In this activity, students will use a model of a computer, taking …
In this activity, students will use a model of a computer, taking the form of a sort of board game, to explore writing programs that include input, output, variables, and arithmetic. Students will read, write, and debug pseudocode as they work on solving simple programming problems using manipulatives. This lesson is part of the ECS+Python lesson set, providing supplemental Python curricular material for the Exploring Computer Science curriculum.
In this project, students create a program that performs calculations on input …
In this project, students create a program that performs calculations on input values to produce formatted output. Students will choose a project to create from a list of three options, or generate their own option that meets the activity requirements. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.
In this lesson, students will explore the “Testing Random Numbers” program to …
In this lesson, students will explore the “Testing Random Numbers” program to learn how to generate random numbers and use if-statements to make comparisons. Then, they will create a “Roll the Dice Game” to learn how to work conditionals and random numbers. At the end, students will create a simple program applying their knowledge of randomization and conditional control structures. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.
This activity will allow students to compare Brute Force and Divide and …
This activity will allow students to compare Brute Force and Divide and Conquer sorting algorithms.This activity will show the sorting process of a Brute Force algorithm and a Divide and Conquer algorithm that is used by a computer when sorting data.
This activity will show the sorting process using the Bubble Sort Brute …
This activity will show the sorting process using the Bubble Sort Brute Force algorithm that is used by a computer when sorting data without using a computer.
This unplugged lesson will allow students to encrypt and decrypt message using …
This unplugged lesson will allow students to encrypt and decrypt message using the Caesar Cipher letter shift method of encryption. Cover the process of how this method works by doing an example and explaining the process of shifting the plaintext by the letter shift value to create the encrypted cipher text.
This lesson is designed to teach students basic encryption using the Caesar …
This lesson is designed to teach students basic encryption using the Caesar cipher method. This is a simple letter shift cipher that takes a plaintext message and encrypts it into cipher text by shifting each letter of the message by a value between 1 and 25 (1 less than the total number of letters in the English alphabet). This technique was used by Julius Caesar to encrypt messages by shifting each letter of the message by 3 letters. The message would be decrypted by taking each letter and shifting back 3 letters to reveal the plaintext message.
In this lesson, students will learn about using binary encoding to represent …
In this lesson, students will learn about using binary encoding to represent numbers and text. They’ll use several different encoding techniques, and then develop and test their own protocol for encoding other kinds of information into binary.
In this activity, students will compete in a shell game tournament while …
In this activity, students will compete in a shell game tournament while they learn about different search strategies that computers perform on sorted collections of data.
Students will use minimum spanning trees to analyze a problem and provide …
Students will use minimum spanning trees to analyze a problem and provide insights into addressing the problem. The lesson provides detailed support around analyzing transportation infrastructure in their community and assessing its impact on the lives of different people who use it. Students create minimum spanning trees based on data, solve the trees to generate insights about the data, and communicate those insights along with policy recommendations based on their analysis.
The Josephus problem is based around Josephus Flavius; a Jewish soldier and historian …
The Josephus problem is based around Josephus Flavius; a Jewish soldier and historian who inspired an interesting set of mathematical problems. This resource is a PDF activity based on the Josephus problem.
This activity will show the sorting process using the Merge Sort Divide …
This activity will show the sorting process using the Merge Sort Divide and Conquer algorithm that is used by a computer when sorting data without using a computer.
This activity will show the sorting process using the Quick Sort Divide …
This activity will show the sorting process using the Quick Sort Divide and Conquer algorithm that is used by a computer when sorting data without using a computer.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.