9-12 Computing Lesson Plans

Computing-integrated lesson plans for 9th through 12th grade. High school activities aligned to CSTA, NGSS, CCSS, and ISTE standards.

88 lessons found.

"So, you want to work for the DNI"

This is an introduction to the CyberSecurity aspect of National Intelligence

Jerry Updike 9-12 Computer ScienceSocial Studies
CybersecurityData CollectionGenCyberRoboticsmicro:bit

3D printing tracking and behind the scences

The learner will be given a demonstration on how to design a 3D model such as a keychain in the free autoCAD software …

Aric Hanusa 9-12 Computer ScienceMathematicsScience
Data CollectionWySTACK

Adding Click-Based Interaction (CodeHS Lesson: 4.1)

In this lesson, students will create VR worlds that allow the user to animate objects interacting with them using a …

Stephanie May 6-89-12 Computer Science
WySTACK

AI and Ethics: A Mini-Unit for High School Lesson Set One

This is the first set of three lessons in a six-lesson mini unit on the basics of how artificial intelligence/machine …

Sarah Horen 9-12 Computer Science
Data CollectionProject-BasedWySTACK

AI and Ethics: A Mini-Unit for High School Lesson Set Two

This is the second set of three lessons in a six-lesson mini unit on the basics of how artificial intelligence/machine …

Sarah Horen 9-12 Computer Science
WySTACK

Algorithmic Bias & AI Ethics

In this activity students will learn about algorithmic bias through real-world examples. They will then learn the four …

Sarah Horen 6-89-12 Computer ScienceScience
Data CollectionWySTACK

Bake Sale Lesson 2

Students will analyze their data from the survey they conducted, find ways to represent the data, make suggestions about …

Nate Reinhardt 9-12 Career and Technical EducationComputer Science
Data Collection

Bake Sale Lesson1

This is the first day of a two-part lesson in entrepreneurship marketing research. In the overall project, Bake Sale, …

Nate Reinhardt 9-12 Career and Technical EducationComputer Science
Data CollectionUnplugged

Careers in the Cyber World

This lesson is a brief overview of the 6 pillars of cybersecurity and the of careers that are available for students …

Tina Simpson 9-12 Career and Technical EducationComputer Science
CybersecurityGenCyber

Cats or Dogs: Intro to Supervised Machine Learning

In this lesson, students will learn what supervised machine learning is and how it operates. Students will then work …

Sarah Horen 6-89-12 Computer ScienceScience
Data CollectionProject-BasedWySTACK

Collaborative Grid Poster

The instructor will ask the students to decode a message from binary. The instructor will then explain to students the …

Mackenzie Wiginton 9-12 ArtComputer Science
Data Collection

Configure godot_rl

Student will install prerequisites such as pip, python-is-python3 etc. Will follow instructions I have given them and …

Jesse Smith 9-12 Computer ScienceScience
Game-BasedWySTACK

CRAFT PD Series — Unlocking AI & IoT for K-12 STEM

A three-session professional development series using the CRAFT pedagogical cycle. Co-hosted by the UCF DRACO Lab and …

K-23-56-89-12 Computer ScienceScienceEngineering +1
AIIoTmicro:bitprompt-engineeringCRAFTWySTACK

Critical Infrastructure 1

Students will be able to explain what Critical Infrastructure is, what are common components that belong to critical …

Timothy Grier 9-12 Science
CybersecurityGenCybermicro:bit

Critical Infrastructure 2

Students will be able to demonstrate foundational knowledge and skills that are related to cybersecurity

Timothy Grier 9-12 Computer ScienceScienceSocial Studies
CybersecurityGenCybermicro:bit

Cryptology

This lesson will help students to understand cryptology. Students will use problem solving skills to encrypt and …

Elizabeth Busch 6-89-12 Computer ScienceMathematics
CybersecurityGenCyberWeb Design

Cryptology with micro:bits

This activity will introduce the Caesar Cipher to students on makecode.micro:bit.org. Students will explore the Caesar …

Elizabeth Busch 6-89-12 Computer ScienceMathematics
CybersecurityGenCybermicro:bit

Cybersecurity - Hello!

The lesson is an overview of the 6 pillars of cybersecurity using the hand model as a mnemonic device.

Tina Simpson 6-89-12 Computer Science
CybersecurityGenCyber

Data Science - Project

This lesson serves as a final project for my Data Science unit. Students will ask a question, write a hypothesis, …

Clint Elliott 6-89-12 Computer Science
Data CollectionWySTACK

Denial of Service Attack

Students will model one type of attack (a denial-of-service attack) and figure out how to protect the network against it …

Jumoke Adebimpe 9-12 ScienceComputer Science
CybersecurityGenCyber

Egg Drop Experiment using Microbit

Students will investigate and design an experiment that explores Newton’s 2nd Law, momentum and impulse using a …

Samantha Schwessinger 9-12 Computer ScienceScienceMathematics
micro:bit

ELA9: Identifying Point of View using Cyber Security

Analysis of the Unreliable Narrator with Cyber Security

Andrew Disney 9-12 Computer ScienceReading/Language Arts
CybersecurityGenCyber

Ethics in Technology

Examination of ethical concerns revolving around technology, specifically social media and technology giants like Google

Jamie Le Jambre 6-89-12 Computer ScienceSocial Studies
Data Collection

Exploring Outputs with an RGB Light Strip

In this lesson you will be introducing the connection of color with computer science through the use of a micro:bit and …

Laramie McCullough 6-89-12 ArtComputer ScienceScience
micro:bit

Exploring Potential and Kinetic Energy by Using Hot Wheels and Micro:bits

Students will be exploring potential and kinetic energy (how mass and velocity changes KE, when does an object have the …

Noel Davis 6-89-12 Computer ScienceScience
Code.orgData Collectionmicro:bit

Exploring the importance of Cyber Security and how it relates to Agriculture Technologies - Part 1

Students will understand the importance of cybersecurity in agricultural technologies. Students will explore the …

Jessica Pastran 9-12 Science
CybersecurityGenCyber

Exploring the importance of Cyber Security and how it relates to Agriculture Technologies - Part 2

Students will understand the importance of cybersecurity in agricultural technologies. Students will explore the …

Jessica Pastran 9-12 Science
CybersecurityGenCyber

Finite State Machine

Students activity starts with choosing a 2 - 3 state simulation by using an object (EX: TV, car, etc) or process within …

Dana Theriot 9-12 Computer Science
Data CollectionWySTACK

For Loops

Designed for students learning Java programming, that are beyond the use of block code, the students will make a program …

Selena Pope 9-12 Computer Science

Frankenstein in the world of virtual reality

This lesson will introduce the students to Computer Science and its applications in the Language Arts Classroom. …

Yvonne Swader 9-12 Computer ScienceReading/Language Arts
WySTACK

Frankenstein in the world of virtual reality (continued)

This lesson will continue our look into the Computer Science field. Students will learn about the dangers of cyber …

Yvonne Swader 9-12 Computer ScienceReading/Language Arts
CybersecurityWySTACK

Geometric planter : find volume

The purpose for this geometry lesson is integrated with computer science 3 D printing so students know what is Tinkercad …

Yung Richards 6-89-12 Computer ScienceMathematics
UnpluggedWySTACK

Getting Results 1 print at a time

Students will use Tinkercad to make a basic key chain with their own name on it. They will export the STL file to get …

Bryce Cushman 6-89-12 Computer ScienceScience
Data CollectionWySTACK

Godot RL Agents Activity

In this section, you will learn how to create a custom environment in the Godot Game Engine and then implement an AI …

Jesse Smith 9-12 Computer ScienceMathematicsScience
Game-BasedWySTACK

Half Life Radioactive Decay with Micro:bits

Introduce basic programming of the micro:bit while reiterating the integration of math in physical science exploring …

Clint Chandler 9-12 Computer ScienceMathematicsScience
micro:bit

Honesty and Integrity

Honesty and Integrity are valuable and necessary skills to flourish in various environments, including higher education, …

Stephen Callum 9-12 Social Studies
CybersecurityGenCyber

How safe are they?

Each group will be provided a different scenario regarding cyber security. After analyzing the scenario, they will need …

Brian Axon 9-12 Reading/Language Arts
CybersecurityGenCyber

How safe are we? ¿Qué salvo estamos?

I am planning to work with Spanish speaking students and parents after school,using your resources show them what to …

Emilia Figueroa 9-12 World Languages
CybersecurityGenCybermicro:bit

Implementing a Counter into Java

Activity Overview: This activity is for more advanced students in the Java Programming language. They will use their own …

Selena Pope 9-12 Computer ScienceMathematics
Robotics

Intro to HTML

This lesson introduces many new concepts and tools to students. They are introduced to HTML, the Web Lab tool, and how …

Camille Conner 9-12 Computer Science
Code.orgWeb DesignWySTACK

Intro to machine learning

Students will train ML models to recognize images in code.org and will understand ML concepts.

Jesse Smith 9-12 Computer ScienceScience
Code.orgWySTACK

Introduction to A-Frame

This lesson would be targeted as a challenge to students that have completed HTML lessons and the ability to work …

Skye Mader 6-89-12 Computer Science
Web DesignWySTACK

Introduction to Cybersecurity Hand Concepts

This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general …

Ashley Gecewicz 9-12 Computer ScienceMathematicsReading/Language Arts +1
CybersecurityGenCyber

Keep Your Lips Sealed

There are multiple ways to gain information. Many people will openly provide information with minimal thought to how the …

Holley Nichols 9-12 Computer ScienceScience
CybersecurityData CollectionGenCyber

Lab 10.1 - Slicing Lists

This is a lesson designed to teach students to slice data from a list.

John Lupher 9-12 Computer Science
WySTACK

Lesson 1/ activity: Geometric planter find total surface area

The purpose for this geometry lesson is integrated with computer science 3 D printing so students know what is 3 D …

Yung Richards 6-89-12 Computer ScienceMathematics
UnpluggedWySTACK

Lesson 8: How does a cup’s surface affect how light warms up a liquid inside the cup?

This is modified from OpenSciEd under the Creative Common 4.0 License. We carry out an investigation to test the …

Abby Slavens 6-89-12 Computer ScienceScience
Data Collectionmicro:bit

Make.code for the Musical

Students were gearing up for a second semester project in design for the spring musical. This was a collaborative …

Samantha J Smith 9-12 Computer ScienceScienceArt
WySTACKmicro:bit

Micro bit Block Programming - 'Customizing Displays'

This lesson focuses on the LED array and how to customize graphics plus LED intensity. Students will program in Block …

Rosetter E. Dirden 9-12 Computer Science
micro:bit

Micro Bit Block Programming: 'Hello World'

This lesson introduces the basic components of the microbit, a beginners program, and teaches how to download a program …

Rosetter E. Dirden 9-12 Computer Science
micro:bit

Micro:bits: Sequencing

The students will use Micro:bit blocks to create the image of snow when shaken. This will be done with sequences, …

Ryan Olson 6-89-12 Computer Science
micro:bit

ML Learning

In this lesson students are introduced to a form of artificial intelligence called machine learning and how they can use …

Jesse Smith 9-12 Computer ScienceMathematicsScience
Code.orgRoboticsWySTACK

Morphology through Cyber Security

Students will identify and define words utilizing basic tenets of cyber security.

Andrew Disney 9-12 Reading/Language Arts
CybersecurityGenCyber

Nature of Science & Life Science / micro:bits

Students will participate in a discussion post regarding confidentiality on Canvas. “What do you think confidentiality …

Sebastian Herrera 9-12 Science
CybersecurityData CollectionGenCybermicro:bit

Nested Loops

This lesson is for more advanced students wanting to code a Python program that uses nested loops. This is not block …

Selena Pope 9-12 Computer Science

Nested Loops - Inner and Outer

This lesson is for more advanced students wanting to code a Python program that uses nested loops. This is not block …

Selena Pope 9-12 Computer Science

Nursery Rhymes and Microbits

This lesson uses familiar nursery rhymes to introduce secondary students to the concepts of coding, sequencing, and …

Maggie Unterseher 9-12 Computer ScienceLibrary MediaReading/Language Arts
micro:bit

Nursery Rhymes and Microbits Pt. 2

This lesson uses familiar nursery rhymes to introduce secondary students to the concepts of coding, sequencing, and …

Maggie Unterseher 9-12 Computer ScienceReading/Language Arts
micro:bit

Nursery Rhymes and Microbits Pt. 3

This will be the end of this mini unit, students will present to their classmates the nursery rhyme that they have coded …

Maggie Unterseher 9-12 Computer ScienceLibrary MediaReading/Language Arts
micro:bit

Plotting Data in Python using Matplotlib

CSV files can be read using pandas read_csv method. Using this method you can easily use the dataframes created to plot …

John Lupher 9-12 Computer ScienceMathematicsScience
Data CollectionWySTACK

Representing Information

This lesson introduces the concept of sending bits of information from one place to another.

James Winn 9-12 Computer Science
Data CollectionProject-Basedmicro:bit

Secrets Told!

Kids love to talk in code so parents and teachers can't figure out what they are saying. Enter the world of emojis and …

Holley Nichols 9-12 Computer ScienceScience
CybersecurityGenCyber

Secure Your Future. Cyber Security Safety.

Students will be provided a scenario. In this scenario, a student is applying to a college. They have created an …

Brian Axon 9-12 Reading/Language Arts
CybersecurityGenCyber

Sensory Classroom

Students, in small groups, collaborate to design one thing that would turn the classroom into a sensory classroom. …

Samantha Joyce Smith 9-12 Computer ScienceScienceArt
ScratchWySTACKmicro:bit

Side Channel Attack

Students will use their example from Lesson 1 to figure out what is the side channel element of their choice (design a …

Dana Theriot 9-12 Computer Science
Data CollectionWySTACK

Student Choice in the Classroom Utilizing AI, Virtual Learning and Digital Tools

in person, learning taking place in a brick and mortar classroom. Students have the choice whether to dissect a frog …

Alicia Vonberg 6-89-12 Science
WySTACK

Student Choice Mission

In this final project for the course, students team to Independently, scope the features of a piece of software,or …

James Cunningham 9-12 Computer ScienceScience

Students own lesson plans about the definition of concepts of authenticity, threats, hackers and security measures in computer systems and the internet.

Students will make their own videos and demonstrate how they are able to describe threats to modern digital computer …

Emilia Figueroa 9-12 World Languages
CybersecurityGenCyber

Talk to the Hand

This is practicing lesson plan for Thinking like an Adversary and the Availability.

Everett Fleming 9-12 Mathematics
CybersecurityData CollectionGenCyber

TALK TO THE HAND – DEFENSE IN DEPTH

Defense in depth is a strategy that leverages multiple security measures to protect an organization's assets. The …

Lorraine Grice 9-12 Computer Science
CybersecurityGenCybermicro:bit

TALK TO THE HAND – THINK LIKE AN ADVERSARY

In this lesson, future CyberSecurity specialists (aka students) will develop a CyberSecurity handbook where they will …

Lorraine Grice 9-12 Computer Science
CybersecurityGenCybermicro:bit

The HANDbook

Implementing effective cybersecurity measures is particularly challenging today because there are more devices than …

Everett Fleming 9-12 Mathematics
CybersecurityGenCyber

There Was An Old Lady....in Sequence and Loops

This lesson uses the familiar nursery rhyme and song 'There Was An Old Lady Who Swallowed a Fly' to introduce primary …

Michelle Ottoes K-23-56-89-12 Computer ScienceReading/Language Arts
Robotics

They're Listening

This lesson is going to be about discussing internet safety, and how simple home items may be listening.

David Fonseca 9-12 Reading/Language Arts
CybersecurityGenCyber

Think Like a Hacker

Students will pretend they are in charge of cybersecurity for a app. Their job it to retain users and increase the …

Adrienne Unertl 3-56-89-12 Computer Science
Cybersecurity

Thinking Cyber

I intend to use the idea of Cyber Security to introduce safe processes when preparing for my class, I do a break-up DBQ …

Jerry Updike 9-12 Computer ScienceReading/Language ArtsSocial Studies
CybersecurityData CollectionGenCybermicro:bit

Understanding Pseudocode

In this lesson, students explore the methods of writing pseudocode to complex problems. Writing pseudocode is a great …

Laramie McCullough 6-89-12 Computer Science

Using AI As A Tool

Students will learn about the potential of AI as a tool and how it can be used to enhance various tasks.

Stephen Callum 9-12 Social Studies
CybersecurityGenCyber

Using Microbits to help Students to Visualize the Stages of Mitosis

Using Microbits to help students visualize the stages of Mitosis lesson can be used after the concept of Mitosis has …

Samantha Schwessinger 9-12 Science
micro:bit

Using Microbits to measure conductivity of metallic, ionic and covalent bonds.

• Observe the conductivity strength between different types of bonds, metallic, ionic and covalent. • …

Samantha Schwessinger 9-12 Computer ScienceReading/Language ArtsScience
micro:bit

What is Python: Hands On

In this part 2 lesson, you will no get to see, modify, and create your own code! Think you can write the code to say …

Ethan Highsmith 9-12 Computer Science
ScratchWySTACK

What is Python?

Python is a highly versatile programming language. It can be used in many application to teach real world skills in …

Camille Conner 9-12 Computer Science
WySTACK

What is Python?

Welcome to coding! In this lesson, you will be given an introduction to Python, a High Level coding language.

Ethan Highsmith 9-12 Computer Science
WySTACK

Working with Bytes

This assignment is part of a unit designed to help students understand the different types of data that are used in …

John Lupher 9-12 Computer Science
WySTACKmicro:bit

Workshop 1: Using AI for STEM — Lessons & More

Turn LLMs into your STEM curriculum co-pilot through hands-on prompt engineering across ChatGPT, Claude, and Gemini.

K-23-56-89-12 Computer ScienceScienceMathematics
AIprompt-engineeringCRAFTLLMWySTACK

Workshop 2: Verifying STEM AI Outputs

The Check the Machine protocol and error-hunting skills for AI-generated code and STEM content.

K-23-56-89-12 Computer ScienceScienceMathematics
AIverificationCRAFTCheck-the-Machinecritical-thinkingWySTACK

Workshop 3: Programming Edge/IoT Systems with AI

BBC micro:bit in the MakeCode simulator + LLM-assisted coding — build a two-node IoT system without any hardware.

K-23-56-89-12 Computer ScienceScienceEngineering
IoTmicro:bitCRAFTedge-computingMakeCodesimulatorMicroPythonradioWySTACK

Writing CSV files in Python

Students will design a flight path for a programmable drone and collect the data from the drone such as altitude, motor …

John Lupher 9-12 Computer Science
Data CollectionWySTACK