Students will code the Sphero Indi robots to build words that match …
Students will code the Sphero Indi robots to build words that match a picture based on a phonics skill. Students will need to use the color codes to figure out what each code means to drive the car over the correct letters needed to spell the words.
Students will identify the characters, setting, and sequential events of a story …
Students will identify the characters, setting, and sequential events of a story and draw a picture summary including the main points and eliminating extra details. Abstraction is the act of eliminating extra information, so students will try to include only the bare essentials to tell the story elements. The teacher will assist them in finding elements that are important to include and students will work in groups of 3 to tell the beginning, middle, and end in a pictorial representation.These materials were created by CodeVA in partnership with George Mason University and were funded by the National Science Foundation under Grant Award #1837380
During the American Revolution, the Patriots relied on sending coded messages to …
During the American Revolution, the Patriots relied on sending coded messages to prevent the British from understanding the actions of the Continental Army. George Washington’s army used this cipher– though it is not a very secure system in its original form. The Patriots adapted it by using a randomized arrangement of the alphabet. This cipher was also used to some extent during the US Civil War.
Donovan O'Brien of Culpeper provides this video recording of the second part …
Donovan O'Brien of Culpeper provides this video recording of the second part of a lesson on the Blended and Remote Learning Models, which covers expectations.
Donovan O'Brien of Culpeper provides this video recording of the first part …
Donovan O'Brien of Culpeper provides this video recording of the first part of a lesson on the Blended and Remote Learning Models, which covers expectations.
This activity will ask students to trace various historical events, as well …
This activity will ask students to trace various historical events, as well as state and national laws and their impacts on two different women in the South. Following along with a series of overlapping Twine stories, students will learn how computer programs can be constructed using simple variables and if-then statements to tell complex stories. Moreover, they will analyze how different women experienced historical events differently, leading to widely different points of view about the Civil War.
This PowerPoint serves to accompany the lesson plan, titled Python Libraries/Chatbots lesson …
This PowerPoint serves to accompany the lesson plan, titled Python Libraries/Chatbots lesson plan that can be found at the following link: https://goopenva.org/courseware/lesson/3579.
In this lesson, students engage in activities to learn about strong passwords, …
In this lesson, students engage in activities to learn about strong passwords, their importance, and how to use and protect personal passwords. Throughout the lesson, student engagement is encouraged through hands-on activities, group discussions, and opportunities for individual creativity. The focus is on fostering an understanding of why strong passwords are necessary and promoting responsible use and protection of personal passwords.
Students will use decomposition strategies to predict what will happen in a …
Students will use decomposition strategies to predict what will happen in a story based on the pictures through the use of the 5W and 1H question words. Students will identify the characters and setting of the story and make a prediction based on the information they gained from the images.These materials were created by CodeVA in partnership with George Mason University and were funded by the National Science Foundation under Grant Award #1837380
Erik Moore and Krissy Sanderlin of Virginia Beach developed (and are still …
Erik Moore and Krissy Sanderlin of Virginia Beach developed (and are still developing, as it is a work-in-progress) this presentation on hybrid and concurrent instruction is a perfect starting point to create your own presentation for your teachers.
Erik Moore and Krissy Sanderlin of Virginia Beach developed (and are still …
Erik Moore and Krissy Sanderlin of Virginia Beach developed (and are still developing, as it is a work-in-progress) this presentation on management of the hybrid classroom with a Teaching Assistant. It is a great starting point to create your own presentation for your teachers.
This resource is a 7-slide presentation detailing 5 goals students should have …
This resource is a 7-slide presentation detailing 5 goals students should have in mind when creating an algorithm. This guide targets younger learners in primary grades. It is available as a PowerPoint and a PDF.5 goals when trying to write an algorithm.● Defining the problem clearly● Breaking the problem down into small, simple parts● Define the solution for each part of the problem● Implementing the solution● Making it efficient (eventually)
This activity is from the Cyber.org website and covers the topic of …
This activity is from the Cyber.org website and covers the topic of the German Enigma Encryption machine that was used during World War II. Students will learn about how the Enigma machine worked and the process it used to encrypt messages. Students will be able to create their own Enigma machine using a normal size Pringles can and the activity sheet in PDF format. This is a great way to teach the concepts of encryption and a low cost way to give students a hands on approach to encrypting and decrypting messages.Ideas on how to use this activity would be to give the students a message to encrypt using their Pringles can Enigma machine or having students send an encrypted message to a classmate with the encryption key and have that student decrypt the message. To show the power of this type of encryption you can have other students try to decrypt the message without the key so they can see how difficult it would have been to crack the code during World War II.Link to the Cyber.org website for this activity
Students will recognize and define computational problems.The students will develop the ability …
Students will recognize and define computational problems.The students will develop the ability to recognize appropriate and worthwhile opportunities to apply computation is a skill that develops over time and is central to computing.
Explore the fundamentals of computer science by building an interactive computer model …
Explore the fundamentals of computer science by building an interactive computer model of cells in Scratch. No previous experience in computer programming is required. Programming Cells was created by Dr. Jeff Saucerman, Professor of Biomedical Engineering at the University of Virginia.
This lesson sequence offers students and teachers a way to develop data …
This lesson sequence offers students and teachers a way to develop data science skills using low technology skills through a series of “unplugged” activities, where students engage in data science learning without using computational tools. This material was created by Sara Fergus, Christa VanOlst, & Jon Stapleton for CodeVA with support from Capital One.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.