Updating search results...

Computer Science for 8th Grade

107 affiliated resources

Search Resources

View
Selected filters:
ACSE Region III - Colonial America
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The student will apply social science skills to understand the factors that shaped Colonial America by describing colonial life in America from the perspectives of large landowners, farmers, artisans, merchants, women, free African Americans, indentured servants, and enslaved African Americans, by creating a computational artifact.

Subject:
Computer Science
Reading
Social Sciences
Material Type:
Activity/Lab
Lesson
Author:
Ms. Boarman
Acse Grant
Ms. Coates
Amanda Coode
Casey Holbrook
Date Added:
02/12/2022
ACSE Region III - Cybersecurity
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will weigh the advantages of cybersecurity in protecting individuals and systems against potential disadvantages of the over-restriction of content and delivery.Students will communicate, verbally and in writing, the advantages or disadvantages of cybersecurity.

Subject:
Cybersecurity
English
Family and Consumer Sciences
Material Type:
Lesson Plan
Author:
Leigh-Ann Crim
Acse Grant
Date Added:
02/12/2022
ACSE Region III - Exploring CS through Math
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This is a performance task where students explore CS concepts, pseudocode, and flowcharts through the lens of order of operations on day 1 and design a math homework helper app on day 2.

Subject:
Computer Science
Mathematics
Material Type:
Activity/Lab
Lesson
Student Guide
Author:
Jeremy Utt
Kim Wilkens
Amanda Fair
Acse Grant
Date Added:
02/24/2022
ACSE Region III - Get a Job! Computer Science and Persuasive Messaging
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Get a Job! Students will use their persuasive messaging skills to research and promote various computer science fields in the unit.

Subject:
Communication and Multimodal Literacy
Computer Science
Cybersecurity
Research
Material Type:
Lesson Plan
Author:
Nathan Sekinger
E. Grimstead
Acse Grant
Date Added:
02/12/2022
The Age of Information
Unrestricted Use
CC BY
Rating
0.0 stars

Applying computer science principals, students will explore inventions & innovations from the Age of Information, then through pattern recognition, compare and contrast the Age of Information with the Age of Industrialization. Students will present their research to peers. 

Subject:
American History
Humanities
Impacts of Computing
Material Type:
Lesson
Lesson Plan
Author:
MORGAN SAELER
Date Added:
04/27/2022
Algorithm Picture Lesson
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The goal of this activity is to build critical thinking skills and excitement for Computer Science / Computational Thinking, while laying a foundation of fundamental programming concepts. By scaffolding basic concepts like sequencing and algorithms in an unplugged activity, students who are intimidated by computers can still build a foundation of understanding. In this lesson, students will learn how to develop an algorithm and encode it into a program.By "programming" one another to draw pictures, students experience some of the core concepts of programming in a fun and accessible way. The class will start by having students view a video of a simple program demonstrating how to develop instructions for building a peanut butter and jelly sandwich. Students will start with simple shapes, and progress to the coding of a specific drawing that other students will then try to replicate (“running the program”). If there is a desire to have a more of a Math slant on the lesson, the drawing could take place on graph paper. Students would then use the coordinates to complete the drawing. 

Subject:
Algorithms and Programming
Business and Information Technology
Computer Science
English
Health/Physical Education
Mathematics
Science
Material Type:
Activity/Lab
Lesson
Lesson Plan
Visual Media
Author:
Michael Speidel
Sharon Brandon
Date Added:
10/13/2020
The Algorithm of the US Lawmaking Process
Unrestricted Use
CC BY
Rating
0.0 stars

The lawmaking process, as described in the US Constitution, is essentially an alogorithm that allows an idea to become a law. In this lesson, students will analyze and evaluate the process for creating laws at the Federal level and create a flow chart that shows the lawmaking process in an alogoritmic sequence. 

Subject:
Computer Science
Government and Civics
Material Type:
Lesson Plan
Author:
MORGAN SAELER
Date Added:
08/06/2021
Analyzing the Causes and Effects of the American Revolution Through Coding 6.1-4
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Cross curricular lesson plan integrating Computer Science and Social Studies Standards CS 6.1-4 Social Science USI.5 e, USI6 a, b, c, d 

Subject:
Algorithms and Programming
Computer Science
Cross-Curricular
Social Sciences
Material Type:
Lesson Plan
Author:
Christy Shepherd
Date Added:
11/05/2022
Are We Like Robots?
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This lesson explores the similarities between how a human being moves/walks and how a robot moves. This allows students to see the human body as a system, i.e., from the perspective of an engineer. It shows how movement results from (i) decision making, i.e., deciding to walk and move, and (ii) implementing the decision by conveying the decision to the muscle (human) or motor (robot).

Subject:
Science
Scientific and Engineering Practices
Material Type:
Lecture Notes
Lesson Plan
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Ajay Nair
Satish Nair
Date Added:
09/18/2014
Brute Force Vs Decrease and Conquer Alogrithms
Unrestricted Use
CC BY
Rating
0.0 stars

The purpose of this lesson plan is to help students understand, using a practical approach, the difference between brute force and a decrease and conquer algorithm.  This approach will use an illustration from history to draw the student into the presentation and then utilize finding the GCF of a number to illustrate the difference in efficiencies

Subject:
Algorithms and Programming
Material Type:
Lesson Plan
Author:
Matthew Rose
Date Added:
06/08/2022
C.S. 8.13 Assessment
Unrestricted Use
CC BY
Rating
0.0 stars

This is a fifteen question assessment from the Computer Science standard, 8.13: The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues. An answer key is also attached.

Subject:
Computer Science
Networking and the Internet
Material Type:
Assessment
Author:
Dana Smith
Date Added:
01/04/2022
CS SOL 8.7 Flippity Vocabulary Crossword Puzzle
Unrestricted Use
CC BY
Rating
0.0 stars

This is a crossword puzzle that is comprised of the essential vocabulary from the Computer Science SOL 8.7 in Cybersecurity. It was made at Flippity.net. 

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Dana Smith
Date Added:
12/21/2021
CS SOL 8.9 Public and Private Information Game on Gamilab
Unrestricted Use
Public Domain
Rating
0.0 stars

This game created on Gamilab is from CS SOL 8.9 and is titled, “Public and Private Information.”
It is a bike race game where students must correctly answer questions to advance regarding online information from the Computer Science SOL 8.9 from the strand of Impacts of Computing. To start, press the up arrow a couple of times. Please enter code G8471Tto play if you have any problems with the link.

Subject:
Computer Science
Impacts of Computing
Material Type:
Game
Author:
Dana Smith
Date Added:
08/12/2021
Causes of the American Revolution
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will apply their knowledge of the causes of the American Revolution to create an interactive story via Twine. The interactive story will be based on the pre-revolutionary war period from the point of view of a loyalist or a patriot. As a warm-up students will look at an optical illusion picture and as a class discuss point of view and perspective. Students will work in heterogeneous pairs/groups to research, outline, and create a pre-revolutionary story about a patriot or loyalist.

Subject:
Algorithms and Programming
American History
Computer Science
History/Social Sciences
Material Type:
Lesson
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
11/17/2022
Choctaw Code Talkers
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will examine the history and culture of the Choctaw native americans, as well as the story of the Code Talkers in WW1, in order to memorialize 1 of the Choctaw Code Talkers.Objectives: Analyze the story of the Choctaw Code Talkers in WWI and identify important data pointsDesign a plaque for the Choctaw Code Talkers based on data collected

Subject:
American History
Computer Science
History/Social Sciences
Material Type:
Lesson
Author:
CodeVA Curriculum
Date Added:
03/17/2023
Code Girls
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Women code-breakers changed the course of WWII by cracking Japanese codes that revealed the movements of people and supplies in the Pacific Islands. In this lesson, students will learn how specific information discovered led to a turning point when cryptographers were able to pinpoint the plans of the Pearl Harbor Attack’s “architect”, Admiral Yamomoto.Students will examine videos and articles to find out more about this episode in history. In pairs or small groups, they’ll look at the US Post Office’s newly revealed stamp commemorating it. They’ll identify what they think are the pros and cons of the stamp and then design their own. 

Subject:
American History
Computer Science
History/Social Sciences
Material Type:
Lesson
Author:
CodeVA Curriculum
Lola Lloyd
Date Added:
03/17/2023
Computer Science Historical Figures Trading Cards
Unrestricted Use
CC BY
Rating
0.0 stars

This resource is a template to make trading cards about Computer Science Historical Figures.Students can be assigned one or multiple figures to research and then create trading cards. The template is a Google Slides and includes a completed example.

Subject:
Computer Science
Impacts of Computing
Material Type:
Activity/Lab
Author:
Kelly Odom
Date Added:
09/10/2021