The teacher will review the following concepts from preceding lessons : Digital …
The teacher will review the following concepts from preceding lessons : Digital Safety (1.9) and Personal Information (1.10) . The teacher will introduce Digital Citizenship.
This Edpuzzle assignment uses a clip from the YouTube video "Binary Numbers for …
This Edpuzzle assignment uses a clip from the YouTube video "Binary Numbers for Kids" by Socratica Kids to ask questions for understanding about binary numbers.
Jennifer Daniel of Washington County has created a Wakelet to show how …
Jennifer Daniel of Washington County has created a Wakelet to show how to create a Bitmoji Classroom if you'd like to create one of this graphic-based virtual classroom interfaces.
Binary is both the language of computers and the manner by which …
Binary is both the language of computers and the manner by which computers input, process, sort, and output information. For that reason, understanding this process and how it works opens up a world of information about how computers function. Through this lesson, students will learn about this language and how it resembles many other things in the world around us. Because this topic was at first unfamiliar to them, students will then challenge themselves to share this information in a way that could be understood by a younger child. All of this is focused on ensuring that this foundational understanding is engrained in multiple ways as other concepts taught during this year and in other years are built off of this topic.
There were many black women who worked as code breakers at Arlington …
There were many black women who worked as code breakers at Arlington Hall during World War II, including Elsie Scott, Sue Bailey Thurman, and Genevieve Collins. These women faced significant challenges and discrimination due to their race and gender, but they made significant contributions to the war effort through their work as code breakers.
A digital checklist board that you can use in any content area! …
A digital checklist board that you can use in any content area! This is a project management resource. The directions are geared towards a book report, however, you could adjust them for any project where the students need to stay organized
This lesson combines ELA story elements and coding on a student-friendly BrainPOP …
This lesson combines ELA story elements and coding on a student-friendly BrainPOP Jr. Platform. Students can take a book they have read and use the BrainPOP Jr. platform for a variety of story map to demonstrate their comprehension of the material chosen.
Students will practice their use of dialogue by creating a thrilling story. …
Students will practice their use of dialogue by creating a thrilling story. They will use Scratch to create sprites and a setting that drives their story with an emphasis on writing proper dialogue.
In this professional development presentation, educators learn about Building Models (1 of the …
In this professional development presentation, educators learn about Building Models (1 of the 7 components of Computational Thinking, according the Ignite My Future platform). This presentation can be used by individuals to learn about them, or used to present to others. The video is a recording of one of the sessions provided to teachers through a 7 week series of "CT Parties".Within this resource, you will find the presentation slides, a recording, a K-2 and 3-5 lesson to build models, and activities to support parents understanding and home use of the strategy. This lesson is part of the Virginia K-12 Computer Science Pipeline which is partly funded through a GO Virginia grant in partnership with Chesapeake Public Schools, Loudoun County Public Schools, and the Loudoun Education Foundation.
The students will work in small groups to design and create a …
The students will work in small groups to design and create a prototype of a simple machine that could move a heavy box.. The machine has to be able to move a scale model of the heavy box.
This is a PowerPoint that helps young students know how to identify …
This is a PowerPoint that helps young students know how to identify a computer program and what to tell an adult so they can help them fix it. It is based on the Computer Science standard, 1.8: The student will identify, using accurate terminology, simple hardware and software problems that may occur during use.
This is a lesson plan where students will collect data using a …
This is a lesson plan where students will collect data using a survey, record their findings using a pictograph, and make predictions about their findings. This is from the essential knowledge of the Comptuer Science standard 2.11.
This is a PowerPoint that was created to support the Computer Science …
This is a PowerPoint that was created to support the Computer Science standard 2.13 about the Impacts of Computing and how the student will compare and contrast examples of how computing technology has changed and improved the way people live, work, and interact.
This is a lesson plan designed for instructors in which students conduct …
This is a lesson plan designed for instructors in which students conduct research on the town they live in, share their findings on Google Jamboard with their classmates, and organize their findings into a chart on Google Sheets in order to make predictions about the data.
This is a game from Gamilab where the player navigates across a …
This is a game from Gamilab where the player navigates across a map by answering questions related to the CS standard 5.16 regarding ethical online communications and cyberbullying.
An assessment is attached that covers the essential vocabulary and knowledge from …
An assessment is attached that covers the essential vocabulary and knowledge from the Computer Science standard, 7.11: The student will describe the development of new technologies in communication, entertainment, and business and their impact on American life. It can be printed or used for Google Classroom, etc.
This resource contains a link to Baamboozle.com where a student can either play …
This resource contains a link to Baamboozle.com where a student can either play a game, watch a slideshow, or study with a set of flashcards from the vocabulary from the Computer Science standards 7.14 and 7.15.
This is game designed on Baamboozle.com that is based on the Computer …
This is game designed on Baamboozle.com that is based on the Computer Science standard 7.6 in Cybersecurity where users must answer questions to distinguish the difference between a physical and a digital security measures.
This is a fifteen question assessment from the Computer Science standard, 8.13: The student …
This is a fifteen question assessment from the Computer Science standard, 8.13: The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues. An answer key is also attached.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.