Curated OER
Gumshoeing the Web
Students discuss hackers and issues of computer privacy. They read the article "Sniffing Out Crime by Bits and Bytes," and debate the article through role-playing.
Curated OER
Cyberattack Detection Versus Privacy Protection
Students examine the issues of privacy and security as they relate to computer monitoring. In this privacy protection lesson, students carry out a round table discussion and write a persuasive essay pertaining to whether citizens must...
Curated OER
Scientist Tracking Network
Students correlate surface radiation with mean surface temperature of several geographic regions. They observe how these parameters change with latitude and construct an understanding of the relationship of solar radiation to seasonal...
Curated OER
Networking at Early James Fort
Students examine the impact of global trade on regional civilizations of the world after 1500. They research and analyze images of pottery excavated at Jamestown, and create a poster that presents information about world trade networks...
Curated OER
Let There Be Peace: Nobel Prize Winners
What is the Nobel Peace Prize? After they establish criteria for great leadership, secondary learners read a New York Times article about President Jimmy Carter's acceptance of the Nobel Peace Prize in 2002. Individuals research the...
Curated OER
Video Game Violence: Explore Possible Impacts
Introduce middle schoolers to the issue of video game violence with a multifaceted approach. Learners complete a gaming survey, as well as read and discuss a news feature about violent video game sales and a handout on stimulus...
TryEngineering
Choose Your Best Way
Find the best path through town. The instructional activity teaches future computer programmers about networks and paths in graph theory. They develop a network of their towns to determine the most efficient path to visit each of their...
Curated OER
Sextant Solutions
Young scholars explore ways a sextant can be a reliable tool that is still being used by today's navigators and how computers can help assure accuracy when measuring angles. This activity will show how computers can be used to understand...
Curated OER
Welcome Back to the Computer Lab: Starting a New School Year
Get kids re-oriented to the computer lab for back-to-school. The constructivist approach in this session allows children to exert ownership of their behavior in the computer lab. Read aloud a few books about good and poor manners, as...
Curated OER
Anasazi Basket Weaving
The Anasazi Indians of Mesa Verde are the focus of this art and social studies lesson. Working in pairs or groups of three, students utilize computers and go online to search for websites about the Anasazi. Students will choose two or...
Curated OER
Exploring Dietary Guidelines and Healthy Eating Patterns
How nutritious is a tiny lollipop? Pass them out to your class as they view a PowerPoint presentation on the basics of nutrition. The students measure and record their weight and height and then carry out a computer activity using their...
Curated OER
Olympic Mascots - and Mash-Ups
The Learning Network has formulated a fill-in the blank worksheet to go along with the New York Times article "Olympic Mascots Inspire Imitations". While the topic is not entirely about physical education, this article could be used for...
Curated OER
NW Link Protocol
In this technology worksheet, students practice logging in to the NW Server and following the security measures for the system.
Curated OER
Have I Been Hacked?
Students investigate how effective SNEAK strategies are in detecting hackers. In this technology lesson, students explain the ethical issues about hacking. They graph and analyze their experimental results.
Curated OER
Installing and Configuring Remote Access Systems
In this technology worksheet, students follow the protocol to set up users that have internet or remote access from another location for the server.
Curated OER
From Lake to Tap
Students use the Internet to study how water is treated to make it safe to drink. They use a tutorial on the U.S. Environmental Protection Agency's website to gain this information. They complete a worksheet for the assessment portion...
Curated OER
Microsoft Word Lesson 2
Fourth graders investigate some of the basic functions of using Microsoft Word. The teacher uses a LCD projector to give instruction and guide the lesson. They practice finding the menu screens to perform basic editing and command...
Curated OER
Microsoft Word~About the Author
Fourth graders investigate how to create a document named "About The Author". The teacher uses a LCD projector to guide the instruction and provide examples for the class. They also include graphics in the document and practice accessing...
Curated OER
Cinquain Poems
Fourth graders investigate the concept of composing a Cinquain poems. They copy a poem from a slide presentation given by the teacher. Students experiment changing the font in the poem. They also receive information about the format used...
Curated OER
Essay Exchange Unit: Rough Drafts
Students submit rough drafts of position papers and post them on computer networks for review.
Teach Engineering
Curb the Epidemic!
Class members use an applet on the Internet to simulate the spread of a disease. The simulation allows individuals to determine two nodes to vaccinate to limit the number of nodes infected. By running several simulations, scholars can...
Code.org
Routers and Redundancy
How are messages to the right recipient? Introduce the concept of routing Internet traffic by drawing a comparison to sending a letter. Groups use the Internet Simulator program to send messages to others using the same router and...
Computer Science Unplugged
Ice Roads–Steiner Trees
As an introduction to Steiner Trees, class members are challenged to find the shortest paths to connect multiple points. The teacher introduces the problem by showing how to connect three points. Groups then go outside and construct a...
Code.org
The Need for Addressing
You sunk my battleship via the Internet? Groups of three play a modified game of Battleship using the Internet Simulator. Team members determine how to address messages, so each player knows who the message is for, and refine their text...