This lesson combines ELA story elements and coding on a student-friendly BrainPOP …
This lesson combines ELA story elements and coding on a student-friendly BrainPOP Jr. Platform. Students can take a book they have read and use the BrainPOP Jr. platform for a variety of story map to demonstrate their comprehension of the material chosen.
Students will practice their use of dialogue by creating a thrilling story. …
Students will practice their use of dialogue by creating a thrilling story. They will use Scratch to create sprites and a setting that drives their story with an emphasis on writing proper dialogue.
In this professional development presentation, educators learn about Building Models (1 of the …
In this professional development presentation, educators learn about Building Models (1 of the 7 components of Computational Thinking, according the Ignite My Future platform). This presentation can be used by individuals to learn about them, or used to present to others. The video is a recording of one of the sessions provided to teachers through a 7 week series of "CT Parties".Within this resource, you will find the presentation slides, a recording, a K-2 and 3-5 lesson to build models, and activities to support parents understanding and home use of the strategy. This lesson is part of the Virginia K-12 Computer Science Pipeline which is partly funded through a GO Virginia grant in partnership with Chesapeake Public Schools, Loudoun County Public Schools, and the Loudoun Education Foundation.
The students will work in small groups to design and create a …
The students will work in small groups to design and create a prototype of a simple machine that could move a heavy box.. The machine has to be able to move a scale model of the heavy box.
This is a PowerPoint that helps young students know how to identify …
This is a PowerPoint that helps young students know how to identify a computer program and what to tell an adult so they can help them fix it. It is based on the Computer Science standard, 1.8: The student will identify, using accurate terminology, simple hardware and software problems that may occur during use.
This is a lesson plan where students will collect data using a …
This is a lesson plan where students will collect data using a survey, record their findings using a pictograph, and make predictions about their findings. This is from the essential knowledge of the Comptuer Science standard 2.11.
This is a PowerPoint that was created to support the Computer Science …
This is a PowerPoint that was created to support the Computer Science standard 2.13 about the Impacts of Computing and how the student will compare and contrast examples of how computing technology has changed and improved the way people live, work, and interact.
This is a lesson plan designed for instructors in which students conduct …
This is a lesson plan designed for instructors in which students conduct research on the town they live in, share their findings on Google Jamboard with their classmates, and organize their findings into a chart on Google Sheets in order to make predictions about the data.
This is a game from Gamilab where the player navigates across a …
This is a game from Gamilab where the player navigates across a map by answering questions related to the CS standard 5.16 regarding ethical online communications and cyberbullying.
An assessment is attached that covers the essential vocabulary and knowledge from …
An assessment is attached that covers the essential vocabulary and knowledge from the Computer Science standard, 7.11: The student will describe the development of new technologies in communication, entertainment, and business and their impact on American life. It can be printed or used for Google Classroom, etc.
This resource contains a link to Baamboozle.com where a student can either play …
This resource contains a link to Baamboozle.com where a student can either play a game, watch a slideshow, or study with a set of flashcards from the vocabulary from the Computer Science standards 7.14 and 7.15.
This is game designed on Baamboozle.com that is based on the Computer …
This is game designed on Baamboozle.com that is based on the Computer Science standard 7.6 in Cybersecurity where users must answer questions to distinguish the difference between a physical and a digital security measures.
This is a fifteen question assessment from the Computer Science standard, 8.13: The student …
This is a fifteen question assessment from the Computer Science standard, 8.13: The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues. An answer key is also attached.
This resources maps out each day and includes resources for both synchronous and …
This resources maps out each day and includes resources for both synchronous and asynchronous activities to support CS Education Week. The document also includes a Computer Science word of the day to help promote the integration of the CS SOLs. This lesson is part of the Virginia K-12 Computer Science Pipeline which is partly funded through a GO Virginia grant in partnership with Chesapeake Public Schools, Loudoun County Public Schools, and the Loudoun Education Foundation.
Grade Level: 2nd GradeSubject: Social Studies and Computer Science IntegrationTopic: Natural, human, and capital …
Grade Level: 2nd GradeSubject: Social Studies and Computer Science IntegrationTopic: Natural, human, and capital resourcesDuration: 2 (30 minute lessons) or (1- 60-minute lesson)Objective: Students will identify and categorize natural, human, and capital resources by creating a digital or physical model. They will demonstrate understanding by accurately representing these resources in a model using basic shapes and labels.
This is a lesson plan based on the Computer Science standard, 2.12, …
This is a lesson plan based on the Computer Science standard, 2.12, where students will create a model. The students will visit a website first to see how a digital model looks and then will create their own digital models of the solar system by using Google Jamboard.
This is a PowerPoint based on the Computer Science standard 2.9 that …
This is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint presentation that is based on the Computer Science standard in Cybersecurity, SOL C.S. 2.9 where students will be reminded of the rules of how to use and handle their computers safely and responsibly.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.