BeeBots are an engaging, hands-on way to introduce sequencing, algorithms, programming and …
BeeBots are an engaging, hands-on way to introduce sequencing, algorithms, programming and debugging to primary and elementary students. In this introductory activity, information will be presented in a clear and concise way so that students can collaborate to plan, create, and run a program. Students will correct through debugging as necessary. The attached resource includes vocabulary and tips for using BeeBot with students.
Spice things up with students by programming BeeBot to go to specific …
Spice things up with students by programming BeeBot to go to specific numbers as a way to reinforce multiples and common factors. Activity cards, a brief overview, and a student planning sheet are included.
This course introduces cryptography by addressing topics such as ciphers that were …
This course introduces cryptography by addressing topics such as ciphers that were used before World War II, block cipher algorithms, the advanced encryption standard for a symmetric-key encryption adopted by the U.S. government, MD5 and SHA-1 hash functions, and the message authentication code. The course will focus on public key cryptography (as exemplified by the RSA algorithm), elliptic curves, the Diffie-Hellman key exchange, and the elliptic curve discrete logarithm problem. The course concludes with key exchange methods, study signature schemes, and discussion of public key infrastructure. Note: It is strongly recommended that you complete an abstract algebra course (such as the Saylor FoundationĺÎĺ_ĺĚĺ_s MA231) before taking this course. Upon successful completion of this course, students will be able to: explain how symmetric and asymmetric key ciphers work; list and define cryptographyĺÎĺ_ĺĚĺ_s goals; list and define the most common classical ciphers; explain the workings of mechanical ciphers Enigma and Lorenz; describe the principles of substitution-permutation networks; describe the algorithms for data encryption and the advanced encryption standard; describe and use the MD5 and SHA-1 hash functions; explain the idea behind public key cryptography; use the RSA cryptography system by applying it to practical problems; test whether the large integer is prime with the mathematical tools presented in this course; define the elliptic curve and use it in cryptography; explain the Diffie-Hellman key exchange; describe the most common signature and autokey identity schemes; describe the conceptual workings of public key infrastructure. This free course may be completed online at any time. (Computer Science 409)
In this lesson, students will be introduced to the idea of decomposition. …
In this lesson, students will be introduced to the idea of decomposition. Specifically the lesson caters to math word problems, but could be easily modified to any subject (as found in the modificaitons section of the lesson plan). Students will engage with each other and the vocab to work through an easy process to decompose word problems into manaeagable pieces as a strategy to solve. All activities are low prep and can be modified to your needs. This can be a stand alone lesson or expanded by using Part 2 and Part 3 to deepen understanding through coding activities.
This lesson expands upon the ideas of decomposition by using GameChangineer to …
This lesson expands upon the ideas of decomposition by using GameChangineer to incorporate commands to create a coded mini game from decomposing word problems. Students will assist the teacher in this guided lesson on how to create commands and use the website before engaing independently in Part 3. Activities are low prep with modifications included, but do require organized planning to implement effectively. If you have not done a lesson on decomposition, it is suggested you use Part 1 to help student's gain the necessary understandings of the processes used in this lesson.
Through Internet research, patent research, standards and codes research, user interviews (if …
Through Internet research, patent research, standards and codes research, user interviews (if possible) and other techniques (idea web, reverse engineering), students further develop the context for their design challenge. In subsequent activities, the design teams use this body of knowledge about the problem to generate product design ideas. (Note: Conduct this activity in the context of a design project that students are working on, which could be a challenge determined by the teacher, brainstormed with the class, or the example project challenge provided [to design a prosthetic arm that can perform a mechanical function]. This activity is Step 2 in a series of six that guide students through the engineering design loop.)
Testing is critical to any design, whether the creation of new software …
Testing is critical to any design, whether the creation of new software or a bridge across a wide river. Despite risking the quality of the design, the testing stage is often hurried in order to get products to market. In this lesson, students focus on the testing phase of the software/systems design process. They start by exploring existing examples of program testing using the CodingBat website, which contains a series of problems and challenges that students solve using the Java programming language. Working in teams, students practice writing test cases for other groups' code, and then write test cases for a program before writing the program itself.
Students use a hurricane tracking map to measure the distance from a …
Students use a hurricane tracking map to measure the distance from a specific latitude and longitude location of the eye of a hurricane to a city. Then they use the map's scale factor to convert the distance to miles. They also apply the distance formula by creating an x-y coordinate plane on the map. Students are challenged to analyze what data might be used by computer science engineers to write code that generates hurricane tracking models. Then students analyze a MATLAB® computer code that uses the distance formula repetitively to generate a table of data that tracks a hurricane at specific time intervals. Students come to realize that using a computer program to generate the calculations (instead of by hand) is very advantageous for a dynamic situation like tracking storm movements. Their inspection of some MATLAB code helps them understand how it communicates what to do using mathematical formulas, logical instructions and repeated tasks. They also conclude that the example program is too simplistic to really be a useful tool; useful computer model tools must necessarily be much more complex.
Set students up for programming success by creating a BeeBot anchor chart!These …
Set students up for programming success by creating a BeeBot anchor chart!These editable instructions will help students identify their role as planner or driver and set clear expectations of how Bee-Bot is used in computer programming. Tips:Introduce Bee-Bot whole classMake sure students understand the importance of the clear (x) button to erase the previous codealways press clear first to signal a new code (like how a capital letter signals the start of a new sentence) Plan the program in developmentally appropriate steps (some students program one step at a time, while others can program to the end goal)Turn the Bee-Bot off and use it as a game piece to write successful algorithmsHave students write their plan, or algorithm, on a whiteboard instead of using the cardsThe Bee-Bot emulator is perfect for guided practice!
Students will love programming their "robot teacher" to maneuver around the classroom …
Students will love programming their "robot teacher" to maneuver around the classroom in this introductory coding lesson. Basic computer science concepts are defined and applied as students work together to plan, create, and test algorithms. Students will recognize that programmers are the brains behind machines and technologies.
Developed by the Science Museum of Western Virginia, this educator outline was …
Developed by the Science Museum of Western Virginia, this educator outline was written for an in-museum program that addresses computational thinking. Teachers and students in grades 3-4 will expand knowledge of computer science algorithms and programming content while working through the activities "Flossbot" and "Edison Bot Activity".
The Aaron Burr treason trial in John Marshall’s court is one of …
The Aaron Burr treason trial in John Marshall’s court is one of America’s most important chapters. Just three years after the deadly Hamilton duel, President Thomas Jefferson had Aaron Burr charged with treason for plotting to carve out a kingdom for himself from parts of Louisiana and Mexico. The ensuing “trial of the century” in 1807 Richmond, VA, captivated a young nation. Accusations of treason. Claims of presidential privilege. The rule of law. Some things endure.What happened to Aaron Burr? Was he found guilty of treason? Watch The King of Crimes to find out.
This course covers the entire family of programming languages, starting with an …
This course covers the entire family of programming languages, starting with an introduction to programming languages in general and a discussion of the features and functionality that make up a modern programming language. Upon successful completion of this course, the student will be able to: identify the common concepts used to create programming languages; compare and contrast factors and commands that affect the programming state illustrate how execution ordering affects programming; identify the basic objects and constructs in Object-Oriented Programming; explain the characteristics of pure functional functions in functional programming; describe the structures and components utilized in logical programming. (Computer Science 404)
In this culminating activity of the unit, students bring together everything they've …
In this culminating activity of the unit, students bring together everything they've learned in order to write the code to solve the Grand Challenge. The code solution takes two images captured by robots and combines them to create an image that can be focused at different distances, similar to the way that humans can focus either near or far. They write in a derivative of C++ called QT; all code is listed in this activity.
Students analyze a cartoon of a Rube Goldberg machine and a Python …
Students analyze a cartoon of a Rube Goldberg machine and a Python programming language script to practice engineering analysis. In both cases, they study the examples to determine how the different systems operate and the function of each component. This exercise in juxtaposition enables students to see the parallels between a more traditional mechanical engineering design and computer programming. Students also gain practice in analyzing two very different systems to fully understand how they work, similar to how engineers analyze systems and determine how they function and how changes to the system might affect the system.
Working in small groups, students complete and run functioning Python codes. They …
Working in small groups, students complete and run functioning Python codes. They begin by determining the missing commands in a sample piece of Python code that doubles all the elements of a given input and sums the resulting values. Then students modify more advanced Python code, which numerically computes the slope of a tangent line by finding the slopes of progressively closer secant lines; to this code they add explanatory comments to describe the function of each line of code. This requires students to understand the logic employed in the Python code. Finally, students make modifications to the code in order to find the slopes of tangents to a variety of functions.
Developed by the Science Museum of Western Virginia, this educator outline is …
Developed by the Science Museum of Western Virginia, this educator outline is intended to assist in guiding middle school-aged students through various activities using the Rokit Smart robot kit. The Rokit Smart utilizes Arduino, a widely-used open-source environment for programming that enables users to create interactive electronic objects. Designed through modules, the activities can be grouped to fit after-school, summer camp, or other student enrichment needs.
Developed by the Science Museum of Western Virginia, this educator outline is …
Developed by the Science Museum of Western Virginia, this educator outline is intended to assist in guiding middle school-aged students through various activities using the Rokit Smart robot kit. The Rokit Smart utilizes Arduino, a widely-used open-source environment for programming that enables users to create interactive electronic objects. Designed through modules, the activities can be grouped to fit after-school, summer camp, or other student enrichment needs.
Developed by the Science Museum of Western Virginia, this educator outline is …
Developed by the Science Museum of Western Virginia, this educator outline is intended to assist in guiding middle school-aged students through various activities using the Rokit Smart robot kit. The Rokit Smart utilizes Arduino, a widely-used open-source environment for programming that enables users to create interactive electronic objects. Designed through modules, the activities can be grouped to fit after-school, summer camp, or other student enrichment needs.
Developed by the Science Museum of Western Virginia, this educator outline is …
Developed by the Science Museum of Western Virginia, this educator outline is intended to assist in guiding middle school-aged students through various activities using the Rokit Smart robot kit. The Rokit Smart utilizes Arduino, a widely-used open-source environment for programming that enables users to create interactive electronic objects. Designed through modules, the activities can be grouped to fit after-school, summer camp, or other student enrichment needs. *Module 4 is meant to be done after Modules 1-3 are completed.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.