Explore the four main phases of the problem-solving process. Analyze a problem and use the steps in the problem-solving process to solve a problem.
- Subject:
- Computer Science
- Material Type:
- Activity/Lab
- Author:
- VCU CISTEME .
- Date Added:
- 03/01/2023
Explore the four main phases of the problem-solving process. Analyze a problem and use the steps in the problem-solving process to solve a problem.
Leverage visual-based programming to introduce text-based programming foundation for students.
Basic Programming in Scratch
Students generate and complete presentations demonstrating what they have learned in CS
Students use data to apply statistical concepts and practice fundamental statistical terms.
This is an unplugged version of how a man in the middle attack can happen and how data can be altered using rope, binder clips, envelopes and index cards.
This activity will show the sorting process using the Merge Sort Divide and Conquer algorithm that is used by a computer when sorting data without using a computer.
This lesson is used to show how conditionals can help filter a dataset. This lesson uses python and a large csv file of Netflix Content to filter through PG-13 movies and output recommendations based on user genre choce. This lesson can be taught using any python IDE and intended to be a live programming demonstration with students. Students will then extend this concept using a dataset of their own choice or other datasets given to them to explore.
This is an unplugged version of how computer data packets travel through computer networks using rope, binder clips, envelopes and index cards.
Students will learn about abstraction by examining a model computer and then breaking down several medieval romances into their essential components.
Students will learn about abstraction by looking at a built model computer and then breaking solving a system of equations down into simple components.
In this lesson, students will have a brief introduction to creating an app in Code.org’s App Lab. They will then create an app that will determine if three given lengths can form a triangle or not.
This is a hands on lesson to get students up and moving while also learning about calculating quadratic regressions. It incorporates techology such as DESMOS and/or CODAP to get students comfortable with these programs and loooking at data in different ways.
This activity is from the Cyber.org website and covers the topic of the German Enigma Encryption machine that was used during World War II. Students will learn about how the Enigma machine worked and the process it used to encrypt messages. Students will be able to create their own Enigma machine using a normal size Pringles can and the activity sheet in PDF format. This is a great way to teach the concepts of encryption and a low cost way to give students a hands on approach to encrypting and decrypting messages.Ideas on how to use this activity would be to give the students a message to encrypt using their Pringles can Enigma machine or having students send an encrypted message to a classmate with the encryption key and have that student decrypt the message. To show the power of this type of encryption you can have other students try to decrypt the message without the key so they can see how difficult it would have been to crack the code during World War II.Link to the Cyber.org website for this activity
This activity will show the sorting process using the Quick Sort Divide and Conquer algorithm that is used by a computer when sorting data without using a computer.
Sensors are part of most modern day technologies. They are integrated into our vehicles, appliances, buildings, and phones. Touch sensors trigger doors to open, motion sensors detect moving vehicles or pedestrians, and heat sensors supply an extra level of safety to our stoves. Sensors are integral to how we interact with technology and are becoming more common in the systems around us.In this lesson, students will explore some of the sensors used in transportation. They will make their own touch sensor and program a sign to display a message or warning when their sensor is triggered.
This activity is designed to help review terms that help distinguish Security and Usability Trade-offs
This lesson introduces 9-12 grade students to the tuple data type using Python. Students will learn what tuples are and how to create and use them.
This is a crossword covering several of the most common types of cyberattacks.
What is Random? Through this project, students will discover what makes an outcome random. Emphasis will be placed on the difference between deterministic and nondeterministic outcomes. The project starts out with a discovery activity where students will see the difference between creating data with a coin toss where they just make up the data and creating data through actually tossing a coin.Students will end the project by studying pseudorandom number generators, specifically the Middle Squared Algorithm. They will even create a program that uses this algorithm. Enjoy!