9-12

58 lessons found.

"So, you want to work for the DNI"

This is an introduction to the CyberSecurity aspect of National Intelligence

Jerry Updike 9-12 Computer ScienceSocial StudiesTechnology
CybersecurityData CollectionGenCyberRoboticsmicro:bit

Bake Sale Lesson 2

Students will analyze their data from the survey they conducted, find ways to represent the data, make suggestions about …

Nate Reinhardt 9-12 BusinessComputer Science
Data Collection

Bake Sale Lesson1

This is the first day of a two-part lesson in entrepreneurship marketing research. In the overall project, Bake Sale, …

Nate Reinhardt 9-12 BusinessComputer Science
Data CollectionUnplugged

Careers in the Cyber World

This lesson is a brief overview of the 6 pillars of cybersecurity and the of careers that are available for students …

Tina Simpson 9-12 Career and Technical EducationComputer Science
CybersecurityGenCyber

Collaborative Grid Poster

The instructor will ask the students to decode a message from binary. The instructor will then explain to students the …

Mackenzie Wiginton 9-12 ArtComputer Science
Data Collection

Critical Infrastructure 1

Students will be able to explain what Critical Infrastructure is, what are common components that belong to critical …

Timothy Grier 9-12 CybersecurityScience
CybersecurityGenCybermicro:bit

Critical Infrastructure 2

Students will be able to demonstrate foundational knowledge and skills that are related to cybersecurity

Timothy Grier 9-12 Computer ScienceEngineeringScience +2
CybersecurityGenCybermicro:bit

Cryptology

This lesson will help students to understand cryptology. Students will use problem solving skills to encrypt and …

Elizabeth Busch 6-89-12 Computer ScienceMathematics
CybersecurityGenCyberWeb Design

Cryptology with micro:bits

This activity will introduce the Caesar Cipher to students on makecode.micro:bit.org. Students will explore the Caesar …

Elizabeth Busch 6-89-12 Computer ScienceMathematics
CybersecurityGenCybermicro:bit

Cybersecurity - Hello!

The lesson is an overview of the 6 pillars of cybersecurity using the hand model as a mnemonic device.

Tina Simpson 6-89-12 Computer Science
CybersecurityGenCyber

Cybersecurity: Denial of Service Attack

In this fun lesson plan, students will model one type of attack (a denial-of-service attack) and figure out how to …

Jumoke Adebimpe 9-12 Computer Science
CybersecurityGenCyber

Denial of Service Attack

Students will model one type of attack (a denial-of-service attack) and figure out how to protect the network against it …

Jumoke Adebimpe 9-12 CybersecurityScienceTechnology
CybersecurityGenCyber

Egg Drop Experiment using Microbit

Students will investigate and design an experiment that explores Newton’s 2nd Law, momentum and impulse using a …

Samantha Schwessinger 9-12 Computer ScienceEngineeringMathematics +2
micro:bit

ELA9: Identifying Point of View using Cyber Security

Analysis of the Unreliable Narrator with Cyber Security

Andrew Disney 9-12 Computer ScienceReading/Language Arts
CybersecurityGenCyber

Ethics in Technology

Examination of ethical concerns revolving around technology, specifically social media and technology giants like Google

Jamie Le Jambre 6-89-12 Computer ScienceSocial StudiesTechnology
Data Collection

Exploring Outputs with an RGB Light Strip

In this lesson you will be introducing the connection of color with computer science through the use of a micro:bit and …

Laramie McCullough 6-89-12 ArtComputer ScienceEngineering +1
micro:bit

Exploring Potential and Kinetic Energy by Using Hot Wheels and Micro:bits

Students will be exploring potential and kinetic energy (how mass and velocity changes KE, when does an object have the …

Noel Davis 6-89-12 Computer ScienceScienceTechnology
Code.orgData Collectionmicro:bit

Exploring the importance of Cyber Security and how it relates to Agriculture Technologies - Part 1

Students will understand the importance of cybersecurity in agricultural technologies. Students will explore the …

Jessica Pastran 9-12 CybersecurityScience
CybersecurityGenCyber

Exploring the importance of Cyber Security and how it relates to Agriculture Technologies - Part 2

Students will understand the importance of cybersecurity in agricultural technologies. Students will explore the …

Jessica Pastran 9-12 CybersecurityScience
CybersecurityGenCyber

For Loops

Designed for students learning Java programming, that are beyond the use of block code, the students will make a program …

Selena Pope 9-12 Computer ScienceMathematics

For Loops

Designed for students learning Java programming, that are beyond the use of block code, the students will make a program …

Selena Pope 9-12 Computer Science

Half Life Radioactive Decay with Micro:bits

Introduce basic programming of the micro:bit while reiterating the integration of math in physical science exploring …

Clint Chandler 9-12 Computer ScienceMathematicsScience
micro:bit

Honesty and Integrity

Honesty and Integrity are valuable and necessary skills to flourish in various environments, including higher education, …

Stephen Callum 9-12 CybersecuritySocial Studies
CybersecurityGenCyber

How safe are they?

Each group will be provided a different scenario regarding cyber security. After analyzing the scenario, they will need …

Brian Axon 9-12 CybersecurityReading/Language Arts
CybersecurityGenCyber

How safe are we? ¿Qué salvo estamos?

I am planning to work with Spanish speaking students and parents after school,using your resources show them what to …

Emilia Figueroa 9-12 CybersecurityWorld Languages
CybersecurityGenCybermicro:bit

Implementing a Counter into Java

Activity Overview: This activity is for more advanced students in the Java Programming language. They will use their own …

Selena Pope 9-12 Computer ScienceMathematics
Robotics

Intro to Cybersecurity HAND Concepts Part 2

This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general …

Ashley Gecewicz 9-12 Computer ScienceScienceTechnology
CybersecurityGenCybermicro:bit

Introduction to Cybersecurity Hand Concepts

This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general …

Ashley Gecewicz 9-12 Computer ScienceMathematicsReading/Language Arts +2
CybersecurityGenCyber

Keep Your Lips Sealed

There are multiple ways to gain information. Many people will openly provide information with minimal thought to how the …

Holley Nichols 9-12 Computer ScienceEngineeringTechnology
CybersecurityData CollectionGenCyber

Lesson 8: How does a cup’s surface affect how light warms up a liquid inside the cup?

This is modified from OpenSciEd under the Creative Common 4.0 License. We carry out an investigation to test the …

Abby Slavens 6-89-12 Computer ScienceScienceTechnology
Data Collectionmicro:bit

Life Sciences Through micro:bits

Students will participate in a discussion post regarding confidentiality on Canvas. “What do you think confidentiality …

Sebastian Herrera 9-12 CybersecurityScience
CybersecurityData CollectionGenCybermicro:bit

Micro bit Block Programming - 'Customizing Displays'

This lesson focuses on the LED array and how to customize graphics plus LED intensity. Students will program in Block …

Rosetter E. Dirden 9-12 Computer ScienceTechnology
micro:bit

Micro Bit Block Programming: 'Hello World'

This lesson introduces the basic components of the microbit, a beginners program, and teaches how to download a program …

Rosetter E. Dirden 9-12 Computer ScienceTechnology
micro:bit

Micro:bits: Sequencing

The students will use Micro:bit blocks to create the image of snow when shaken. This will be done with sequences, …

Ryan Olson 6-89-12 Computer Science
micro:bit

Morphology through Cyber Security

Students will identify and define words utilizing basic tenets of cyber security.

Andrew Disney 9-12 CybersecurityReading/Language Arts
CybersecurityGenCyber

Nature of Science & Life Science / micro:bits

Students will participate in a discussion post regarding confidentiality on Canvas. “What do you think confidentiality …

Sebastian Herrera 9-12 CybersecurityScience
CybersecurityData CollectionGenCybermicro:bit

Nested Loops

This lesson is for more advanced students wanting to code a Python program that uses nested loops. This is not block …

Selena Pope 9-12 Computer Science

Nested Loops - Inner and Outer

This lesson is for more advanced students wanting to code a Python program that uses nested loops. This is not block …

Selena Pope 9-12 Computer Science

Nursery Rhymes and Microbits

This lesson uses familiar nursery rhymes to introduce secondary students to the concepts of coding, sequencing, and …

Maggie Unterseher 9-12 Computer ScienceLibrary MediaReading/Language Arts
micro:bit

Nursery Rhymes and Microbits Pt. 2

This lesson uses familiar nursery rhymes to introduce secondary students to the concepts of coding, sequencing, and …

Maggie Unterseher 9-12 Computer ScienceReading/Language Arts
micro:bit

Nursery Rhymes and Microbits Pt. 3

This will be the end of this mini unit, students will present to their classmates the nursery rhyme that they have coded …

Maggie Unterseher 9-12 Computer ScienceLibrary MediaReading/Language Arts
micro:bit

Representing Information

This lesson introduces the concept of sending bits of information from one place to another.

James Winn 9-12 Computer ScienceTechnology
Data CollectionProject-Basedmicro:bit

Secrets Told!

Kids love to talk in code so parents and teachers can't figure out what they are saying. Enter the world of emojis and …

Holley Nichols 9-12 Computer ScienceEngineeringTechnology
CybersecurityGenCyber

Secure Your Future. Cyber Security Safety.

Students will be provided a scenario. In this scenario, a student is applying to a college. They have created an …

Brian Axon 9-12 CybersecurityReading/Language Arts
CybersecurityGenCyber

Student Choice Mission

In this final project for the course, students team to Independently, scope the features of a piece of software,or …

James Cunningham 9-12 Computer ScienceEngineeringTechnology

Students own lesson plans about the definition of concepts of authenticity, threats, hackers and security measures in computer systems and the internet.

Students will make their own videos and demonstrate how they are able to describe threats to modern digital computer …

Emilia Figueroa 9-12 CybersecurityWorld Languages
CybersecurityGenCyber

Talk to the Hand

This is practicing lesson plan for Thinking like an Adversary and the Availability.

Everett Fleming 9-12 CybersecurityMathematics
CybersecurityData CollectionGenCyber

TALK TO THE HAND – DEFENSE IN DEPTH

Defense in depth is a strategy that leverages multiple security measures to protect an organization's assets. The …

Lorraine Grice 9-12 CybersecurityTechnology
CybersecurityGenCybermicro:bit

TALK TO THE HAND – THINK LIKE AN ADVERSARY

In this lesson, future CyberSecurity specialists (aka students) will develop a CyberSecurity handbook where they will …

Lorraine Grice 9-12 CybersecurityTechnology
CybersecurityGenCybermicro:bit

The HANDbook

Implementing effective cybersecurity measures is particularly challenging today because there are more devices than …

Everett Fleming 9-12 CybersecurityMathematics
CybersecurityGenCyber

There Was An Old Lady....in Sequence and Loops

This lesson uses the familiar nursery rhyme and song 'There Was An Old Lady Who Swallowed a Fly' to introduce primary …

Michelle Ottoes K-23-56-89-12 Computer ScienceReading/Language Arts
Robotics

They're Listening

This lesson is going to be about discussing internet safety, and how simple home items may be listening.

David Fonseca 9-12 CybersecurityReading/Language Arts
CybersecurityGenCyber

Think Like a Hacker

Students will pretend they are in charge of cybersecurity for a app. Their job it to retain users and increase the …

Adrienne Unertl 3-56-89-12 Computer ScienceTechnology
Cybersecurity

Thinking Cyber

I intend to use the idea of Cyber Security to introduce safe processes when preparing for my class, I do a break-up DBQ …

Jerry Updike 9-12 Computer ScienceReading/Language ArtsSocial Studies
CybersecurityData CollectionGenCybermicro:bit

Understanding Pseudocode

In this lesson, students explore the methods of writing pseudocode to complex problems. Writing pseudocode is a great …

Laramie McCullough 6-89-12 Computer ScienceTechnology

Using AI As A Tool

Students will learn about the potential of AI as a tool and how it can be used to enhance various tasks.

Stephen Callum 9-12 CybersecuritySocial Studies
CybersecurityGenCyber

Using Microbits to help Students to Visualize the Stages of Mitosis

Using Microbits to help students visualize the stages of Mitosis lesson can be used after the concept of Mitosis has …

Samantha Schwessinger 9-12 Science
micro:bit

Using Microbits to measure conductivity of metallic, ionic and covalent bonds.

• Observe the conductivity strength between different types of bonds, metallic, ionic and covalent. • …

Samantha Schwessinger 9-12 Computer ScienceReading/Language ArtsScience
micro:bit