Reading/Language Arts
103 lessons found.
5 Senses
Students will learn about the 5 senses as a whole then learn about each individual sense and complete science activities …
Algorithm Neighborhoods
These interdisciplinary lessons encompass standards across Computer Science, Language Arts, Social Studies, and …
Algorithms Unplugged
students will be learning how to create an algorithm/sequence by giving set directions to their 'bot' (another student) …
Alphabetical Order
Using a Scratch Jr. activity, students will program different alphabet letter sprites to line up in alphabetical order. …
aMAZEing Margaret Hamilton
In this lesson students will begin by reading about Margaret Hamilton in 'Margaret and the Moon' by Dean Robbins. After …
Basic aspects of Cyber security and Copyrights
Students will be learning about the basic aspects of Cyber security. They will become aware of how to protect their …
Being Aware of What You Share
Kids share a lot of information whenever they go online -- sometimes on purpose, sometimes not. But do they understand …
Blind Maze - a lesson with combined classes K and 5
This is an unplugged activity where students will work in mixed grade level teams (Kindergarten and 5th grade) to guide …
Build Your Own Snowman
Student learners will build a snowman using a Google Slides template. They will click and drag snowman parts and …
Can you escape the maze?
Students will use two different maze websites throughout the lesson. They will use speaking and listening skills to exit …
Can You Keep a Secret?
Elementary students will be able to identify the meaning of "password". Students will explain reasons why a strong …
Coding a Story with Ozobots
In this lesson, the students will create their own story or use one that's already made, and draw out that story on a …
Coding through Stories
Reading is powerful, it can unlock a world of possibilities. Reading and having others read to us can increase our …
Communicating Through History: MicroBit Morse Code
Students will read articles and then construct a timeline of the progression of communication technology in the …
Computer Basics (Collaborative lesson with K and 5)
5th grade students will mentor kindergarten students in how to properly care for and navigate their personal computer. …
Computer Basics (Collaborative lesson with K and 5th)
Kindergarten students will be working with 5th grade students to learn about the proper care and use of their computers. …
Controlled Collaboration
Introduce your students to shared document norms while also identifying main ideas and text structures.
Controlled Collaboration
Introduce your students to shared document norms while practicing identifying main idea and key details.
Creating a Gear Amusement Park
Students will use peer collaboration, engineering, problem solving, & reflection, when given a set of Funny Gears & …
Creepy Carrots
Stem activity for 5-year olds. Students will work cooperatively to construct a structure using a variety of items.
Cybersecurity Training part II
How are devices that are not physically connected able to communicate? micro:bits will be used to help students …
Darn! I forgot my password...again!
Middle School Students love to share everything-including their water bottles, their sense of humor and even their …
Darn! I forgot my password...again!
Middle School Students love to share everything-including their water bottles, their sense of humor and even their …
Digital Citizenship Escape Room
Beginning of the year introduction to digital citizenship. Students work through escape room to perform tasks. The tasks …
Discover Digital Citizenship
Students will use a decoder to decode messages that lead to exploration of Digital Citizenship resources. They will then …
Do you want to build a robot
Students will learn about robots, how to program a microbit and create a microbit pet.
Dr. Suess Venn Diagram Activity using Google Slides
Create a Venn Diagram using Google Slides. The activity can be used for Dr. Seuss' birthday and incorporates moving Red …
ELA9: Identifying Point of View using Cyber Security
Analysis of the Unreliable Narrator with Cyber Security
ESP Problem Solving: A Problem Solving Model
This is an introductory lesson to the problem-solving process. The goal is for students to see that they, in a manner …
Exploration with Tetrix
Tetrix: In this lesson students will sort/ organize the school's Tetrix sets to ensure each set is complete. After …
Explore Block Programming with Free Scratch
Students are introduced to block programing for the first time and are given several sets of tasks to complete to show …
Factors and Hazards (Part One)
In this activity, students explore the three factors that affect weather: precipitation, temperature, and wind. Students …
Fundamentals of Cyber Safety
Students will listen to a short presentation about three of the six cybersecurity hand concepts. Students will then be …
GEMS and Algorithms
In this lesson students will engage in discussion about whether order matters. Students will write the steps to their …
Geocaching with Microbits
Geodynamics powers the Earth’s magnetic field, which is magnetic north. There is also a true north which is the Earth’s …
Geographic Information Systems: Introduction and Map Creation
This lesson introduces Geographic Information Systems (GIS) to students. We explore ways in which GIS impacts our …
Gesturing for Cybersecurity
Students will receive a demonstration and introduction to using a Mnemonic to help them understand and recall the areas …
Get to Know Me
Students will participate in a community building activity that will integrate Computer Science through the use of the …
Getting started with Micro:bit
Students will explore the functions of the MIcro: bit. Students have not had experience with this and I have very …
Getting to Know You, CPU
Students will be introduced to Micro:Bit technology and have the opportunity to program the Micro:Bit to share some …
Grid Coding
This activity focuses on creating a following an algorithm to solve a problem. Using a white shower curtain liner, draw …
How safe are they?
Each group will be provided a different scenario regarding cyber security. After analyzing the scenario, they will need …
I = Integrity
Students will locate, read and research articles from sources to better understand using credible sources for research.
Impacts of Computing
Students will begin the year of computer science by talking about how the people in their lives use different types of …
Intro to Coding a Microbit
In this lesson the students will be introduced to the website MakeCode with programing the microbit simulator. To start …
Intro To Coding a Microbit
Students will be introduced to block coding using the website makecode.org. They will code a virtual microbit by …
Intro to Problem Solving
This lesson is a fun introduction to the open-ended, collaborative, and creative problem solving students will be using …
Introducing our Technology
This lesson is designed to be delivered early in the year to establish a common knowledge base on the programs to be …
Introduction of Cybersecurity/ Confidentiality Availability
1. Test students' prior knowledge
Introduction to Computer Science and SpeedGeeking 101
Part 1: Gauge student understanding of computer science and introduce basic CS vocabulary. Part 2: Teach students about …
Introduction to Cybersecurity Hand Concepts
This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general …
Inventing & Problem Solving with the 3 R’s (Reduce/Reuse/Recycle)
Students will work collaboratively to respond to a text by using recycled materials to create an invention that will …
Kindergarten Bee-bot Letter identification/sounds Activity
In this lesson kindergarten students practice identifying and matching uppercase and lowercase letters along with given …
Library - Robotics for Students in the Functional Life Skills (FLS) Program
This lesson provides robotics opportunities in the library for students with complex needs in the Functional Life …
Magellan and Technology
Adapted from: Flocabulary.com 7/2020 “Become a Map-Maker and Explorer” Use this lesson plan to commemorate Magellan’s …
Making Books Come Alive!
Students will use an app of the teacher’s choosing (I prefer Voice Recorder with the red speech bubble) to record …
Malware: The Rat
With the increase in available technology and connectivity, cyber hackers are looking for vulnerable software to gather …
Micro:bits / Makerspace
The lesson is for coding with micro:bits. It is written broadly for implementation as an activity for a whole group of …
Micro:bits / Makerspace
The lesson is for coding with micro:bits. It is written broadly for implementation as an activity for a whole group of …
Microbit compass
THIS A DRAFT-Student will program a microbit that locate magnetic north, south, east and west. They will create …
Microbit programming
Creating a program for their microbit 'pets'. Their program must include noise, pictures and words/phrases
Mindstorms and Hidden Figures
Students will design a robot to orbit the moon in conjunction with their ELA class reading the book Hidden Figures.
Morphology through Cyber Security
Students will identify and define words utilizing basic tenets of cyber security.
Nature Art: Merging Nature, Algorithms, and Programming in an inclusive environment
This lesson is an introduction to computational thinking and the BBC micro:bit. Students learn how to create nature …
Nursery Rhymes and Microbits
This lesson uses familiar nursery rhymes to introduce secondary students to the concepts of coding, sequencing, and …
Nursery Rhymes and Microbits Pt. 2
This lesson uses familiar nursery rhymes to introduce secondary students to the concepts of coding, sequencing, and …
Nursery Rhymes and Microbits Pt. 3
This will be the end of this mini unit, students will present to their classmates the nursery rhyme that they have coded …
O' is for Outlaw
Students will by studying outlaws and law enforcement in Wyoming History. We will talk about how technology has changed …
O' is for Outlaw
Students will be studying Outlaws and Law Enforcement in Wyoming History. We will talk about how technology has changed …
Our Christmas Book
Students will create a page in a class book about their favorite part of Christmas using words and pictures. Students …
Powerful Passwords
This activity teaches students the importance of creating a safe and secure password. In addition, students will also …
Protect Your Passwords
This activity teaches students the importance of creating a safe and secure password. In addition, students will also …
Real World Cyber Security Historical Event
Cybersecurity and personal information protection go hand in hand. This is the second of a three lesson unit that offers …
Real World Cyber Security in the Present
Cybersecurity and personal information protection go hand in hand. This is the third of a three lesson unit offering 5th …
Real World Cybersecurity
Cybersecurity and personal information protection go hand in hand. This is the first of a three lesson unit that …
Retelling a Story with Scratch Jr.
This lesson allows students to retell the major aspects of a children's book using Scratch Jr. Using their background …
Scranimal Island (This lesson will span across the 3 lessons in the library.)
Students will listen to the poetry from the book Scranimals by Jack Prelutsky. Students will choose an animal and a …
Secure Your Future. Cyber Security Safety.
Students will be provided a scenario. In this scenario, a student is applying to a college. They have created an …
Sequencing = Storytelling
This lesson helps learners connect storytelling with simple coding through the study of the sequence of events. It …
Sequencing-Storytelling
This lesson, as adapted and written, is for middle school students in the library setting. Students will explore …
Sight Word Bowling
Students will draw a sight word card and then program either a kibo or bee bot to knock down the matching bowling pin.
Stormy Skies (Part Two)
This lesson continues with the next section of Mystery Science: Grade 3 Water Cycle & Phases of Matter: Local Weather …
Stormy Skies: Why are some places always hot?
In this lesson, students are introduced to the concept of “climate” and explore the world’s five major climates. In the …
Technology Compare and Contrast
Students will independently or collaboratively compare and contrast technology and how it has changed our lives and how …
Technology Compare and Contrast
Students will independently or collaboratively compare and contrast technology and how it has changed our lives and how …
Thanksgiving Day Parade
This lesson is a great one to do right before Thanksgiving. Students will read or listen to the book Balloons Over …
The Card Catalog: Computer of Yesteryear
This lesson will show students how computer coding is used to solve the problem of quickly accessing books using the …
The Problem with Plastics
3rd grade learns about Jacques Cousteau and his conservation efforts to clean up the ocean. Plastic waste has become a …
There Was An Old Lady....in Sequence and Loops
This lesson uses the familiar nursery rhyme and song 'There Was An Old Lady Who Swallowed a Fly' to introduce primary …
They're Listening
This lesson is going to be about discussing internet safety, and how simple home items may be listening.
Thinking Cyber
I intend to use the idea of Cyber Security to introduce safe processes when preparing for my class, I do a break-up DBQ …
Using Microbits to measure conductivity of metallic, ionic and covalent bonds.
• Observe the conductivity strength between different types of bonds, metallic, ionic and covalent. • …
Using Microbits to measure light level of sunlight for optimal plant growth
Students will investigate and design an experiment that explores the natural world using microprocessors. They will …
Virtual Pet
Students will create a virtual pet using micro:bits and then collect data for their pet as it interacts with its …
Volcano Animation
Students use flowcharts and repetition to explore building a volcanic eruption on a Micro:Bit.
Volcano interactions with Earth's Spheres
In this lesson students will use the microbit to develop volcanic eruptions.
Wax Museum Part 1
In this lesson series, students will research ways that technology has impacted the world. They can choose to research …
Wax Museum Technology Part 1
In this lesson series, students will research ways that technology has impacted the world. They can choose to research …
Weather Factors
In this activity, students explore the three factors that affect weather: precipitation, temperature, and wind. Students …
WHAT DOES TECHNOLOGY LOOK LIKE?
Students will brainstorm what technology is, what it looks like and the parts/functions of a computer.
What’s the Weather
Micro bit will project temp - students will graph the data accordingly Arduino will be set up as a weather station
Where do clouds come from?
Students will begin with background knowledge of reading materials about water and clouds. Students will then review …
Zombie Break Out Alarms
Students will use Cublets to make an alarm through trial and error. They will then write/draw the sequence of blocks …