a very quick lesson that introduces the students to computer science vocabulary and connects it to a read aloud. After the read aloud the students are encouraged to summarize the read aloud with peers while using the computer science language they were introduced to.
In this unplugged lesson, students will be learning computer science vocabulary, listening …
In this unplugged lesson, students will be learning computer science vocabulary, listening to a read, and summarizing the story from their read aloud. The students will identify where they can see the computer science vocabulary they learned occur in the story. The students will work in partners to complete an unplugged lesson of moving the events in the correct order of the loop of the story.
Students will listen to the story There Was an Old Lady that …
Students will listen to the story There Was an Old Lady that Swallowed a Fly and be able to retell the story in sequential order. Students will construct step-by-step instructions using retelling necklaces to put the events in order and then be placed with a partner/group for a sequencing writing activity.
Understanding how a computer communicates and sends information is foundational to an …
Understanding how a computer communicates and sends information is foundational to an understanding of how networks work. Since students are part of an interconnected world, it is imperative that they go beyond the simple explanations and instead fully understand the complexity behind something that occurs so seamlessly in today’s day and age. Students will investigate how protocols work and begin to build a framework to understand this process so that as they investigate this further in the followup lesson, they can begin to reason and understand with the knowledge learned here. The primary focus on this lesson is centered on building frameworks and is focused on students communicating information than modeling information for them. All of this will prepare them for the follow-up lesson where they will work on building models of their own.
Understanding how a computer communicates and sends information is foundational to an …
Understanding how a computer communicates and sends information is foundational to an understanding of how networks work. Since students are part of an interconnected world, it is imperative that they go beyond the simple explanations and instead fully understand the complexity behind something that occurs so seamlessly in today’s day and age. Now that a foundational framework has been laid, students will now apply their knowledge of the subject by creating their own practical models and reasoning out problem solving scenarios. The primary focus on this lesson is centered on the students applying their knowledge and crafting something new and original that will help them understand this concept in an even richer way.
In this lesson, students will discuss and analyze human impact on the …
In this lesson, students will discuss and analyze human impact on the environment. While completing activities on human impact and seeing how this can change populations over time, students will analyze how technology has had a similar impact on the environment and the world. They will also debate the advantages and disadvantages of having these technological advances.
Students will use unplugged coding games to design, develop, and deliver an …
Students will use unplugged coding games to design, develop, and deliver an unplugged coding game to play with others. The student will create a plan as part of the iterative design process, both independently and collaboratively using strategies such as pair programming (e.g., storyboard, flowchart, pseudocode, story map).
In this English, Computer Science lesson students will put their previously taught …
In this English, Computer Science lesson students will put their previously taught knowledge of character traits and story elements to the test in this unplugged portion of the activity by comparing characters from two versions of the same story. This fast paced activity will show if the students have what it takes to correctly sort and identify the correct story elements and character traits for their specified story version. In doing so they will then enter the plugged portion of the activity where they will be given a piece of a coding algorithm that will help their Beebot to escape from the Evil Book Worms dungeon! Can they compare and contrast, sequence, debug and program their Beebots escape in time?
Students will integrate history and art to create origami models of several …
Students will integrate history and art to create origami models of several types of transportation and order them sequentially based on their development in United States history over time. Additionally, cooperating with the art teacher to help teach the origami portion will demonstrate collaboration and communication skills amongst peers and coworkers.
Students will practice sorting triangles based on sides and angles and write …
Students will practice sorting triangles based on sides and angles and write a program that sorts triangles based on the measure of their angles using conditionals.
Students will create right triangles and calculate the length of each side. …
Students will create right triangles and calculate the length of each side. Utilizing the Pythagorean Theorem (a squared + b squared = c squared) they will measure two sides of the right triangle and predict the 3rd side’s measurement. They will cut sheets of graph paper and determine the hypotenuse’s (side opposite the right angle) length. This block based activity will tie in to the computer science vocabulary and show how it corrEnglishtes to what the student is learning in Mathematics.
Students will be introduced to the vocabulary of the lesson first. They …
Students will be introduced to the vocabulary of the lesson first. They will then learn about the Trojan war and the secret of the Trojan Horse. Finally, students will use a deck of Uno cards in small groups to simulate code and search for a Trojan Horse virus. It is a metaphor to see if a Trojan guard can catch a Trojan Horse scam before the Spartans attack the city.
Students will discuss issues that can occur with devices and ways to …
Students will discuss issues that can occur with devices and ways to resolve them. Students will work together to create a classroom guide for troubleshooting technology problems.
Students will learn that QSN as a mnemonic which will assist them …
Students will learn that QSN as a mnemonic which will assist them in breaking apart and analyzing the more complex word problem into smaller sections that make it more easily handled.
Students will investigate scenarios of hacking and data breaches. To begin, students …
Students will investigate scenarios of hacking and data breaches. To begin, students will become familiar with the terms hacking and ransomware associated with data breaches. As a whole group, they will discuss the impacts of hacking both legally and ethically. They will research a specific data breach and then work in groups to create an infographic explaining the effects and impacts of hacking.
Students encounter patterns throughout their day-to-day lives. Identifying patterns helps students make …
Students encounter patterns throughout their day-to-day lives. Identifying patterns helps students make predictions about what will happen next in a series of events, and helps them understand the sequential nature of many routine activities. Students will be introduced to the concept of algorithms as being repetitive commands or actions that execute a program, similar to how we use patterns throughout our day to carry us from one activity to another. Students will identify, create and extend patterns using manipulatives (toy cars and a grid), and discuss ways that computer programs move through a similar process of repeating steps using algorithms and loops.
During this lesson, students will work to debug incorrect algorithms (repeating patterns) …
During this lesson, students will work to debug incorrect algorithms (repeating patterns) and use the corrected algorithm to extend the pattern. This lesson will provide an opportunity for students to demonstrate their knowledge of patterns and apply computer science principles and vocabulary to build background knowledge and understanding about algorithms, loops, and events.
The student will develop an algorithm with the use of simple coding …
The student will develop an algorithm with the use of simple coding cards to direct their peers to an appropriate picture. Students will roll digraph dice and develop an algorithm that uses simple steps to guide their peers to coordinating pictures on a grid (ex. sh- ship).
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.