Updating search results...

Computer Science for 7th Grade

102 affiliated resources

Search Resources

View
Selected filters:
Choctaw Code Talkers
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will examine the history and culture of the Choctaw Native Americans, as well as the story of the Code Talkers in WW1, in order to memorialize one of the Choctaw Code Talkers. 

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
11/30/2023
Ciphers and Encryption Part 1:  Pigpen Cipher
Unrestricted Use
CC BY
Rating
0.0 stars

The student or class will watch a video clip about spies and secret codes from the past.  Next students will be able to use a Pigpen cipher to crack a secret message of their own.  Teachers can edit the message to fit their needs and make adjustments as desired.  This is one mini lesson out of a series of five.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Emily Ball
Date Added:
01/18/2022
Ciphers and Encryption Part 2:  Vigenère Square
Unrestricted Use
CC BY
Rating
0.0 stars

The student or class will watch a video clip about how to decode a Vigenère Square Cipher.Next students will be able to use the cipher to crack a secret message of their own (teacher provided messages in a hat (not inlcuded)).  One student chooses the word or phrase, the teacher puts the key (word) on the board, that same student will encrypt the message and send it to their partner.  The partner with use the same key word to return the text to plain text revealing the message and send their guess back to their partner. Teachers can edit the message to fit their needs and make adjustments as desired.  This is one mini lesson out of a series of five (part 2) and can be used alone, or with other lessons in the series. Vigenère Square Ciphefrom the past.  Next students will be able to use a Pigpen cipher to crack a secret message of their own.  Teachers can edit the message to fit their needs and make adjustments as desired.  This is one mini lesson out of a series of five. Vigenère Square Ciphe

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Emily Ball
Date Added:
01/18/2022
Ciphers and Encryption Part 4: Book Ciphers
Unrestricted Use
CC BY
Rating
0.0 stars

The student or class will read about book ciphers and how they work.  Students will then be able to use a cipher provided to crack a secret message.  Teachers can edit the message to fit their needs and make adjustments as desired.  This is one mini lesson out of a series of five, this is lesson four and it can be completed alone, or with any of the other lessons.

Subject:
Networking and the Internet
Material Type:
Activity/Lab
Author:
Emily Ball
Date Added:
01/18/2022
Ciphers and Encryption Part 5: Caesar Cipher
Unrestricted Use
CC BY
Rating
0.0 stars

The student or class will watch a video clip about ciphers, specifically Caesar Ciphers.  Next students will learn more about encryption and decryption through the use of "keys".  Lastly, students will be introduced to the career path choices as a Cyber-security analyst. This is one lesson out of a series of five, and can be used alone, or with the some or all of the other four lessons.

Subject:
Impacts of Computing
Networking and the Internet
Material Type:
Activity/Lab
Author:
Emily Ball
Date Added:
01/18/2022
Code Girls
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Women code-breakers changed the course of WWII by cracking Japanese codes that revealed the movements of people and supplies in the Pacific Islands. In this lesson, students will learn how specific information discovered led to a turning point when cryptographers were able to pinpoint the plans of the Pearl Harbor Attack’s “architect”, Admiral Yamomoto.Students will examine videos and articles to find out more about this episode in history. In pairs or small groups, they’ll look at the US Post Office’s newly revealed stamp commemorating it. They’ll identify what they think are the pros and cons of the stamp and then design their own. 

Subject:
American History
Computer Science
History/Social Sciences
Material Type:
Lesson
Author:
CodeVA Curriculum
Lola Lloyd
Date Added:
03/17/2023
Coding Kitchen Safety
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson is designed to engage students in a meaningful and fun coding experience, while investigating sanitation practices, food, and kitchen safety. Students will create an animated story using block-based coding in Scratch. This overarching lesson idea (research – storyboard – code) can be applied to any subject.

Subject:
Computer Science
Family and Consumer Sciences
Material Type:
Activity/Lab
Lesson
Author:
Julia DiOrio
Date Added:
05/19/2023
Computer Graphics Art Lesson Plan
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson plan is for middle school art, teaching how computer graphics work are designed with pixels and aliasing. It reinforces how a computer shows a picture while refining art skills.

Subject:
Computer Science
Impacts of Computing
Material Type:
Homework/Assignment
Author:
Tara Williams
Date Added:
06/06/2022
Computer Science Careers Crossword
Unrestricted Use
CC BY
Rating
0.0 stars

This activity is designed to help students review the potential careers associated with computer science.  This should follow a discussion about the wide variety of career choices for students.

Subject:
Impacts of Computing
Material Type:
Activity/Lab
Author:
Matthew Rose
Date Added:
06/08/2022
Creating a Formula Calculator
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

This resource will show how to teach your students to make their own "formula calculator" using Java programming, and it has handouts for your students or your own use. It is ideal for Grade 7 and Grade 8 Math.The video in this resource walks you through the steps to teach your students to program their "formula calculator" using Java programming after they have been taught about geometric formulas. They can then use their calculator to help them solve their math problems. It will reinforce critical thinking skills and create a deeper understanding of how the formulas work.Students can use any Java IDE or even an online IDE. The lesson can be customized based on your familiarity with Java and your students' computer skills.The handouts show how to use arithmetic operators in Java as well as some Math class methods that will be helpful. The attached program can be used as a starting point for their programs. 

Subject:
Algorithms and Programming
Computer Science
Mathematics
Measurement and Geometry
Material Type:
Activity/Lab
Lesson Plan
Author:
Tara Williams
Date Added:
07/30/2021
Creating a Golden Ratio Model to Predict People's Height 7.8-9
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Cross curricular lesson plan integrating Computer Science and Mathematics Standards CS 7.8-9 Mathematics 7.10 and 8.13

Subject:
Computer Science
Cross-Curricular
Data and Analysis
Mathematics
Material Type:
Lesson Plan
Author:
Christy Shepherd
Date Added:
11/05/2022
#CyberSmarts (3 Lessons by Scholastic)
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

The lessons provided are presented by Scholastic and sponsored by Norton Lifelock.
All rights reserved by Scholastic.
Below is an overview of the three lessons provided.
The lessons do not coincide with one another.
The teacher can choose to use all three or select the best option for the classroom needs.

The PDF Links includes:
Lesson 1: Understanding Online Safety (45 minutes)
- Students will analyze text, citing evidence and summarizing central ideas. They will make inferences to create their own cybersecurity protection plan.
- Students will use the provided copy of #Cybersmarts student magazine to create their personalized online protection plan.

Lesson 2: Identifying Preventive Technologies (45 minutes + presentation time)
- Students will conduct research on preventive technologies built and used by professionals in the cybersecurity field (e.g., firewalls, ad blocker apps, antivirus software, voice recognition software, virtual private network (VPN), etc.).
- Students will then prepare a presentation - the given choices are a skit or interview. Presentation options can be easily adapted to best fit your classroom needs.
- Research planning/ gathering page is provided.

Lesson 3: Making Online Profiles More Secure (2 part lesson - 90 minutes total)
- Students will use analytical and reasoning skills to identify areas of vulnerability in an online profile and come up with strategies for how to make them more secure by applying information from a text.
- First, students will analyze their own personal profiles (if applicable). Then, they will analyze a provided “profile” to identify security holes. Last, discuss the answers and reasonings as a class.
*This lesson can be shortened to fit into one class period.
*(Optional) An extension idea is provided. It includes information from all lessons. Students will use what they have learned to create their own cybersecurity device.

Subject:
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Lesson Plan
Reading
Author:
Norton Lifelock
Scholastic
Date Added:
02/02/2022
Cybersecurity to Solve the Mystery of the Kentucky Derby Disappearance!
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This activity introduces cybersecurity concerns with technologies commonly used in the livestock industry  in the context of a "clue" style activity in which students act as private investigators looking for a lost racehorse. It can be facilitated in 90 minutes, either in a single session or 4-5 shorter sessions. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Cybersecurity
Material Type:
Lesson Plan
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
10/30/2023
Data Collection and Graphing Part 1:  Screen Time Log
Unrestricted Use
CC BY
Rating
0.0 stars

The student will use a table of personal data collected about plugged/unplugged activites and times of rest throughout the period of one week (7 days) to document screen times in comparison to active and restful breaks for a computer science integration and digital balance project.This Part 1 activity uses the data collected in a table to teach students how to copy and paste a table from Docs into Slides, and how to develop a Slideshow Presentation with tables (Part 1) and graphs (Part 2).  Students are given opportunities to collect and analyze data, to enter information into tables and graphs, to develop and share presentations in Slides, as well as summarize and draw conclusions about the data collection, graphing, and results as comparable to their peers, digital categories, or peer groups (Gamers vs YouTubers, Boys vs Girls, etc.).The goal/s of this unit is to help students realize the importance of living a digitally balanced life and to help students develop skills for creating and using digital tables and graphs with an introduction to data collection and analysis.

Subject:
Data and Analysis
Material Type:
Activity/Lab
Homework/Assignment
Author:
Emily Ball
Date Added:
03/06/2022
Data Collection and Graphing in Sheets Part 2
Unrestricted Use
CC BY
Rating
0.0 stars

The student will use previously collected personal and peer data (Part 1: Screen Time Logs) to graph a bar and pie graph in Slides using Sheets to graph the data collected.This is the second part of an intended presentation project for a computer CTE middle school class, but can be edited and adapted for any graphing and/or computer integration lessons about bar and pie graphs and how to make them in Google Sheets using Google Slides.

Subject:
Data and Analysis
Material Type:
Activity/Lab
Homework/Assignment
Author:
Emily Ball
Date Added:
03/06/2022
Data quality in automation of food production: A soil nutrient experiment
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this activity, participants plan and conduct a plant growth experiment while considering the role of data quality in automated systems in agriculture. The timing of the activity is highly dependent on the seed variety that you are growing and the level of familiarity that participants already have with basic plant science and scientific investigation concepts, but will likely take several weeks. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Data and Analysis
Living Systems and Processes
Scientific and Engineering Practices
Material Type:
Lesson Plan
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
10/30/2023