In this lesson, students will engage in socio-political critique as they think …
In this lesson, students will engage in socio-political critique as they think through what might happen when people fail to successfully complete different parts of the problem-solving process. Students will engage in a case study of Summit Learning, a “personalized” learning platform that led to protests and walkouts. They will think through how the designers of Summit Learning failed to solve their problem, and then make a plan to solve a problem of their own using the problem-solving process.
In this activity, students will use a model of a computer, taking …
In this activity, students will use a model of a computer, taking the form of a sort of board game, to explore writing programs that include input, output, variables, and arithmetic. Students will read, write, and debug pseudocode as they work on solving simple programming problems using manipulatives. This lesson is part of the ECS+Python lesson set, providing supplemental Python curricular material for the Exploring Computer Science curriculum.
In this project, students create a program that performs calculations on input …
In this project, students create a program that performs calculations on input values to produce formatted output. Students will choose a project to create from a list of three options, or generate their own option that meets the activity requirements. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.
In this lesson, students will explore the “Testing Random Numbers” program to …
In this lesson, students will explore the “Testing Random Numbers” program to learn how to generate random numbers and use if-statements to make comparisons. Then, they will create a “Roll the Dice Game” to learn how to work conditionals and random numbers. At the end, students will create a simple program applying their knowledge of randomization and conditional control structures. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.
In this lesson, students will implement Python programs that use “while” loops …
In this lesson, students will implement Python programs that use “while” loops and logical operations as they consider how they might make their programs more interactive and control the flow of commands in their programs. They’ll read and modify examples, explore the new concepts through paired programming, and complete a short mini-project where they will demonstrate their new skills. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.
In this lesson, students will implement Python programs that use “while” loops …
In this lesson, students will implement Python programs that use “while” loops and logical operations as they consider how they might make their programs more interactive and control the flow of commands in their programs. They’ll read and modify examples, explore the new concepts through paired programming, and complete a short mini-project where they will demonstrate their new skills. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.
Students will learn about cybersecurity and ways to protect themselves and their …
Students will learn about cybersecurity and ways to protect themselves and their personal information. Then they will use their peers within their own school as the target audience to create digital posters or infographics on cyber security.
This resource contains a link to a youtube video titled "The Digital …
This resource contains a link to a youtube video titled "The Digital Divide, Explained" along with questions for students to respond to after they view the video.
Students will use a variety of online resources to learn about different …
Students will use a variety of online resources to learn about different ways to display data and find relationships. They will practice collecting data, interpreting data, and representing data in a variety of forms.
This activity will allow students to compare Brute Force and Divide and …
This activity will allow students to compare Brute Force and Divide and Conquer sorting algorithms.This activity will show the sorting process of a Brute Force algorithm and a Divide and Conquer algorithm that is used by a computer when sorting data.
This activity will show the sorting process using the Bubble Sort Brute …
This activity will show the sorting process using the Bubble Sort Brute Force algorithm that is used by a computer when sorting data without using a computer.
This unplugged lesson will allow students to encrypt and decrypt message using …
This unplugged lesson will allow students to encrypt and decrypt message using the Caesar Cipher letter shift method of encryption. Cover the process of how this method works by doing an example and explaining the process of shifting the plaintext by the letter shift value to create the encrypted cipher text.
This lesson is designed to teach students basic encryption using the Caesar …
This lesson is designed to teach students basic encryption using the Caesar cipher method. This is a simple letter shift cipher that takes a plaintext message and encrypts it into cipher text by shifting each letter of the message by a value between 1 and 25 (1 less than the total number of letters in the English alphabet). This technique was used by Julius Caesar to encrypt messages by shifting each letter of the message by 3 letters. The message would be decrypted by taking each letter and shifting back 3 letters to reveal the plaintext message.
A Quizlet study set of 15 Computer Network terms and definitions. This …
A Quizlet study set of 15 Computer Network terms and definitions. This is a study set with terms and definitions done on quizlet. It covers basic terms, as well as topogolies, and Ethernet cable types.This set can be used as reinforcement of these topics or as a short quiz to test understanding.
A Quizlet study set of 15 Computer Network terms and definitions. This …
A Quizlet study set of 15 Computer Network terms and definitions. This is a study set with terms and definitions done on quizlet. It covers web services and protocol terms.This set can be used as reinforcement of these topics or as a short quiz to test understanding.
A Quizlet study set of 15 Computer Network terms and definitions. This …
A Quizlet study set of 15 Computer Network terms and definitions. This is a study set with terms and definitions done on quizlet. It covers wireless, remote and VPN.This set can be used as reinforcement of these topics or as a short quiz to test understanding.
This is a reference resource on the timeline of computers from the …
This is a reference resource on the timeline of computers from the 1800's to the present. It contains two graphic images from the g2.com website showing the history of computers from 1890 to the 1970's and from 1980 to 2015 as well as a link to the website that provides more details of the items from the charts. Weblink to article
PDF resource of different Cyber Careers from NICERC. The document details 15 …
PDF resource of different Cyber Careers from NICERC. The document details 15 different cyber related careers which can be used to aid students in choosing a career path in Cybersecurity. Good way to discuss with students the opportunities available in the growing field. The document details the job profile, education requirements, median salary, job growth percent, and common job duties.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.