Code.org
Cleaning Data
"Clean the data!" "I did not know it was dirty." Introduce your class to the process of cleaning data so that it can analyze it. Groups work through a guide that demonstrates the common ways to filter and sort data. Pairs then...
Code.org
Making Data Visualizations
Relax ... now visualize the data. Introduce pupils to creating charts from a single data set. Using chart tools included in spreadsheet programs class members create data visualizations that display data. The...
Code.org
Creativity in Algorithms
Groups work with the program they built in the previous lesson to make it more creative. The resource challenges pupils to add functionality to their existing programs by adding a new command.
Code.org
Functions and Top-Down Design
Let me break it down for you! Introduce your class to a way of breaking up a complicated task into its component pieces. Individuals draw a complex figure using JavaScript and then break it down to help determine the...
Code.org
APIs and Using Functions with Parameters
Introduce your class to the API, a reference guide that lists and explains the functionality of programming language. Using JavaScript, individuals draw complex designs that require additional commands and parameters defined in the...
Code.org
Creating Functions with Parameters
The pupils practice modifying parameters in a function to add variations to their under the sea scene. The resource also introduces random number functions that alter the scene every time the program runs.
Code.org
Looping and Random Numbers
Repetition, repetition, repetition. Get your class to efficiently repeat a section of code over and over again by introducing looping. Class members learn looping to quickly recreate objects they want to appear more than once in their...
TryEngineering
Search Engines
Introduce search engines with an activity that models how search engines work and the different algorithms they employ. Working in groups, class members then build search queries to demonstrate the knowledge learned.
TryEngineering
Boolean Algebra is Elementary
See how Boolean algebra relates to video games with a lesson that teaches young scholars how to use Boolean algebra to create rules for a virtual world. They test the rule base for consistency in groups.
Code.org
What is Big Data?
Find out why Big Data is a big deal in the first installment of a 12-part unit that introduces young computer scientists to Big Data and demonstrates how it is useful. In pairs, class members research a big data tool to uncover...
Code.org
The Need for Encryption
Scholars investigate the need for encryption as they read a portion of the book Blown to Bits and discuss encryption techniques. They finish by attempting to decode a message written using a Caesar cipher.
Code.org
Cracking the Code
Scholars learn how to crack secret codes as they continue reading from the Blown to Bits and try to crack the random substitution cipher. They also begin learning about the Vigenere cipher.
Code.org
Practice Performance Task - Security and Hacking in the Real World
Young computer scientists create a visual artifact that represents their research into a computing innovation in the world of cybersecurity. They then work individually to write an essay on the impact of technology on cybersecurity.
Code.org
Rapid Research – Data Innovations
Scholars conduct research into a computing innovation of their choice and figure out how it uses data. They prepare brief reports of their research in the second installment of the series.
Google
Snapchat Geofilter
Sometimes pictures could use a little help. Scholars add filters, frames, stamps, and text to a background photograph. They learn to use variables, encapsulation, sequences, and objects as they use the Blockly programming language.
Teach Engineering
Java Programming: Testing the Edges
Tests are no fun, but test cases are extremely helpful. Pupils work in groups to write a Java program that completes a given task. They come up with test cases to give to another group, then trade test cases to determine if their program...
Computer Science Unplugged
Tourist Town—Dominating Sets
As an introduction to using a network to determine the fewest number of nodes that meet a given condition, small groups work together to determine the fewest number of ice cream vans, and their locations, to be able to serve the people...
Code.org
The Internet Is for Everyone
What is this thing called the Internet? A KWL activity elicits what the class knows about how the Internet works. Then pupils read a copy of a memo about the need to keep the Internet open and accessible by everyone.
Code.org
Packets and Making a Reliable Internet
That's not what I said! My message did not arrive in the correct order! Introduce the concept of packets and the transmission control protocol used to send and receive information over the Internet. The class participates in an...
Code.org
How Routers Learn
Your routers don't seem to be routing correctly. To figure out why, pupils act like routers, talk to their direct connects in order to determine as much information about the simulated network as possible. As they learn more about...
Code.org
Practice PT - Encode an Experience
Encoding What I did Last Summer. Class members develop a way to encode a personal experience using a top-down approach to determine components and sub-components of their experience They then pick one portion of the experience and go...
Code.org
Check Your Assumptions
Always check your assumptions when interpreting data and data visualizations. That's the take away from this exercise. Class members examine a failed project that looks at search trends to predict flu outbreaks and consider the...
Drexel University
Learning Roomba Module 2: Robot Configurations
How do robots move? A presentation shows viewers the different types of configurations of that help robots move and lists the advantages and disadvantages of each of the configurations.
Code.org
Identifying People with Data
How much information about you is out there? Scholars explore this question as they investigate data breaches and how these violations occur. They then take part in an activity where they research how easily people could get access to...
Other popular searches
- Computer Science Excel
- Computer Science Java
- B Ed Computer Science
- History of Computer Science
- Computer Science History
- Computer Science Worksheets
- Networking Computer Science
- Computer Science C Programs
- Computer Science C++programs
- Computer Science Engineering
- Science and Computer Science
- Computer Science Terms