BeeBots are an engaging, hands-on way to introduce sequencing, algorithms, programming and …
BeeBots are an engaging, hands-on way to introduce sequencing, algorithms, programming and debugging to primary and elementary students. In this introductory activity, information will be presented in a clear and concise way so that students can collaborate to plan, create, and run a program. Students will correct through debugging as necessary. The attached resource includes vocabulary and tips for using BeeBot with students.
This slideshow will help students to identify and use strong passwords, and explain …
This slideshow will help students to identify and use strong passwords, and explain why strong passwords should be used (e.g., protect name, address, and telephone number). It walks students through a process that can be used to create strong, easy to remember, passwords.
This is a lesson plan where students will collect data using a …
This is a lesson plan where students will collect data using a survey, record their findings using a pictograph, and make predictions about their findings. This is from the essential knowledge of the Comptuer Science standard 2.11.
This is a PowerPoint that was created to support the Computer Science …
This is a PowerPoint that was created to support the Computer Science standard 2.13 about the Impacts of Computing and how the student will compare and contrast examples of how computing technology has changed and improved the way people live, work, and interact.
This is a lesson plan based on the Computer Science standard, 2.12, …
This is a lesson plan based on the Computer Science standard, 2.12, where students will create a model. The students will visit a website first to see how a digital model looks and then will create their own digital models of the solar system by using Google Jamboard.
This is a PowerPoint based on the Computer Science standard 2.9 that …
This is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint presentation that is based on the Computer Science standard in Cybersecurity, SOL C.S. 2.9 where students will be reminded of the rules of how to use and handle their computers safely and responsibly.
This lesson is part of the Virginia K-12 Computer Science Pipeline which is partly …
This lesson is part of the Virginia K-12 Computer Science Pipeline which is partly funded through a GO Virginia grant in partnership with Chesapeake Public Schools, Loudoun County Public Schools, and the Loudoun Education Foundation. During this lesson, students will program a Bee-Bot (or similar robot) to locate fraction models.
Observe how computer networks function and make connections to the different ways …
Observe how computer networks function and make connections to the different ways we communicate (both in written form and modern forms). The students will discuss, in a whole class setting, how information can be communicated electronically and transmitted using computing devices via a network (e.g., email, social media, video conferencing, blogging).
In this activity, students and teachers are able to sort components of …
In this activity, students and teachers are able to sort components of a computer into 4 categories: input, output, process, and store (memory). Reinforcing the ability to drag and drop, learners are able to identify and begin developing the purpose of each categorized component.
This activity complements the book Hello Ruby: Journey Inside the Computer by Linda Liukas and was remixed with permission from the San Francisco Unified School District (SFUSD) Computer Science Team.
Key concepts include: mouse keyboard printer microphone headphones monitor controller camera temperature sensor 3-D printer CPU GPU ROM RAM Hard Drive Input Output Memory Process
Computer Use Agreement for Second Grade2.9 The student will explain what is allowed …
Computer Use Agreement for Second Grade2.9 The student will explain what is allowed and what is not allowed at school associated with the use of technology (e.g., class rules).
This slides presentation has a short video about the 4 things that …
This slides presentation has a short video about the 4 things that all computing devices have in common and then has picture examples of Input and output devices. It also has a slide of internal components we don't usually see.The final slide is a sorting activity that includes input and output devices.
This lesson will teach students key vocabulary needed to understand computing systems. …
This lesson will teach students key vocabulary needed to understand computing systems. The lesson starts by showing a video to introduce key vocabulary terms. Then, teacher and students will have a class discussion to review components of a computer, hardware/software and input/output, and how to resolve problems when using a device. Teacher will facilitate a Kahoot, and students will answer each question individually to review material learned throughout the lesson. To wrap up the lesson, students will be asked to complete an exit slip by matching pictures to the correct terms (hardware, software, input, output).
With this lesson, students will practice the Math Standards of Learning around …
With this lesson, students will practice the Math Standards of Learning around counting and comparing values of money and creating equations while also learning computer science terminology for problem solving. Students will learn to start counting change with the highest value coin possible.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.