This cipher was invented for the Hebrew alphabet, but it can work …
This cipher was invented for the Hebrew alphabet, but it can work with any alphabet. Many people believe it was used in the Bible and is older than Hieroglyphics! It was later adopted by other cultures, such as the Greeks and Romans, and used to encode messages in their respective languages. This lesson leads students the basics of cryptography.
This breakout activity provides teachers and students an interactive way to demonstrate …
This breakout activity provides teachers and students an interactive way to demonstrate their learning about cryptography, code-breaking, and historic ciphers. Clues are provided, along with additional hints you can choose to provide to students so that students solve ciphers and learn what time their army is planning to raid the enemy camp.
In this lesson, students will learn about one of the most significant …
In this lesson, students will learn about one of the most significant and successful spy rings in American History. They will also actually conduct some of the same techniques and demonstrate them to the rest of the class.
In small groups, students will be assigned two of the first ten …
In small groups, students will be assigned two of the first ten amendments and pose the questions, “Which of these two amendments do you think is more important?” and “Why do you believe this?” in a survey of ten classmates. Then they will collect and organize the data electronically to create two visual representations of their information. Students will add their raw data and visualizations to a shared slideshow to present their findings to the class and explain why they chose this particular visualization model and what conclusions they can draw from their survey responses.This material is based upon work supported by the National Science Foundation under Grant No. 2010256.Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
Students will gather information regarding the cultural and economic interactions between Europeans …
Students will gather information regarding the cultural and economic interactions between Europeans and American Indians during Westward Expansion. Students will work in groups to analyze several primary sources and create a visual representation depicting the Native vs. European perspectives of westward expansion.
This activity allows students to act as historians. The student will analyze …
This activity allows students to act as historians. The student will analyze various primary documents to determine the cause of "The Starving Time" in Jamestown, Virginia. Once the students have analyzed the sources, they will be asked to write a paragraph to explain their conclusion.
This activity allows students to act as historians. The student will analyze …
This activity allows students to act as historians. The student will analyze various primary documents to determine the cause of "The Starving Time" in Jamestown, Virginia. Once the students have analyzed the sources, they will be asked to write a paragraph to explain their conclusion.
After completing background research on what it was like to live during …
After completing background research on what it was like to live during the colonial times students will be placed in a Minecraft world where they will have to collaborate with a group of classmates to build a colony that provides food and protection since the game will be played in survival mode.
Create a museum exhibit that will explore a specific historical time period …
Create a museum exhibit that will explore a specific historical time period or event through the display and analysis of historical artifacts and primary sources.
Students will use a letter Paul Revere wrote to learn how he …
Students will use a letter Paul Revere wrote to learn how he worked to keep meetings secret and warn the colonists that the British army was on their way.
During the American Revolution, the Patriots relied on sending coded messages to …
During the American Revolution, the Patriots relied on sending coded messages to prevent the British from understanding the actions of the Continental Army. George Washington’s army used this cipher– though it is not a very secure system in its original form. The Patriots adapted it by using a randomized arrangement of the alphabet. This cipher was also used to some extent during the US Civil War.
Students will work with a partner to pair-program a comparison of two …
Students will work with a partner to pair-program a comparison of two different leaders and their role in the Civil War (Abraham Lincoln/Jefferson Davis, Ulysses S. Grant/Robert E. Lee, Thomas “Stonewall” Jackson/Frederick Douglass) using Twinery.org. Their product must also incorporate and attribute existing digital media (i.e.images). Students will then find a partner group that selected different figures and peer review their Twine product with emphasis on usability, content, language, user perspective, image layout/attribution and ease of use. The feedback given must be addressed and incorporated. Students will then complete a Partner Evaluation form to review their experience working with pair programming.This lesson may need to be split across two class periods.
In this activity students will analyze various forms of primary sources, images …
In this activity students will analyze various forms of primary sources, images and text, based on differing accounts of the Boston Massacre. Students will use this information to construct a historically accurate timeline (story) using the website twinery.org.
Fifth grade students in Michigan begin their study of American history with …
Fifth grade students in Michigan begin their study of American history with American Indian peoples before the arrival of European explorers and conclude with the adoption of the Bill of Rights in 1791.
In this lesson students will learn how enslaved people used lyrics in …
In this lesson students will learn how enslaved people used lyrics in songs to help them follow the path to freedom, in the time period before and during the Civil War.
In this lesson, students will organize and visualize data from indentured contract …
In this lesson, students will organize and visualize data from indentured contract databases from virtualjamestown.org in order to come to some conclusions about the characteristics of indentured servants in early colonial America. They will make specific decisions about how to organize the data and how to best visualize the data. They will then use the data to draw conclusions about indentured servants in early colonial Virginia, culminating in a creative journal entry assignment. Additional lessons can have students search for and analyze data on the enslaved Africans of early colonial Virginia in order to compare and contrast the two forms of labor in colonial Virginia.
Students will sort and analyze data about a historical figure from the …
Students will sort and analyze data about a historical figure from the American Revolution then create a desk depicting the accomplishments, life events and/or experiences, positive and negative of the historical figure of that individual. Students will work in heterogeneous groups on a project where they sort data and analyze data about a historical figure during the American Revolution. Students will use the data collected to create a depiction of the historical figure’s desk.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.