Updating search results...

Search Resources

18 Results

View
Selected filters:
CPU, memory, input & output
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Smart fabric designer Madison Maxey and founder and maker Danielle Applestone explain the different components that allow computers to input, store, process, and output information.

Subject:
Computer Science
Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Code.org
Khan Academy
Date Added:
07/07/2022
Circuits & Logic
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Adafruit founder Limor Fried and virtual reality designer Nat Brown show how simple logical circuits underlie everything your computer does.

Subject:
Computer Science
Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Code.org
Khan Academy
Date Added:
07/07/2022
Cybersecurity and crime
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Google Security Princess Parisa Tabriz and Jenny Martin from Symantec introduce the most common types of cybercrime, including viruses, malware, DDOS attacks and phishing scams.

Subject:
Computer Science
Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Code.org
Khan Academy
Date Added:
07/07/2022
Dancing Using Patterns
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The student will learn a dance and identify the pattern, then create a dance routine in both repeating and growing patterns. Students will also understand and identify simple loops.

Subject:
Algorithms and Programming
Computer Science
Material Type:
Lesson Plan
Author:
Stephanie Playton
code.org
Date Added:
11/23/2021
Delivering Packets Lesson with Unplgugged Game
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This interactive lesson teaches middle school students about how information is delivered via the internet. Students will review/ be introduced to vocabulary words, gain an understanding of packets and servers, and be challenged with different internet connectivity (Wi-Fi, cable, DSL, and Fiber Optic) as they work together as a team to deliver a message to another IP address.

This lesson has been slightly adapted from the original version from Code.org. All the links and copyright information are included in the lesson. The teacher is able to use the original or the premade materials from this document.

Have fun!

Subject:
Computer Science
Networking and the Internet
Material Type:
Activity/Lab
Author:
code.org
Anna Nester
Date Added:
02/02/2022
Encryption and public keys
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This video explains 256-bit encryption, public and private keys, SSL & TLS and HTTPS.

Subject:
Computer Science
Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Code.org
Khan Academy
Date Added:
07/07/2022
HTTP and HTML
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Tumblr founder David Karp and Xbox program manager Jasmine Lawrence give a detailed description of how files and webpages are sent and received using HTTP and HTML.

Subject:
Computer Science
Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Code.org
Khan Academy
Date Added:
07/07/2022
Happy Maps
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lesson plan for early elementary grades to support understanding of an algorithm. At the root of all computer science is something called an algorithm. The word “algorithm” may sound like something complicated, but really it’s just a list of instructions that someone can follow to achieve a result. To provide a solid base for the rest of your students’ computer science education, we’re going to focus on building a secure relationship with algorithms.

Students will:
List steps to move character around a map
Arrange directions to reach predetermined goal
Predict where character will land, given a list of steps

Subject:
Algorithms and Programming
Computer Science
Material Type:
Activity/Lab
Author:
Code.org
Date Added:
07/16/2019
Hardware and Software
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Engineering manager Erica Gomez, program manager Jerome Holman, and Microsoft founder Bill Gates explain how a computer's hardware and software work together.

Subject:
Computer Science
Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Code.org
Khan Academy
Date Added:
07/07/2022
Humpty Dumpty Algorithm and Programming
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will be introduced to the term algorithm while reading the story of Humpty Dumpty. Students will develop an algorithm or step by step sequence of instructions for putting Humpty Dumpty back together again.

Subject:
Algorithms and Programming
Communication and Multimodal Literacy
Computer Science
Cross-Curricular
English
Material Type:
Lesson Plan
Author:
Code.org
Education.com
Kimberly Jones
Date Added:
11/22/2021
IP addresses and DNS
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The co-founder of the Internet Vint Cerf and software engineer Paola Mejia take us through the ins and outs of how networks talk to each other.

Subject:
Computer Science
Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Code.org
Khan Academy
Date Added:
07/07/2022
Packets, routers, and reliability
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Spotify engineer Lynn Root and Vint Cerf, Father of the Internet, explain how information on the Internet is broken down into packets, and how to ensure that information is reliably received.

Subject:
Computer Science
Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Code.org
Khan Academy
Date Added:
07/07/2022
Simple Encryption
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson is presented by Code.org
Lesson 8: Cybersecurity - Simple Encryption

From the website:
OVERVIEW
"In this lesson, students are introduced to the need for encryption and simple techniques for breaking (or cracking) secret messages. Students try their own hand at cracking a message encoded with the classic Caesar cipher and also a Random Substitution Cipher. Students should become well-acquainted with idea that in an age of powerful computational tools, techniques of encryption will need to be more sophisticated. The most important aspect of this lesson is to understand how and why encryption plays a role in all of our lives every day on the Internet, and that making good encryption is not trivial. Students will get their feet wet with understanding the considerations that must go into making strong encryption in the face of powerful computational tools that can be used to crack it. The need for secrecy when sending bits over the Internet is important for anyone using the Internet."

OBJECTIVE
"Explain why encryption is an important need for everyday life on the Internet.
Crack a message encrypted with a Caesar cipher using a Caesar Cipher Widget
Crack a message encrypted with random substitution using Frequency Analysis
Explain the weaknesses and security flaws of substitution ciphers"

The lesson is mapped out for teachers. It is easy to follow and includes vocabulary to cover, links to the necessary materials, and a teaching guide with background information, tips, and prompts.

AGENDA
Warm Up (10 min)
Classic Encryption - The Caesar Cipher
Activity (35 min)
Part 1 - Crack a Caesar Cipher
Part 2 - Crack a Random Substitution Cipher
Wrap Up (15 min)
Video: Encryption and Public Keys
Discussion
Career Discussion

Subject:
Computer Science
Cybersecurity
Impacts of Computing
Material Type:
Activity/Lab
Author:
code.org
Date Added:
01/13/2022
Simple Encryption (Code.org)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Overview: This lesson is presented by Code.org
Lesson 8: Cybersecurity - Simple Encryption

From the website:
OVERVIEW
"In this lesson, students are introduced to the need for encryption and simple techniques for breaking (or cracking) secret messages. Students try their own hand at cracking a message encoded with the classic Caesar cipher and also a Random Substitution Cipher. Students should become well-acquainted with idea that in an age of powerful computational tools, techniques of encryption will need to be more sophisticated. The most important aspect of this lesson is to understand how and why encryption plays a role in all of our lives every day on the Internet, and that making good encryption is not trivial. Students will get their feet wet with understanding the considerations that must go into making strong encryption in the face of powerful computational tools that can be used to crack it. The need for secrecy when sending bits over the Internet is important for anyone using the Internet."

OBJECTIVE
"Explain why encryption is an important need for everyday life on the Internet.
Crack a message encrypted with a Caesar cipher using a Caesar Cipher Widget
Crack a message encrypted with random substitution using Frequency Analysis
Explain the weaknesses and security flaws of substitution ciphers"

The lesson is mapped out for teachers. It is easy to follow and includes vocabulary to cover, links to the necessary materials, and a teaching guide with background information, tips, and prompts.

AGENDA
Warm Up (10 min)
Classic Encryption - The Caesar Cipher

Activity (35 min)
Part 1 - Crack a Caesar Cipher
Part 2 - Crack a Random Substitution Cipher

Wrap Up (15 min)
Video: Encryption and Public Keys
Discussion
Career Discussion

***This lesson can be adapted for younger students but material covered aligns best with the current 8th grade Impacts of Computing Standards.

Subject:
Computer Science
Cybersecurity
Impacts of Computing
Material Type:
Activity/Lab
Interactive
Lesson Plan
Author:
code.org
Date Added:
02/02/2022
Wires, cables, and WiFi
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Software engineer Tess Winlock introduces how the physical infrastructure of the Internet moves information.

Subject:
Computer Science
Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Code.org
Khan Academy
Date Added:
07/07/2022