Computer Science Standard Alignment Guides are resources for teachers working to integrate …
Computer Science Standard Alignment Guides are resources for teachers working to integrate computer science into their core curriculum. These guides explain the standard, give a sample activity or lesson that teaches the standard, and ways to measure student proficiency on the skill or concept.
Using the book How to Code a Sandcastle by Josh Funk to …
Using the book How to Code a Sandcastle by Josh Funk to introduce coding, some essential vocabulary, and using a coding mat to have students orally and with their white boards and markers try to code a robot.
The Computer Science Office in Loudoun County Public Schools has developed this …
The Computer Science Office in Loudoun County Public Schools has developed this curriculum integration document to support the integration of the 2017 Virginia Computer Science Standards into core subject areas and beyond. Each CS standard was aligned to up to 3 grade level standards that made natural correlations.Additionally, many activities and resources were included to each standard to support the introduction and integration of the standard. For each of the six strands of the Computer Science Standards of Learning: Computing Systems, Networks and the Internet, Cybersecurity, Data and Analysis, Algorithms and Programming, and Impacts of Computing, we have included tiered support called "Fuel", "Spark", and "Ignite". The "Fuel" is provided to build teacher capacity and students' understanding in understanding the CS SOL. The "Spark" provides a Computer Science integrated experience into a core or speciality subject SOL. The "Ignite" section is where teachers in Loudoun County have the opportunity to share authentic learning experiences and lessons in our LCPS Computer Science Lesson Repository.This document was created as part of the Virginia K-12 Computer Science Pipeline which is partly funded through a GOVA and DHCD grant in partnership with Chesapeake Public Schools, Loudoun County Public Schools, and the Loudoun Education Foundation.
These slide help to decipher between and explain Local Area Networks and …
These slide help to decipher between and explain Local Area Networks and Wide Are Networks. The teacher can use the slides to explain and then print the slides with pictures to display in the room as a reminder.
The Computer Science Office in Loudoun County, Virginia has developed an open …
The Computer Science Office in Loudoun County, Virginia has developed an open access lesson repository as a place for LCPS teachers and administrators to store, search, access, and share district created, free, curated digital resources that integrate Virginia’s Computer Science Standards of Learning.
This lesson sequence offers students and teachers a way to explore their …
This lesson sequence offers students and teachers a way to explore their individual identities and sense of belonging through analyzing children’s literature and coding with Scratch. Through read-aloud activities and self-differentiated Scratch projects, students learn about the value of inclusion and explore and express ideas about their personal and social identities. Students will describe environments supportive of diversity, and reflect on their own identity as they create expressive projects about their sense of belonging. This sequence is made up of four lessons, though your students may need additional class time to work on their projects.This lesson sequence is part of CodeVA's committment to the U.S. Department of Education "YOU Belong in STEM" initiative.
The internet can be both an exciting and terrifying place, and knowledge …
The internet can be both an exciting and terrifying place, and knowledge of how to navigate it is crucial for students. In this lesson, students will take on the role of an investigative detective who is gathering intel on a specific kind of cybercrime. These cybercrimes are all real events that occurred in history and students analysis of them will help them understand the types of crimes that take place in the digital world and understand how and why these types of crimes take place.
Welcome back to the Cyber Crimes Unit. Now that students have been …
Welcome back to the Cyber Crimes Unit. Now that students have been taught an overview of Cybersecurity threats, they are now going to focus in on a very specific type of threat as they wrap up this topic. Denial of Service Attacks are an amalgamation of a lot of different concepts discussed before (phishing, malware, etc), but elevate these concepts to company destroying techniques. Unlike some sophisticated techniques, this can be a rEnglishtively home grown cyberattack, so the more students understand what it is, how it attacks, and how to protect themselves, the more informed they will be about this very common technique in cybersecurity.
The process of how a bill becomes law is a fascinating process …
The process of how a bill becomes law is a fascinating process that is much more than just a Representative or Senator introducing a bill and having it move through the process to its eventual demise or addition to another bill or to the bill ending up on the President’s desk itself. An even more interesting question is: “What is the subject matter of MANY of these bills- researched, drafted, and introduced? This lesson will tackle that question and many others!
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.