Updating search results...

Search Resources

9 Results

View
Selected filters:
  • VA.6.CS.NI.1 - The student will outline the advantages and disadvantages of transmitt...
  • VA.6.CS.NI.1 - The student will outline the advantages and disadvantages of transmitt...
Ciphers and Encryption Part 5: Caesar Cipher
Unrestricted Use
CC BY
Rating
0.0 stars

The student or class will watch a video clip about ciphers, specifically Caesar Ciphers.  Next students will learn more about encryption and decryption through the use of "keys".  Lastly, students will be introduced to the career path choices as a Cyber-security analyst. This is one lesson out of a series of five, and can be used alone, or with the some or all of the other four lessons.

Subject:
Impacts of Computing
Networking and the Internet
Material Type:
Activity/Lab
Author:
Emily Ball
Date Added:
01/18/2022
Drawing Conclusions about OS: Speed & Accuracy Experiment
Unrestricted Use
CC BY
Rating
0.0 stars

Students will work independently, or in groups, to explore computer response times for start-up; application and program run times;  serch engine speeds; and powering off the computer in safe and efficient ways using stopwatches and averaging load times.  Students will draw conclutions through a series of questions and comparisons to understand that variables in the user data collection, system byte sizes, storage limitations, multiple known and unknow tasks running behind the scenes, and/or internet stability/instability can all directly affect the computer's ability to respond accurately, and in a timely manner to user requests as well as perform as expected (with errors or success and/or lag time) and quickly. 

Subject:
Computing Systems
Material Type:
Activity/Lab
Interactive
Author:
Emily Ball
Date Added:
12/06/2021
Grade 7 Computing Systems & Networks and the Internet Notes
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

This resource is a fill-in-the-blank notes set is for Grade 7 Computing Systems & Networking and the Internet strands. The information is taken directly from the Curriculum Framework's context of the standard. Answer key included.

Subject:
Computer Science
Computing Systems
Networking and the Internet
Material Type:
Homework/Assignment
Lecture Notes
Lesson
Author:
Kelly Odom
Date Added:
03/31/2022
Josephine Baker - Hidden Messages
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

American performer Josephine Baker used her star-status access to spy for the Allies in WWII and convey information to the Allies by using invisible ink on her sheet music. We’ll look at a few methods that can be used to hide messages “in plain sight”?

Subject:
American History
Computer Science
History/Social Sciences
Material Type:
Lesson
Author:
CodeVA Curriculum
Lola Lloyd
Date Added:
03/17/2023
Part 1 Password Safety: Brute Force
Unrestricted Use
CC BY
Rating
0.0 stars

In this first part of a three part series, students will explore the ideas around Brute Force algorithm/programs to further understand the importance of password development, use, safety, and safekeeping while completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately with a few adjustments as well.  Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Networking and the Internet
Material Type:
Activity/Lab
Game
Homework/Assignment
Author:
Emily Ball
Date Added:
03/20/2022
Part 2 Password Safety:  Decrease (Divide) and Conquer
Unrestricted Use
CC BY
Rating
0.0 stars

In this second part of a three part series, students will explore the ideas around Decrease, or Divide, and Conquer algorithm/programs to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately (stand-alone) with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Measurement and Geometry
Networking and the Internet
Material Type:
Activity/Lab
Homework/Assignment
Author:
Emily Ball
Date Added:
03/21/2022
Part 3:  Password Safety: Unplugged Decryption
Unrestricted Use
CC BY
Rating
0.0 stars

In this final part of a three part series, students will practice Brute Force and Decrease (or Divide) and Conquer methods to try to crack a password puzzle to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged sorting activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately with a few minor adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Networking and the Internet
Material Type:
Activity/Lab
Homework/Assignment
Author:
Emily Ball
Date Added:
03/21/2022
Quizalize Game on C.S. 6.13 Data Types and Transmission Speed
Unrestricted Use
CC BY
Rating
0.0 stars

This is a game on Quizalize.com based on the Computer Science standard 6.13 on data types and transmission speeds. The students will click the link to take them to the game. The questions can be read aloud to the students. 

Subject:
Computer Science
Networking and the Internet
Material Type:
Game
Author:
Dana Smith
Date Added:
12/29/2021