Updating search results...

Search Resources

6 Results

View
Selected filters:
  • VA.SS.G3.2.a - The student will explain how the contributions of ancient China and Eg...
ACSE Region III-Computing Technologies based on Ancient Cultures
Unrestricted Use
CC BY
Rating
0.0 stars

Students will work in teams or individually to create a new technology that will change the world and be able to connect it to a technological influence from Ancient China or Egypt. 

Subject:
Impacts of Computing
Material Type:
Lesson Plan
Author:
Ms. Coates
Latrice Knight
Dawn Hillis
Estela White
Acse Grant
Laura Michaels
Date Added:
04/24/2023
Making Ancient Egypt Safe
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will be able to distinguish between weak and strong passwords and how passwords could have looked in Ancient Egypt!  Using the stamps, hieroglyphics stamps, magnetic letters, and papyrus paper, the students will be able to create passwords.  Dive into the differences in Ancient Egypt and today and learn how to keep your information safe!

Subject:
Computer Science
Cybersecurity
Social Sciences
Material Type:
Activity/Lab
Lesson Plan
Author:
Brooke Atwood
Date Added:
02/13/2024
PAGE ACSE -  Ancient People with Virtual Reality
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will be immersed in a part of each of the 5 ancient civilizations and learn about either architecture or daily life using a VR headset and Youtube App.

Subject:
Computer Science
Cross-Curricular
History/Social Sciences
Impacts of Computing
STEM/STEAM
World History
Material Type:
Activity/Lab
Interactive
Simulation
Author:
Nichole Brumfield
Date Added:
03/28/2024
PAGE ACSE -  Building Passwords as strong as the Great Wall of China
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson we will discuss the story of  The Three Little Pigs and the types of houses that they built.  Which ones were stronger and why?   How do people protect themselves?  In Ancient China they used a wall. Did that wall protect them?  How?  What are other ways people protect themselves?  In today’s world we need to protect ourselves using strong passwords.  How do we make a strong password?  Today you will build a strong password.  Then you will build a great wall that is as strong as the password that you created!

Subject:
Computer Science
Cross-Curricular
Cybersecurity
History/Social Sciences
STEM/STEAM
World History
Material Type:
Activity/Lab
Lesson
Lesson Plan
Reading
Author:
Tricia Nesselrodt
Date Added:
03/13/2024
PAGE ACSE -   Building strong Passwords & Pyramids
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

​​​​​​Students will be learning about the importance of building strong passwords! It's great that they will be able to see the real-world application of this concept through building pyramids like the ancient Egyptians. It's interesting to note how using different materials can determine the strength of a pyramid, just like how using different characters, symbols, and numbers can determine the strength of a password. This is a fun and engaging way for students to learn about cybersecurity.

Subject:
Computer Science
Cross-Curricular
Cybersecurity
History/Social Sciences
STEM/STEAM
Material Type:
Activity/Lab
Author:
Kelly Rickard
Date Added:
04/29/2024
World History I - Compare & Contrast (5 Venn Diagrams)
Unrestricted Use
Public Domain
Rating
0.0 stars

Interactive Google Slides - Drag and drop venn diagram activities that can also print off as worksheets. Includes Answer Keys!Venn Diagrams Included:Paleolithic v. Neolithic ErasEgypt v. MesopotamiaHinduism v. BuddhismAthens v. SpartaMayans, Incas, & Aztecs matching 

Subject:
History/Social Sciences
Humanities
Social Sciences
World History
Material Type:
Activity/Lab
Homework/Assignment
Interactive
Author:
Haley Taylor
Date Added:
07/27/2022