Code.org
Number Systems
Generating a system of shapes. Groups work together to create a number system using three different shapes as symbols. The groups should come up with the rules that generate all the possible permutations of the three shapes.
Code.org
Encoding Numbers in the Real World
Ah, the numerous number of numbers. Individuals research different ways of encoding numbers. After conducting their initial research, they find classmates who have researched a different article and the pair share information. The...
Code.org
Encoding and Sending Formatted Text
Introduce your class to encoding text. Pairs work together to create a protocol to send text prior to learning ASCII encoding. Groups then collaborate to send and translate ASCII codes creating a formatted text message.
Code.org
Algorithms Detour - Minimum Spanning Tree
This optional lesson plan introduces the class to the idea of a minimum spanning tree. The activity focuses on determining an algorithm that will find the most efficient path in a network to transfer data.
Code.org
The Need for Algorithms
Pairs work through two scenarios that require them to generate an algorithm. The first activity requires pairs to define a common language to use; the second comes with the language. The pairs then must determine how to code the...
Code.org
Creating Functions
Quit repeating yourself ... you can make this simpler! Rather than repeating the same set of code over and over, class members learn to build and call functions in a series of challenges in App Lab. In the end, they combine...
Code.org
One-way Functions – The WiFi Hotspot Problem
Pupils attempt to solve the Wireless Hotspot Problem and learn why it is considered a computationally hard problem in the ninth lesson of the series on 12. They also learn about one-way functions and how the Wireless Hotspot Problem is...
Code.org
Public Key Cryptography
Investigate how public key cryptography works. Scholars continue their study of one-way functions and asymmetric keys and apply this information to public key cryptography. They use an app to explore public key cryptography and its...
Institute of Electrical and Electronics Engineers
Public Keys, One Way Functions and Hard Problems
Use paint to teach about cryptography. Scholars explore public key cryptography by attempting to mix a secret color using paint. After the activity, they investigate the Diffie-Hellman method using prime numbers, exponents, and modular...
Curated OER
Getting to Know Our Class
Fifth graders introduce themselves to their classmates by making a PowerPoint presentation. They each are required to produce a six-slide presentation with photographs, graphics, and text. This is a perfect activity to implement during...
Teach Engineering
How Antibiotics Work
Take two pills and call me in the morning. The first lesson in a short unit of four introduces class members to delivery methods of medicines. The instruction introduces the question of which delivery method is best to get you feeling...
Teach Engineering
Microfluidic Devices and Flow Rate
When you have to flow, you have to flow. The activity introduces class members to microfluidic devices and their uses in medicine. They watch a short video on how the diameter affects the rate of flow. The worksheet has individuals...
Teach Engineering
The Fibonacci Sequence and Robots
What better way to introduce the idea of a sequence than with robots! An educational lesson explains the classic Fibonacci sequence before pupils build and program a robot to move. Additionally, the lesson challenges individuals to...
National Sailing Hall of Fame
Sailboat Design Requirements
Sailboat design requires more than a half-circle and triangle sketch. After viewing a slideshow presentation that outlines the requirements for sailboat design, learners draw a design, perform the needed...
Code.org
Sending Numbers
Binary graphing ... bit by bit. Pairs work together to develop a protocol in order to send the points of a graph. One partner sends the points and the other receives them and tries to recreate the graph. The pupils use the rubric to...
Code.org
Practice PT - The Internet and Society
Speaking of the Internet. The culminating instructional activity for the unit on the Internet challenges pupils to prepare short, two-minute speeches on an issue facing society. The pupils chose from three topics that connect...
Code.org
Good and Bad Data Visualizations
Good versus bad data. Pairs rate online collections of data representations from good to bad and then suggest ways to improve the visualizations. The class then creates a list of best practices and common errors in data representations...
Code.org
Discover a Data Story
"Data is so boring, there's no way to find any patterns in them." Or is there? Pairs investigate data sets using different data visualization tools to discover a trend that may exist in a data set. Once they find a trend or...
Code.org
Cleaning Data
"Clean the data!" "I did not know it was dirty." Introduce your class to the process of cleaning data so that it can analyze it. Groups work through a guide that demonstrates the common ways to filter and sort data. Pairs then...
Code.org
Making Data Visualizations
Relax ... now visualize the data. Introduce pupils to creating charts from a single data set. Using chart tools included in spreadsheet programs class members create data visualizations that display data. The...
TryEngineering
Data Representation: Millions of Colors
How many colors do you know? The lesson teaches scholars how digital devices use binary and hexadecimal representations to store colors. They learn how millions of colors are available on these devices.
TryEngineering
Boolean Algebra is Elementary
See how Boolean algebra relates to video games with a lesson that teaches young scholars how to use Boolean algebra to create rules for a virtual world. They test the rule base for consistency in groups.
Code.org
The Need for Encryption
Scholars investigate the need for encryption as they read a portion of the book Blown to Bits and discuss encryption techniques. They finish by attempting to decode a message written using a Caesar cipher.
Code.org
Cracking the Code
Scholars learn how to crack secret codes as they continue reading from the Blown to Bits and try to crack the random substitution cipher. They also begin learning about the Vigenere cipher.
Other popular searches
- "Computer Technology" History
- Computer Technology Plans
- Technology Computer Parts
- Computer Technology Projects
- Computer Technology Basic
- Computer Technology Math
- Computer Technology Skills
- Computer Technology Lessons
- Computer Technology Spanish
- Computer Technology Science
- Using Computer Technology
- Computer Technology Excel