This is an integration guide that shows a DRAFT alignment of 2017 …
This is an integration guide that shows a DRAFT alignment of 2017 Computer Science Standards and 2024 Computer Science Standards with possible integration for Third Grade Science and activities. This will be updated after further resources are provided from VDOE. Third Grade Computer Science and Science Integration Guide
Using Arrow Cards, graph paper and an object as an “animal”, students …
Using Arrow Cards, graph paper and an object as an “animal”, students will use cards and pair programming to create the quickest route back to their natural habitat. One student will pick a card for the animal, starting point, and give directions using words like right, left, forward, turn, backward to navigate their object to the correlating ecosystem for that animal.The lesson can be found at this LINK.
Summary --Students will participate in a scientific investigation with gum. Through the process …
Summary --Students will participate in a scientific investigation with gum. Through the process students will apply and connect how algorithms and loops are part of not only computer science but the scientific method. Students gain an understanding of loops and the role they play in the overall algorithm to reach an end goal- or answer a question in the scientific process. The lesson can be found HERE.
Students will create an artifact using computing systems to model the attributes …
Students will create an artifact using computing systems to model the attributes and behaviors associated with a concept (e.g., day and night, animal life cycles, plant life cycles). Students are scientists (botanists, zoologists), who just found a new plant/animal in their chosen ecosystem. Their job is to introduce their new plant/animal to the scientific world! They will create a stop motion video to show their new plant/animal's life cycle.
This performance task combines a computer science standard with both history and math …
This performance task combines a computer science standard with both history and math standards. Students will "discover" an older version of a moden technology currently used. Students will collect data to determine which techonology has been most impactful on society. Students will graph and analyze that data.
This performance task is designed for third grade and up to teach …
This performance task is designed for third grade and up to teach the importance of using strong passwords. This would be helpful to use at the beginning of the year to review password safety with upper elementary school students to refresh their memory. This includes an instructional slide show and a student handout.
This lesson combines ELA story elements and coding on a student-friendly BrainPOP …
This lesson combines ELA story elements and coding on a student-friendly BrainPOP Jr. Platform. Students can take a book they have read and use the BrainPOP Jr. platform for a variety of story map to demonstrate their comprehension of the material chosen.
Using a Fluffy pancakes recipe students will identify a recipe as a …
Using a Fluffy pancakes recipe students will identify a recipe as a type of algorithm. Students will identify the part of the recipe that is numbered as the steps or algorithm is numbered. Students are expected to identify that number one step is done before number 2 and so on. Students will work in pairs to create their own algorithm for brushing teeth. Students should work in pairs. One student should create the algorithm and the other should debug the algorithm.
This slideshow will help students to identify and use strong passwords, and explain …
This slideshow will help students to identify and use strong passwords, and explain why strong passwords should be used (e.g., protect name, address, and telephone number). It walks students through a process that can be used to create strong, easy to remember, passwords.
The students will work in small groups to design and create a …
The students will work in small groups to design and create a prototype of a simple machine that could move a heavy box.. The machine has to be able to move a scale model of the heavy box.
This is a crossword puzzle designed on Flippity.net that has the essential …
This is a crossword puzzle designed on Flippity.net that has the essential vocabulary from the Computer Science SOL 3.17 in Networking and the Internet.
Every day our privacy is at risk with data being collected about …
Every day our privacy is at risk with data being collected about us as we share and live more of our lives online. For this activity, you will explore how you do and do not protect your privacy online and then create a security avatar to help you battle for your privacy.
Observe how computer networks function and make connections to the different ways …
Observe how computer networks function and make connections to the different ways we communicate (both in written form and modern forms). The students will discuss, in a whole class setting, how information can be communicated electronically and transmitted using computing devices via a network (e.g., email, social media, video conferencing, blogging).
This performance task is designed for third grade students and higher to …
This performance task is designed for third grade students and higher to compare and contrast a group of items based on attributes or actions classified into at least two sets and subsets. The items being classified are polygons. The use of algorithms and flowcharts is also a key component of the performance task.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.