In this activity, students will use a model of a computer, taking …

In this activity, students will use a model of a computer, taking the form of a sort of board game, to explore writing programs that include input, output, variables, and arithmetic. Students will read, write, and debug pseudocode as they work on solving simple programming problems using manipulatives. This lesson is part of the ECS+Python lesson set, providing supplemental Python curricular material for the Exploring Computer Science curriculum.

"In this lesson, students will read and trace a “Hello World'' Python …

"In this lesson, students will read and trace a “Hello World'' Python program to learn how to display simple output. Then, they will create an “Addition Calculator” to learn how to work with variables and arithmetic operators. At the end, students will modify and complete partially-written Python programs, applying their knowledge of variables and arithmetic operations. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.

In this project, students create a program that performs calculations on input …

In this project, students create a program that performs calculations on input values to produce formatted output. Students will choose a project to create from a list of three options, or generate their own option that meets the activity requirements. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.

This lesson is designed to teach students basic encryption using the Caesar …

This lesson is designed to teach students basic encryption using the Caesar cipher method. This is a simple letter shift cipher that takes a plaintext message and encrypts it into cipher text by shifting each letter of the message by a value between 1 and 25 (1 less than the total number of letters in the English alphabet). This technique was used by Julius Caesar to encrypt messages by shifting each letter of the message by 3 letters. The message would be decrypted by taking each letter and shifting back 3 letters to reveal the plaintext message.

In this lesson sequence, students will work in teams to learn the …

In this lesson sequence, students will work in teams to learn the MakeCode and Micro:Bit Development platform. They’ll develop basic programming skills, implementing input, output, variables, and conditional control structures. At the end of the sequence, students will compete in a “puzzle box” challenge, attempting to create a puzzle using their Micro:Bit, code, and craft supplies and earning points based on how challenging their puzzle is to solve.

In this lesson, students learn the basics of coding for the Micro:Bit …

In this lesson, students learn the basics of coding for the Micro:Bit using the MakeCode development tool. Students will engage in PRIMM cycles, pair programming, and will begin working on the puzzle box they’ll finish in later lessons by building an “unlocking” animation using display output blocks.This lesson is part of the Micro:Bit Puzzle Box four-lesson sequence. Read about the sequence in the sequence overview, linked here.

This activity will allow students to create a simple bank account program …

This activity will allow students to create a simple bank account program using the Java programming language. This activity could also be edited to use any programming language.

What is Random? Through this project, students will discover what makes an outcome …

What is Random? Through this project, students will discover what makes an outcome random. Emphasis will be placed on the difference between deterministic and nondeterministic outcomes. The project starts out with a discovery activity where students will see the difference between creating data with a coin toss where they just make up the data and creating data through actually tossing a coin.Students will end the project by studying pseudorandom number generators, specifically the Middle Squared Algorithm. They will even create a program that uses this algorithm. Enjoy!

No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.

Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.

Your redistributing comes with some restrictions. Do not remix or make derivative works.

Most restrictive license type. Prohibits most uses, sharing, and any changes.

Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.