Curated OER
Creating Circle Graphs with Microsoft Excel
Seventh graders will learn how to construct circle graphs using paper and pencil. Then they will learn how to construct circle graphs using Microsoft Excel. This lesson uses technology and shows learners how to cross skills into the...
Curated OER
Write a Story
Elementary writers will create short stories with their classmates' help, publishing the books using computer programs. The first learner writes a sentence to start the story, and each classmate adds a sentence to the story. The original...
Code.org
Personal Innovations
Here's a resource designed to serve as an introduction to a computer science course. Groups brainstorm an innovation that may improve technology or use technology to solve a problem. The plan guides the teacher through the introduction...
Code.org
Looping and Simulation
Young computer scientists continue programming with while loops by creating a program to simulate coins flipping.
Code.org
Introduction to Digital Assistant Project
How does a computer recognize voice commands? Scholars learn about digital assistants and natural language processing (NLP) algorithms in the ninth lesson of the series. They begin building a simple digital assistant and work on this...
Computer Science Unplugged
Colour by Numbers–Image Representation
How do computers store and send images? Here's an activity that explains one way a computer can compress image information. Pupils decode run-length coding to produce a black and white image. Pairs then work together to code and...
TryEngineering
Program Your Own Game
Young computer scientists get to see what it's like to be a software engineer as they use free online software to design a computer game. They play and evaluate games groups created to round out the activity.
Code.org
Understanding Program Flow and Logic
Explore decision-making logic in programming computer games. The 10th installment of a 21-part unit teaches scholars how to apply conditional statements and Boolean expressions. They use these concepts to create a "Guess My Number" game...
Code.org
HTTP and Abstraction on the Internet
Introduce your class to the layers of abstraction of the Internet with a instructional activity on the HTTP protocol. Pupils review previous lessons on levels of the Internet, then investigate new high levels by examining the...
Code.org
Routers and Redundancy
How are messages to the right recipient? Introduce the concept of routing Internet traffic by drawing a comparison to sending a letter. Groups use the Internet Simulator program to send messages to others using the same router...
Code.org
Keys and Passwords
Scholars explore the relationship between cipher keys and passwords and as they learn more about the Vigenere cipher and continue to read from the book Blown to Bits in the seventh lesson of the series. They conduct an activity where...
Google
Music and Sound: Guru Introduction and Musical Talent Show
Become talented in computer science. After interviewing a computer science guru, pupils work on individual projects related to a virtual music talent show. They learn how to use different code blocks in the Scratch programming language,...
TryEngineering
Sorting Socks is Algorithm Complexity
Use hosiery to teach computer science. Scholars use socks to develop a set of algorithms. They find ways to find a particular sock from a set and ways to sort socks. Finally, they use their algorithms to consider time complexity.
Code.org
Number Systems
Generating a system of shapes. Groups work together to create a number system using three different shapes as symbols. The groups should come up with the rules that generate all the possible permutations of the three shapes.
Code.org
Practice PT - Design a Digital Scene
The final performance task for the unit requires class members to utilize what they have learned to create a personal digital scene. Groups work together to develop a scene and then, using top-down design, break the scene into...
Teach Engineering
Microfluidic Devices and Flow Rate
When you have to flow, you have to flow. The lesson introduces class members to microfluidic devices and their uses in medicine. They watch a short video on how the diameter affects the rate of flow. The worksheet has individuals...
Code.org
Sending Bits in the Real World
A bit optional. How do computers transmit in the real world? Pupils research a device that is used in transmitting bits, then individuals create a poster that presents the information they have learned about their device.
Code.org
Sending Numbers
Binary graphing ... bit by bit. Pairs work together to develop a protocol in order to send the points of a graph. One partner sends the points and the other receives them and tries to recreate the graph. The pupils use the rubric to...
Code.org
Text Compression
The second instructional activity in a unit of 15 introduces pupils to text compression. The class begins with discussing how they already use text compression when sending text messages. Pairs learn more about the subject as they work...
Code.org
Discover a Data Story
"Data is so boring, there's no way to find any patterns in them." Or is there? Pairs investigate data sets using different data visualization tools to discover a trend that may exist in a data set. Once they find a trend or...
Code.org
Functions and Top-Down Design
Let me break it down for you! Introduce your class to a way of breaking up a complicated task into its component pieces. Individuals draw a complex figure using JavaScript and then break it down to help determine the...
TryEngineering
Data Representation: Millions of Colors
How many colors do you know? The lesson teaches scholars how digital devices use binary and hexadecimal representations to store colors. They learn how millions of colors are available on these devices.
Code.org
Compound Conditional Logic
Scholars explore compound conditional logic and learn to use the Boolean operators AND, OR, and NOT within conditional statements by incorporating these operators to improve a previously created app.
Code.org
The Need for Encryption
Scholars investigate the need for encryption as they read a portion of the book Blown to Bits and discuss encryption techniques. They finish by attempting to decode a message written using a Caesar cipher.