Using a Fluffy pancakes recipe students will identify a recipe as a …
Using a Fluffy pancakes recipe students will identify a recipe as a type of algorithm. Students will identify the part of the recipe that is numbered as the steps or algorithm is numbered. Students are expected to identify that number one step is done before number 2 and so on. Students will work in pairs to create their own algorithm for brushing teeth. Students should work in pairs. One student should create the algorithm and the other should debug the algorithm.
The purpose of this lesson plan is to help students understand, using …
The purpose of this lesson plan is to help students understand, using a practical approach, the difference between brute force and a decrease and conquer algorithm. This approach will use an illustration from history to draw the student into the presentation and then utilize finding the GCF of a number to illustrate the difference in efficiencies
In the field of computer science, there are two approaches to solving …
In the field of computer science, there are two approaches to solving a problem. One, being Brute Force, which is the method of just working out the problem until it is solved. This can be related to students with the idea of never giving up, or "I think I can, I think I can". Divide and Conquer is a problem solving method that braeks a larger problem into smaller problems. For example, if you have a big chore such as cleaning a house, start with one room at a time. This lesson applies these two methods to mathematics by using Brute Force to find multiples and common multiple of numbers. While the Divide and Conquer method is applied to fiding factors of a number through divisibility rules.
This activity will allow students to compare Brute Force and Divide and …
This activity will allow students to compare Brute Force and Divide and Conquer sorting algorithms.This activity will show the sorting process of a Brute Force algorithm and a Divide and Conquer algorithm that is used by a computer when sorting data.
This activity will show the sorting process using the Bubble Sort Brute …
This activity will show the sorting process using the Bubble Sort Brute Force algorithm that is used by a computer when sorting data without using a computer.
These Pocket Guides are a quick summary of each of the 6 …
These Pocket Guides are a quick summary of each of the 6 computer science strands for grades K-8. The pocket guides explain what the strand is about and how it increases in complexity from Kindergarten to 8th grade.
This lesson is designed to teach students basic encryption using the Caesar …
This lesson is designed to teach students basic encryption using the Caesar cipher method. This is a simple letter shift cipher that takes a plaintext message and encrypts it into cipher text by shifting each letter of the message by a value between 1 and 25 (1 less than the total number of letters in the English alphabet). This technique was used by Julius Caesar to encrypt messages by shifting each letter of the message by 3 letters. The message would be decrypted by taking each letter and shifting back 3 letters to reveal the plaintext message.
Students will apply their knowledge of the causes of the American Revolution …
Students will apply their knowledge of the causes of the American Revolution to create an interactive story via Twine. The interactive story will be based on the pre-revolutionary war period from the point of view of a loyalist or a patriot. As a warm-up students will look at an optical illusion picture and as a class discuss point of view and perspective. Students will work in heterogeneous pairs/groups to research, outline, and create a pre-revolutionary story about a patriot or loyalist.
Spice things up with students by programming BeeBot to go to specific …
Spice things up with students by programming BeeBot to go to specific numbers as a way to reinforce multiples and common factors. Activity cards, a brief overview, and a student planning sheet are included.
Comments in a program are meant to help the programmer(s). This activity …
Comments in a program are meant to help the programmer(s). This activity will take a program and ask the students to determine what it is doing and put in appropriate comments.
This performance task is designed for third grade students and higher to …
This performance task is designed for third grade students and higher to compare and contrast a group of items based on attributes or actions classified into at least two sets and subsets. The items being classified are polygons. The use of algorithms and flowcharts is also a key component of the performance task.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.