The student will apply social science skills to understand the factors that …
The student will apply social science skills to understand the factors that shaped Colonial America by describing colonial life in America from the perspectives of large landowners, farmers, artisans, merchants, women, free African Americans, indentured servants, and enslaved African Americans, by creating a computational artifact.
Students will weigh the advantages of cybersecurity in protecting individuals and systems …
Students will weigh the advantages of cybersecurity in protecting individuals and systems against potential disadvantages of the over-restriction of content and delivery.Students will communicate, verbally and in writing, the advantages or disadvantages of cybersecurity.
This is a performance task where students explore CS concepts, pseudocode, and …
This is a performance task where students explore CS concepts, pseudocode, and flowcharts through the lens of order of operations on day 1 and design a math homework helper app on day 2.
Applying computer science principals, students will explore inventions & innovations from the …
Applying computer science principals, students will explore inventions & innovations from the Age of Information, then through pattern recognition, compare and contrast the Age of Information with the Age of Industrialization. Students will present their research to peers.
The goal of this activity is to build critical thinking skills and …
The goal of this activity is to build critical thinking skills and excitement for Computer Science / Computational Thinking, while laying a foundation of fundamental programming concepts. By scaffolding basic concepts like sequencing and algorithms in an unplugged activity, students who are intimidated by computers can still build a foundation of understanding. In this lesson, students will learn how to develop an algorithm and encode it into a program.By "programming" one another to draw pictures, students experience some of the core concepts of programming in a fun and accessible way. The class will start by having students view a video of a simple program demonstrating how to develop instructions for building a peanut butter and jelly sandwich. Students will start with simple shapes, and progress to the coding of a specific drawing that other students will then try to replicate (“running the program”). If there is a desire to have a more of a Math slant on the lesson, the drawing could take place on graph paper. Students would then use the coordinates to complete the drawing.
The lawmaking process, as described in the US Constitution, is essentially an …
The lawmaking process, as described in the US Constitution, is essentially an alogorithm that allows an idea to become a law. In this lesson, students will analyze and evaluate the process for creating laws at the Federal level and create a flow chart that shows the lawmaking process in an alogoritmic sequence.
Cross curricular lesson plan integrating Computer Science and Social Studies Standards CS 6.1-4 Social …
Cross curricular lesson plan integrating Computer Science and Social Studies Standards CS 6.1-4 Social Science USI.5 e, USI6 a, b, c, d
This lesson explores the similarities between how a human being moves/walks and …
This lesson explores the similarities between how a human being moves/walks and how a robot moves. This allows students to see the human body as a system, i.e., from the perspective of an engineer. It shows how movement results from (i) decision making, i.e., deciding to walk and move, and (ii) implementing the decision by conveying the decision to the muscle (human) or motor (robot).
The purpose of this lesson plan is to help students understand, using …
The purpose of this lesson plan is to help students understand, using a practical approach, the difference between brute force and a decrease and conquer algorithm. This approach will use an illustration from history to draw the student into the presentation and then utilize finding the GCF of a number to illustrate the difference in efficiencies
This is a fifteen question assessment from the Computer Science standard, 8.13: The student …
This is a fifteen question assessment from the Computer Science standard, 8.13: The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues. An answer key is also attached.
This is a crossword puzzle that is comprised of the essential vocabulary from …
This is a crossword puzzle that is comprised of the essential vocabulary from the Computer Science SOL 8.7 in Cybersecurity. It was made at Flippity.net.
This game created on Gamilab is from CS SOL 8.9 and is …
This game created on Gamilab is from CS SOL 8.9 and is titled, “Public and Private Information.” It is a bike race game where students must correctly answer questions to advance regarding online information from the Computer Science SOL 8.9 from the strand of Impacts of Computing. To start, press the up arrow a couple of times. Please enter code G8471Tto play if you have any problems with the link.
Students will apply their knowledge of the causes of the American Revolution …
Students will apply their knowledge of the causes of the American Revolution to create an interactive story via Twine. The interactive story will be based on the pre-revolutionary war period from the point of view of a loyalist or a patriot. As a warm-up students will look at an optical illusion picture and as a class discuss point of view and perspective. Students will work in heterogeneous pairs/groups to research, outline, and create a pre-revolutionary story about a patriot or loyalist.
Students will examine the history and culture of the Choctaw native americans, …
Students will examine the history and culture of the Choctaw native americans, as well as the story of the Code Talkers in WW1, in order to memorialize 1 of the Choctaw Code Talkers.Objectives: Analyze the story of the Choctaw Code Talkers in WWI and identify important data pointsDesign a plaque for the Choctaw Code Talkers based on data collected
Women code-breakers changed the course of WWII by cracking Japanese codes that …
Women code-breakers changed the course of WWII by cracking Japanese codes that revealed the movements of people and supplies in the Pacific Islands. In this lesson, students will learn how specific information discovered led to a turning point when cryptographers were able to pinpoint the plans of the Pearl Harbor Attack’s “architect”, Admiral Yamomoto.Students will examine videos and articles to find out more about this episode in history. In pairs or small groups, they’ll look at the US Post Office’s newly revealed stamp commemorating it. They’ll identify what they think are the pros and cons of the stamp and then design their own.
This resource is a template to make trading cards about Computer Science …
This resource is a template to make trading cards about Computer Science Historical Figures.Students can be assigned one or multiple figures to research and then create trading cards. The template is a Google Slides and includes a completed example.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.