In this lesson, students will learn about compound conditionals by playing the …
In this lesson, students will learn about compound conditionals by playing the “Boole Says” game. Then, students will apply their knowledge as they predict, run, and investigate compound conditional structures written in Twine.
Students use pair programming to trace, annotate and debug a prewritten Twine …
Students use pair programming to trace, annotate and debug a prewritten Twine story. Students then add modifications to the existing code and extend the story.
Students will craft a Twine program with variables, conditionals, and relational expressions …
Students will craft a Twine program with variables, conditionals, and relational expressions for a historical narrative on Westward Expansion. Students choose a project from a choice board & test products regularly during construction. Programs should offer multiple outcomes based on the user's choices or actions."
Information Technology is a broad field to learn about. Within IT there …
Information Technology is a broad field to learn about. Within IT there are many careers. This lesson is designed to help engage the students in the IT field where they will be able to research and discover various jobs they are interested in. Students will discover the education requirments, possible benefits of different jobs, salary, hiring demad, and growth potential in the field.The activities include: brainstorming, compare and contrast, research, writing, and using software either in Google or Microsoft.
Your friend asked you to enter a texting/typing competition but have months …
Your friend asked you to enter a texting/typing competition but have months to practice. We know practicing something makes you better at it. You will be given your current speed and how well you improve over each month. It is your job to find your texting/typing speed given a number of months that you have practiced. You are also to look over other student’s work to see if they made an error and if so, where.
Applying computer science principals, students will explore inventions & innovations from the …
Applying computer science principals, students will explore inventions & innovations from the Age of Information, then through pattern recognition, compare and contrast the Age of Information with the Age of Industrialization. Students will present their research to peers.
Biomanufacturing is uses nature as an inspiration. Some of the processes we …
Biomanufacturing is uses nature as an inspiration. Some of the processes we rely on started in nature!This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity
Scientists get some of their best ideas from biology. Whether that be …
Scientists get some of their best ideas from biology. Whether that be using bacteria to help make food or gene editing to cure disease, biotechnology uses the tools in biology to make amazing technology. This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity
With digitization, we see biosecurity, cybersecurity, and physical security begin to overlap. …
With digitization, we see biosecurity, cybersecurity, and physical security begin to overlap. This overlap started a new discipline, cyberbiosecurity. This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity
Data makes the world go around! As we use more technology, more …
Data makes the world go around! As we use more technology, more data is being created, recorded, and used. The next task is understanding what it all means!This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity
Farming is not just a farmer driving a tractor anymore. Sometimes the …
Farming is not just a farmer driving a tractor anymore. Sometimes the tractor drives itself! Agriculture is very technological and part of that effort is precision agriculture. Learn about how farmers are using technology to optimize their farms. This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity
As the world gets more digital, the world will need more sensors. …
As the world gets more digital, the world will need more sensors. A sensor is something that records the environment around it. Sensors can measure temperature, light, or sound among other things. Where can you find a sensor? This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity
The goal of this activity is to build critical thinking skills and …
The goal of this activity is to build critical thinking skills and excitement for Computer Science / Computational Thinking, while laying a foundation of fundamental programming concepts. By scaffolding basic concepts like sequencing and algorithms in an unplugged activity, students who are intimidated by computers can still build a foundation of understanding. In this lesson, students will learn how to develop an algorithm and encode it into a program.By "programming" one another to draw pictures, students experience some of the core concepts of programming in a fun and accessible way. The class will start by having students view a video of a simple program demonstrating how to develop instructions for building a peanut butter and jelly sandwich. Students will start with simple shapes, and progress to the coding of a specific drawing that other students will then try to replicate (“running the program”). If there is a desire to have a more of a Math slant on the lesson, the drawing could take place on graph paper. Students would then use the coordinates to complete the drawing.
This lesson incorporates both computer science and mathematics to analyze coding with …
This lesson incorporates both computer science and mathematics to analyze coding with patterns and proportional relationships. It uses the Turtle library with Python programming.
There were many black women who worked as code breakers at Arlington …
There were many black women who worked as code breakers at Arlington Hall during World War II, including Elsie Scott, Sue Bailey Thurman, and Genevieve Collins. These women faced significant challenges and discrimination due to their race and gender, but they made significant contributions to the war effort through their work as code breakers.
An assessment is attached that covers the essential vocabulary and knowledge from …
An assessment is attached that covers the essential vocabulary and knowledge from the Computer Science standard, 7.11: The student will describe the development of new technologies in communication, entertainment, and business and their impact on American life. It can be printed or used for Google Classroom, etc.
This resource contains a link to Baamboozle.com where a student can either play …
This resource contains a link to Baamboozle.com where a student can either play a game, watch a slideshow, or study with a set of flashcards from the vocabulary from the Computer Science standards 7.14 and 7.15.
This is game designed on Baamboozle.com that is based on the Computer …
This is game designed on Baamboozle.com that is based on the Computer Science standard 7.6 in Cybersecurity where users must answer questions to distinguish the difference between a physical and a digital security measures.
This is a visual that can open a class discussion on the …
This is a visual that can open a class discussion on the various differnent professions in the internet technology field. This graphic can also be included as a poster in the classroom.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.