Updating search results...

Computer Science for 5th Grade

118 affiliated resources

Search Resources

View
Selected filters:
5 Types of Computer Networks 5.17
Unrestricted Use
CC BY
Rating
0.0 stars

This PDF information sheet covers the 5 types of basic computer networks with review questions.Strand: Networking and the InterentSOL(s):  5.17 The student will compare and contrast the difference between a local network and a worldwide network. 

Subject:
Computer Science
Networking and the Internet
Material Type:
Activity/Lab
Lecture
Reading
Author:
Robert Underwood
Date Added:
05/05/2022
ACSE Region III - Colonial America
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The student will apply social science skills to understand the factors that shaped Colonial America by describing colonial life in America from the perspectives of large landowners, farmers, artisans, merchants, women, free African Americans, indentured servants, and enslaved African Americans, by creating a computational artifact.

Subject:
Computer Science
Reading
Social Sciences
Material Type:
Activity/Lab
Lesson
Author:
Ms. Boarman
Acse Grant
Ms. Coates
Amanda Coode
Casey Holbrook
Date Added:
02/12/2022
ACSE Region III- Patterns with Input/Output Tables
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will determine what type of data is needed to answer a question and will use Google Sheets to find patterns. These data skills are needed in many career and academic fields. In addition, students will use input output tables in their daily lives through the use of vending machines, banking, and taking trips to new places. This Performance Task allows them to practice these skills through real-world scenerios. 

Subject:
Computer Mathematics
Computer Science
Computing Systems
Data and Analysis
Patterns, Functions, and Algebra
Material Type:
Lesson Plan
Author:
Leland Brooks
Kristina Kelly
Acse Grant
Date Added:
02/12/2022
ACSE Region III-Performance Task: Leading a P.P.E. Manufacturing Company
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This performance task has the students working as bookkeepers for a P.P.E. Manufacturing Company to see how many P.P.E. they sold by adult and children sizes over a 2-3 month period of time and if their price of production vs cost for consumers to buy was enough that they made a profit or if they needed to make adjustments. This performance task has the students using PEMDAS to better understand how Algorithms and Programming are used in our everyday lives. 

Subject:
Algorithms and Programming
Computation and Estimation
Computer Science
Material Type:
Lesson Plan
Author:
Joseph Jarski
Georgette Willis
Acse Grant
Date Added:
02/12/2022
ACSE Region III - Playing with Order of Operations in Google Draw
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this performance task, students will have the opportunity to demonstrate the use of flowcharts in Google Draw and then create their own flowchart to show their understanding of the Order of Operations. 

Subject:
Algorithms and Programming
Computation and Estimation
Computer Science
Mathematics
Patterns, Functions, and Algebra
Material Type:
Lesson
Author:
Kelly Gearhart
Kristina Kelly
Acse Grant
Date Added:
02/12/2022
ACSE Region III - Technology Evolution Flowchart
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will create a flowchart showing the evolution of a specific technology including failed attempts at advancement. This task includes research and understanding the iterative process. Easily differentiated. 

Subject:
Algorithms and Programming
English
Impacts of Computing
Non-fiction
Research
Writing
Material Type:
Lesson Plan
Author:
Casey Holbrook
Amanda Coode
Acse Grant
Date Added:
02/12/2022
Appropriate Use of Technology 5.9
Unrestricted Use
CC BY
Rating
0.0 stars

Students will read a passage about Sarah and Thomas and underline any use of technology in the passage. They will then write “AP” for appropriate or “IN” for inappropriate above any use of technology.5.9  The student will evaluate and solve problems that relate to inappropriate use of computing devices and networks.

Subject:
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Author:
Robert Underwood
Date Added:
05/17/2022
Binary Name Art
Unrestricted Use
Public Domain
Rating
0.0 stars

In this lesson, students will create a binary art representation of their names. This will reinforce the concept of using numbers to represent non-numeric ideas.

Subject:
Data and Analysis
Material Type:
Activity/Lab
Author:
Jude Raffeinner
Date Added:
01/19/2022
Building Passwords
Unrestricted Use
Public Domain
Rating
0.0 stars

This is an unplugged worksheet activity to walk students through the process of building strong, easy to remember, passwords.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Homework/Assignment
Author:
Jude Raffeinner
Date Added:
01/28/2022
Building a Better Password
Unrestricted Use
Public Domain
Rating
0.0 stars

This slideshow will help students to identify and use strong passwords, and explain why strong passwords should be used (e.g., protect name, address, and telephone number). It walks students through a process that can be used to create strong, easy to remember, passwords.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Homework/Assignment
Author:
Jude Raffeinner
Date Added:
01/29/2022
CS 5.16 Cyberbullying  Gamilab Game
Unrestricted Use
CC BY
Rating
0.0 stars

This is a game from Gamilab where the player navigates across a map by answering questions related to the CS standard 5.16 regarding ethical online communications and cyberbullying.

Subject:
Computer Science
Material Type:
Game
Author:
Dana Smith
Date Added:
12/23/2021
CS Unplugged: Binary Bracelets/Bookmarks
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

One of the fundamental computer science concepts is that everything we do on a computer is really just turning binary digits on and off. Even though this sounds simple, it can be a concept that is hard to wrap one's head around. This activity brings the binary concept to reality through the creation of binary bracelets or bookmarks.

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Kim Wilkens
Date Added:
02/29/2020
CS Unplugged: Robot Zine
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

With advances in AI, it is more important than ever that we consider how humans and computers will interact. How do you want the robots of the future to behave towards you and others? For this activity, students will make a “robot zine” where they will sketch an original robot design, identify how their robot will sense the world around it and write a code of conduct to describe how their robot will interact with humans.

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Kim Wilkens
Date Added:
03/01/2020