Students will engage in a discussion about the concepts of algorithms and …
Students will engage in a discussion about the concepts of algorithms and loops. They will then apply the pair programming technique to collaboratively create an origami model. During the activity, students will closely examine the algorithm, represented by the origami instructions, and identify the 'loops,' ( steps that are repeated in these instructions).
Students will engage in a discussion about the concepts of algorithms and …
Students will engage in a discussion about the concepts of algorithms and loops. They will then apply the pair programming technique to collaboratively create an origami model. During the activity, students will closely examine the algorithm, represented by the origami instructions, and identify the 'loops,' ( steps that are repeated in these instructions).
4.15 The student will give examples of computing technologies that have changed the …
4.15 The student will give examples of computing technologies that have changed the world and express how those technologies influence, and are influenced by, cultural practices.Students will use this printable to:Research India’s culture and society. (No more than 10 min)Research India’s traditional education system. (No more than 10 min)Develop a plan to use technology (computing devices and internet) to provide online classes to children in India. For this assignment, do not worry about cost.What cultural and societal elements from India would you need to include in online classes for students in India?
In this lesson, students learn the basics of coding for the Micro:Bit …
In this lesson, students learn the basics of coding for the Micro:Bit using the MakeCode development tool. Students will engage in PRIMM cycles, pair programming, and will begin working on the puzzle box they’ll finish in later lessons by building an “unlocking” animation using display output blocks.This lesson is part of the Micro:Bit Puzzle Box four-lesson sequence. Read about the sequence in the sequence overview, linked here.
Using block coding (OzoBlockly) to program their robot, students will navigate their …
Using block coding (OzoBlockly) to program their robot, students will navigate their Ozobot EVO through four subterranean rooms. Specific actions must be performed in sequence to defeat the various dungeon creatures and collect the treasure from each room.
Want to introduce some basic coding and real life examples of the …
Want to introduce some basic coding and real life examples of the Scientific Method? This is the lesson for you. Using either the online program MakeCode, or by purchasing the Handheld Kitronik Arcades, the students will be performing an experiment while coding a maze game. No purchases required if students only use the online platform. A whole lesson ready to engage your students and use Computer Science and the Scientific Method!
Scientific Method and scientific investigation are skills needed for our students to …
Scientific Method and scientific investigation are skills needed for our students to explore new adventures and avenues. Kids will have a good time exploring science while dissolving marshmallows. Students will be investigating how temperature affects the size of a marshmallow. The students will determine the constant, dependent variable, and independent variable.
Students will be immersed in a part of each of the 5 …
Students will be immersed in a part of each of the 5 ancient civilizations and learn about either architecture or daily life using a VR headset and Youtube App.
In this project, You will compare homemade applesauce and store bought applesauce. …
In this project, You will compare homemade applesauce and store bought applesauce. We’ll look at the cost, nutritional information and taste of each option. You’ll make your own applesauce, test different brands, and then use simple programming to analyze and visualize the data. By the end you will be able to decide which option is healthier, more affordable and tastier!
This activity incorporates a lesson on online safety with a whole-class review …
This activity incorporates a lesson on online safety with a whole-class review of astronomy. Students will review what is personal vs public information and the dangers of posting private information online. Then they will go around the room to examine astronomy posters. They’ll be hunting for personal details that WOULD NOT be safe for an individual to include in a public forum, like posters or online. They’ll also be looking for key ideas that they covered during their astronomy course.
Think before you click. When online make sure to stay safe, always …
Think before you click. When online make sure to stay safe, always keep your personal information private and make sure that the website you are using is safe and age appropriate. If you are unsure, ask a trusted adult.
In this lesson we will discuss the story of The Three Little …
In this lesson we will discuss the story of The Three Little Pigs and the types of houses that they built. Which ones were stronger and why? How do people protect themselves? In Ancient China they used a wall. Did that wall protect them? How? What are other ways people protect themselves? In today’s world we need to protect ourselves using strong passwords. How do we make a strong password? Today you will build a strong password. Then you will build a great wall that is as strong as the password that you created!
We all know that students can retain more knowledge when they have …
We all know that students can retain more knowledge when they have something concrete for it to stick to, why not actually build something that they can build their knowledge upon? Using the MakeDo kits and the stencils that come in this lesson. Let students take some cardboard that is just waiting to be recycled and upcycle it into the Rome Colosseum!!
Looking for a fun way to teach both scientific method and cybersecurity? …
Looking for a fun way to teach both scientific method and cybersecurity? Well great job, you found it. Students will not only learn 5 characteristics to making a good password but they will also be using all of their 2.1, 3.1, and 4.1 strands to build and rebuild a structure using different materials that are probably inside your classroom right now. Need a STEM activity for a club day? Need a “Friday and I can’t teach anymore content” lesson? This is for you. Roll up your sleeves and let the students do the work and problem solve in a simple and fun way.
Can you see how far you can catapult a Pom Pom? I …
Can you see how far you can catapult a Pom Pom? I want to see! We are going to be building a catapult from scratch. Your goal is to see if you can catapult your Pom Pom at least 3 feet.
Students will be learning about the importance of building strong passwords! It's …
Students will be learning about the importance of building strong passwords! It's great that they will be able to see the real-world application of this concept through building pyramids like the ancient Egyptians. It's interesting to note how using different materials can determine the strength of a pyramid, just like how using different characters, symbols, and numbers can determine the strength of a password. This is a fun and engaging way for students to learn about cybersecurity.
This is a whole classroom collaborative process with the goal of creating …
This is a whole classroom collaborative process with the goal of creating a school-wide lunch waste composting program. The lesson relates the collaborative and iterative processes used in science to computer science.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.