Code.org
The Need for Encryption
Scholars investigate the need for encryption as they read a portion of the book Blown to Bits and discuss encryption techniques. They finish by attempting to decode a message written using a Caesar cipher.
Teach Engineering
Applying Statistics to Nano-Circuit Dimensions in Fabrication
Do flexible circuits change dimensions during fabrication? Groups use GeoGebra software to measure the length of pictures of flexible nano-circuits. To determine if the circuits change dimensions, future engineers use Microsoft...
Institute of Electrical and Electronics Engineers
Water Rocket Launch
How do rockets fly? Teams design, build, and launch a rocket made from a two-liter bottle to explore forces on a rocket such as Newton's Laws of Motion. During the design phase, young engineers draw a diagram of their rocket and...
Channel Islands Film
Once Upon a Time (Sa Hi Pa Ca): Lesson Plan 3
What was the most significant tool used by the Chumash? How did the environment make the tool possible? What group behaviors allowed the Chumash be be successful for thousands of years? After watching West of the West's documentary Once...
Social Media Toolbox
Twitter Time
Tweet all about it! Junior journalists explore the Twittersphere to determine its effectiveness as a news broadcasting tool in the 12th installment of the 16-part Social Media Toolbox. Participants follow and record their observations of...
Social Media Toolbox
Verification
When you're putting together a great story, you've got to consider the source! Scholars discover the dangers of errors in reporting during the 14th activity in a 16-part Social Media Toolbox series. Groups collaborate to create a source...
National Research Center for Career and Technical Education
Back to Basics
Your class will enjoy this Health Science lesson created by CTE and math teachers from Missouri. Learners make conversions between the apothecary system and metric and US standard measurements used in the healthcare field. The CTE...
Code.org
Identifying People with Data
How much information about you is out there? Scholars explore this question as they investigate data breaches and how these violations occur. They then take part in an activity where they research how easily people could get access to...
Code.org
Public Key Cryptography
Investigate how public key cryptography works. Scholars continue their study of one-way functions and asymmetric keys and apply this information to public key cryptography. They use an app to explore public key cryptography and its...
Curated OER
Lesson Plan for Chato's Kitchen
Through an exploration of Chato's Kitchen by Gary Soto, learners practice sequencing skills, retelling a story, and Spanish vocabulary words. All of the necessary resources, worksheets, and other materials are provided in order to give...
Newseum
The Medium Shapes the Message
Where do you get your news? Have learners examine four different publications and decide which one they would choose to read on their own time. The resource includes a list of publication types to supply and a worksheet for groups...
Teach Engineering
Combustion and Air Quality: Emissions Monitoring
Help your class determine the types of pollutants coming from vehicle exhaust. Groups use an air quality monitor to determine the emissions from different vehicles, to gain knowledge about combustion energy, and to predict how the...
Teach Engineering
Exploring the Lotus Effect
The Lotus Effect ... is it not some kind of yoga pose. In the last installment of a nine-part series, young scientists observe the Lotus Effect on lotus leaves and water-repellent cloths. They observe how motion and damage affect the...
Teach Engineering
Bubbles and Biosensors
Bubbles aren't just for children. In the third installment of a seven-part series, teenagers use bubble solution to create bubbles and observe patterns of refraction on the bubble surfaces. Application of this concept to thin films in...
Code.org
What is Big Data?
Find out why Big Data is a big deal in the first installment of a 12-part unit that introduces young computer scientists to Big Data and demonstrates how it is useful. In pairs, class members research a big data tool to uncover...
Kenan Fellows
The Newton Challenge
Make Newton proud. Scholars apply their understanding of forces and energy to an engineering design challenge. They learn about simple machines, create a presentation on Newton's laws, and develop a balloon-powered car.
Cornell Cooperative Extension
Rope Making
Jump ropes, dock lines, cables. The science and technology behind rope making is the focus of a seven-page packet that ends with a rope making challenge.
Annenberg Foundation
Pre-Columbian America
What was life like in America before Christopher Columbus discovered the New World? Scholars investigate life in the Americas through the eyes of Native Americans in the first lesson of a 22-part series covering America's history. Using...
Mrs. Burke's Math Page
Let Them Eat Pi
Looking for a fun and creative way to celebrate Pi Day? Then this is the resource for you. From a scavenger hunt and trivia contest to PowerPoint presentations and skills practice worksheets, this collection of materials is a...
Kenan Fellows
Microorganisms in Pond Water
That is living in the water? Groups of two to three view pond water with microscopes in order to find microorganisms. They draw pictures of the ones they find in their slides. The groups compare their drawings to pictures of common...
Code.org
Cleaning Data
"Clean the data!" "I did not know it was dirty." Introduce your class to the process of cleaning data so that it can analyze it. Groups work through a guide that demonstrates the common ways to filter and sort data. Pairs then...
Code.org
Functions and Top-Down Design
Let me break it down for you! Introduce your class to a way of breaking up a complicated task into its component pieces. Individuals draw a complex figure using JavaScript and then break it down to help determine the...
Code.org
Understanding Program Flow and Logic
Explore decision-making logic in programming computer games. The 10th installment of a 21-part unit teaches scholars how to apply conditional statements and Boolean expressions. They use these concepts to create a "Guess My Number" game...
Code.org
Functions with Return Values
Young computer scientists explore how to use the return command in computer programing by playing Go Fish. They learn about functions that return values and then write a turtle driver app using the return function.