Updating search results...

Computer Science Foundations

90 affiliated resources

Search Resources

View
Selected filters:
2.3 Problem Solving Process
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students will engage in socio-political critique as they think through what might happen when people fail to successfully complete different parts of the problem-solving process. Students will engage in a case study of Summit Learning, a “personalized” learning platform that led to protests and walkouts. They will think through how the designers of Summit Learning failed to solve their problem, and then make a plan to solve a problem of their own using the problem-solving process.

Subject:
Computer Science
Impacts of Computing
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
12/05/2022
4.1 Input, Output & Variables Unplugged (ECS+Python)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this activity, students will use a model of a computer, taking the form of a sort of board game, to explore writing programs that include input, output, variables, and arithmetic. Students will read, write, and debug pseudocode as they work on solving simple programming problems using manipulatives. This lesson is part of the ECS+Python lesson set, providing supplemental Python curricular material for the Exploring Computer Science curriculum.

Subject:
Algorithms and Programming
Computer Science
Computing Systems
Impacts of Computing
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
12/05/2022
4.3 Input, Output & Variables Project (ECS+Python)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this project, students create a program that performs calculations on input values to produce formatted output. Students will choose a project to create from a list of three options, or generate their own option that meets the activity requirements. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.

Subject:
Algorithms and Programming
Computer Science
Computing Systems
Impacts of Computing
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
12/05/2022
4.5 Conditionals & Randomization Coding Practice (ECS+Python)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students will explore the “Testing Random Numbers” program to learn how to generate random numbers and use if-statements to make comparisons. Then, they will create a “Roll the Dice Game” to learn how to work conditionals and random numbers. At the end, students will create a simple program applying their knowledge of randomization and conditional control structures. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.

Subject:
Algorithms and Programming
Computer Science
Impacts of Computing
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
12/05/2022
4.6 Loops & Logic Coding Practice (ECS+Python)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students will implement Python programs that use “while” loops and logical operations as they consider how they might make their programs more interactive and control the flow of commands in their programs. They’ll read and modify examples, explore the new concepts through paired programming, and complete a short mini-project where they will demonstrate their new skills. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.

Subject:
Algorithms and Programming
Computer Science
Impacts of Computing
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
12/05/2022
4.7 Conditionals, Randomization & Loops Project (ECS+Python)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students will implement Python programs that use “while” loops and logical operations as they consider how they might make their programs more interactive and control the flow of commands in their programs. They’ll read and modify examples, explore the new concepts through paired programming, and complete a short mini-project where they will demonstrate their new skills. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.

Subject:
Algorithms and Programming
Computer Science
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
12/05/2022
ACSE Page  Cybersecurity Infographics and Posters
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will learn about cybersecurity and ways to protect themselves and their personal information. Then they will use their peers within their own school as the target audience to create digital posters or infographics on cyber security. 

Subject:
Computer Science
Cross-Curricular
Cybersecurity
STEM/STEAM
Visual Art
Writing
Material Type:
Activity/Lab
Lesson Plan
Author:
Brandy Jenkins
Date Added:
12/12/2024
Algebra II Unit Statistics
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will use a variety of online resources to learn about different ways to display data and find relationships.  They will practice collecting data, interpreting data, and representing data in a variety of forms.

Subject:
Algebra I & II
Computer Science
Data and Analysis
Material Type:
Unit of Study
Author:
RCPS STEM TEAM
Date Added:
01/02/2025
Brute Force vs Divide and Conquer Sorting
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

 This activity will allow students to compare Brute Force and Divide and Conquer sorting algorithms.This activity will show the sorting process of a Brute Force algorithm and a Divide and Conquer algorithm that is used by a computer when sorting data.

Subject:
Algorithms and Programming
Material Type:
Activity/Lab
Author:
Ronald Sparks
Date Added:
04/18/2022
Caesar Cipher - Unplugged
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This unplugged lesson will allow students to encrypt and decrypt message using the Caesar Cipher letter shift method of encryption. Cover the process of how this method works by doing an example and explaining the process of shifting the plaintext by the letter shift value to create the encrypted cipher text.

Subject:
Computer Science
Cybersecurity
Data and Analysis
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
05/23/2022
Caesar Cipher in Python
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson is designed to teach students basic encryption using the Caesar cipher method. This is a simple letter shift cipher that takes a plaintext message and encrypts it into cipher text by shifting each letter of the message by a value between 1 and 25 (1 less than the total number of letters in the English alphabet). This technique was used by Julius Caesar to encrypt messages by shifting each letter of the message by 3 letters. The message would be decrypted by taking each letter and shifting back 3 letters to reveal the plaintext message.

Subject:
Algorithms and Programming
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
05/23/2022
Computer Network Terms Study Set #1
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A Quizlet study set of 15 Computer Network terms and definitions. This is a study set with terms and definitions done on quizlet. It covers basic terms, as well as topogolies, and Ethernet cable types.This set can be used as reinforcement of these topics or as a short quiz to test understanding.

Subject:
Computer Science
Networking and the Internet
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
06/05/2022
Computer Network Terms Study Set #2
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A Quizlet study set of 15 Computer Network terms and definitions. This is a study set with terms and definitions done on quizlet. It covers web services and protocol terms.This set can be used as reinforcement of these topics or as a short quiz to test understanding.

Subject:
Computer Science
Networking and the Internet
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
06/07/2022
Computer Network Terms Study Set #3
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A Quizlet study set of 15 Computer Network terms and definitions. This is a study set with terms and definitions done on quizlet. It covers wireless, remote and VPN.This set can be used as reinforcement of these topics or as a short quiz to test understanding.

Subject:
Computer Science
Networking and the Internet
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
06/07/2022
Computers 1800's to Now
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This is a reference resource on the timeline of computers from the 1800's to the present. It contains two graphic images from the g2.com website showing the history of computers from 1890 to the 1970's and from 1980 to 2015 as well as a link to the website that provides more details of the items from the charts. Weblink to article

Subject:
Computer Science
Impacts of Computing
Material Type:
Homework/Assignment
Author:
Ronald Sparks
Date Added:
06/14/2022
Cyber Careers
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

PDF resource of different Cyber Careers from NICERC. The document details 15 different cyber related careers which can be used to aid students in choosing a career path in Cybersecurity. Good way to discuss with students the opportunities available in the growing field. The document details the job profile, education requirements, median salary, job growth percent, and common job duties. 

Subject:
Computer Science
Cybersecurity
Impacts of Computing
Material Type:
Activity/Lab
Author:
Ronald Sparks
Date Added:
06/14/2022