This a a Bike Race game from Gamilab about public and private …
This a a Bike Race game from Gamilab about public and private information that is based on SOL 8.9. The player will navigate a biker through a path by correctly answering questions about information. The biker is navigated by using the arrow keys on a keyboard.
This lesson takes students through the examination of the poem Remember and …
This lesson takes students through the examination of the poem Remember and its use of figurative language to set the stage for considering how the physical world around us has changed in the past 50 years. Students research a specific local plant, animal, or element of weather and how it has changed over time, and then use Twine to represent their research in a digital story. This lesson culminates with the discussion of whether or not we are doing a good job of listening to Virginia’s natural elements over the past 50 years. This lesson was created through a partnership between CodeVA and the Virginia Tribal Education Consortium (VTEC).
Before goods are shipped in trucks or containers, they are usually placed …
Before goods are shipped in trucks or containers, they are usually placed in protective packaging and arranged on pallets for efficient transport. Stacking goods on a pallet is a repetitive job that can cause injury to workers. Because of this, many factories that require a high volume of palletization have turned to using robots to perform palletizing tasks. In this lesson plan, students learn how to program a robot to be efficient and effective at this real-world task.
In this lesson students will be able to identify that computers, like …
In this lesson students will be able to identify that computers, like the solar system, complete predictable actions based on a set of variables. Students will learn about the solar system via Scratch. They will explore block coding and computational thinking practices as they utilize Scratch as a tool for creativity, expression and learning about the Solar System.
Overview: This lesson is presented by Code.org Lesson 8: Cybersecurity - Simple …
Overview: This lesson is presented by Code.org Lesson 8: Cybersecurity - Simple Encryption
From the website: OVERVIEW "In this lesson, students are introduced to the need for encryption and simple techniques for breaking (or cracking) secret messages. Students try their own hand at cracking a message encoded with the classic Caesar cipher and also a Random Substitution Cipher. Students should become well-acquainted with idea that in an age of powerful computational tools, techniques of encryption will need to be more sophisticated. The most important aspect of this lesson is to understand how and why encryption plays a role in all of our lives every day on the Internet, and that making good encryption is not trivial. Students will get their feet wet with understanding the considerations that must go into making strong encryption in the face of powerful computational tools that can be used to crack it. The need for secrecy when sending bits over the Internet is important for anyone using the Internet."
OBJECTIVE "Explain why encryption is an important need for everyday life on the Internet. Crack a message encrypted with a Caesar cipher using a Caesar Cipher Widget Crack a message encrypted with random substitution using Frequency Analysis Explain the weaknesses and security flaws of substitution ciphers"
The lesson is mapped out for teachers. It is easy to follow and includes vocabulary to cover, links to the necessary materials, and a teaching guide with background information, tips, and prompts.
AGENDA Warm Up (10 min) Classic Encryption - The Caesar Cipher
Activity (35 min) Part 1 - Crack a Caesar Cipher Part 2 - Crack a Random Substitution Cipher
Wrap Up (15 min) Video: Encryption and Public Keys Discussion Career Discussion
***This lesson can be adapted for younger students but material covered aligns best with the current 8th grade Impacts of Computing Standards.
This activity introduces puts participants in the role of agricultural workers in …
This activity introduces puts participants in the role of agricultural workers in a fresh produce operation that grows crops in a hydroponic system to sell at grocery stores. As they grow their crops over the course of several weeks, they are responsible for ensuring that the products are safe, delicious, and ready to sell to customers. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity
Students will program Sphero RVR+ robots to explore a mock crime scene …
Students will program Sphero RVR+ robots to explore a mock crime scene to determine if it is safe for humans to investigate without destroying evidence or running into objects. Students will apply their knowledge of physical evidence to determine what objects in the crime scene need to be avoided when sending the robot into the crime scene.
This performance task is a computer science (CS) integration project where your …
This performance task is a computer science (CS) integration project where your students will take you on a virtual field trip. It can be to a museum, a historical site, a modern destination, a book, a planet or really anywhere. Along the way, they will incorporate CS concepts into their projects including sequences, conditionals, and events to add interactivity. This is a great project for students to share their research and learning from a wide variety of subject areas like social studies, language arts, world languages, history, etc. This unit includes 5th grade standards for the Virginia CS Standards of Learning, but it can easily be adapted for younger and older students. The latest resources for this project can be found at https://sites.google.com/virginia.edu/virtualfieldtrip/resources.
This lesson is part of the Virginia K-12 Computer Science Pipeline which is partly …
This lesson is part of the Virginia K-12 Computer Science Pipeline which is partly funded through a GO Virginia grant in partnership with Chesapeake Public Schools, Loudoun County Public Schools, and the Loudoun Education Foundation. Students will design and conduct an investigation to answer the question, "What is the relationship between mass and distance a robot travels?" The lesson uses WeDo 2.0 robots; however, other robots may be used as well as conducted without robotics. This lesson was written for 5th graders; however, the content alignes with SOL PS.8 as well.
This activity introduces the idea of cyberbiosecurity in the context of a …
This activity introduces the idea of cyberbiosecurity in the context of a "clue" style activity focused on vulnerabilities in the U.S. food system. It can be facilitated in 60 minutes, either in a single session or 3-4 shorter sessions. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.