American performer Josephine Baker used her star-status access to spy for the …
American performer Josephine Baker used her star-status access to spy for the Allies in WWII and convey information to the Allies by using invisible ink on her sheet music. We’ll look at a few methods that can be used to hide messages “in plain sight”?
The Josephus problem is based around Josephus Flavius; a Jewish soldier and historian …
The Josephus problem is based around Josephus Flavius; a Jewish soldier and historian who inspired an interesting set of mathematical problems. This resource is a PDF activity based on the Josephus problem.
Students will challenge themselves to go the distance by broad jumping as …
Students will challenge themselves to go the distance by broad jumping as far as possible. This will be a fun way to practice collecting data, organizing data on a graph, and analyzing the results to make predictions and/or conclusions.
See how the computer science standards progress from the youngest learner to …
See how the computer science standards progress from the youngest learner to third grade, so that teachers and coaches can get a better understanding of the skill progression.
This set contains all Kindergarten through 5th Grade CS Standard Alignment Guides. …
This set contains all Kindergarten through 5th Grade CS Standard Alignment Guides. The CS Standard Alignment Guides help teachers integrate computer science into their other content areas and provide background information on the standard, vocabulary, sample lesson, and integration opportunities.
This set contains all Kindergarten through 8th Grade CS Standard Alignment Guides. …
This set contains all Kindergarten through 8th Grade CS Standard Alignment Guides. The CS Standard Alignment Guides help teachers integrate computer science into their other content areas and provide background information on the standard, vocabulary, sample lesson, and integration opportunities.
Passwords are usually associated with the digital world. However, the importance of …
Passwords are usually associated with the digital world. However, the importance of security has been important throughout history. In this lesson, students will review the components of a strong password in the digital world and apply it to the Culpepper Code, which is a primary source that uses a a secret code during the Revolutionary War. They will compare/contrast the security issues from the Revolutionary War to the modern world.
Dance choreography will be used to make patterns, measure time duration, and …
Dance choreography will be used to make patterns, measure time duration, and generate data for graphs then used to make predictions. The repeat of patterns will be connected with the algorithms and looping strategies in computer science.
Computer Science Standard Alignment Guides are resources for teachers working to integrate …
Computer Science Standard Alignment Guides are resources for teachers working to integrate computer science into their core curriculum. These guides explain the standard, give a sample activity or lesson that teaches the standard, and ways to measure student proficiency on the skill or concept.
Using the book How to Code a Sandcastle by Josh Funk to …
Using the book How to Code a Sandcastle by Josh Funk to introduce coding, some essential vocabulary, and using a coding mat to have students orally and with their white boards and markers try to code a robot.
The Computer Science Office in Loudoun County Public Schools has developed this …
The Computer Science Office in Loudoun County Public Schools has developed this curriculum integration document to support the integration of the 2017 Virginia Computer Science Standards into core subject areas and beyond. Each CS standard was aligned to up to 3 grade level standards that made natural correlations.Additionally, many activities and resources were included to each standard to support the introduction and integration of the standard. For each of the six strands of the Computer Science Standards of Learning: Computing Systems, Networks and the Internet, Cybersecurity, Data and Analysis, Algorithms and Programming, and Impacts of Computing, we have included tiered support called "Fuel", "Spark", and "Ignite". The "Fuel" is provided to build teacher capacity and students' understanding in understanding the CS SOL. The "Spark" provides a Computer Science integrated experience into a core or speciality subject SOL. The "Ignite" section is where teachers in Loudoun County have the opportunity to share authentic learning experiences and lessons in our LCPS Computer Science Lesson Repository.This document was created as part of the Virginia K-12 Computer Science Pipeline which is partly funded through a GOVA and DHCD grant in partnership with Chesapeake Public Schools, Loudoun County Public Schools, and the Loudoun Education Foundation.
The Computer Science Office in Loudoun County, Virginia has developed an open …
The Computer Science Office in Loudoun County, Virginia has developed an open access lesson repository as a place for LCPS teachers and administrators to store, search, access, and share district created, free, curated digital resources that integrate Virginia’s Computer Science Standards of Learning.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.