Updating search results...

Computer Science Foundations

83 affiliated resources

Search Resources

View
Selected filters:
2.3 Problem Solving Process
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students will engage in socio-political critique as they think through what might happen when people fail to successfully complete different parts of the problem-solving process. Students will engage in a case study of Summit Learning, a “personalized” learning platform that led to protests and walkouts. They will think through how the designers of Summit Learning failed to solve their problem, and then make a plan to solve a problem of their own using the problem-solving process.

Subject:
Computer Science
Impacts of Computing
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
12/05/2022
4.1 Input, Output & Variables Unplugged (ECS+Python)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this activity, students will use a model of a computer, taking the form of a sort of board game, to explore writing programs that include input, output, variables, and arithmetic. Students will read, write, and debug pseudocode as they work on solving simple programming problems using manipulatives. This lesson is part of the ECS+Python lesson set, providing supplemental Python curricular material for the Exploring Computer Science curriculum.

Subject:
Algorithms and Programming
Computer Science
Computing Systems
Impacts of Computing
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
12/05/2022
4.3 Input, Output & Variables Project (ECS+Python)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this project, students create a program that performs calculations on input values to produce formatted output. Students will choose a project to create from a list of three options, or generate their own option that meets the activity requirements. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.

Subject:
Algorithms and Programming
Computer Science
Computing Systems
Impacts of Computing
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
12/05/2022
4.5 Conditionals & Randomization Coding Practice (ECS+Python)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students will explore the “Testing Random Numbers” program to learn how to generate random numbers and use if-statements to make comparisons. Then, they will create a “Roll the Dice Game” to learn how to work conditionals and random numbers. At the end, students will create a simple program applying their knowledge of randomization and conditional control structures. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.

Subject:
Algorithms and Programming
Computer Science
Impacts of Computing
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
12/05/2022
4.6 Loops & Logic Coding Practice (ECS+Python)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students will implement Python programs that use “while” loops and logical operations as they consider how they might make their programs more interactive and control the flow of commands in their programs. They’ll read and modify examples, explore the new concepts through paired programming, and complete a short mini-project where they will demonstrate their new skills. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.

Subject:
Algorithms and Programming
Computer Science
Impacts of Computing
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
12/05/2022
4.7 Conditionals, Randomization & Loops Project (ECS+Python)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students will implement Python programs that use “while” loops and logical operations as they consider how they might make their programs more interactive and control the flow of commands in their programs. They’ll read and modify examples, explore the new concepts through paired programming, and complete a short mini-project where they will demonstrate their new skills. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.

Subject:
Algorithms and Programming
Computer Science
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
12/05/2022
Brute Force vs Divide and Conquer Sorting
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

 This activity will allow students to compare Brute Force and Divide and Conquer sorting algorithms.This activity will show the sorting process of a Brute Force algorithm and a Divide and Conquer algorithm that is used by a computer when sorting data.

Subject:
Algorithms and Programming
Material Type:
Activity/Lab
Author:
Ronald Sparks
Date Added:
04/18/2022
Caesar Cipher - Unplugged
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This unplugged lesson will allow students to encrypt and decrypt message using the Caesar Cipher letter shift method of encryption. Cover the process of how this method works by doing an example and explaining the process of shifting the plaintext by the letter shift value to create the encrypted cipher text.

Subject:
Computer Science
Cybersecurity
Data and Analysis
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
05/23/2022
Caesar Cipher in Python
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson is designed to teach students basic encryption using the Caesar cipher method. This is a simple letter shift cipher that takes a plaintext message and encrypts it into cipher text by shifting each letter of the message by a value between 1 and 25 (1 less than the total number of letters in the English alphabet). This technique was used by Julius Caesar to encrypt messages by shifting each letter of the message by 3 letters. The message would be decrypted by taking each letter and shifting back 3 letters to reveal the plaintext message.

Subject:
Algorithms and Programming
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
05/23/2022
Computer Network Terms Study Set #1
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A Quizlet study set of 15 Computer Network terms and definitions. This is a study set with terms and definitions done on quizlet. It covers basic terms, as well as topogolies, and Ethernet cable types.This set can be used as reinforcement of these topics or as a short quiz to test understanding.

Subject:
Computer Science
Networking and the Internet
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
06/05/2022
Computer Network Terms Study Set #2
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A Quizlet study set of 15 Computer Network terms and definitions. This is a study set with terms and definitions done on quizlet. It covers web services and protocol terms.This set can be used as reinforcement of these topics or as a short quiz to test understanding.

Subject:
Computer Science
Networking and the Internet
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
06/07/2022
Computer Network Terms Study Set #3
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A Quizlet study set of 15 Computer Network terms and definitions. This is a study set with terms and definitions done on quizlet. It covers wireless, remote and VPN.This set can be used as reinforcement of these topics or as a short quiz to test understanding.

Subject:
Computer Science
Networking and the Internet
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
06/07/2022
Computers 1800's to Now
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This is a reference resource on the timeline of computers from the 1800's to the present. It contains two graphic images from the g2.com website showing the history of computers from 1890 to the 1970's and from 1980 to 2015 as well as a link to the website that provides more details of the items from the charts. Weblink to article

Subject:
Computer Science
Impacts of Computing
Material Type:
Homework/Assignment
Author:
Ronald Sparks
Date Added:
06/14/2022
Cyber Careers
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

PDF resource of different Cyber Careers from NICERC. The document details 15 different cyber related careers which can be used to aid students in choosing a career path in Cybersecurity. Good way to discuss with students the opportunities available in the growing field. The document details the job profile, education requirements, median salary, job growth percent, and common job duties. 

Subject:
Computer Science
Cybersecurity
Impacts of Computing
Material Type:
Activity/Lab
Author:
Ronald Sparks
Date Added:
06/14/2022
Data and Analysis
Unrestricted Use
CC BY
Rating
0.0 stars

This activity allows for students to Identify the quantitative and qualitative benefits of going to collegeUnderstand common costs associated with collegeExplain the difference between sticker price and net price

Subject:
Business and Information Technology
Data and Analysis
Personal Finance
Material Type:
Activity/Lab
Lesson
Author:
CHARISSE WOODWARD
Date Added:
06/10/2022
ECS 1.10: Data Scramble
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this activity, students will explore the idea of “data” and how it provides a lens through which to view different aspects of human experience. Students will interrogate the affordances and constraints of data as a form of representation and speculate about the effects data can have on human perception and behavior by fitting data into different schemata, developing their own data schemata, and comparing the data schemata of different institutions in their lives with the schemata they develop to represent themselves.

Subject:
Computer Science
Data and Analysis
Impacts of Computing
Material Type:
Lesson
Lesson Plan
Author:
CodeVA Curriculum
Jon Stapleton
Date Added:
11/17/2022