9-12 Computing Lesson Plans
Computing-integrated lesson plans for 9th through 12th grade. High school activities aligned to CSTA, NGSS, CCSS, and ISTE standards.
88 lessons found.
"So, you want to work for the DNI"
This is an introduction to the CyberSecurity aspect of National Intelligence
3D printing tracking and behind the scences
The learner will be given a demonstration on how to design a 3D model such as a keychain in the free autoCAD software …
Adding Click-Based Interaction (CodeHS Lesson: 4.1)
In this lesson, students will create VR worlds that allow the user to animate objects interacting with them using a …
AI and Ethics: A Mini-Unit for High School Lesson Set One
This is the first set of three lessons in a six-lesson mini unit on the basics of how artificial intelligence/machine …
AI and Ethics: A Mini-Unit for High School Lesson Set Two
This is the second set of three lessons in a six-lesson mini unit on the basics of how artificial intelligence/machine …
Algorithmic Bias & AI Ethics
In this activity students will learn about algorithmic bias through real-world examples. They will then learn the four …
Bake Sale Lesson 2
Students will analyze their data from the survey they conducted, find ways to represent the data, make suggestions about …
Bake Sale Lesson1
This is the first day of a two-part lesson in entrepreneurship marketing research. In the overall project, Bake Sale, …
Careers in the Cyber World
This lesson is a brief overview of the 6 pillars of cybersecurity and the of careers that are available for students …
Cats or Dogs: Intro to Supervised Machine Learning
In this lesson, students will learn what supervised machine learning is and how it operates. Students will then work …
Collaborative Grid Poster
The instructor will ask the students to decode a message from binary. The instructor will then explain to students the …
Configure godot_rl
Student will install prerequisites such as pip, python-is-python3 etc. Will follow instructions I have given them and …
CRAFT PD Series — Unlocking AI & IoT for K-12 STEM
A three-session professional development series using the CRAFT pedagogical cycle. Co-hosted by the UCF DRACO Lab and …
Critical Infrastructure 1
Students will be able to explain what Critical Infrastructure is, what are common components that belong to critical …
Critical Infrastructure 2
Students will be able to demonstrate foundational knowledge and skills that are related to cybersecurity
Cryptology
This lesson will help students to understand cryptology. Students will use problem solving skills to encrypt and …
Cryptology with micro:bits
This activity will introduce the Caesar Cipher to students on makecode.micro:bit.org. Students will explore the Caesar …
Cybersecurity - Hello!
The lesson is an overview of the 6 pillars of cybersecurity using the hand model as a mnemonic device.
Data Science - Project
This lesson serves as a final project for my Data Science unit. Students will ask a question, write a hypothesis, …
Denial of Service Attack
Students will model one type of attack (a denial-of-service attack) and figure out how to protect the network against it …
Egg Drop Experiment using Microbit
Students will investigate and design an experiment that explores Newton’s 2nd Law, momentum and impulse using a …
ELA9: Identifying Point of View using Cyber Security
Analysis of the Unreliable Narrator with Cyber Security
Ethics in Technology
Examination of ethical concerns revolving around technology, specifically social media and technology giants like Google
Exploring Outputs with an RGB Light Strip
In this lesson you will be introducing the connection of color with computer science through the use of a micro:bit and …
Exploring Potential and Kinetic Energy by Using Hot Wheels and Micro:bits
Students will be exploring potential and kinetic energy (how mass and velocity changes KE, when does an object have the …
Exploring the importance of Cyber Security and how it relates to Agriculture Technologies - Part 1
Students will understand the importance of cybersecurity in agricultural technologies. Students will explore the …
Exploring the importance of Cyber Security and how it relates to Agriculture Technologies - Part 2
Students will understand the importance of cybersecurity in agricultural technologies. Students will explore the …
Finite State Machine
Students activity starts with choosing a 2 - 3 state simulation by using an object (EX: TV, car, etc) or process within …
For Loops
Designed for students learning Java programming, that are beyond the use of block code, the students will make a program …
Frankenstein in the world of virtual reality
This lesson will introduce the students to Computer Science and its applications in the Language Arts Classroom. …
Frankenstein in the world of virtual reality (continued)
This lesson will continue our look into the Computer Science field. Students will learn about the dangers of cyber …
Geometric planter : find volume
The purpose for this geometry lesson is integrated with computer science 3 D printing so students know what is Tinkercad …
Getting Results 1 print at a time
Students will use Tinkercad to make a basic key chain with their own name on it. They will export the STL file to get …
Godot RL Agents Activity
In this section, you will learn how to create a custom environment in the Godot Game Engine and then implement an AI …
Half Life Radioactive Decay with Micro:bits
Introduce basic programming of the micro:bit while reiterating the integration of math in physical science exploring …
Honesty and Integrity
Honesty and Integrity are valuable and necessary skills to flourish in various environments, including higher education, …
How safe are they?
Each group will be provided a different scenario regarding cyber security. After analyzing the scenario, they will need …
How safe are we? ¿Qué salvo estamos?
I am planning to work with Spanish speaking students and parents after school,using your resources show them what to …
Implementing a Counter into Java
Activity Overview: This activity is for more advanced students in the Java Programming language. They will use their own …
Intro to HTML
This lesson introduces many new concepts and tools to students. They are introduced to HTML, the Web Lab tool, and how …
Intro to machine learning
Students will train ML models to recognize images in code.org and will understand ML concepts.
Introduction to A-Frame
This lesson would be targeted as a challenge to students that have completed HTML lessons and the ability to work …
Introduction to Cybersecurity Hand Concepts
This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general …
Keep Your Lips Sealed
There are multiple ways to gain information. Many people will openly provide information with minimal thought to how the …
Lab 10.1 - Slicing Lists
This is a lesson designed to teach students to slice data from a list.
Lesson 1/ activity: Geometric planter find total surface area
The purpose for this geometry lesson is integrated with computer science 3 D printing so students know what is 3 D …
Lesson 8: How does a cup’s surface affect how light warms up a liquid inside the cup?
This is modified from OpenSciEd under the Creative Common 4.0 License. We carry out an investigation to test the …
Make.code for the Musical
Students were gearing up for a second semester project in design for the spring musical. This was a collaborative …
Micro bit Block Programming - 'Customizing Displays'
This lesson focuses on the LED array and how to customize graphics plus LED intensity. Students will program in Block …
Micro Bit Block Programming: 'Hello World'
This lesson introduces the basic components of the microbit, a beginners program, and teaches how to download a program …
Micro:bits: Sequencing
The students will use Micro:bit blocks to create the image of snow when shaken. This will be done with sequences, …
ML Learning
In this lesson students are introduced to a form of artificial intelligence called machine learning and how they can use …
Morphology through Cyber Security
Students will identify and define words utilizing basic tenets of cyber security.
Nature of Science & Life Science / micro:bits
Students will participate in a discussion post regarding confidentiality on Canvas. “What do you think confidentiality …
Nested Loops
This lesson is for more advanced students wanting to code a Python program that uses nested loops. This is not block …
Nested Loops - Inner and Outer
This lesson is for more advanced students wanting to code a Python program that uses nested loops. This is not block …
Nursery Rhymes and Microbits
This lesson uses familiar nursery rhymes to introduce secondary students to the concepts of coding, sequencing, and …
Nursery Rhymes and Microbits Pt. 2
This lesson uses familiar nursery rhymes to introduce secondary students to the concepts of coding, sequencing, and …
Nursery Rhymes and Microbits Pt. 3
This will be the end of this mini unit, students will present to their classmates the nursery rhyme that they have coded …
Plotting Data in Python using Matplotlib
CSV files can be read using pandas read_csv method. Using this method you can easily use the dataframes created to plot …
Representing Information
This lesson introduces the concept of sending bits of information from one place to another.
Secrets Told!
Kids love to talk in code so parents and teachers can't figure out what they are saying. Enter the world of emojis and …
Secure Your Future. Cyber Security Safety.
Students will be provided a scenario. In this scenario, a student is applying to a college. They have created an …
Sensory Classroom
Students, in small groups, collaborate to design one thing that would turn the classroom into a sensory classroom. …
Side Channel Attack
Students will use their example from Lesson 1 to figure out what is the side channel element of their choice (design a …
Student Choice in the Classroom Utilizing AI, Virtual Learning and Digital Tools
in person, learning taking place in a brick and mortar classroom. Students have the choice whether to dissect a frog …
Student Choice Mission
In this final project for the course, students team to Independently, scope the features of a piece of software,or …
Students own lesson plans about the definition of concepts of authenticity, threats, hackers and security measures in computer systems and the internet.
Students will make their own videos and demonstrate how they are able to describe threats to modern digital computer …
Talk to the Hand
This is practicing lesson plan for Thinking like an Adversary and the Availability.
TALK TO THE HAND – DEFENSE IN DEPTH
Defense in depth is a strategy that leverages multiple security measures to protect an organization's assets. The …
TALK TO THE HAND – THINK LIKE AN ADVERSARY
In this lesson, future CyberSecurity specialists (aka students) will develop a CyberSecurity handbook where they will …
The HANDbook
Implementing effective cybersecurity measures is particularly challenging today because there are more devices than …
There Was An Old Lady....in Sequence and Loops
This lesson uses the familiar nursery rhyme and song 'There Was An Old Lady Who Swallowed a Fly' to introduce primary …
They're Listening
This lesson is going to be about discussing internet safety, and how simple home items may be listening.
Think Like a Hacker
Students will pretend they are in charge of cybersecurity for a app. Their job it to retain users and increase the …
Thinking Cyber
I intend to use the idea of Cyber Security to introduce safe processes when preparing for my class, I do a break-up DBQ …
Understanding Pseudocode
In this lesson, students explore the methods of writing pseudocode to complex problems. Writing pseudocode is a great …
Using AI As A Tool
Students will learn about the potential of AI as a tool and how it can be used to enhance various tasks.
Using Microbits to help Students to Visualize the Stages of Mitosis
Using Microbits to help students visualize the stages of Mitosis lesson can be used after the concept of Mitosis has …
Using Microbits to measure conductivity of metallic, ionic and covalent bonds.
• Observe the conductivity strength between different types of bonds, metallic, ionic and covalent. • …
What is Python: Hands On
In this part 2 lesson, you will no get to see, modify, and create your own code! Think you can write the code to say …
What is Python?
Python is a highly versatile programming language. It can be used in many application to teach real world skills in …
What is Python?
Welcome to coding! In this lesson, you will be given an introduction to Python, a High Level coding language.
Working with Bytes
This assignment is part of a unit designed to help students understand the different types of data that are used in …
Workshop 1: Using AI for STEM — Lessons & More
Turn LLMs into your STEM curriculum co-pilot through hands-on prompt engineering across ChatGPT, Claude, and Gemini.
Workshop 2: Verifying STEM AI Outputs
The Check the Machine protocol and error-hunting skills for AI-generated code and STEM content.
Workshop 3: Programming Edge/IoT Systems with AI
BBC micro:bit in the MakeCode simulator + LLM-assisted coding — build a two-node IoT system without any hardware.
Writing CSV files in Python
Students will design a flight path for a programmable drone and collect the data from the drone such as altitude, motor …