The goal of this activity is to build critical thinking skills and …
The goal of this activity is to build critical thinking skills and excitement for Computer Science / Computational Thinking, while laying a foundation of fundamental programming concepts. By scaffolding basic concepts like sequencing and algorithms in an unplugged activity, students who are intimidated by computers can still build a foundation of understanding. In this lesson, students will learn how to develop an algorithm and encode it into a program.By "programming" one another to draw pictures, students experience some of the core concepts of programming in a fun and accessible way. The class will start by having students view a video of a simple program demonstrating how to develop instructions for building a peanut butter and jelly sandwich. Students will start with simple shapes, and progress to the coding of a specific drawing that other students will then try to replicate (“running the program”). If there is a desire to have a more of a Math slant on the lesson, the drawing could take place on graph paper. Students would then use the coordinates to complete the drawing.
The lawmaking process, as described in the US Constitution, is essentially an …
The lawmaking process, as described in the US Constitution, is essentially an alogorithm that allows an idea to become a law. In this lesson, students will analyze and evaluate the process for creating laws at the Federal level and create a flow chart that shows the lawmaking process in an alogoritmic sequence.
This lesson plan uses the Hello Ruby book, Adventures in Coding, by …
This lesson plan uses the Hello Ruby book, Adventures in Coding, by Linda Liukas, to teach students about algorithms and conditional loops. It contains an activity featured from the book as well as other resources that can be used in conjunction with the book. The lesson teaches 2nd grade students what an algorithm is and how they use them in everyday life.
This presentation focuses on the basics of UDL (Universal Design for Learning) …
This presentation focuses on the basics of UDL (Universal Design for Learning) and how various technology tools can support all students. It is about 57 minutes long and the accompanying slide deck is included.
Teaching students the ethical issues between right and wrong for the uses …
Teaching students the ethical issues between right and wrong for the uses of technology might lead into conversations to other ethical and unethical behaviors. Impacts of Computing involves the effect that computing has on daily life. Computing affects many aspects of the world in both positive and negative ways at local, national, and global levels. Individuals and communities influence computing through their behaviors and cultural and social interactions, and in turn, computing influences new cultural practices. Students should understand the social implications of the digital world, including equity and access to computing.
piggy backing on lesson number 1, this allows students the opportunity to …
piggy backing on lesson number 1, this allows students the opportunity to try to record their code with arrows, paying close attention to the sequence.
This lesson incorporates both computer science and mathematics to analyze coding with …
This lesson incorporates both computer science and mathematics to analyze coding with patterns and proportional relationships. It uses the Turtle library with Python programming.
Students will read a passage about Sarah and Thomas and underline any …
Students will read a passage about Sarah and Thomas and underline any use of technology in the passage. They will then write “AP” for appropriate or “IN” for inappropriate above any use of technology.5.9 The student will evaluate and solve problems that relate to inappropriate use of computing devices and networks.
Students will brainstorm and identify problems that arise from inappropriate use of …
Students will brainstorm and identify problems that arise from inappropriate use of computing devices and networks by working in pairs or groups. They will recognize the importance of using technology responsibly and safely.
This course includes materials on AI programming, logic, search, game playing, machine …
This course includes materials on AI programming, logic, search, game playing, machine learning, natural language understanding, and robotics, which will introduce the student to AI methods, tools, and techniques, their application to computational problems, and their contribution to understanding intelligence. The material is introductory; the readings cite many resources outside those assigned in this course, and students are encouraged to explore these resources to pursue topics of interest. Upon successful completion of this course, the student will be able to: Describe the major applications, topics, and research areas of artificial intelligence (AI), including search, machine learning, knowledge representation and inference, natural language processing, vision, and robotics; Apply basic techniques of AI in computational solutions to problems; Discuss the role of AI research areas in growing the understanding of human intelligence; Identify the boundaries of the capabilities of current AI systems. (Computer Science 405)
This cipher was invented for the Hebrew alphabet, but it can work …
This cipher was invented for the Hebrew alphabet, but it can work with any alphabet. Many people believe it was used in the Bible and is older than Hieroglyphics! It was later adopted by other cultures, such as the Greeks and Romans, and used to encode messages in their respective languages. This lesson leads students the basics of cryptography.
Students will categorize attribute blocks based on their color, thickness and/or size. …
Students will categorize attribute blocks based on their color, thickness and/or size. Optionally, connections to categorizing will be related to robots (e.g. looks, motions, sounds) and coding.
This lesson aims to teach students how to use computing devices and …
This lesson aims to teach students how to use computing devices and networks responsibly and ethically and to develop critical thinking skills to identify social and ethical issues rEnglishted to technology.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.