Every day our privacy is at risk with data being collected about …
Every day our privacy is at risk with data being collected about us as we share and live more of our lives online. For this activity, you will explore how you do and do not protect your privacy online and then create a security avatar to help you battle for your privacy.
This Quizlet Study Set contains Elementary (K-5) vocabulary from the "Computing Systems" strand …
This Quizlet Study Set contains Elementary (K-5) vocabulary from the "Computing Systems" strand of the Virginia Standards of Learning for Computer Science. Students can study the terms with flashcards or try the games to test their knowledge.
This Quizlet Study Set contains Elementary (K-5) vocabulary from the "Networking and …
This Quizlet Study Set contains Elementary (K-5) vocabulary from the "Networking and the Internet" strand of the Virginia Standards of Learning for Computer Science. Students can study the flashcards and play games to test themselves on the terms.
Students will work in groups to plan the process they will use …
Students will work in groups to plan the process they will use to first determine the perimeter and then the area of a rectangle. Students will write out a detailed step by step process that can be used in different situations.
In this lesson, students will review the development of the Constitution. To …
In this lesson, students will review the development of the Constitution. To experience what this might be like, students will work together to create a set of rules, procedures, rights, and responsibilities needed to safely use computing devices and networks in our school. When they have finished they will compare their list to the school’s Acceptable Use Policy.
Explore science while inputting data into a google form to chart results! Students …
Explore science while inputting data into a google form to chart results! Students will get to investigate electrical voltage with meters. The student will answer a question by using a computer to manipulate data in order for the student to draw conclusions and make predictions.
This is an introductory lesson on encryption and decryption. It includes a …
This is an introductory lesson on encryption and decryption. It includes a discussion about the importance of protecting data when communicating across a network. The data is protected through a process of encryption and decryption.Students are asked to decrypt a message (in this case, a scientific fact to reinforce knowledge ) using the encrypted message and a decryption key.
Students will work independently, or in groups, to explore computer response times …
Students will work independently, or in groups, to explore computer response times for start-up; application and program run times; serch engine speeds; and powering off the computer in safe and efficient ways using stopwatches and averaging load times. Students will draw conclutions through a series of questions and comparisons to understand that variables in the user data collection, system byte sizes, storage limitations, multiple known and unknow tasks running behind the scenes, and/or internet stability/instability can all directly affect the computer's ability to respond accurately, and in a timely manner to user requests as well as perform as expected (with errors or success and/or lag time) and quickly.
This is a list of basic vocabulary with definitions and/or examples that will …
This is a list of basic vocabulary with definitions and/or examples that will be used in elementary classrooms K-5 when teaching the concepts of algorithms and programming.
Events in computer science are the triggers for making action happen, like …
Events in computer science are the triggers for making action happen, like selecting the play button on any screen. Events in Scratch are represented by the yellow codes including: when flag clicked, when sprite clicked, when key pressed and broadcast. Broadcasting is the most advanced event in Scratch and helps with interactions between sprites like pacing their conversations or changing levels.
In this lesson, students will make a guess about how to code …
In this lesson, students will make a guess about how to code a particular type of triangle and then test their code out. Coding a shape really helps visualize what makes it possible.
Mixing Science and Computer Science has never been easier! In this lesson …
Mixing Science and Computer Science has never been easier! In this lesson you will use Root Robots for Computer science using 5.7 and 5.8 computing systems.Students will explore troubleshooting with technology while exploring force and motion with the Robots. In this all inclusive lesson students will use the Scientific Method to experiment with Root Bots with force and motion. Students will graph results, create a hypothesis, proceedure lists, research with they know about force and motion, and them create a conclusion all while exploring force and motion and computer science trouble shooting.
In this lesson, students learn how to write a simple program to …
In this lesson, students learn how to write a simple program to find all of the factors of any positive integer. The coding language is Python. Students learn the concept of an algorithm, as well as programming concepts such as variables, data types, and looping. The lesson also includes information on how the difficulty of factoring really large numbers is the basis of all modern online commerce.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.