Impacts of Computing — Computer Science Lessons

111 lessons found.

“Weather” you know or not…. Classroom temperature is a hot topic!

This lesson merges weather, microbit, programming and social impact. Does the temperature of a classroom matter? Yes! In …

Tracey Winey 6-8 Computer ScienceScience
micro:bit

“White Energy Journey”

Students will work independently to design a ‘driving base’ using the SPIKE PRIME LEGO sets. Upon completion of the base …

Alicia Vonberg 6-8 Computer ScienceScience
Data CollectionProject-BasedRobotics

3D printing tracking and behind the scences

The learner will be given a demonstration on how to design a 3D model such as a keychain in the free autoCAD software …

Aric Hanusa 9-12 Computer ScienceMathematicsScience
Data CollectionWySTACK

AI and Ethics: A Mini-Unit for High School Lesson Set One

This is the first set of three lessons in a six-lesson mini unit on the basics of how artificial intelligence/machine …

Sarah Horen 9-12 Computer Science
Data CollectionProject-BasedWySTACK

AI and Ethics: A Mini-Unit for High School Lesson Set Two

This is the second set of three lessons in a six-lesson mini unit on the basics of how artificial intelligence/machine …

Sarah Horen 9-12 Computer Science
WySTACK

Algorithmic Bias & AI Ethics

In this activity students will learn about algorithmic bias through real-world examples. They will then learn the four …

Sarah Horen 6-89-12 Computer ScienceScience
Data CollectionWySTACK

Algorithms and Programming, Impacts of Computing

Explaining what algorithms are and how computers use them. Students will try to follow a set of step by step …

Brooke George 3-5 Computer Science

Algorithms with origami

Explaining what algorithms are and how computers use them.

Brooke George 3-5 Computer Science

Algorithms With Origami

Explaining what algorithms are and how computers use them.

Marisol Armstrong 3-5 Computer Science
Unplugged

aMAZEing Margaret Hamilton

In this lesson students will begin by reading about Margaret Hamilton in 'Margaret and the Moon' by Dean Robbins. After …

Kalista Pendleton K-23-5 Computer ScienceScienceReading/Language Arts +1
Project-BasedRobotics

Bake Sale Lesson1

This is the first day of a two-part lesson in entrepreneurship marketing research. In the overall project, Bake Sale, …

Nate Reinhardt 9-12 Career and Technical EducationComputer Science
Data CollectionUnplugged

Being Aware of What You Share

Kids share a lot of information whenever they go online -- sometimes on purpose, sometimes not. But do they understand …

Autumn Spiva 6-8 Computer ScienceReading/Language Arts

Brochure of Community

This is a research project of students community. After research is complete students will compile data into a …

Heidi Dicks 3-5 Social StudiesComputer Science

Careers in Cybersecurity

“Global cybersecurity job vacancies grew by 350 percent, from one million openings in 2013 to 3.5 million in 2021, …

Janixa Burgos 6-8 Computer Science
CybersecurityGenCyber

Cats or Dogs: Intro to Supervised Machine Learning

In this lesson, students will learn what supervised machine learning is and how it operates. Students will then work …

Sarah Horen 6-89-12 Computer ScienceScience
Data CollectionProject-BasedWySTACK

Communicating Through History: MicroBit Morse Code

Students will read articles and then construct a timeline of the progression of communication technology in the …

Becky Junge 3-5 Computer ScienceReading/Language ArtsSocial Studies
Unpluggedmicro:bit

Configure godot_rl

Student will install prerequisites such as pip, python-is-python3 etc. Will follow instructions I have given them and …

Jesse Smith 9-12 Computer ScienceScience
Game-BasedWySTACK

Controlled Collaboration

Introduce your students to shared document norms while also identifying main ideas and text structures.

Marisol Armstrong 3-5 Computer ScienceReading/Language Arts

Controlled Collaboration

Introduce your students to shared document norms while practicing identifying main idea and key details.

Crystal Graf 3-5 Computer ScienceReading/Language Arts

COVID-19 Revised/Extended Lesson Plan

The Covid-19 pandemic has impacted education, learning, and the social and emotional well-being of students due to …

Alicia Vonberg 6-8 ScienceSocial Studies
WySTACK

CRAFT PD Series — Unlocking AI & IoT for K-12 STEM

A three-session professional development series using the CRAFT pedagogical cycle. Co-hosted by the UCF DRACO Lab and …

K-23-56-89-12 Computer ScienceScienceEngineering +1
AIIoTmicro:bitprompt-engineeringCRAFTWySTACK

Create a cookie cutter device using technology and 3D printing to understand adding and subtracting fractions.

In this lesson students will create a cookie cutter to help them practice adding and subtracting fractions. They will …

Brandi Rodriguez 3-5 Computer ScienceMathematics

Critical Infrastructure 1

Students will be able to explain what Critical Infrastructure is, what are common components that belong to critical …

Timothy Grier 9-12 Science
CybersecurityGenCybermicro:bit

Critical Infrastructure 2

Students will be able to demonstrate foundational knowledge and skills that are related to cybersecurity

Timothy Grier 9-12 Computer ScienceScienceSocial Studies
CybersecurityGenCybermicro:bit

Cybersecurity 101 (4th Grade)

The teacher will introduce the topic of cybersecurity by asking students about any personal experience they have had …

Stacy Lynn Martinez 3-5 Computer Science
CybersecurityUnplugged

Cybersecurity Career Poster Project

Students will design a poster project detailing an individual cybersecurity career. The poster project will include …

Jana Simmerly 6-8 Computer ScienceScience
CybersecurityData CollectionGenCyber

Data: Patterns, Cause and Effect

Students will discover, explore, model and communicate patterns found within data. This lesson/activity will incorporate …

Kendrea Herring 3-5 ArtComputer ScienceMathematics +1
Data Collectionmicro:bit

Digital and Analog Activity Project

This is a project for students to experience the differences between analog and digital waves. Students will be …

Sara Percy 6-8 Computer ScienceScience
micro:bit

Digital Citizenship Escape Room

Beginning of the year introduction to digital citizenship. Students work through escape room to perform tasks. The tasks …

Melissa Harris 3-5 ArtComputer ScienceReading/Language Arts
Game-Based

Discover Digital Citizenship

Students will use a decoder to decode messages that lead to exploration of Digital Citizenship resources. They will then …

Melissa Harris 3-56-8 ArtComputer ScienceMathematics +1

Do you want to build a robot

Students will learn about robots, how to program a microbit and create a microbit pet.

Sandra Joslin 3-5 Computer ScienceMathematicsReading/Language Arts +1
Data CollectionProject-BasedRoboticsmicro:bit

E' is for Erosion

Students will learn the effects of wind and water erosion. They will create their own landscape to show how water …

Katie Cline 3-5 Computer ScienceScience
Cybersecurity

ELA9: Identifying Point of View using Cyber Security

Analysis of the Unreliable Narrator with Cyber Security

Andrew Disney 9-12 Computer ScienceReading/Language Arts
CybersecurityGenCyber

Ethics in Technology

Examination of ethical concerns revolving around technology, specifically social media and technology giants like Google

Jamie Le Jambre 6-89-12 Computer ScienceSocial Studies
Data Collection

Evolution and Impact of Technology Throughout History

This is going to be one of the first lessons that will be taught this school year as a way to set the stage for the year …

Michelle Petty 6-8 Computer ScienceSocial Studies
Project-Based

Evolution of the Telephone

Students spend several periods looking at the development of communication over the past 200 years.

Victoria Davis K-23-5 Computer ScienceScienceSocial Studies
micro:bit

Exploring Eye Tracking

The objective of this lesson is to introduce middle school students to the concept of eye tracking and its applications. …

Christy Rodgers 6-8 Computer ScienceScience
Data CollectionWySTACK

Exploring Eye Tracking: A Lesson For Middle Schoolers

The objective of this lesson is to introduce middle school students to the concept of eye tracking and its applications. …

Autumn Spiva 6-8 Computer ScienceScience
Data CollectionWySTACK

Exploring Eye Tracking: A Lesson for Middle School Students

The objective of this lesson is to introduce middle school students to the concept of eye tracking and its applications. …

Autumn Spiva 6-8 Computer ScienceScience
Data CollectionWySTACK

Exploring Outputs with an RGB Light Strip

In this lesson you will be introducing the connection of color with computer science through the use of a micro:bit and …

Laramie McCullough 6-89-12 ArtComputer ScienceScience
micro:bit

Exploring VR Eye Movement Tracking Accuracy

Students use their understanding of eye movement tracking learned in the prior lesson to test the accuracy of an eye …

Autumn Spiva 6-8 Computer ScienceScience
Data CollectionWySTACK

Exploring VR Eye Tracking Accuracy

This lesson uses discussions and hands-on activities to help students better understand what eye tracking is, how data …

Autumn Spiva 6-8 Computer ScienceScience
Data CollectionWySTACK

Eye Tracking Lab

Eye tracking, is a technology that helps us understand how our eyes move and what we look at.

Christy Rodgers 6-8 Computer ScienceMathematicsScience
Data CollectionWySTACK

Future Job Research

Student is required to 'explore future occupations' as defined by Occupational Outlook Handbook at …

Harry C Guess 6-8 Computer Science
Project-BasedWeb Design

Geographic Information Systems: Introduction and Map Creation

This lesson introduces Geographic Information Systems (GIS) to students. We explore ways in which GIS impacts our …

Whitney Wilking 6-8 Computer ScienceReading/Language ArtsSocial Studies
Data Collection

Geometric planter : find volume

The purpose for this geometry lesson is integrated with computer science 3 D printing so students know what is Tinkercad …

Yung Richards 6-89-12 Computer ScienceMathematics
UnpluggedWySTACK

Get to Know Me

Students will participate in a community building activity that will integrate Computer Science through the use of the …

Melanie Mullikin K-23-5 Computer ScienceReading/Language Arts

Getting started with Micro:bit

Students will explore the functions of the MIcro: bit. Students have not had experience with this and I have very …

Melissa Harris K-23-5 Computer ScienceMathematicsReading/Language Arts
micro:bit

Getting to Know You, CPU

Students will be introduced to Micro:Bit technology and have the opportunity to program the Micro:Bit to share some …

Becky Junge 3-5 Computer ScienceReading/Language Arts
Web Designmicro:bit

GIS Watershed Information

Students use GIS online software to analyze local watersheds and draw conclusions about earth changes over time and …

Victoria L Davis 6-8 Computer ScienceScience
Data Collection

Godot RL Agents Activity

In this section, you will learn how to create a custom environment in the Godot Game Engine and then implement an AI …

Jesse Smith 9-12 Computer ScienceMathematicsScience
Game-BasedWySTACK

HexBug Mazes

In this lesson/activity students will learn about who Margaret Hamilton is and what she did for NASA. Students will be …

Kalista Pendleton 3-5 Computer ScienceScienceSocial Studies
Project-BasedRobotics

Hour of Code introduction/ Ecosystems

this will be an introduction to coding using Hour of Code, as a refresher/ attention grabber right after Christmas …

Brenna Franklin 6-8 Science
Code.orgData Collection

How Information is Transferred Over the Internet and Internet/Database Search Strategies

Students will be introduced to the concept of data/information transfer across computer devices and the Internet, …

Ron Chesmore 6-8 Computer ScienceLibrary Media
Unplugged

How safe are they?

Each group will be provided a different scenario regarding cyber security. After analyzing the scenario, they will need …

Brian Axon 9-12 Reading/Language Arts
CybersecurityGenCyber

I = Integrity

Students will locate, read and research articles from sources to better understand using credible sources for research.

Billie Rainey 6-8 Computer ScienceReading/Language ArtsSocial Studies
CybersecurityGenCyber

Impacts of Computing

Students will begin the year of computer science by talking about how the people in their lives use different types of …

Traci Gardner K-2 Computer ScienceReading/Language Arts

Internet Information Research and Retrieval Processes and Effective Search Strategies

This lesson will introduce the concepts of information research strategies, information storage, and retrieval systems …

Ron Chesmore 6-8 Computer ScienceLibrary Media
Data CollectionUnplugged

Internet Safe!

Students will understand what it means to be an active, safe, and responsible citizen when participating in an online …

Megan Moore 3-5 Computer Science
Cybersecurity

Introduction to Computer Science and SpeedGeeking 101

Part 1: Gauge student understanding of computer science and introduce basic CS vocabulary. Part 2: Teach students about …

Whitney Wilking 6-8 Computer ScienceReading/Language Arts
Data CollectionRobotics

Introduction to Cybersecurity Hand Concepts

This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general …

Ashley Gecewicz 9-12 Computer ScienceMathematicsReading/Language Arts +1
CybersecurityGenCyber

Keep Your Lips Sealed

There are multiple ways to gain information. Many people will openly provide information with minimal thought to how the …

Holley Nichols 9-12 Computer ScienceScience
CybersecurityData CollectionGenCyber

Lesson 1/ activity: Geometric planter find total surface area

The purpose for this geometry lesson is integrated with computer science 3 D printing so students know what is 3 D …

Yung Richards 6-89-12 Computer ScienceMathematics
UnpluggedWySTACK

Magellan and Technology

Adapted from: Flocabulary.com 7/2020 “Become a Map-Maker and Explorer” Use this lesson plan to commemorate Magellan’s …

Timothy George 3-5 Computer ScienceReading/Language ArtsSocial Studies

Make.code for the Musical

Students were gearing up for a second semester project in design for the spring musical. This was a collaborative …

Samantha J Smith 9-12 Computer ScienceScienceArt
WySTACKmicro:bit

Making Good Decisions Online/Computer Parts (Kindergarten)

In the first activity, with the slideshow displayed, the teacher will facilitate a discussion about making good …

Stacy Lynn Martinez K-2 Computer Science

Malware: The Rat

With the increase in available technology and connectivity, cyber hackers are looking for vulnerable software to gather …

Jonathan Broersma 3-5 Computer ScienceReading/Language Arts
Cybersecurity

Micro:bits / Makerspace

The lesson is for coding with micro:bits. It is written broadly for implementation as an activity for a whole group of …

Devin Hodgins 3-56-8 Computer ScienceReading/Language Arts
Data CollectionProject-Basedmicro:bit

Micro:bits on the Fly with Lego Cars

Students will explore how sensors are used in our lives and what they could measure. Students will build a Lego car and …

Julie Snyder 6-8 Computer ScienceScience
Data CollectionProject-Basedmicro:bit

Miscommunication in Communication

For the Nature of Science students are practicing going through steps in scientific inquiry. Students need to …

Jesica Jones-Saka 6-8 Computer ScienceScience
CybersecurityGenCybermicro:bit

ML Learning

In this lesson students are introduced to a form of artificial intelligence called machine learning and how they can use …

Jesse Smith 9-12 Computer ScienceMathematicsScience
Code.orgRoboticsWySTACK

Music is Life

Students will use coding to develop animation and sound for a music simulator. students will demonstrate locating and …

Will Barnes 6-8 Computer ScienceMathematicsArt
Robotics

My avatar and me

This lesson will introduce students to the differences between an avatar, a virtual human, and artificial intelligence. …

Jennifer LaVanchy 3-5 Computer Science
Code.orgRoboticsWySTACK

Nature Art: Merging Nature, Algorithms, and Programming in an inclusive environment

This lesson is an introduction to computational thinking and the BBC micro:bit. Students learn how to create nature …

Tracey Winey 6-8 ArtComputer ScienceReading/Language Arts
micro:bit

Online Mindfulness

On the internet, students interact with websites, peers, and strangers throughout the day. With that said, students must …

Jonathan Broersma 3-5 Computer Science
Cybersecurity

Practicamos Español

In this lesson students will review what Duolingo does for Spanish students, and design a similar project using Scratch …

Jennifer LaVanchy 3-5 Computer Science
Game-BasedScratchUnpluggedWySTACK

Protect Your Passwords

This activity teaches students the importance of creating a safe and secure password. In addition, students will also …

Kryssi Soule 3-5 Computer ScienceReading/Language ArtsSocial Studies
Code.orgWeb Design

Radio Communicating with Microbits

In this project, you and a partner will code a program that is capable of sending a coded message to each other. Each of …

Taylor Plantt 6-8 Computer ScienceScienceSocial Studies
Cybersecuritymicro:bit

Radio Kindness

Sharing and receiving kindness is a good way to support your well-being and that of your friends. In this activity you …

Anita Tope K-23-5 Computer ScienceScienceSocial Studies
micro:bit

Real World Cyber Security Historical Event

Cybersecurity and personal information protection go hand in hand. This is the second of a three lesson unit that offers …

Chad Lemley 3-5 Computer ScienceReading/Language ArtsSocial Studies
Cybersecurity

Real World Cyber Security in the Present

Cybersecurity and personal information protection go hand in hand. This is the third of a three lesson unit offering 5th …

Chad Lemley 3-5 Computer ScienceReading/Language ArtsSocial Studies
Cybersecurity

Real World Cybersecurity

Cybersecurity and personal information protection go hand in hand. This is the first of a three lesson unit that …

Chad Lemley 3-5 Computer ScienceReading/Language ArtsSocial Studies
Cybersecurity

Research in our World: Innovation in Computing

Students will complete a research report on an industry that they are interested in. They will research other projects …

Skye Mader 6-8 Computer Science
Code.orgWySTACK

Robotics for Students in the Functional Life Skills (FLS) Program

As the library exists to offer an inclusive space for everyone, this lesson is geared toward giving students with …

Devin Hodgins 6-8 Computer ScienceScienceMathematics
Data CollectionRobotics

Safety City

Create a safety city scale model and make a working traffic light system. Role playing let them experience the safety …

Tonya R Taylor K-23-5 Computer ScienceScience
Data CollectionWySTACK

Scientific Technologies

Students research a field of science that interests them and the technologies that are used to solve-problems in that …

Amanda Katelyn Carson K-23-56-8 Computer ScienceScience
Data Collectionmicro:bit

Secrets Told!

Kids love to talk in code so parents and teachers can't figure out what they are saying. Enter the world of emojis and …

Holley Nichols 9-12 Computer ScienceScience
CybersecurityGenCyber

Secure Your Future. Cyber Security Safety.

Students will be provided a scenario. In this scenario, a student is applying to a college. They have created an …

Brian Axon 9-12 Reading/Language Arts
CybersecurityGenCyber

Security Risks & Consequences

This lesson can be done either in person OR virtually. Students will work individually and in groups to determine how …

Alicia Vonberg 6-8 Computer ScienceScience
Cybersecurity

See Ya Later, Alligator: Coding and Ratio Tabless

Students will work in pairs to build ratio tables defining a list of data for distance traveled by various animals over …

Becky Junge 3-5 Computer ScienceMathematics
Data CollectionProject-Basedmicro:bit

Self Driving Moral Dilemma and Machine Learning - 1

This lesson asks students to create their own moral dilemma scenario and create possible outcomes for their scenario. …

Garrid Halsey 6-8 Computer ScienceScienceSocial Studies

Shaw Plans for Classroom Implementation

This lesson consists of introducing students to the concepts of finite state machines (FSM), side-channel attacks, and …

Shari Shaw 6-8 Computer ScienceMathematicsScience
Data CollectionWySTACK

Sonic Pi: Midi Synthesizer

Most commercial music produced today involves the use of synthesized and sampled sounds. MIDI (musical instrument …

Colin Botts 3-5 Computer ScienceArt

Student Choice in the Classroom Utilizing AI, Virtual Learning and Digital Tools

in person, learning taking place in a brick and mortar classroom. Students have the choice whether to dissect a frog …

Alicia Vonberg 6-89-12 Science
WySTACK

Sunlight Sensor

Turn your micro:bit into a light sensor! Using the light level sensor feature of the micro:bit, students will program …

Anita Tope 3-5 Computer ScienceScience
Data Collectionmicro:bit

Surprise! We get to have new Pets!

This is an opportunity for students to learn more about coding through creating a micro:pet with a partner, It will …

Phaedra Davila K-23-5 ArtComputer ScienceScience +1
CybersecurityGenCybermicro:bit

Talk to the Hand

This is practicing lesson plan for Thinking like an Adversary and the Availability.

Everett Fleming 9-12 Mathematics
CybersecurityData CollectionGenCyber

TALK TO THE HAND – DEFENSE IN DEPTH

Defense in depth is a strategy that leverages multiple security measures to protect an organization's assets. The …

Lorraine Grice 9-12 Computer Science
CybersecurityGenCybermicro:bit

TALK TO THE HAND – THINK LIKE AN ADVERSARY

In this lesson, future CyberSecurity specialists (aka students) will develop a CyberSecurity handbook where they will …

Lorraine Grice 9-12 Computer Science
CybersecurityGenCybermicro:bit

Technology Compare and Contrast

Students will independently or collaboratively compare and contrast technology and how it has changed our lives and how …

Megan Moore 3-5 Computer ScienceReading/Language Arts
Project-Basedmicro:bit

The Card Catalog: Computer of Yesteryear

This lesson will show students how computer coding is used to solve the problem of quickly accessing books using the …

Michelle Ottoes 3-56-8 Computer ScienceLibrary MediaReading/Language Arts

They're Listening

This lesson is going to be about discussing internet safety, and how simple home items may be listening.

David Fonseca 9-12 Reading/Language Arts
CybersecurityGenCyber

Think Like a Hacker

Students will pretend they are in charge of cybersecurity for a app. Their job it to retain users and increase the …

Adrienne Unertl 3-56-89-12 Computer Science
Cybersecurity

Traffic Light Arduino

Students will design a traffic light simulator using an Arduino to imitate traffic light timings. Students will program …

Sandra Joslin 6-8 Computer ScienceScience
WySTACK

Traffic Signals: Real World Finite State Machines

Students will login and play the gridlock buster game. This is a traffic light simulation that requires students to be …

Shari Shaw 6-8 Computer ScienceMathematicsScience +1
Data CollectionWySTACK

Using Microbits to measure conductivity of metallic, ionic and covalent bonds.

• Observe the conductivity strength between different types of bonds, metallic, ionic and covalent. • …

Samantha Schwessinger 9-12 Computer ScienceReading/Language ArtsScience
micro:bit

VR Eye Tracking Accuracy

Students will understand the concept of VR eye tracking accuracy. Students will collect data on the use of VR eye …

Christy Rodgers 6-8 Computer ScienceScienceSocial Studies
Data CollectionWySTACK

Wax Museum Technology Part 1

In this lesson series, students will research ways that technology has impacted the world. They can choose to research …

Taylor Wailes-Putnam 3-5 ArtComputer ScienceScience +3
Unplugged

What is VR and A Frame?

In this lesson, students will learn about virtual reality and how it is currently being used for entertainment as well …

Stephanie May 6-8 Computer Science
Web DesignWySTACK

Workshop 1: Using AI for STEM — Lessons & More

Turn LLMs into your STEM curriculum co-pilot through hands-on prompt engineering across ChatGPT, Claude, and Gemini.

K-23-56-89-12 Computer ScienceScienceMathematics
AIprompt-engineeringCRAFTLLMWySTACK

Workshop 2: Verifying STEM AI Outputs

The Check the Machine protocol and error-hunting skills for AI-generated code and STEM content.

K-23-56-89-12 Computer ScienceScienceMathematics
AIverificationCRAFTCheck-the-Machinecritical-thinkingWySTACK