A student’s exposure to sentence formation occurs, most often, at a very …
A student’s exposure to sentence formation occurs, most often, at a very young age. Over time this exposure helps build their sentence building foundation and ability to create solid sentences of their own. Using the mentor text, “The Important book” by, Maragret Wise Brown, students will use the author’s craft (mode of writing) to create sentences of their own modeling the written patterns noted in the book. Through this unplugged activity, students will combine their knowledge of looping in computer science to their grammatical skills to formulate strong complete sentences. These sentences will model that of the author’s craft of writing to complete their own “important idea” statements. Upon completion of their sentences students will combine their writings to create an algorithm of ideas that loop to follow that of the original mentor text. Combining the areas of language arts and computer science together in this lesson, allows the students to work on two common and necessary learning components.
Impossible Password Hack Challenge!! Students will dive into the mid-year review with a …
Impossible Password Hack Challenge!! Students will dive into the mid-year review with a new outlook on their vocabulary words. As they go back through old information they have the challenge to turn vocabulary words into the strongest password. What group will be able to create the most complex passwords.
Discussion about hardware, software, input, and outputs on computers. Then students will …
Discussion about hardware, software, input, and outputs on computers. Then students will use input and output function boxes to review addition and subtraction. One number would be the input and the solution as output and determine the rule of the machine or function box.
Students will have to show all the steps required to solve practical …
Students will have to show all the steps required to solve practical problems involving inequalities. Once they have documented their method and solved the problems, they will pass their own work to a peer who will see if they can follow and test each step to verify its accuracy. If there are any errors, the peers can debug the method together and come up with a solution or new steps that would prove to be accurate. The students should be able to complete a full worksheet and provide feedback for their peers.
This lesson focuses on inference and prediction, which are valuable reading skills. …
This lesson focuses on inference and prediction, which are valuable reading skills. It also exposes students to another important skill in CS, tracing code. Students are introduced to the lesson by predicting the outcome of a simple code projected on the board. Then they transfer that knowledge and skill into English by predicting the outcome of a story by examining the clues in the text.
In this lesson, students will be identifying different sources of information in …
In this lesson, students will be identifying different sources of information in regards to books, pictures, and people. They will learn what kind of information we can get from each source and how to use that information to help solve problems or answer questions. They will also become a source of information and tell about what they know.
Students will explore many examples of physical and digital security measures. They …
Students will explore many examples of physical and digital security measures. They will apply these concepts to safety procedures used in a law of conservation of matter activity and create a safety plan for the science lab using both physical and digital security measures.
Social and Ethical Issues C/T K-2.3 Students will make responsible decisions—grounded in knowledge …
Social and Ethical Issues C/T K-2.3 Students will make responsible decisions—grounded in knowledge of digital safety and security best practices—that pertain to various digital communication tools and methods.D. Identify and model responsible behaviors when using information and technology. • Identify strategies to address bullying situations involving electronic devices.
The purpose of this lesson is to help students make responsible decisions …
The purpose of this lesson is to help students make responsible decisions regarding digital citizenship in the areas of personal safety and cyberbullying. The goal is to prepare students to be safe and responsible online explorers.
Developed by the Science Museum of Western Virginia, this educator outline was …
Developed by the Science Museum of Western Virginia, this educator outline was written for an in-museum program that addresses computational thinking. Teachers and students in grades 3-4 will expand knowledge of computer science algorithms and programming content while working through the activities "Flossbot" and "Edison Bot Activity".
In this lesson, students engage in a historical jigsaw activity focused on …
In this lesson, students engage in a historical jigsaw activity focused on westward expansion. The lesson ends with a coding project where students create “postcards” by coding with Twine, expressing the perspectives of different groups experiencing the effects of westward expansion.--
This lesson is part of the Virginia K-12 Computer Science Pipeline which is partly …
This lesson is part of the Virginia K-12 Computer Science Pipeline which is partly funded through a GO Virginia grant in partnership with Chesapeake Public Schools, Loudoun County Public Schools, and the Loudoun Education Foundation. During this lesson, students will explore contact and noncontact forces.
The students will work as a class to use scientific practices. They …
The students will work as a class to use scientific practices. They will create an algorithm for how to investigate the weight of common objects around their classroom. The teacher will help the students record their algorithm emphasizing the beginning, middle, and end of the steps on a piece of chart paper. After this, the students will gather materials and carry out their investigation using the step-by-step instructions they created in groups of two. At the end of the lesson, the teacher will assess what the students have learned by having them explain the algorithm that was established by the class to measure the weight of objects.
Students will learn about all of the computers they encounter each day. …
Students will learn about all of the computers they encounter each day. They will read part of a book where the character explores the inside of the computer to figure out what they do. They will list any potential problems that she may encounter to review problem and solution. Students will walk away knowing the functions of a computer (input, output, process, and storing).
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.