In this lesson, students will be divided into groups and pretend to be a family being relocated to an internment camp. They will read from the online exhibit A More Perfect Union and make decisions about what they will take with them to the camp. After discussing with their groups, students will visit the "Reflections" section and write a response to at least one of the topics.
In this activity, students will read and respond to a quote by a woman who was forced to move into a Japanese Internment camp during World War II. Students will decide what they would take with them if they had to go into an internment camp.
Grade(s)
Subject Area
Learning Resource Type
In this learning activity, students will learn about women's history and making quilts. Students will make a quilt square in honor of a person who is important to them.
Grade(s)
Subject Area
Learning Resource Type
In this learning activity, students learn about Puerto Rico and Puerto Rican culture by creating their own Carnival mask.
Grade(s)
Subject Area
Learning Resource Type
In this learning activity, students make their own Koinobori (fish kite). These kites were an important way of life for Japanese American children in internment camps during World War II.
Grade(s)
Subject Area
Learning Resource Type
This is a collection of photographs and student activities that teach engineering skills by teaching students about the four forces of flight (drag, lift, weight, and thrust). Students are also challenged to a paper airplane test!
Grade(s)
Subject Area
Learning Resource Type
This collection includes videos, audio, photographs, activities, and lesson ideas to explore jazz and blues developed from the 1920s to the Great Depression and beyond.
Grade(s)
Subject Area
Learning Resource Type
This collection contains videos, articles, photographs, letters, and documents. This collection allows students to explore Japanese American internment and answers the question: What was life like for Japanese Americans in internment camps?
Grade(s)
Subject Area
Learning Resource Type
This collection includes videos, photographs, and articles about the Holocaust. Students can use this collection to explore what life might have been like during the Holocaust.
Grade(s)
Subject Area
Learning Resource Type
This collection includes photographs of jazz musicians Duke Ellington, George Wein, and Frank Sinatra.
Grade(s)
Subject Area
Learning Resource Type
This collection includes videos, photographs, and sheet music about jazz. Students can use the collection to explore the history of jazz in America.
Grade(s)
Subject Area
Learning Resource Type
In this activity, students will discover ways that scientists and engineers can use rovers to explore places where humans cannot go. Students will construct a science rover using the LEGO WeDo 2.0 kit and program the rover using WeDo 2.0 Software or a compatible programming app. Students will also document completion of the programming task and evidence of learning how the rover can help scientists make discoveries.
This activity was demonstrated during the Exploring Today's Classroom (ETC) Summit.
Grade(s)
Subject Area
Learning Resource Type
In this lesson, students will begin to explore the way digital images are encoded in binary.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
In this lesson, students will conduct a small amount of research to explore a file format either currently in use or from history. Students will conduct research in order to complete a "one-pager" that summarizes their findings. They will also design a computational artifact (video, audio, graphic, etc.) that succinctly summarizes the advantages of their format over other similar ones.
This lesson is intended to be a quick, short version of a performance task in which students rapidly do some research and respond in writing. It might take two class days but should not take more. The goal is to develop skills that students will use when they complete the actual Explore PT later in the year.
Students will be able to:
- identify reliable sources of information when doing research.
- synthesize information taken from multiple online sources.
- create an artifact (video, image, slide, poster, etc.) to communicate information about a computing topic.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
At the beginning of a new unit, we jump right into an activity - building a small arrangement of LEGO® blocks and then creating text instructions a classmate could follow to construct the same arrangement. Groups will trade instructions to see if they were clear enough to allow reconstruction of the original arrangement. The wrap-up discussion is used to highlight the inherent ambiguities of human language and call out the need for the creation of a programming language which leaves no room for interpretation.
Students will be able to:
- assess the clarity of a set of instructions expressed in human language.
- create a set of instructions in human language for building a simple LEGO block arrangement.
- identify connections between the ability to program and the ability to solve problems.
- describe the ambiguities inherent in human language and the ways programming languages seek to remove those ambiguities.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
This is the second day of a three-lesson sequence in which we attempt to show the "art" of programming and introduce the connection between programming and algorithms. In the previous lesson, we established the need for a common language to express algorithms to avoid ambiguity in how instructions would be interpreted. In this lesson, we continue to establish the connection between programming and algorithms, with more emphasis on the "art" of algorithms.
First, students are presented with a new task for the “human machine” - to write a set of instructions to identify the smallest (lowest value) card in a row of cards on the table. Once again we try to establish a set of fundamental commands for doing this and develop a more formal set of “low-level” commands for manipulating playing cards. Students are presented with a "Human Machine Language" that includes five commands and then must figure out how to use these primitive commands to “program” the same algorithm.
At the conclusion, several points about programming can be made, namely:
1. Different algorithms can be developed to solve the same problem.
2. Different programs can be written to implement the same algorithm.
Students will be able to:
- trace programs written in the "Human Machine Language".
- develop an algorithm to find the smallest playing card in a row of cards
- express an algorithm in the "Human Machine Language".
- identify the properties of sequencing, selection, and iteration the "Human Machine Language".
- evaluate the correctness of algorithms expressed in the "Human Machine Language".
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
This is the third of three lessons that make the connection between programming and algorithms. In this lesson, students continue to work with the "Human Machine Language" to get creative designing more algorithms for playing cards. One command is added to the language from the previous lesson (SWAP) that allows positions of cards to change. With the addition of swap, the challenge is to design an algorithm that will move the minimum card to the front of the list while keeping the relative order of all the other cards the same. If that is achieved some other Human Machine Language challenges are available.
Students will be able to:
- develop an algorithm to solve a new problem with playing cards.
- express an algorithm in the Human Machine Language.
- identify Sequencing, Selection, and Iteration in a program written the Human Machine Language.
- describe the properties of the Human Machine Language that make it a "low level" language.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
This lesson is a student's first exposure to programming in App Lab. The lesson begins with a quick reflection prompt. Then students are introduced to the practice of pair programming before beginning to program. For this lesson, the students' view is limited to only a very few simple “turtle” commands to draw graphics on the screen. After a few warm-up exercises, using only combinations of four drawing commands, students must figure out the most “efficient” way to draw an image of a 3x3 grid. The lesson concludes with a sense-making discussion about the meaning of efficiency in programming and the reason behind beginning with such a limited set of programming tools.
Students will be able to:
- use App Lab to write programs that create simple drawings with “turtle graphics.”
- create a program with a partner following the pair programming model.
- explain different ways one might measure the efficiency of a program.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
In this lesson, students learn to define and call procedures (in JavaScript, procedures are called “functions”) in order to create and give a name to a group of commands for easy and repeated use in their code. They will be introduced to functions as a form of abstraction that enables them to write code in larger, more logical chunks and focus on what something does, rather than how it does it. As they explore the use of functions through a sequence of activities in App Lab, they will be asked to think about where they see the need for functions and how these functions can make their code clearer or more concise.
At the end of the lesson, students review the concept of abstraction and are introduced to elements of the Create PT in preparation for the Practice PT at the end of the unit.
Students will be able to:
- recognize functions in programs as a form of abstraction.
- write a program that solves a turtle drawing problem using multiple levels of abstraction (i.e. functions that call other functions within your code).
- explain why and how functions can make code easier to read and maintain.
- define and call simple functions that solve turtle drawing tasks.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
This lesson presents a top-down problem-solving strategy for designing solutions to programming problems. Students use a worksheet to learn about top-down design, and then on paper, design a solution to a new turtle drawing challenge with a partner. Having practiced this approach on paper and in code, students will be presented again with the 3x3 square challenge from an earlier lesson and asked to improve upon their old solution by designing multiple layers of functions.
Students will be able to:
- write a complete program with functions that solve sub-tasks of a larger programming task.
- explain how functions are an example of abstraction.
- use a “top-down” problem-solving approach to identify sub-tasks of a larger programming task.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
Students will learn to read App Lab’s API documentation and will use functions that accept parameters in order to complete a series of drawing puzzles which require them to make use of the App Lab API documentation to learn new drawing commands. Many of these commands will require the use of parameters. The final challenge asks students to design a personal monogram making use of the commands they learned during the lesson.
Students will be able to:
- use parameters to provide different values as input to procedures when they are called in a program.
- use API documentation to assist in writing programs.
- define an API as the set of commands made available by a programming language.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
In this lesson, students practice using and creating functions with parameters. Students learn that writing functions with parameters can generalize solutions to problems even further. Especially in situations where you feel like you are about to duplicate some code with only a few changes to some numbers, that is a good time to write a function that accepts parameters. In the second half of the lesson, students make a series of modifications to a program that creates an “Under the Sea” scene by adding parameters to functions to more easily add variation to the scene. Lastly, students are introduced to App Lab’s random number functions to supply random values to function calls so the scene looks a little different every time the program runs.
Students will be able to:
- write functions with parameters to generalize a solution instead of duplicating code.
- identify appropriate situations for creating a function with parameters.
- use random numbers as inputs to function calls for the purpose of testing.
- add parameters to a function in an existing piece of code to generalize its behavior.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
Students learn to use random values and looping to create variation in their drawings and quickly duplicate objects they wish to appear in their digital scenes many times. Students will be presented with a version of the for loop which only enables them to change the number of times the loop runs. This block is essentially a "repeat" block and will be presented that way. Students will also be presented with blocks which enable them to choose a random number within a given range. Together these blocks enable students to create more complex backgrounds for digital scenes by randomly placing simple objects within the background of their scene. Students use these tools to step through the Under the Sea exemplar digital scene.
Students will be able to:
- use a loop in a program to simplify the expression of repeated tasks.
- identify appropriate situations in a program for using a loop.
- use random values within a loop to repeat code that behaves differently each time it is executed.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
Students use the Google Trends tool in order to visualize historical search data. They will need to identify interesting trends or patterns in their findings and will attempt to explain those trends, based on their own experience or through further research online. Afterward, students will present their findings to ensure they are correctly identifying patterns in a visualization and are providing plausible explanations of those patterns.
Students will be able to:
- use Google Trends to identify and explore connections and patterns within a data visualization.
- accurately describe what a data visualization of a trend is showing.
- provide plausible explanations of trends and patterns observed within a data visualization.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
This lesson asks students to consider carefully the assumptions they make when interpreting data and data visualizations. The class begins by examining how the Google Flu Trends project tried and failed to use search trends to predict flu outbreaks. They will then read a report on the Digital Divide which highlights how access to technology differs widely by personal characteristics like race and income. This report challenges the widespread assumption that data collected online is representative of the population at large. To practice identifying assumptions in data analysis, students are provided with a series of scenarios in which data-driven decisions are made based on flawed assumptions. They will need to identify the assumptions being made (most notably those related to the digital divide) and explain why these assumptions lead to incorrect conclusions.
Students will be able to:
- define the digital divide as the variation in access or use of technology by various demographic characteristics.
- identify assumptions made when drawing conclusions from data and data visualizations.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
Students begin this lesson by investigating some of the world’s biggest data breaches to get a sense for how frequently data breaches happen within companies and organizations, and what kinds of data and information is lost or given up. Afterward, students will use the Data Privacy Lab tool to investigate just how easily they could be uniquely identified with a few seemingly innocuous pieces of information. At the conclusion of the lesson, students will research themselves online to determine just how much someone could learn about them by conducting the same searches and “connecting the dots.”
Students will be able to:
- explain privacy concerns that arise through the mass collection of data.
- use online search tools to find and connect information about a person or topic of interest.
- explain how multiple sources of data can be combined in order to uncover new knowledge or information.
- analyze the personal privacy and security concerns that arise with any use of computational systems.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
This lesson focuses on the economic and consumer concerns around apps and websites that collect and track data about you in exchange for providing you a service free of cost. Often the quality of the service itself is dependent on having access to data about many people and their behavior. The main takeaway of the lesson is that students should be more informed consumers of the technology around them. They should be able to explain some of the trade-offs between maintaining personal privacy and using innovative software free of cost.
Students will be able to:
- explain how and why personal data is exchanged for the use of free software.
- explain some of the privacy and economic tradeoffs involved in the collection and use of personal data.
- describe the ways and reasons organizations collect information about individuals.
- read and critically evaluate a data privacy policy.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
In this lesson, students are introduced to the need for encryption and simple techniques for breaking (or cracking) secret messages. Students try their own hand at cracking a message encoded with the classic Caesar cipher and also a Random Substitution Cipher. Students should become well-acquainted with the idea that in an age of powerful computational tools, techniques of encryption will need to be more sophisticated. The most important aspect of this lesson is to understand how and why encryption plays a role in all of our lives every day on the Internet, and that making good encryption is not trivial. Students will get their feet wet with understanding the considerations that must go into making strong encryption in the face of powerful computational tools that can be used to crack it. The need for secrecy when sending bits over the Internet is important for anyone using the Internet.
Students will be able to:
- explain why encryption is an important need for everyday life on the Internet.
- crack a message encrypted with a Caesar cipher using a Caesar Cipher Widget.
- crack a message encrypted with random substitution using Frequency Analysis.
- explain the weaknesses and security flaws of substitution ciphers.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
In this lesson, students learn about the relationship between cryptographic keys and passwords. Students explore the Vigenère cipher with a widget to examine how a cryptographic "key" can be used to encrypt and decrypt a message. Then, students use a tool that shows them about how long it would take to crack a given password using a standard desktop computer. Students experiment with what makes a good password and answer questions about the “human components” of cybersecurity.
Students will be able to:
- explain the relationship between cryptographic keys and passwords.
- explain in broad terms what makes a key difficult to “crack.”
- reason about strong vs. weak passwords using a tool that shows password strength.
- understand that exponential growth is related to an encryption algorithm’s strength.
- explain how and why the Vigenère cipher is a stronger form of encryption than plain substitution.
- explain properties that make for a good key when using the Vigenère Cipher.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
In this lesson, students continue their exploration of computationally hard problems as they investigate a one-way function, a problem which is easy to construct in such a way that you know the solution, but it is computationally hard to solve. Students will begin the lesson by trying to solve the “Wireless Hotspot Problem” (also known as the vertex cover or dominating sets problem) to experience first-hand the challenge of solving it. They will then be instructed on how easy it is to create such a problem and will practice doing so themselves. In the Wrap-up, students are introduced to the concept of a one-way function and consider why such problems might be useful tools when constructing methods of encryption. If it’s easy to create a problem that is hard for a computer (or human!) to solve, then perhaps it is possible to make truly secure encryptions.
Students will be able to:
- describe the properties of a one-way function.
- construct a wireless hotspot map, starting from a solution key.
- explain why the wireless hotspot problem is a computationally hard problem.
- describe the difference between the Traveling Salesman Problem and the Wireless Hotspot Problem and why one-way functions are desirable when creating cryptographic methods.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
This is a big multi-part lesson that introduces the concept of public key cryptography which is an answer to the crucial question: How can two people send encrypted messages back and forth over insecure channels (the Internet) without meeting ahead of time to agree on a secret key? In a nutshell, there are two main principles we want students to understand:
- The mechanics of communication with public key cryptography
- The basic mathematical principles that make it possible
The lesson gets at these two core ideas through a deliberate chain of thought experiments, demonstrations, activities, and widgets. All parts are building blocks that lead to a deeper understanding of how it works.
Students will be able to:
- explain what the modulo operation does and how it operates as a "one-way" function.
- follow an asymmetric encryption algorithm to encrypt a numerical message using the Public Key Crypto widget.
- explain the difference between symmetric and asymmetric encryption.
- describe the basic process of encrypting data using public key encryption.
- explain the benefits of public key cryptography.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
Students learn about various types of cybercrimes and the cybersecurity measures that can help prevent them. Then students perform a Rapid Research project investigating a particular cybercrime event with a focus on the data that was lost or stolen and the concerns that arise as a result. The Rapid Research activity features vocabulary, concepts, and skills that should help prepare them for the AP Explore PT, and also serves as a capstone for the sequence of lessons on encryption and security.
Students will be able to:
- explain the characteristics of a phishing attack.
- explain how a DDoS attack works.
- describe how one computer virus works.
- research and describe a cyber attack found in the news.
- reason about the threats posed by, and methods of recourse for, various types of cyber attacks.
- describe plausible storage, security, or privacy concerns for particular pieces of data.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
To conclude their study of big data and cryptography, students will complete a small research project related to a dilemma presented by Big Data or Cybersecurity, in the form of a Practice Performance Task. Students will pick one of two issues to research more deeply - either an issue related to big data, or one related to cybersecurity. Students will need to identify appropriate online resources to learn about the functionality, context, and impact of the technological innovation that gave rise to the dilemma they are investigating. After completing their research, students will present their findings both in a written summary and with an audio/visual artifact they found online. The written components students must complete are similar to those students will see in the AP Performance Tasks.
This project is an opportunity to practice many of the skills students will use when completing the Explore Performance Task on the AP® Exam at the end of the year. While an open-ended research project might be intimidating, students have built all the skills they need to complete this task.
Note: This is NOT the official AP® Performance Task that will be submitted as part of the Advanced Placement exam; it is a practice activity intended to prepare students for some portions of their individual performance at a later time.
Students will be able to:
- identify reliable and authoritative sources of information about computing information.
- synthesize information taken from multiple online sources to create a cohesive description of a computing innovation.
- identify an artifact that clarifies an aspect of a computing topic not easily captured in writing.
- explain both the beneficial and harmful effects related to a modern social dilemma in computing.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
In this lesson, students add variables to two different exemplary apps to keep track of a score or a count of some number of button clicks. The major topic is variable in scope and understanding the differences, benefits, and drawbacks, of using global versus local variables. This lesson focuses more on using global variables since in event-driven apps that’s what you need to keep track of data across multiple events.
The very basics of a simple if statement are also presented in this lesson, mostly to highlight the difference between the = and == operators. Finally, students are asked to apply what they’ve learned about variables, scope, and if statements, to make their own “clicker” game modeled after one of the exemplars they saw during the lesson.
Students will be able to:
- use global variables to track numeric data in an app.
- give a high-level explanation of what “variable scope” means.
- debug problems related to variable scoping issues.
- modify existing programs to add and update variables to track information.
- create a multi-screen "clicker" game from scratch.
Note: You will need to create a free account on code.org before you can view this resource.
Grade(s)
Subject Area
Learning Resource Type
In this lesson, students are introduced to the string data type as a way of representing arbitrary sequences of ASCII characters. They will use strings to accept input from a user as they work on mastering two new UI elements, the text input, and the text area. Students combine these skills to develop a simple Mad Libs® app.
Mad Libs® is a trademark of the Penguin Group (USA) LLC., which does not sponsor, authorize or endorse this site.
Students will be able to:
- identify strings as a unique data type which contains a sequence of ASCII characters.
- describe the characteristics of the string data type.
- accept string input in a program.
- manipulate user-generated string input to generate dynamic output.
Note: You will need to create a free account on code.org before you can view this resource.