Networks and the Internet — Computer Science Lessons

88 lessons found.

"So, you want to work for the DNI"

This is an introduction to the CyberSecurity aspect of National Intelligence

Jerry Updike 9-12 Computer ScienceSocial Studies
CybersecurityData CollectionGenCyberRoboticsmicro:bit

All about the Internet

How Does the Internet Work? Learning about networks, protocols, TCP/IP

Christy Rodgers 6-8 Computer Science

Basic aspects of Cyber security and Copyrights

Students will be learning about the basic aspects of Cyber security. They will become aware of how to protect their …

Judes Francois 3-56-8 Reading/Language Arts
CybersecurityGenCyber

Being Aware of What You Share

Kids share a lot of information whenever they go online -- sometimes on purpose, sometimes not. But do they understand …

Autumn Spiva 6-8 Computer ScienceReading/Language Arts

Bookmarking Websites

Searching for websites can be time-consuming. Imagine having to re-discover the places where we buy our groceries or …

Justin Hansen 3-5 Computer Science

Can you escape the maze?

Students will use two different maze websites throughout the lesson. They will use speaking and listening skills to exit …

Amber E Johnson 3-5 Computer ScienceReading/Language Arts

Candy Burglar: Password Lesson

Candy Burglar: Password Lesson Students will each receive a card with a symbol or word on it. The symbol will match with …

Michelle Black K-2 Computer Science
Unplugged

Careers in the Cyber World

This lesson is a brief overview of the 6 pillars of cybersecurity and the of careers that are available for students …

Tina Simpson 9-12 Career and Technical EducationComputer Science
CybersecurityGenCyber

CODIS & Forensic Science

Students will work together (in teams of 4) as forensic scientists to solve the crime of “Who broke into our school and …

Alicia Vonberg 6-8 Computer ScienceScience
Data CollectionUnplugged

Collaborative Grid Poster

The instructor will ask the students to decode a message from binary. The instructor will then explain to students the …

Mackenzie Wiginton 9-12 ArtComputer Science
Data Collection

Computer Basics (Collaborative lesson with K and 5)

5th grade students will mentor kindergarten students in how to properly care for and navigate their personal computer. …

Melissa Harris K-23-5 Computer ScienceReading/Language Arts

Create Your Own Musical Code

Different applications and disciplines often require knowledge of different communication systems and the ability to …

Colin Botts 3-5 Computer ScienceArt
Data Collection

Creating a Strong Username and Password

This lesson will discuss the importance of using a unique username, and help create a strong password using a Caesar …

Kayla Horn 3-5 Computer Science
Cybersecurity

Critical Infrastructure 1

Students will be able to explain what Critical Infrastructure is, what are common components that belong to critical …

Timothy Grier 9-12 Science
CybersecurityGenCybermicro:bit

Critical Infrastructure 2

Students will be able to demonstrate foundational knowledge and skills that are related to cybersecurity

Timothy Grier 9-12 Computer ScienceScienceSocial Studies
CybersecurityGenCybermicro:bit

Cybersecurity - Hand Introduction and Confidentiality

Introduction to the GenCyber Hand concepts - also includes Confidentiality topics.

Jeff Kitterman 6-8 Computer Science
CybersecurityGenCybermicro:bit

Cybersecurity - Integrity

Introduction to the concept of integrity with a video, unplugged activity, and discussion

Jeff Kitterman 6-8 Computer Science
CybersecurityGenCyberUnplugged

Cybersecurity - Secure Passwords

Online Authentication often revolves around passwords. We will discuss how to develop simple rules to create strong …

Justin Hansen 3-5 Computer ScienceLibrary Media
Code.orgCybersecurity

Cybersecurity 101 (4th Grade)

The teacher will introduce the topic of cybersecurity by asking students about any personal experience they have had …

Stacy Lynn Martinez 3-5 Computer Science
CybersecurityUnplugged

Cybersecurity Career Poster Project

Students will design a poster project detailing an individual cybersecurity career. The poster project will include …

Jana Simmerly 6-8 Computer ScienceScience
CybersecurityData CollectionGenCyber

Darn! I forgot my password...again!

Middle School Students love to share everything-including their water bottles, their sense of humor and even their …

Tracey Winey 6-8 Computer ScienceReading/Language Arts
Code.org

Denial of Service Attack

Students will model one type of attack (a denial-of-service attack) and figure out how to protect the network against it …

Jumoke Adebimpe 9-12 ScienceComputer Science
CybersecurityGenCyber

Digital Citizenship Escape Room

Beginning of the year introduction to digital citizenship. Students work through escape room to perform tasks. The tasks …

Melissa Harris 3-5 ArtComputer ScienceReading/Language Arts
Game-Based

Discover Digital Citizenship

Students will use a decoder to decode messages that lead to exploration of Digital Citizenship resources. They will then …

Melissa Harris 3-56-8 ArtComputer ScienceMathematics +1

Do’s and Don'ts on the internet

Introduction: “Today, we live in a time characterized by rapid technology transformation, and resulting social, …

Janixa Brugos 6-8 Computer Science
CybersecurityGenCyber

Don't Feed the Phish (Adapted from Common Sense Media's Digital Citizenship Curriculum

This lesson helps students identify phishing attacks over networks via email, texts, and online pop-ups and ads, etc. A …

Ron Chesmore 6-8 Computer ScienceLibrary Media
Cybersecurity

E is for Erosion, C is for Cybersecurity

Students will learn the effects of wind and water erosion. They will create their own landscape to show how water …

Katie Cline 3-5 Computer ScienceScience
CybersecurityProject-Based

Ethics in Technology

Examination of ethical concerns revolving around technology, specifically social media and technology giants like Google

Jamie Le Jambre 6-89-12 Computer ScienceSocial Studies
Data Collection

Evolution of the Telephone

Students spend several periods looking at the development of communication over the past 200 years.

Victoria Davis K-23-5 Computer ScienceScienceSocial Studies
micro:bit

Exploring Eye Tracking: A Lesson For Middle Schoolers

The objective of this lesson is to introduce middle school students to the concept of eye tracking and its applications. …

Autumn Spiva 6-8 Computer ScienceScience
Data CollectionWySTACK

Exploring Potential and Kinetic Energy by Using Hot Wheels and Micro:bits

Students will be exploring potential and kinetic energy (how mass and velocity changes KE, when does an object have the …

Noel Davis 6-89-12 Computer ScienceScience
Code.orgData Collectionmicro:bit

Exploring VR Eye Movement Tracking Accuracy

Students use their understanding of eye movement tracking learned in the prior lesson to test the accuracy of an eye …

Autumn Spiva 6-8 Computer ScienceScience
Data CollectionWySTACK

Frankenstein in the world of virtual reality

This lesson will introduce the students to Computer Science and its applications in the Language Arts Classroom. …

Yvonne Swader 9-12 Computer ScienceReading/Language Arts
WySTACK

Frankenstein in the world of virtual reality (continued)

This lesson will continue our look into the Computer Science field. Students will learn about the dangers of cyber …

Yvonne Swader 9-12 Computer ScienceReading/Language Arts
CybersecurityWySTACK

Frog Dissection Lab-Virtual Option

Virtual or hybrid learning, taking place through a remote conferencing system and with students working at their own …

Alicia Lynn Vonberg 6-8 Science
Data CollectionWySTACK

Future Job Research

Student is required to 'explore future occupations' as defined by Occupational Outlook Handbook at …

Harry C Guess 6-8 Computer Science
Project-BasedWeb Design

Geometric planter : find volume

The purpose for this geometry lesson is integrated with computer science 3 D printing so students know what is Tinkercad …

Yung Richards 6-89-12 Computer ScienceMathematics
UnpluggedWySTACK

Gesturing for Cybersecurity

Students will receive a demonstration and introduction to using a Mnemonic to help them understand and recall the areas …

Billie Rainey 6-8 Computer ScienceReading/Language Arts
CybersecurityGenCyberScratch

Get to Know Me

Students will participate in a community building activity that will integrate Computer Science through the use of the …

Kiley Hiser K-2 Computer Science

Get to Know Me

Students will participate in a community building activity that will integrate Computer Science through the use of the …

Melanie Mullikin K-23-5 Computer ScienceReading/Language Arts

Getting started with Micro:bit

Students will explore the functions of the MIcro: bit. Students have not had experience with this and I have very …

Melissa Harris K-23-5 Computer ScienceMathematicsReading/Language Arts
micro:bit

Godot RL Agents Activity

In this section, you will learn how to create a custom environment in the Godot Game Engine and then implement an AI …

Jesse Smith 9-12 Computer ScienceMathematicsScience
Game-BasedWySTACK

Hardware/Software Sorting Activity

Hardware/Software Sorting Activity: For this exploration, you and your partner will sort the computer science resource …

Terry Highfield K-23-5 Computer Science

Honesty and Integrity

Honesty and Integrity are valuable and necessary skills to flourish in various environments, including higher education, …

Stephen Callum 9-12 Social Studies
CybersecurityGenCyber

Hour of Code introduction/ Ecosystems

this will be an introduction to coding using Hour of Code, as a refresher/ attention grabber right after Christmas …

Brenna Franklin 6-8 Science
Code.orgData Collection

How do we know if a source is reliable?

The students will analyze three different websites. During their exploration the students will answer three questions. …

Chad Miller 6-8 Computer ScienceSocial Studies

How Information is Transferred Over the Internet and Internet/Database Search Strategies

Students will be introduced to the concept of data/information transfer across computer devices and the Internet, …

Ron Chesmore 6-8 Computer ScienceLibrary Media
Unplugged

How safe are they?

Each group will be provided a different scenario regarding cyber security. After analyzing the scenario, they will need …

Brian Axon 9-12 Reading/Language Arts
CybersecurityGenCyber

How safe are we? ¿Qué salvo estamos?

I am planning to work with Spanish speaking students and parents after school,using your resources show them what to …

Emilia Figueroa 9-12 World Languages
CybersecurityGenCybermicro:bit

I = Integrity

Students will locate, read and research articles from sources to better understand using credible sources for research.

Billie Rainey 6-8 Computer ScienceReading/Language ArtsSocial Studies
CybersecurityGenCyber

Integrity and Keep It Simple

The purpose for this lesson is to help you understand the notions or aspects of integrity and the simplicity with which …

Judes Francois 3-56-8 ScienceSocial StudiesComputer Science
CybersecurityGenCyber

Internet Information Research and Retrieval Processes and Effective Search Strategies

This lesson will introduce the concepts of information research strategies, information storage, and retrieval systems …

Ron Chesmore 6-8 Computer ScienceLibrary Media
Data CollectionUnplugged

Internet Safe!

Students will understand what it means to be an active, safe, and responsible citizen when participating in an online …

Megan Moore 3-5 Computer Science
Cybersecurity

Intro to HTML

This lesson introduces many new concepts and tools to students. They are introduced to HTML, the Web Lab tool, and how …

Camille Conner 9-12 Computer Science
Code.orgWeb DesignWySTACK

Introducing our Technology

This lesson is designed to be delivered early in the year to establish a common knowledge base on the programs to be …

Chase Christensen K-2 Computer ScienceMathematicsReading/Language Arts

Introduction of Cybersecurity/ Confidentiality Availability

1. Test students' prior knowledge

Judes Francois 3-56-8 Computer ScienceReading/Language Arts
CybersecurityGenCyber

Introduction to Computer Science and SpeedGeeking 101

Part 1: Gauge student understanding of computer science and introduce basic CS vocabulary. Part 2: Teach students about …

Whitney Wilking 6-8 Computer ScienceReading/Language Arts
Data CollectionRobotics

Introduction to Micro:bits

Students will learn what micro:bits are and how they can be used. They will also learn how to code their own micro:bits. …

Jenny Day K-2 Computer Science
RoboticsScratchUnpluggedmicro:bit

Learning the Importance of Authentication Factors

Students will learn what authentication factors are, and the importance of keeping them private. They will apply the use …

Kathleen Cherry K-2 Computer Science

Lesson 1/ activity: Geometric planter find total surface area

The purpose for this geometry lesson is integrated with computer science 3 D printing so students know what is 3 D …

Yung Richards 6-89-12 Computer ScienceMathematics
UnpluggedWySTACK

Lesson Plan 2-First LEGO ® League “White Energy Journey”

Students will work independently to design a ‘driving base’ using the SPIKE PRIME LEGO sets. Upon completion of the base …

Alicia Vonberg 6-8 Computer ScienceScienceMathematics
Project-BasedRobotics

Making a AR book- Using AR in the classroom

The Halo AR app shows various ways to show the human CAPTCHA tool for a virtual environment. This type of technology is …

Tonya Rose Taylor 6-8 Computer ScienceReading/Language Arts
Game-BasedWySTACK

Malware: The Rat

With the increase in available technology and connectivity, cyber hackers are looking for vulnerable software to gather …

Jonathan Broersma 3-5 Computer ScienceReading/Language Arts
Cybersecurity

Micro:bits / Makerspace

The lesson is for coding with micro:bits. It is written broadly for implementation as an activity for a whole group of …

Devin Hodgins 3-56-8 Computer ScienceReading/Language Arts
Data CollectionProject-Basedmicro:bit

O' is for Outlaw

Students will be studying Outlaws and Law Enforcement in Wyoming History. We will talk about how technology has changed …

Katie Cline 3-5 Computer ScienceReading/Language ArtsSocial Studies

Pixel Art

In this unplugged activity students will learn different ways to write out programs/codes to create large scale pixel …

Mackenzie Wiginton 3-5 ArtComputer Science
Data CollectionUnplugged

Powerful Passwords

This activity teaches students the importance of creating a safe and secure password. In addition, students will also …

Marisol Armstrong K-23-5 Computer Science
Code.orgWeb Design

Protect Your Passwords

This activity teaches students the importance of creating a safe and secure password. In addition, students will also …

Kryssi Soule 3-5 Computer ScienceReading/Language ArtsSocial Studies
Code.orgWeb Design

Radio Communicating with Microbits

In this project, you and a partner will code a program that is capable of sending a coded message to each other. Each of …

Taylor Plantt 6-8 Computer ScienceScienceSocial Studies
Cybersecuritymicro:bit

Radio Kindness

Sharing and receiving kindness is a good way to support your well-being and that of your friends. In this activity you …

Anita Tope K-23-5 Computer ScienceScienceSocial Studies
micro:bit

Real World Cyber Security Historical Event

Cybersecurity and personal information protection go hand in hand. This is the second of a three lesson unit that offers …

Chad Lemley 3-5 Computer ScienceReading/Language ArtsSocial Studies
Cybersecurity

Real World Cyber Security in the Present

Cybersecurity and personal information protection go hand in hand. This is the third of a three lesson unit offering 5th …

Chad Lemley 3-5 Computer ScienceReading/Language ArtsSocial Studies
Cybersecurity

Real World Cybersecurity

Cybersecurity and personal information protection go hand in hand. This is the first of a three lesson unit that …

Chad Lemley 3-5 Computer ScienceReading/Language ArtsSocial Studies
Cybersecurity

Safety City

Create a safety city scale model and make a working traffic light system. Role playing let them experience the safety …

Tonya R Taylor K-23-5 Computer ScienceScience
Data CollectionWySTACK

Secure Your Future. Cyber Security Safety.

Students will be provided a scenario. In this scenario, a student is applying to a college. They have created an …

Brian Axon 9-12 Reading/Language Arts
CybersecurityGenCyber

Security Risks & Consequences

This lesson can be done either in person OR virtually. Students will work individually and in groups to determine how …

Alicia Vonberg 6-8 Computer ScienceScience
Cybersecurity

Student Choice in the Classroom Utilizing AI, Virtual Learning and Digital Tools

in person, learning taking place in a brick and mortar classroom. Students have the choice whether to dissect a frog …

Alicia Vonberg 6-89-12 Science
WySTACK

Students own lesson plans about the definition of concepts of authenticity, threats, hackers and security measures in computer systems and the internet.

Students will make their own videos and demonstrate how they are able to describe threats to modern digital computer …

Emilia Figueroa 9-12 World Languages
CybersecurityGenCyber

The Card Catalog: Computer of Yesteryear

This lesson will show students how computer coding is used to solve the problem of quickly accessing books using the …

Michelle Ottoes 3-56-8 Computer ScienceLibrary MediaReading/Language Arts

The HANDbook

Implementing effective cybersecurity measures is particularly challenging today because there are more devices than …

Everett Fleming 9-12 Mathematics
CybersecurityGenCyber

The Problem with Plastics

3rd grade learns about Jacques Cousteau and his conservation efforts to clean up the ocean. Plastic waste has become a …

Kathy Manker 3-5 Computer ScienceMathematicsReading/Language Arts +1
Data Collection

They're Listening

This lesson is going to be about discussing internet safety, and how simple home items may be listening.

David Fonseca 9-12 Reading/Language Arts
CybersecurityGenCyber

Think Like a Hacker

Students will pretend they are in charge of cybersecurity for a app. Their job it to retain users and increase the …

Adrienne Unertl 3-56-89-12 Computer Science
Cybersecurity

Virtual Reality Oculus Quest 2

Goal Work: Depending on the individual students’ goals, the appropriate application will be selected according to their …

Jennifer Puckett K-2 Reading/Language Arts
WySTACK

Visual Behavior Resource

The first lesson plan will consist of some physical and behavioral activities that will show the meanings of the traffic …

Tonya Taylor K-23-5 Computer ScienceScience
Data CollectionWySTACK

What to do with the stuff I have

Students are given CONNEX or VEX pieces from a build kit and are given a mission. As a team they will create an artifact …

Will Barnes 6-8 ArtComputer Science

Workshop 3: Programming Edge/IoT Systems with AI

BBC micro:bit in the MakeCode simulator + LLM-assisted coding — build a two-node IoT system without any hardware.

K-23-56-89-12 Computer ScienceScienceEngineering
IoTmicro:bitCRAFTedge-computingMakeCodesimulatorMicroPythonradioWySTACK

Zoo Data

Students will collect data on what animals they would keep in a library. Students will choose their top 5 animals that …

Taylor Wailes-Putnam K-23-5 Computer ScienceMathematics
Data Collection