Updating search results...

Computer Science for 8th Grade

62 affiliated resources

Search Resources

View
Selected filters:
ACSE Region III - Cybersecurity
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will weigh the advantages of cybersecurity in protecting individuals and systems against potential disadvantages of the over-restriction of content and delivery.Students will communicate, verbally and in writing, the advantages or disadvantages of cybersecurity.

Subject:
Cybersecurity
English
Family and Consumer Sciences
Material Type:
Lesson Plan
Author:
Leigh-Ann Crim
Acse Grant
Date Added:
02/12/2022
ACSE Region III - Exploring CS through Math
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This is a performance task where students explore CS concepts, pseudocode, and flowcharts through the lens of order of operations on day 1 and design a math homework helper app on day 2.

Subject:
Computer Science
Mathematics
Material Type:
Activity/Lab
Lesson
Student Guide
Author:
Jeremy Utt
Acse Grant
Amanda Fair
Kim Wilkens
Date Added:
02/24/2022
ACSE Region III - Get a Job! Computer Science and Persuasive Messaging
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Get a Job! Students will use their persuasive messaging skills to research and promote various computer science fields in the unit.

Subject:
Communication and Multimodal Literacy
Computer Science
Cybersecurity
Research
Material Type:
Lesson Plan
Author:
Nathan Sekinger
Acse Grant
E. Grimstead
Date Added:
02/12/2022
Agricultural Cyberbiosecurity: Biomanufacturing
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Biomanufacturing is uses nature as an inspiration. Some of the processes we rely on started in nature!This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Business and Information Technology
Cybersecurity
Data and Analysis
STEM/STEAM
Material Type:
Reading
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
09/27/2022
Agricultural Cyberbiosecurity: Biotechnology
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Scientists get some of their best ideas from biology. Whether that be using bacteria to help make food or gene editing to cure disease, biotechnology uses the tools in biology to make amazing technology. This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Business and Information Technology
Cybersecurity
STEM/STEAM
Material Type:
Reading
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
05/01/2023
Agricultural Cyberbiosecurity: Cyberbiosecurity
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

With digitization, we see biosecurity, cybersecurity, and physical security begin to overlap. This overlap started a new discipline, cyberbiosecurity. This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Computing Systems
Cybersecurity
Data and Analysis
Health and Medical Sciences
STEM/STEAM
Material Type:
Reading
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
05/03/2023
Agricultural Cyberbiosecurity: Data Literacy
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Data makes the world go around! As we use more technology, more data is being created, recorded, and used. The next task is understanding what it all means!This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Business and Information Technology
Cybersecurity
Data and Analysis
STEM/STEAM
Material Type:
Reading
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
05/01/2023
Agricultural Cyberbiosecurity: Precision Agriculture
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Farming is not just a farmer driving a tractor anymore. Sometimes the tractor drives itself! Agriculture is very technological and part of that effort is precision agriculture. Learn about how farmers are using technology to optimize their farms. This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Business and Information Technology
Cybersecurity
Data and Analysis
STEM/STEAM
Material Type:
Reading
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
05/01/2023
Agricultural Cyberbiosecurity: Sensors
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

As the world gets more digital, the world will need more sensors. A sensor is something that records the environment around it. Sensors can measure temperature, light, or sound among other things. Where can you find a sensor?  This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Business and Information Technology
Cybersecurity
Data and Analysis
STEM/STEAM
Material Type:
Reading
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
05/01/2023
Algorithm Picture Lesson
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The goal of this activity is to build critical thinking skills and excitement for Computer Science / Computational Thinking, while laying a foundation of fundamental programming concepts. By scaffolding basic concepts like sequencing and algorithms in an unplugged activity, students who are intimidated by computers can still build a foundation of understanding. In this lesson, students will learn how to develop an algorithm and encode it into a program.By "programming" one another to draw pictures, students experience some of the core concepts of programming in a fun and accessible way. The class will start by having students view a video of a simple program demonstrating how to develop instructions for building a peanut butter and jelly sandwich. Students will start with simple shapes, and progress to the coding of a specific drawing that other students will then try to replicate (“running the program”). If there is a desire to have a more of a Math slant on the lesson, the drawing could take place on graph paper. Students would then use the coordinates to complete the drawing. 

Subject:
Algorithms and Programming
Business and Information Technology
Computer Science
English
Health/Physical Education
Mathematics
Science
Material Type:
Activity/Lab
Lesson
Lesson Plan
Visual Media
Author:
Michael Speidel
Sharon Brandon
Date Added:
10/13/2020
C.S. 8.13 Assessment
Unrestricted Use
CC BY
Rating
0.0 stars

This is a fifteen question assessment from the Computer Science standard, 8.13: The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues. An answer key is also attached.

Subject:
Computer Science
Networking and the Internet
Material Type:
Assessment
Author:
Dana Smith
Date Added:
01/04/2022
CS SOL 8.9 Public and Private Information Game on Gamilab
Unrestricted Use
Public Domain
Rating
0.0 stars

This game created on Gamilab is from CS SOL 8.9 and is titled, “Public and Private Information.”
It is a bike race game where students must correctly answer questions to advance regarding online information from the Computer Science SOL 8.9 from the strand of Impacts of Computing. To start, press the up arrow a couple of times. Please enter code G8471Tto play if you have any problems with the link.

Subject:
Computer Science
Impacts of Computing
Material Type:
Game
Author:
Dana Smith
Date Added:
08/12/2021
Coding Kitchen Safety
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson is designed to engage students in a meaningful and fun coding experience, while investigating sanitation practices, food, and kitchen safety. Students will create an animated story using block-based coding in Scratch. This overarching lesson idea (research – storyboard – code) can be applied to any subject.

Subject:
Computer Science
Family and Consumer Sciences
Material Type:
Activity/Lab
Lesson
Author:
Julia DiOrio
Date Added:
05/19/2023
Convex Polygons and Sphero Robots
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will program a Sphero robot to travel around the exterior of a convex polygon. Students will then use the information in their code to determine the sum of the interior angles in a convex polygon.

Subject:
Computer Science
Measurement and Geometry
Material Type:
Activity/Lab
Author:
Andrea Lee
Date Added:
10/05/2023
Convex Polygons and Sphero Robots
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will program a Sphero robot to travel around the exterior of a convex polygon. Students will then use the information in their code to determine the sum of the interior angles in a convex polygon.

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
jDiOrio@ycsd.york.va.us
Date Added:
10/10/2023
Creating a Formula Calculator
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

This resource will show how to teach your students to make their own "formula calculator" using Java programming, and it has handouts for your students or your own use. It is ideal for Grade 7 and Grade 8 Math.The video in this resource walks you through the steps to teach your students to program their "formula calculator" using Java programming after they have been taught about geometric formulas. They can then use their calculator to help them solve their math problems. It will reinforce critical thinking skills and create a deeper understanding of how the formulas work.Students can use any Java IDE or even an online IDE. The lesson can be customized based on your familiarity with Java and your students' computer skills.The handouts show how to use arithmetic operators in Java as well as some Math class methods that will be helpful. The attached program can be used as a starting point for their programs. 

Subject:
Algorithms and Programming
Computer Science
Mathematics
Measurement and Geometry
Material Type:
Activity/Lab
Lesson Plan
Author:
Tara Williams
Date Added:
07/30/2021
#CyberSmarts (3 Lessons by Scholastic)
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

The lessons provided are presented by Scholastic and sponsored by Norton Lifelock.
All rights reserved by Scholastic.
Below is an overview of the three lessons provided.
The lessons do not coincide with one another.
The teacher can choose to use all three or select the best option for the classroom needs.

The PDF Links includes:
Lesson 1: Understanding Online Safety (45 minutes)
- Students will analyze text, citing evidence and summarizing central ideas. They will make inferences to create their own cybersecurity protection plan.
- Students will use the provided copy of #Cybersmarts student magazine to create their personalized online protection plan.

Lesson 2: Identifying Preventive Technologies (45 minutes + presentation time)
- Students will conduct research on preventive technologies built and used by professionals in the cybersecurity field (e.g., firewalls, ad blocker apps, antivirus software, voice recognition software, virtual private network (VPN), etc.).
- Students will then prepare a presentation - the given choices are a skit or interview. Presentation options can be easily adapted to best fit your classroom needs.
- Research planning/ gathering page is provided.

Lesson 3: Making Online Profiles More Secure (2 part lesson - 90 minutes total)
- Students will use analytical and reasoning skills to identify areas of vulnerability in an online profile and come up with strategies for how to make them more secure by applying information from a text.
- First, students will analyze their own personal profiles (if applicable). Then, they will analyze a provided “profile” to identify security holes. Last, discuss the answers and reasonings as a class.
*This lesson can be shortened to fit into one class period.
*(Optional) An extension idea is provided. It includes information from all lessons. Students will use what they have learned to create their own cybersecurity device.

Subject:
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Lesson Plan
Reading
Author:
Norton Lifelock
Scholastic
Date Added:
02/02/2022