Hacking Teacher Resources
Find Hacking lesson plans and worksheets
Showing 143 resources
Crash Course
P-Hacking: Crash Course Statistics #30
Spot the fake research. The 30th installment of the Crash Course Statistics series explains p-hacking and the family wise error rate, which occurs when researchers attempt to weed out a statistically significant result even when one is...
Curated OER
Hacking Campaign, Seen as Linked to China's Arm, Targets US Industry and Government
This single link includes six New York Times articles for learners to read. Each article relates to the Chinese culture, government, school system, or economics in some way. Each also includes a set of comprehension questions for...
Curated OER
Have I Been Hacked?
Young scholars investigate how effective SNEAK strategies are in detecting hackers. In this technology lesson, students explain the ethical issues about hacking. They graph and analyze their experimental results.
TED-Ed
Hacking Bacteria to Fight Cancer
The research being done in the field of synthetic biology holds tremendous possibilities for cancer patients. Here is a short video that details how synthetic biologists are learning how to program bacteria to attack tumors.
Curated OER
Curious? "Hack Away" Computer Activity
In this computer worksheet, students complete 3 multiple choice questions about computer hacking. Page contains multiple links to additional activities.
Code.org
Practice Performance Task - Security and Hacking in the Real World
Young computer scientists create a visual artifact that represents their research into a computing innovation in the world of cybersecurity. They then work individually to write an essay on the impact of technology on cybersecurity.
Curated OER
Breaking News English: Forty Million Credit Cards Hacked
In this English worksheet, students read "Forty Million Credit Cards Hacked," and then respond to 47 fill in the blank, 7 short answer, 20 matching, and 8 true or false questions about the selection.
Curated OER
What is a Computer Crime?
An important lesson plan on cybercrimes is here for you. In it, young computer users learn about how people commit crimes on computers by hacking into accounts, and stealing personal information from people. Some excellent discussion...
Veritasium
This Toy Can Open Any Garage
Just how secure are those remote devices used to unlock cars and open garage doors? A short video follows two friends as they try to hack the codes using children's toys and sophisticated computer programs.
Curated OER
Cartoons for the Classroom: The Climate Change Debate
Is global warming all smoke and mirrors? Find out what your scholars think with this handout, which has them analyzing two political cartoons on the topic. Background information gives context, detailing the computer hacking during the...
PBS
The Secret Lives of Hackers
Hacking: cyber crime or creative problem-solving technique? Young pupils watch a video about hackers. and learn that not all computer hackers are evil. The video also describes some common types of hackers.
TED-Ed
The Happy Secret to Better Work
This is a video that every individual, whether adolescent or adult, should have the chance to see! Using an incredibly humorous presentation style and fascinating statistics, psychologist Shawn Achor makes a compelling case for positive...
TED-Ed
Want to Be Happier? Stay in the Moment
How often do the minds of those in your class wander? Matt Killingsworth unpacks his research and illustrates a connection between mind wandering and unhappiness, explaining the inherent value of staying in the moment. Begin a discussion...
Curated OER
Hack Attack
Students explore the recent hacker attacks on e-commerce sites by comparing and contrasting security issues in traditional commerce and e-commerce companies, determining solutions for security issues that face both types of companies.
American Chemical Society
How to Survive the Snow and Ice
Can you tell the difference between artificial snow and the real thing? An informative video explains the structure of a snowflake crystal, both real and artificial. It finishes with a discussion of the chemistry related to salting...
Curated OER
Cyber-crime
Students discuss what types of Internet activity are or should be considered criminal, examine how criminal prohibitions against certain types of Internet activity are best implemented in law, determine whether computer crimes are unique...
Gobal Oneness Project
Passionate Pursuits
Not all technology is digital. Teach learners about the low-tech maker movement with a photo essay about six artisans from California and two articles about the local creator movement. After tackling the photo essay in small...
Curated OER
Batter Up
Students explore personal achievement by reading a children's book. In this story analysis lesson, students read the book Batter Up, by Sue Muller Hacking and discuss the main character in the story and the actions that she takes to meet...
Domain of Science
Map of Computer Science
Like all other sciences, computer science has many branches. An informative video provides a brief overview of computer science. It breaks the discipline into three major areas: theoretical computer science, computer engineering, and...
Curated OER
On Being Modern Knight
Young scholars, upon completion of the "Knighting Ceremony" and reflection, research the meaning of privacy, plagiarism, pirating, computer viruses, or hacking. Then they design a survey of high school students to find the level of...
Curated OER
Curling
Students review the basics of the game of curling. They discuss curling terms, hack, hogline, use of broom, and rocks. Students practice throwing for accuracy and distance. They participate in a curling activity.
Curated OER
Spanish Sentence Construction
After reviewing Spanish articles, nouns, noun gender, subject pronouns, and the verb ser, give your emerging Spanish speakers this practice packet. Several activities are included: an unscrambling exercise, translation practice, an...
Veritasium
The Science of Six Degrees of Separation
The concept of everyone on earth being separated by only six degrees of social connections originated more than 100 years ago. Connect the dots using an installment from an engaging video series that takes a look at various social...
American Chemical Society
How To Grow Fluorescent Flowers
Grow glow-in-the-dark flowers. An excellent video in the ACS Reactions series shows how to make fluorescent flowers. It gives step-by-step instructions for such an experiment.