Updating search results...

Search Resources

6 Results

View
Selected filters:
  • NC.CSS.K2.NI.03 - Discover your digital footprint and how personal information can be pr...
4th Grade:  Sphero Natural Disasters/Rescue
Unrestricted Use
CC BY
Rating
0.0 stars

Students will create a fictitious city that has experienced a natural disaster. Once their city is completed, students will create a vehicle to transport supplies to the people who need help.

Subject:
Science
Material Type:
Activity/Lab
Author:
William Allred
Carrie Robledo
Date Added:
04/30/2020
5th Grade:  Build Your Own Operation Game
Unrestricted Use
CC BY
Rating
0.0 stars

As students study the human body, they can include the different body systems as they build their Operation games. Made from a few household materials, a makey-makey kit and the Scratch website, students can create and play their Operation game.

Subject:
Science
Material Type:
Activity/Lab
Author:
William Allred
Carrie Robledo
Date Added:
04/30/2020
5th Grade:  Predator Challenge
Unrestricted Use
CC BY
Rating
0.0 stars

Each team has a budget of $45 to spend to modify a cup into the ultimate predator.  After predators are constructed, students battle to pop each others’ balloons.  Whichever predator is able to survive is the apex predator.

Subject:
Science
Material Type:
Activity/Lab
Author:
William Allred
Carrie Robledo
Date Added:
04/30/2020
First Grade Sick Simon--Keep Your Germs and Information to Yourself
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson students will learn about transmission: 1- how not to pass germs to others and 2- how what they say and do online travels and reaches a broad range of people.

Subject:
Applied Science
Computer Science
English Language Arts
Material Type:
Activity/Lab
Date Added:
03/17/2023
K-2 Networks and the Internet 3 Day Unit
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Day 1: In this lesson, students will…. Understand how information is transferred over physical or wireless paths and are broken down into smaller pieces called packets, then reassembled at their destination. They will learn this by creating a LEGO/Magnatile/block house, or building, as a team. The teacher, or facilitator, will take a photo of their creation. The students will disassemble their structure and transfer it to the next group, representing how information is broken down and passed on. The next group who receives the pieces will have to look at the photo and rebuild based on the photo. If the group completes this, they will successfully complete how information is transferred showing that in order for information to be the same when it’s transferred and to show up, it needs to be the same.

Day 2: Students will learn to protect their personal information by creating passwords/passphrases. This will be equated to students using your house key, or house code. This is private to the adults in your life. They do not share those with others, just like you would not share a password to your account with others. Teacher will create an easily guessable password to model, students will ask the teacher questions from a predetermined list of questions with picture tiles, like favorite animal, favorite color, etc. Using the answers to the questions the students will try to guess the password. Then, students will create a password, and play the guessing game with a small group.

Day 3:Students will review previous concepts about passwords and protecting personal information. They will be introduced to anti-virus software. Teacher will equate malware to getting sick and anti-virus software to antibiotics. When you’re sick your body is ‘infected’ like a computer with malware on it. The anti-biotic or anti-virus software protects you. Students illustrate a computer transmitting information (use paper and markers to solve a maze). They will be given anti-virus software (saran wrap) to place over their maze. Teacher walks around and sprays water on each “computer” with anti-virus software. Remove anti-virus software and spray again to illustrate malware.

Subject:
Applied Science
Computer Science
English Language Arts
Social Studies
Material Type:
Activity/Lab
Assessment
Diagram/Illustration
Interactive
Lesson Plan
Unit of Study
Author:
Drew McElhennon
Allison Zinkievich
Date Added:
06/22/2023
Silence the Sound
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students use their knowledge of sound energy to create a soundproof box to protect a secret code word! Students measure and graph decibels to determine how well their boxes omit sounds!

Subject:
Applied Science
Computer Science
Mathematics
Science
Material Type:
Activity/Lab
Interactive
Lesson
Lesson Plan
Date Added:
03/17/2023