In this lesson, students will engage in socio-political critique as they think …
In this lesson, students will engage in socio-political critique as they think through what might happen when people fail to successfully complete different parts of the problem-solving process. Students will engage in a case study of Summit Learning, a “personalized” learning platform that led to protests and walkouts. They will think through how the designers of Summit Learning failed to solve their problem, and then make a plan to solve a problem of their own using the problem-solving process.
In this activity, students will use a model of a computer, taking …
In this activity, students will use a model of a computer, taking the form of a sort of board game, to explore writing programs that include input, output, variables, and arithmetic. Students will read, write, and debug pseudocode as they work on solving simple programming problems using manipulatives. This lesson is part of the ECS+Python lesson set, providing supplemental Python curricular material for the Exploring Computer Science curriculum.
In this project, students create a program that performs calculations on input …
In this project, students create a program that performs calculations on input values to produce formatted output. Students will choose a project to create from a list of three options, or generate their own option that meets the activity requirements. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.
In this lesson, students will explore the “Testing Random Numbers” program to …
In this lesson, students will explore the “Testing Random Numbers” program to learn how to generate random numbers and use if-statements to make comparisons. Then, they will create a “Roll the Dice Game” to learn how to work conditionals and random numbers. At the end, students will create a simple program applying their knowledge of randomization and conditional control structures. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.
In this lesson, students will implement Python programs that use “while” loops …
In this lesson, students will implement Python programs that use “while” loops and logical operations as they consider how they might make their programs more interactive and control the flow of commands in their programs. They’ll read and modify examples, explore the new concepts through paired programming, and complete a short mini-project where they will demonstrate their new skills. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.
In this lesson, students will implement Python programs that use “while” loops …
In this lesson, students will implement Python programs that use “while” loops and logical operations as they consider how they might make their programs more interactive and control the flow of commands in their programs. They’ll read and modify examples, explore the new concepts through paired programming, and complete a short mini-project where they will demonstrate their new skills. This lesson is part of CodeVA's ECS+Python lesson set, providing alternative units for the Exploring Computer Science curriculum covering basic Python coding concepts.
This resource contains a link to a youtube video titled "The Digital …
This resource contains a link to a youtube video titled "The Digital Divide, Explained" along with questions for students to respond to after they view the video.
This activity will allow students to compare Brute Force and Divide and …
This activity will allow students to compare Brute Force and Divide and Conquer sorting algorithms.This activity will show the sorting process of a Brute Force algorithm and a Divide and Conquer algorithm that is used by a computer when sorting data.
This activity will show the sorting process using the Bubble Sort Brute …
This activity will show the sorting process using the Bubble Sort Brute Force algorithm that is used by a computer when sorting data without using a computer.
This unplugged lesson will allow students to encrypt and decrypt message using …
This unplugged lesson will allow students to encrypt and decrypt message using the Caesar Cipher letter shift method of encryption. Cover the process of how this method works by doing an example and explaining the process of shifting the plaintext by the letter shift value to create the encrypted cipher text.
This lesson is designed to teach students basic encryption using the Caesar …
This lesson is designed to teach students basic encryption using the Caesar cipher method. This is a simple letter shift cipher that takes a plaintext message and encrypts it into cipher text by shifting each letter of the message by a value between 1 and 25 (1 less than the total number of letters in the English alphabet). This technique was used by Julius Caesar to encrypt messages by shifting each letter of the message by 3 letters. The message would be decrypted by taking each letter and shifting back 3 letters to reveal the plaintext message.
A Quizlet study set of 15 Computer Network terms and definitions. This …
A Quizlet study set of 15 Computer Network terms and definitions. This is a study set with terms and definitions done on quizlet. It covers basic terms, as well as topogolies, and Ethernet cable types.This set can be used as reinforcement of these topics or as a short quiz to test understanding.
A Quizlet study set of 15 Computer Network terms and definitions. This …
A Quizlet study set of 15 Computer Network terms and definitions. This is a study set with terms and definitions done on quizlet. It covers web services and protocol terms.This set can be used as reinforcement of these topics or as a short quiz to test understanding.
A Quizlet study set of 15 Computer Network terms and definitions. This …
A Quizlet study set of 15 Computer Network terms and definitions. This is a study set with terms and definitions done on quizlet. It covers wireless, remote and VPN.This set can be used as reinforcement of these topics or as a short quiz to test understanding.
This is a reference resource on the timeline of computers from the …
This is a reference resource on the timeline of computers from the 1800's to the present. It contains two graphic images from the g2.com website showing the history of computers from 1890 to the 1970's and from 1980 to 2015 as well as a link to the website that provides more details of the items from the charts. Weblink to article
PDF resource of different Cyber Careers from NICERC. The document details 15 …
PDF resource of different Cyber Careers from NICERC. The document details 15 different cyber related careers which can be used to aid students in choosing a career path in Cybersecurity. Good way to discuss with students the opportunities available in the growing field. The document details the job profile, education requirements, median salary, job growth percent, and common job duties.
This activity allows for students to Identify the quantitative and qualitative benefits of …
This activity allows for students to Identify the quantitative and qualitative benefits of going to collegeUnderstand common costs associated with collegeExplain the difference between sticker price and net price
In this activity, students will explore the idea of “data” and how …
In this activity, students will explore the idea of “data” and how it provides a lens through which to view different aspects of human experience. Students will interrogate the affordances and constraints of data as a form of representation and speculate about the effects data can have on human perception and behavior by fitting data into different schemata, developing their own data schemata, and comparing the data schemata of different institutions in their lives with the schemata they develop to represent themselves.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.