This lesson plan uses the Hello Ruby book, Adventures in Coding, by …
This lesson plan uses the Hello Ruby book, Adventures in Coding, by Linda Liukas, to teach students about algorithms and conditional loops. It contains an activity featured from the book as well as other resources that can be used in conjunction with the book. The lesson teaches 2nd grade students what an algorithm is and how they use them in everyday life.
This is a PowerPoint that helps young students know how to identify …
This is a PowerPoint that helps young students know how to identify a computer program and what to tell an adult so they can help them fix it. It is based on the Computer Science standard, 1.8: The student will identify, using accurate terminology, simple hardware and software problems that may occur during use.
This is a lesson plan where students will collect data using a …
This is a lesson plan where students will collect data using a survey, record their findings using a pictograph, and make predictions about their findings. This is from the essential knowledge of the Comptuer Science standard 2.11.
This is a PowerPoint that was created to support the Computer Science …
This is a PowerPoint that was created to support the Computer Science standard 2.13 about the Impacts of Computing and how the student will compare and contrast examples of how computing technology has changed and improved the way people live, work, and interact.
This is a lesson plan designed for instructors in which students conduct …
This is a lesson plan designed for instructors in which students conduct research on the town they live in, share their findings on Google Jamboard with their classmates, and organize their findings into a chart on Google Sheets in order to make predictions about the data.
This is a game from Gamilab where the player navigates across a …
This is a game from Gamilab where the player navigates across a map by answering questions related to the CS standard 5.16 regarding ethical online communications and cyberbullying.
An assessment is attached that covers the essential vocabulary and knowledge from …
An assessment is attached that covers the essential vocabulary and knowledge from the Computer Science standard, 7.11: The student will describe the development of new technologies in communication, entertainment, and business and their impact on American life. It can be printed or used for Google Classroom, etc.
This resource contains a link to Baamboozle.com where a student can either play …
This resource contains a link to Baamboozle.com where a student can either play a game, watch a slideshow, or study with a set of flashcards from the vocabulary from the Computer Science standards 7.14 and 7.15.
This is game designed on Baamboozle.com that is based on the Computer …
This is game designed on Baamboozle.com that is based on the Computer Science standard 7.6 in Cybersecurity where users must answer questions to distinguish the difference between a physical and a digital security measures.
This is a fifteen question assessment from the Computer Science standard, 8.13: The student …
This is a fifteen question assessment from the Computer Science standard, 8.13: The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues. An answer key is also attached.
This is a lesson plan based on the Computer Science standard, 2.12, …
This is a lesson plan based on the Computer Science standard, 2.12, where students will create a model. The students will visit a website first to see how a digital model looks and then will create their own digital models of the solar system by using Google Jamboard.
This is a PowerPoint based on the Computer Science standard 2.9 that …
This is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint presentation that is based on the Computer Science standard in Cybersecurity, SOL C.S. 2.9 where students will be reminded of the rules of how to use and handle their computers safely and responsibly.
This is a crossword puzzle designed on Flippity.net that has the essential …
This is a crossword puzzle designed on Flippity.net that has the essential vocabulary from the Computer Science SOL 3.17 in Networking and the Internet.
This activity, created on Quizalize, is from the essential knowledge and vocabulary …
This activity, created on Quizalize, is from the essential knowledge and vocabulary from the Computer Science SOL 5.7, from the strand Computing Systems.
This is a crossword puzzle that is comprised of the essential vocabulary from …
This is a crossword puzzle that is comprised of the essential vocabulary from the Computer Science SOL 8.7 in Cybersecurity. It was made at Flippity.net.
This game created on Gamilab is from CS SOL 8.9 and is …
This game created on Gamilab is from CS SOL 8.9 and is titled, “Public and Private Information.” It is a bike race game where students must correctly answer questions to advance regarding online information from the Computer Science SOL 8.9 from the strand of Impacts of Computing. To start, press the up arrow a couple of times. Please enter code G8471Tto play if you have any problems with the link.
This is a PowerPoint presentation that covers the essential knowledge of the …
This is a PowerPoint presentation that covers the essential knowledge of the Computer Science standard 3.8 on Computing System about systems and the inputs and outputs of computing systems.
The following resources is a link that will allow the user to …
The following resources is a link that will allow the user to play a matching game from Flippity.net using the vocabulary words from the Comptuer Science SOL 4.18-The student will identify and explain different ways information can be transmitted using computing devices via a network (e.g., email, images, and videos).
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.