This resource provides eight multiple-choice questions which were modeled after question stems …
This resource provides eight multiple-choice questions which were modeled after question stems frequently appearing on the End of Course (EOC) Reading Standards of Learning (SOL) test. It is designed to be used with the poem "One Art" by Elizabeth Bishop.
In this unit, students explore the meaning of family, community, and identity …
In this unit, students explore the meaning of family, community, and identity by reading the core text One Crazy Summer. Through the eyes of eleven-year-old Delphine, readers experience life in Oakland, California, in 1968, the height of the Black Panther movement. Delphine and her two younger sisters, Vonetta and Fern, spend a summer in Oakland visiting their estranged mother who sends them to spend their days at a camp run by the Black Panthers. Over the course of the summer, the girls learn about what it means to be part of a revolution, what the Black Panther Party was fighting for, and why the Black Panther Party was important during this time period. Through it all, they build confidence in themselves and their relationships with others as they learn to challenge and respond to social issues in the community. It is our hope that this unit, in conjunction with others in the series, will help students understand the way experiences shape our identities and beliefs, and how children can help bring about change in the community.
In reading, this unit continues to build on reading strategies and skills covered in previous units. It is assumed that students are able to quote or paraphrase accurately from the text, interpret figurative language, and summarize sections of the text. These skills should continue to be spiraled throughout the unit; however, the main focuses for this unit are determining theme and analyzing how it is developed over the course of the novel or poem, analyzing point of view and the impact it has on the way events are portrayed, and comparing characters and their responses to situations.
This chart assignment is meant as a review and a second part …
This chart assignment is meant as a review and a second part to the first Computer Operating System Tasks (WS 1). The student will mark each task with the appropriate purposes of the task in relationship to how the computer communicates, security protocols, storage and management of files, and its performace speed and accuracy.This can be used as an exit pass, interactive notebook or binder page, a small group or whole group assignment, or an independent activity/worksheet.This link will take you to the first WS if interested: https://goopenva.org/courseware/lesson/4254This link will take you to the Computer OS poster/image for reference and use if interested: https://goopenva.org/courseware/lesson/4254
In this virtual scavenger hunt, students will simplify expressions, by using the …
In this virtual scavenger hunt, students will simplify expressions, by using the order of operations, and rearrange cards so they are in the correct order.
Looking for a fun way to teach both scientific method and cybersecurity? …
Looking for a fun way to teach both scientific method and cybersecurity? Well great job, you found it. Students will not only learn 5 characteristics to making a good password but they will also be using all of their 2.1, 3.1, and 4.1 strands to build and rebuild a structure using different materials that are probably inside your classroom right now. Need a STEM activity for a club day? Need a “Friday and I can’t teach anymore content” lesson? This is for you. Roll up your sleeves and let the students do the work and problem solve in a simple and fun way.
How are predators in the WILD and ONLINE similar? Check out this …
How are predators in the WILD and ONLINE similar? Check out this lesson that incorporates Cybersecurity and pack animals! You will learn ways on how both the animals and you can be protected from danger!
Students learn about how computers represent data visually and how artists have …
Students learn about how computers represent data visually and how artists have used self portraits with symbolism to represent themselves. Then students will create their own data selfies including adding their names written in binary code. Written descriptions will be added to display alongside their artworks that will detail their data symbols and what their artwork says about them and how it relates to computer science.
Would you like students to see how data analysis works in real …
Would you like students to see how data analysis works in real life? Using Gas Laws and Google Sheets students will definitely use their critical thinking skills to answer some questions and potentially manipulate their own created data!
Students will process the quality of data used in campaign ads by …
Students will process the quality of data used in campaign ads by identifying the nature and uses of language and imagery to become aware of how candidates use words and images to influence viewer opinion and verifying information by fact checking and determining if information has been mischaracterized.
Students will dive into the different components of computing systems, as we …
Students will dive into the different components of computing systems, as we collect data from our homes to find out what computing systems are most commonly used in our families. Students will practice identifying inputs and output computer systems.
What better way to use technology than to keep track of your …
What better way to use technology than to keep track of your students during an at home project! This lesson will help you track your students’ progress and keep them on task as they work from home.
Students will be using 3 different ways of communication to talk about …
Students will be using 3 different ways of communication to talk about the Empire of Mali. This activity will encourage different students to participate in different ways.
If you want an easy way to review Scientific Method, along with …
If you want an easy way to review Scientific Method, along with Force and Motion here is the best lesson for you. Using ‘Hot Wheels’ you will be identifying IV, DV, and constants. You will also be reviewing kinetic energy, potential energy, motion, speed, force, and friction.
Students examine images to determine how early humans used the environment. Students …
Students examine images to determine how early humans used the environment. Students use skills of observe and identify details in images and then place them in eight categories: location, migration, physical geography, shelter, settlements, food acquisition, technological advancements, and social advancements. After learning characteristics of the Neolithic and Paleolithic eras, students determine whether or not images depict life in the Paleolithic or Neolithic Era. Students are challenged to make inferences and draw conclusions supported by evidence from the images. Key questions: How did early humans use the environment to meet their basic needs? How did hunter gatherer and agricultural societies differ in their use of the land?
In this first part of a three part series, students will explore …
In this first part of a three part series, students will explore the ideas around Brute Force algorithm/programs to further understand the importance of password development, use, safety, and safekeeping while completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each). These activites can be completed seperately with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired. Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes. Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged). These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.
In this second part of a three part series, students will explore …
In this second part of a three part series, students will explore the ideas around Decrease, or Divide, and Conquer algorithm/programs to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each). These activites can be completed seperately (stand-alone) with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired. Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes. Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged). These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.
In this final part of a three part series, students will practice …
In this final part of a three part series, students will practice Brute Force and Decrease (or Divide) and Conquer methods to try to crack a password puzzle to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged sorting activities over the course of three class periods (approximately 30-45 minutes each). These activites can be completed seperately with a few minor adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired. Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes. Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged). These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.
Students work with a partner to go on a pretend online shopping …
Students work with a partner to go on a pretend online shopping spree. They use clothing and accessory words, colors, descriptive adjectives, and BAGS adjectives to talk through outfits they’d consider buying.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.