Updating search results...

Search Resources

613 Results

View
Selected filters:
  • Homework/Assignment
"One Art" SOL Aligned Multiple-Choice Questions
Unrestricted Use
CC BY
Rating
0.0 stars

This resource provides eight multiple-choice questions which were modeled after question stems frequently appearing on the End of Course (EOC) Reading Standards of Learning (SOL) test. It is designed to be used with the poem "One Art" by Elizabeth Bishop.

Subject:
English
Material Type:
Assessment
Homework/Assignment
Reading
Author:
Carrie Longworth
Date Added:
08/10/2021
One Crazy Summer
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this unit, students explore the meaning of family, community, and identity by reading the core text One Crazy Summer. Through the eyes of eleven-year-old Delphine, readers experience life in Oakland, California, in 1968, the height of the Black Panther movement. Delphine and her two younger sisters, Vonetta and Fern, spend a summer in Oakland visiting their estranged mother who sends them to spend their days at a camp run by the Black Panthers. Over the course of the summer, the girls learn about what it means to be part of a revolution, what the Black Panther Party was fighting for, and why the Black Panther Party was important during this time period. Through it all, they build confidence in themselves and their relationships with others as they learn to challenge and respond to social issues in the community. It is our hope that this unit, in conjunction with others in the series, will help students understand the way experiences shape our identities and beliefs, and how children can help bring about change in the community.

In reading, this unit continues to build on reading strategies and skills covered in previous units. It is assumed that students are able to quote or paraphrase accurately from the text, interpret figurative language, and summarize sections of the text. These skills should continue to be spiraled throughout the unit; however, the main focuses for this unit are determining theme and analyzing how it is developed over the course of the novel or poem, analyzing point of view and the impact it has on the way events are portrayed, and comparing characters and their responses to situations.

Subject:
Communication and Multimodal Literacy
English
Fiction
Reading
Writing
Material Type:
Assessment
Homework/Assignment
Lesson Plan
Provider:
Match Fishtank
Provider Set:
Fishtank ELA
Date Added:
01/01/2017
Operating System Tasks and Task Purposes
Unrestricted Use
CC BY
Rating
0.0 stars

This chart assignment is meant as a review and a second part to the first Computer Operating System Tasks (WS 1).  The student will mark each task with the appropriate purposes of the task in relationship to how the computer communicates, security protocols, storage and management of files, and its performace speed and accuracy.This can be used as an exit pass, interactive notebook or binder page, a small group or whole group assignment, or an independent activity/worksheet.This link will take you to the first WS if interested:  https://goopenva.org/courseware/lesson/4254This link will take you to the Computer OS poster/image for reference and use if interested: https://goopenva.org/courseware/lesson/4254

Subject:
Computing Systems
Material Type:
Activity/Lab
Binder
Homework/Assignment
Interactive
Author:
Emily Ball
Date Added:
11/16/2021
PAGE ACSE -  Building Stronger Passwords Image
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Looking for a fun way to teach both scientific method and cybersecurity? Well great job, you found it. Students will not only learn 5 characteristics to making a good password but they will also be using all of their 2.1, 3.1, and 4.1 strands to build and rebuild a structure using different materials that are probably inside your classroom right now.  Need a STEM activity for a club day? Need a “Friday and I can’t teach anymore content” lesson? This is for you. Roll up your sleeves and let the students do the work and problem solve in a simple and fun way.

Subject:
Computer Science
Cross-Curricular
Cybersecurity
STEM/STEAM
Science
Scientific and Engineering Practices
Material Type:
Activity/Lab
Homework/Assignment
Lesson Plan
Author:
Nichole Brumfield
Date Added:
01/23/2024
PAGE ACSE -  Cybersecurity in the Wild
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

How are predators in the WILD and ONLINE similar? Check out this lesson that incorporates Cybersecurity and pack animals! You will learn ways on how both the animals and you can be protected from danger!

Subject:
Computer Science
Cross-Curricular
Cybersecurity
Data and Analysis
Living Systems and Processes
STEM/STEAM
Science
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Lecture
Lesson
Lesson Plan
Author:
Nichole Brumfield
Date Added:
11/22/2024
PAGE ACSE - Data Selfie
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students learn about how computers represent data visually and how artists have used self portraits with symbolism to represent themselves. Then students will create their own data selfies including adding their names written in binary code. Written descriptions will be added to display alongside their artworks that will detail their data symbols and what their artwork says about them and how it relates to computer science. 

Subject:
Computer Science
Computing Systems
Cross-Curricular
English
STEM/STEAM
Visual Art
Material Type:
Activity/Lab
Homework/Assignment
Lesson Plan
Author:
Brandy Jenkins
Date Added:
11/04/2024
PAGE ACSE - Gas Laws and Data Analysis
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Would you like students to see how data analysis works in real life?  Using Gas Laws and Google Sheets students will definitely use their critical thinking skills to answer some questions and potentially manipulate their own created data!

Subject:
Computer Science
Cross-Curricular
Data and Analysis
Matter
STEM/STEAM
Science
Scientific and Engineering Practices
Material Type:
Activity/Lab
Homework/Assignment
Interactive
Lesson
Lesson Plan
Author:
Nichole Brumfield
Date Added:
11/22/2024
PAGE ACSE - Identify Campaign Propaganda by Analyzing Data Accuracy and Reliability in Ads
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will process the quality of data used in campaign ads by identifying the nature and uses of language and imagery to become aware of how candidates use words and images to influence viewer opinion and verifying information by fact checking and determining if information has been mischaracterized.

Subject:
Computer Science
Cross-Curricular
Data and Analysis
Government and Civics
History/Social Sciences
STEM/STEAM
Material Type:
Activity/Lab
Homework/Assignment
Interactive
Lesson
Lesson Plan
Author:
Sarah Getz
Date Added:
11/15/2024
PAGE ACSE -  Interpreting and organizing data based on computing systems found in our homes.
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will dive into the different components of computing systems, as we collect data from our homes to find out what computing systems are most commonly used in our families. Students will practice identifying inputs and output computer systems. 

Subject:
Computer Science
Computing Systems
Cross-Curricular
STEM/STEAM
Science
Scientific and Engineering Practices
Material Type:
Data Set
Homework/Assignment
Interactive
Lesson
Teaching/Learning Strategy
Author:
Amanda Dofflemyer
Date Added:
02/06/2024
PAGE ACSE -  Let’s Talk About It!
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

What better way to use technology than to keep track of your students during an at home project! This lesson will help you track your students’ progress and keep them on task as they work from home. 

Subject:
Computer Science
Cross-Curricular
Living Systems and Processes
Networking and the Internet
STEM/STEAM
Science
Material Type:
Activity/Lab
Homework/Assignment
Interactive
Lesson
Lesson Plan
Author:
Mary Longanecker
Date Added:
04/25/2024
PAGE ACSE -  Mali, Networking and the Internet
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will be using 3 different ways of communication to talk about the Empire of Mali.  This activity will encourage different students to participate in different ways.

Subject:
Computer Science
Cross-Curricular
History/Social Sciences
Networking and the Internet
STEM/STEAM
World History
Material Type:
Activity/Lab
Homework/Assignment
Lesson
Author:
Nichole Brumfield
Date Added:
03/28/2024
PAGE ACSE -  Scientific Racecar
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

If you want an easy way to review Scientific Method, along with Force and Motion here is the best lesson for you. Using ‘Hot Wheels’ you will be identifying IV, DV, and constants. You will also be reviewing kinetic energy, potential energy, motion, speed, force, and friction.

Subject:
Computer Science
Cross-Curricular
Force/Motion/Energy
Impacts of Computing
STEM/STEAM
Science
Material Type:
Activity/Lab
Homework/Assignment
Author:
Nichole Brumfield
Date Added:
03/28/2024
The Paleolithic Era to the Agricultural Revolution:Explaining How Physical Geography Influenced the Lives of Early Humans
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students examine images to determine how early humans used the environment. Students use skills of observe and identify details in images and then place them in eight categories: location, migration, physical geography, shelter, settlements, food acquisition, technological advancements, and social advancements. After learning characteristics of the Neolithic and Paleolithic eras, students determine whether or not images depict life in the Paleolithic or Neolithic Era. Students are challenged to make inferences and draw conclusions supported by evidence from the images. Key questions: How did early humans use the environment to meet their basic needs? How did hunter gatherer and agricultural societies differ in their use of the land?

Subject:
Geography
History/Social Sciences
World History
Material Type:
Homework/Assignment
Lesson
Visual Media
Provider:
Virginia Geographic Alliance
Provider Set:
World History and Geography to 1500 A.D. (C.E.) Class Lessons
Author:
Barbara
Donald J.
Georgeanne
Joseph D.
Rebecca
Shannon
Castelo
Crain
Enedy
Hribar
Mills
Zeigler
Date Added:
08/14/2012
Part 1 Password Safety: Brute Force
Unrestricted Use
CC BY
Rating
0.0 stars

In this first part of a three part series, students will explore the ideas around Brute Force algorithm/programs to further understand the importance of password development, use, safety, and safekeeping while completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately with a few adjustments as well.  Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Networking and the Internet
Material Type:
Activity/Lab
Game
Homework/Assignment
Author:
Emily Ball
Date Added:
03/20/2022
Part 2 Password Safety:  Decrease (Divide) and Conquer
Unrestricted Use
CC BY
Rating
0.0 stars

In this second part of a three part series, students will explore the ideas around Decrease, or Divide, and Conquer algorithm/programs to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately (stand-alone) with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Measurement and Geometry
Networking and the Internet
Material Type:
Activity/Lab
Homework/Assignment
Author:
Emily Ball
Date Added:
03/21/2022
Part 3:  Password Safety: Unplugged Decryption
Unrestricted Use
CC BY
Rating
0.0 stars

In this final part of a three part series, students will practice Brute Force and Decrease (or Divide) and Conquer methods to try to crack a password puzzle to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged sorting activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately with a few minor adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Networking and the Internet
Material Type:
Activity/Lab
Homework/Assignment
Author:
Emily Ball
Date Added:
03/21/2022
Partner Shopping Trip for Outfits
Unrestricted Use
CC BY
Rating
0.0 stars

Students work with a partner to go on a pretend online shopping spree. They use clothing and accessory words, colors, descriptive adjectives, and BAGS adjectives to talk through outfits they’d consider buying.

Subject:
French
Material Type:
Activity/Lab
Homework/Assignment
Author:
Ingrid McGuckin
Date Added:
06/15/2021