This resource will show how to teach your students to make their own …
This resource will show how to teach your students to make their own "formula calculator" using Java programming, and it has handouts for your students or your own use. It is ideal for Grade 7 and Grade 8 Math.The video in this resource walks you through the steps to teach your students to program their "formula calculator" using Java programming after they have been taught about geometric formulas. They can then use their calculator to help them solve their math problems. It will reinforce critical thinking skills and create a deeper understanding of how the formulas work.Students can use any Java IDE or even an online IDE. The lesson can be customized based on your familiarity with Java and your students' computer skills.The handouts show how to use arithmetic operators in Java as well as some Math class methods that will be helpful. The attached program can be used as a starting point for their programs.
The lessons provided are presented by Scholastic and sponsored by Norton Lifelock. …
The lessons provided are presented by Scholastic and sponsored by Norton Lifelock. All rights reserved by Scholastic. Below is an overview of the three lessons provided. The lessons do not coincide with one another. The teacher can choose to use all three or select the best option for the classroom needs.
The PDF Links includes: Lesson 1: Understanding Online Safety (45 minutes) - Students will analyze text, citing evidence and summarizing central ideas. They will make inferences to create their own cybersecurity protection plan. - Students will use the provided copy of #Cybersmarts student magazine to create their personalized online protection plan.
Lesson 2: Identifying Preventive Technologies (45 minutes + presentation time) - Students will conduct research on preventive technologies built and used by professionals in the cybersecurity field (e.g., firewalls, ad blocker apps, antivirus software, voice recognition software, virtual private network (VPN), etc.). - Students will then prepare a presentation - the given choices are a skit or interview. Presentation options can be easily adapted to best fit your classroom needs. - Research planning/ gathering page is provided.
Lesson 3: Making Online Profiles More Secure (2 part lesson - 90 minutes total) - Students will use analytical and reasoning skills to identify areas of vulnerability in an online profile and come up with strategies for how to make them more secure by applying information from a text. - First, students will analyze their own personal profiles (if applicable). Then, they will analyze a provided “profile” to identify security holes. Last, discuss the answers and reasonings as a class. *This lesson can be shortened to fit into one class period. *(Optional) An extension idea is provided. It includes information from all lessons. Students will use what they have learned to create their own cybersecurity device.
Cybersecurity is a very important portion of computer science today. This activity …
Cybersecurity is a very important portion of computer science today. This activity has students complete a web search to find the ten things they feel you should know about some aspect of cybersecurity. This activity can be completed by a group of students or by an individual student.
This activity introduces cybersecurity concerns with technologies commonly used in the livestock …
This activity introduces cybersecurity concerns with technologies commonly used in the livestock industry in the context of a "clue" style activity in which students act as private investigators looking for a lost racehorse. It can be facilitated in 90 minutes, either in a single session or 4-5 shorter sessions. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity
This crossword activity will help students better understand the different types of …
This crossword activity will help students better understand the different types of storage options available for a computer to store and manage files.
In this activity, participants plan and conduct a plant growth experiment while …
In this activity, participants plan and conduct a plant growth experiment while considering the role of data quality in automated systems in agriculture. The timing of the activity is highly dependent on the seed variety that you are growing and the level of familiarity that participants already have with basic plant science and scientific investigation concepts, but will likely take several weeks. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity
This lesson expands upon the ideas of decomposition by using GameChangineer to …
This lesson expands upon the ideas of decomposition by using GameChangineer to incorporate commands to create a coded mini game from decomposing word problems. Students will assist the teacher in this guided lesson on how to create commands and use the website before engaing independently in Part 3. Activities are low prep with modifications included, but do require organized planning to implement effectively. If you have not done a lesson on decomposition, it is suggested you use Part 1 to help student's gain the necessary understandings of the processes used in this lesson.
This is the final part of an extended lesson on decomposition. Students …
This is the final part of an extended lesson on decomposition. Students will create a word problem to decompose and then use GameChangineer to create a mini game that is reflective of the word problem and its solution. Students will be using the plan, design, and review process thourhgout their creations. A rubric and self reflection tool for the final products are included. Activities are low prep with modifications included, but do require organized planning to implement effectively. If you have not done a lesson on decomposition, it is suggested you use Part 1 to help student's gain the necessary understandings of the processes used in this lesson. If you have not done a lesson on writing commands and using GameChangineer, it is suggested you use Part 2 before implementing this independent activity.
The goal of this activity is to solidify students' understanding of functions: …
The goal of this activity is to solidify students' understanding of functions: Input/Independent Variable/Domain → Output/Dependent Variable/Range in math and relate that to functions in CS.
In computer science, developing programs involves planning. This planning may include representing …
In computer science, developing programs involves planning. This planning may include representing algorithms and programs graphically with symbols, like in a flowchart, or writing, like using pseudocode. Pseudocode is not a programming language, but a simple way of describing a set of programming instructions. This practice sheet offers the opportunity to take pseudocode and flowchart information and interpret the outcomes.
In this lesson, students will experience the force of friction as they use …
In this lesson, students will experience the force of friction as they use block-based coding to program a Sphero Bot through a maze made up of materials with varying amounts of friction.
Games have been an integral part of human culture throughout history. They …
Games have been an integral part of human culture throughout history. They not only entertain, but also inform and change us. Today video games designers bring together art & code to immerse their players in a story. There are video games being created to solve real-world problems and video game players solving scientific mysteries.
A Google Forms quiz link is attached for the Computer Science SOL …
A Google Forms quiz link is attached for the Computer Science SOL 8.10: The student will evaluate online and print sources for appropriateness and credibility.
This lesson integrates computer science through discovering graphing on a coordinate plane for …
This lesson integrates computer science through discovering graphing on a coordinate plane for 6th graders all the way to a review for 8th graders with extensions that include slope.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.