Updating search results...

Computer Science for 7th Grade

91 affiliated resources

Search Resources

View
Selected filters:
Middle-Schoolers Coding With Python Part 2 of 3
Unrestricted Use
CC BY
Rating
0.0 stars

The students will copy and paste code snippets from Google Slides and run them on Replit.  After students run the code, they will screenshot the images created using "import Turtle", a graphics program within Python.  These screenshots will be used as a digital greeting card and students will practice composing emails. Lastly, students send/email their created digital artifacts to three of their friends or family members to wish them a "Happy New Year".*The image attached is just a sample and may or may not be what this lessons code creates.

Subject:
Algorithms and Programming
Impacts of Computing
Material Type:
Activity/Lab
Author:
Emily Ball
Date Added:
01/12/2022
Minecraft Colonial Settlement Lesson
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

After completing background research on what it was like to live during the colonial times students will be placed in a Minecraft world where they will have to collaborate with a group of classmates to build a colony that provides food and protection since the game will be played in survival mode.

Subject:
American History
Computer Science
Government and Civics
Virginia History
Material Type:
Activity/Lab
Author:
Michael Speidel
Sharon Brandon
Date Added:
12/21/2020
NASA eClips Ask SME Close-up with a NASA Subject Matter Expert:  Remote Sensing Scientist - Dr. Catherine Nakalembe
Unrestricted Use
Public Domain
Rating
0.0 stars

Video Description:  In this close-up video, Dr. Catherine Nakalembe, Remote Sensing Scientist for NASA Harvest, shares her passion for helping farmers around the world through the use of NASA satellites to monitor crops from space to increase sustainability. She also describes how her love for hiking, photography, and travel supports her work.  Video Length:  2:09.NASA eClipsTM is a suite of online student-centered, standards-based resources that support instruction by increasing STEM literacy in formal and nonformal settings.  These free digital and downloadable resources inform and engage students through NASA-inspired, real-world connections.NASA eClips Ask SME: Close-up with a NASA Subject Matter Expert videos are professionally developed to capture a glimpse of NASA SME's personal interests and career journeys. Each can be used to spark student interest and broaden their ideas of the STEM workforce. Additional videos in this series can be found by searching GoOpenVA using "NASA eClips Ask SME".

Subject:
Career Connections
Earth and Space Systems
Impacts of Computing
Science
Material Type:
Visual Media
Author:
Betsy McAllister
Date Added:
04/05/2022
NASA eClips Real World:  Computer Simulations -- Turning Complex Ideas Into Solvable Equations
Unrestricted Use
Public Domain
Rating
0.0 stars

Video Description:  How does NASA test ideas, like the Mars Helicopter, before they are even built? Find out more about this revolutionary helicopter and how NASA uses mathematical modeling to turn complex ideas into solvable equations that help shape future missions. Video Length:  3:20.NASA eClipsTM is a suite of online student-centered, standards-based resources that support instruction by increasing STEM literacy in formal and nonformal settings.  These free digital and downloadable resources inform and engage students through NASA-inspired, real-world connections.NASA eClips Real World segments (grades 6-8) connect classroom mathematics to 21st Century careers and innovations.  They are designed for students to develop an appreciation for mathematics through real-world problem solving.

Subject:
Algorithms and Programming
Computer Mathematics
Computer Science
Impacts of Computing
Mathematics
STEM/STEAM
Science
Scientific and Engineering Practices
Material Type:
Visual Media
Author:
Betsy McAllister
Date Added:
03/01/2022
NASA eClips Real World:  Food Security -- Monitoring Crops from Space
Unrestricted Use
Public Domain
Rating
0.0 stars

NASA eClips Real World:  Food Security -- Monitoring Crops from SpaceVideo Description:  Discover how NASA's Earth-observing satellites gather data to monitor food growth. Dr. Inbal Becker-Reshef describes how mathematics is used to interpret satellite data and describe vegetation and crop yield. Dr. Hannah Kerner shares how algorithms and models use NASA data to describe and predict food supply and food shortages. This work through NASA Harvest provides tools for farmers and governments to describe and predict food security worldwide. Video Length:  5:25.NASA eClipsTM is a suite of online student-centered, standards-based resources that support instruction by increasing STEM literacy in formal and nonformal settings.  These free digital and downloadable resources inform and engage students through NASA-inspired, real-world connections.NASA eClips Real World segments (grades 6-8) connect classroom mathematics to 21st Century careers and innovations.  They are designed for students to develop an appreciation for mathematics through real-world problem solving.

Subject:
Agricultural Education
Data and Analysis
Earth Resources
Mathematics
STEM/STEAM
Science
Material Type:
Visual Media
Author:
Betsy McAllister
Date Added:
02/28/2022
NASA eClips Real World:  From Idea to Physical Prototype
Unrestricted Use
Public Domain
Rating
0.0 stars

Video Description:  At NASA everything begins with an idea. Physical models help NASA engineers and technicians test those ideas before building full-scale versions. Learn more about the important role physical modeling, building prototypes and mathematics play in engineering solutions.  Video Length:  3:11.NASA eClipsTM is a suite of online student-centered, standards-based resources that support instruction by increasing STEM literacy in formal and nonformal settings.  These free digital and downloadable resources inform and engage students through NASA-inspired, real-world connections.NASA eClips Real World segments (grades 6-8) connect classroom mathematics to 21st Century careers and innovations.  They are designed for students to develop an appreciation for mathematics through real-world problem solving.

Subject:
Algorithms and Programming
Computer Mathematics
Computer Science
Impacts of Computing
Mathematics
Measurement and Geometry
STEM/STEAM
Science
Scientific and Engineering Practices
Material Type:
Visual Media
Author:
Betsy McAllister
Date Added:
03/01/2022
Navajo Code Talkers
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

During WWII the Marines enlisted Navajo code talkers to send messages. The Navajo language is not written down and is very difficult for non-native speakers to speak and understand. The Marines started with 29 Navajo men for this project. Their code became unbreakable and fast. They could decode 3 lines of English in 20 seconds versus the normal 30 minutes.In this lesson students will hear audio of spoken Navajo language. They will make predictions on what language they think is being spoken. After learning the language they will research the Navajo code breakers. Students will then use the Navajo dictionary to practice creating and deciphering messages. Students will then be able to make connections to cybersecurity. 

Subject:
American History
Computer Science
History/Social Sciences
Material Type:
Lesson
Author:
CodeVA Curriculum
THEA CLARK
Date Added:
03/17/2023
Packet Data on a Network 7.15
Unrestricted Use
CC BY
Rating
0.0 stars

Lesson Title:Packet Data on a Network 7.15Strand:Networking and the InternetSOL(s):7.15 The student will model how information is broken down into smaller pieces, transmitted as packets through multiple devices over networks and the Internet, and reassembled at the destination.Objectives:Students will learn how data is transmitted on networks via packet technologies.

Subject:
Computer Science
Networking and the Internet
Material Type:
Activity/Lab
Lesson
Teaching/Learning Strategy
Author:
Robert Underwood
Date Added:
05/06/2022
Part 1 Password Safety: Brute Force
Unrestricted Use
CC BY
Rating
0.0 stars

In this first part of a three part series, students will explore the ideas around Brute Force algorithm/programs to further understand the importance of password development, use, safety, and safekeeping while completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately with a few adjustments as well.  Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Networking and the Internet
Material Type:
Activity/Lab
Game
Homework/Assignment
Author:
Emily Ball
Date Added:
03/20/2022
Part 2 Password Safety:  Decrease (Divide) and Conquer
Unrestricted Use
CC BY
Rating
0.0 stars

In this second part of a three part series, students will explore the ideas around Decrease, or Divide, and Conquer algorithm/programs to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately (stand-alone) with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Measurement and Geometry
Networking and the Internet
Material Type:
Activity/Lab
Homework/Assignment
Author:
Emily Ball
Date Added:
03/21/2022
Part 3:  Password Safety: Unplugged Decryption
Unrestricted Use
CC BY
Rating
0.0 stars

In this final part of a three part series, students will practice Brute Force and Decrease (or Divide) and Conquer methods to try to crack a password puzzle to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged sorting activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately with a few minor adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Networking and the Internet
Material Type:
Activity/Lab
Homework/Assignment
Author:
Emily Ball
Date Added:
03/21/2022
Password Probability
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Passwords are essential to protecting our private information from others. Use this lesson to explore some basic probabilty behind password options and how easily they can be guessed! This lesson provides an intro into cybersecurity and its vocabulary, as well as incorporates low prep activities you can modifiy to fit your needs.

Subject:
Cross-Curricular
Cybersecurity
Mathematics
Probability and Statistics
Material Type:
Activity/Lab
Lesson
Lesson Plan
Author:
Mary Dickerson
Date Added:
12/26/2022
Picture Packet Introduction
Unrestricted Use
CC BY
Rating
0.0 stars

This lesson gives students a very basic introduction to the data transmission concept of packets and how data is broken down, transmitted across a network, and then re-assembled into a final product.

Subject:
Networking and the Internet
Material Type:
Activity/Lab
Author:
Jude Raffeinner
Date Added:
12/31/2021
Program a Friend
Unrestricted Use
CC BY
Rating
0.0 stars

Lesson Plan for CS 7th grade. OBJECTIVES 1. At the end of this lesson students will be able to create and execute an algorithm that “programs” a partner to move from point A to point B, avoiding obstacles . 2. Students will plan independently and collaboratively to create a program 3. Students will share their pseudocode in Google Classroom or print completed pseudo code. 4. If time allows, students will begin to code their programs using a text based programming language.

Subject:
Algorithms and Programming
Material Type:
Activity/Lab
Author:
Kimberly McCarty
Date Added:
05/26/2022
Programming Cells
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Explore the fundamentals of computer science by building an interactive computer model of cells in Scratch. No previous experience in computer programming is required. Programming Cells was created by Dr. Jeff Saucerman, Professor of Biomedical Engineering at the University of Virginia.

Subject:
Computer Science
Living Systems and Processes
Material Type:
Activity/Lab
Author:
Kim Wilkens
Date Added:
06/29/2022
Public and Private Networks 7.6
Unrestricted Use
CC BY
Rating
0.0 stars

Strand: Cybersecurity7.6 The student will describe how physical and digital security measures protect electronic information.A network is a collection of computers, phones, servers, network or other devices connected to allow data sharing among users. An example of a network is the internet, which connects tens of millions of people all over the world.There are two types of networks. Private networks are the kind you use at home. Private networks have security measures in place to prevent unwanted or unauthorized connections. Public networks are networks that are often used at schools or hospitals. Public networks are far less secure than home or private networks.

Subject:
Computer Science
Cybersecurity
Material Type:
Lecture Notes
Reading
Teaching/Learning Strategy
Author:
Robert Underwood
Date Added:
05/03/2022
Renewable Resources & Minecraft Houses
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Students will explore the opportunities and challenges of using renewable energy by selecting a Minecraft Biome and developing a home that utilizes the unique characteristics of that biome to create energy. The lesson is intended to be completed in two different parts. In Part 1, students will learn about how Clean Energy sources can be different based on the biome. They will also familiarize themselves with Minecraft. In Part 2, students will select a specific Minecraft world (6 different biomes) and will design and build a home that uses a renewable energy source unique to that biome.  

Subject:
Computer Science
Earth Resources
Science
Material Type:
Activity/Lab
Author:
Michael Speidel
Sharon Brandon
Date Added:
10/14/2020