This lesson plan uses the Hello Ruby book, Adventures in Coding, by …
This lesson plan uses the Hello Ruby book, Adventures in Coding, by Linda Liukas, to teach students about algorithms and conditional loops. It contains an activity featured from the book as well as other resources that can be used in conjunction with the book. The lesson teaches 2nd grade students what an algorithm is and how they use them in everyday life.
This lesson incorporates both computer science and mathematics to analyze coding with …
This lesson incorporates both computer science and mathematics to analyze coding with patterns and proportional relationships. It uses the Turtle library with Python programming.
In this lesson, students will create a binary art representation of their …
In this lesson, students will create a binary art representation of their names. This will reinforce the concept of using numbers to represent non-numeric ideas.
This slideshow will help students to identify and use strong passwords, and explain …
This slideshow will help students to identify and use strong passwords, and explain why strong passwords should be used (e.g., protect name, address, and telephone number). It walks students through a process that can be used to create strong, easy to remember, passwords.
This is a PowerPoint that helps young students know how to identify …
This is a PowerPoint that helps young students know how to identify a computer program and what to tell an adult so they can help them fix it. It is based on the Computer Science standard, 1.8: The student will identify, using accurate terminology, simple hardware and software problems that may occur during use.
This is a PowerPoint that was created to support the Computer Science …
This is a PowerPoint that was created to support the Computer Science standard 2.13 about the Impacts of Computing and how the student will compare and contrast examples of how computing technology has changed and improved the way people live, work, and interact.
This is a game from Gamilab where the player navigates across a …
This is a game from Gamilab where the player navigates across a map by answering questions related to the CS standard 5.16 regarding ethical online communications and cyberbullying.
An assessment is attached that covers the essential vocabulary and knowledge from …
An assessment is attached that covers the essential vocabulary and knowledge from the Computer Science standard, 7.11: The student will describe the development of new technologies in communication, entertainment, and business and their impact on American life. It can be printed or used for Google Classroom, etc.
This is game designed on Baamboozle.com that is based on the Computer …
This is game designed on Baamboozle.com that is based on the Computer Science standard 7.6 in Cybersecurity where users must answer questions to distinguish the difference between a physical and a digital security measures.
This is a PowerPoint based on the Computer Science standard 2.9 that …
This is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint presentation that is based on the Computer Science standard in Cybersecurity, SOL C.S. 2.9 where students will be reminded of the rules of how to use and handle their computers safely and responsibly.
This activity, created on Quizalize, is from the essential knowledge and vocabulary …
This activity, created on Quizalize, is from the essential knowledge and vocabulary from the Computer Science SOL 5.7, from the strand Computing Systems.
This is a crossword puzzle that is comprised of the essential vocabulary from …
This is a crossword puzzle that is comprised of the essential vocabulary from the Computer Science SOL 8.7 in Cybersecurity. It was made at Flippity.net.
This game created on Gamilab is from CS SOL 8.9 and is …
This game created on Gamilab is from CS SOL 8.9 and is titled, “Public and Private Information.” It is a bike race game where students must correctly answer questions to advance regarding online information from the Computer Science SOL 8.9 from the strand of Impacts of Computing. To start, press the up arrow a couple of times. Please enter code G8471Tto play if you have any problems with the link.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.