This lesson plan uses the Hello Ruby book, Adventures in Coding, by …
This lesson plan uses the Hello Ruby book, Adventures in Coding, by Linda Liukas, to teach students about algorithms and conditional loops. It contains an activity featured from the book as well as other resources that can be used in conjunction with the book. The lesson teaches 2nd grade students what an algorithm is and how they use them in everyday life.
This presentation focuses on the basics of UDL (Universal Design for Learning) …
This presentation focuses on the basics of UDL (Universal Design for Learning) and how various technology tools can support all students. It is about 57 minutes long and the accompanying slide deck is included.
Teaching students the ethical issues between right and wrong for the uses …
Teaching students the ethical issues between right and wrong for the uses of technology might lead into conversations to other ethical and unethical behaviors. Impacts of Computing involves the effect that computing has on daily life. Computing affects many aspects of the world in both positive and negative ways at local, national, and global levels. Individuals and communities influence computing through their behaviors and cultural and social interactions, and in turn, computing influences new cultural practices. Students should understand the social implications of the digital world, including equity and access to computing.
piggy backing on lesson number 1, this allows students the opportunity to …
piggy backing on lesson number 1, this allows students the opportunity to try to record their code with arrows, paying close attention to the sequence.
This lesson incorporates both computer science and mathematics to analyze coding with …
This lesson incorporates both computer science and mathematics to analyze coding with patterns and proportional relationships. It uses the Turtle library with Python programming.
Students will read a passage about Sarah and Thomas and underline any …
Students will read a passage about Sarah and Thomas and underline any use of technology in the passage. They will then write “AP” for appropriate or “IN” for inappropriate above any use of technology.5.9 The student will evaluate and solve problems that relate to inappropriate use of computing devices and networks.
Students will brainstorm and identify problems that arise from inappropriate use of …
Students will brainstorm and identify problems that arise from inappropriate use of computing devices and networks by working in pairs or groups. They will recognize the importance of using technology responsibly and safely.
This cipher was invented for the Hebrew alphabet, but it can work …
This cipher was invented for the Hebrew alphabet, but it can work with any alphabet. Many people believe it was used in the Bible and is older than Hieroglyphics! It was later adopted by other cultures, such as the Greeks and Romans, and used to encode messages in their respective languages. This lesson leads students the basics of cryptography.
Students will categorize attribute blocks based on their color, thickness and/or size. …
Students will categorize attribute blocks based on their color, thickness and/or size. Optionally, connections to categorizing will be related to robots (e.g. looks, motions, sounds) and coding.
This lesson aims to teach students how to use computing devices and …
This lesson aims to teach students how to use computing devices and networks responsibly and ethically and to develop critical thinking skills to identify social and ethical issues rEnglishted to technology.
The teacher will review the following concepts from preceding lessons : Digital …
The teacher will review the following concepts from preceding lessons : Digital Safety (1.9) and Personal Information (1.10) . The teacher will introduce Digital Citizenship.
This Edpuzzle assignment uses a clip from the YouTube video "Binary Numbers for …
This Edpuzzle assignment uses a clip from the YouTube video "Binary Numbers for Kids" by Socratica Kids to ask questions for understanding about binary numbers.
Jennifer Daniel of Washington County has created a Wakelet to show how …
Jennifer Daniel of Washington County has created a Wakelet to show how to create a Bitmoji Classroom if you'd like to create one of this graphic-based virtual classroom interfaces.
Binary is both the language of computers and the manner by which …
Binary is both the language of computers and the manner by which computers input, process, sort, and output information. For that reason, understanding this process and how it works opens up a world of information about how computers function. Through this lesson, students will learn about this language and how it resembles many other things in the world around us. Because this topic was at first unfamiliar to them, students will then challenge themselves to share this information in a way that could be understood by a younger child. All of this is focused on ensuring that this foundational understanding is engrained in multiple ways as other concepts taught during this year and in other years are built off of this topic.
There were many black women who worked as code breakers at Arlington …
There were many black women who worked as code breakers at Arlington Hall during World War II, including Elsie Scott, Sue Bailey Thurman, and Genevieve Collins. These women faced significant challenges and discrimination due to their race and gender, but they made significant contributions to the war effort through their work as code breakers.
A digital checklist board that you can use in any content area! …
A digital checklist board that you can use in any content area! This is a project management resource. The directions are geared towards a book report, however, you could adjust them for any project where the students need to stay organized
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.