Updating search results...

Search Resources

5 Results

View
Selected filters:
  • VA.MTH.G7.6 - The student will a) compare and contrast quadrilaterals based on thei...
Classifying Quadrilaterals
Unrestricted Use
CC BY
Rating
0.0 stars

The students will visualize how the properties of Quadrilaterals can help them determine the exact shape of the figure. The students will create a model of the properties and compare them to the results the students have from data they have found

Subject:
Computer Science
Mathematics
Material Type:
Interactive
Lecture Notes
Student Guide
Unit of Study
Author:
NANCY HEAGERTY
Date Added:
08/03/2021
Math and Art with Sol LeWitt's Sculpture: "1, 2, 3, 4, 5, 6"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Using the Virginia Museum of Fine Arts website, students explore the sculptural work of 20th Century Conceptual artist Sol LeWitt to expand their understanding of geometric concepts, creatively play with mathematical ideas, and be inspired to make art of their own.

The website page provides a scaffolded approach to exploring Sol LeWitt's sculpture titled "1, 2, 3, 4, 5, 6." culminating in a challenge for students to build a 3-D Tinkercad model of a geometry concept of their own choosing.

Subject:
Computation and Estimation
Cross-Curricular
Fine Arts
Mathematics
Measurement and Geometry
Number and Number Sense
Patterns, Functions, and Algebra
STEM/STEAM
Visual Art
Material Type:
Activity/Lab
Interactive
Lesson Plan
Visual Media
Provider:
Virginia Museum of Fine Arts (VMFA)
Date Added:
07/23/2019
Part 2 Password Safety:  Decrease (Divide) and Conquer
Unrestricted Use
CC BY
Rating
0.0 stars

In this second part of a three part series, students will explore the ideas around Decrease, or Divide, and Conquer algorithm/programs to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately (stand-alone) with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Measurement and Geometry
Networking and the Internet
Material Type:
Activity/Lab
Homework/Assignment
Author:
Emily Ball
Date Added:
03/21/2022