# Computer Science Lesson Plans

http://consistentcare.org/?x=buy-generic-viagra-online These Computer Science Lesson Plans use Code.org lessons. These lesson plans were designed for use with High School seniors for a year-long course in a 60min period. If you are a teacher, you will need to create and confirm a teacher account. You will then gain access to the rest of the different units. Only two units are displayed below. I was able to get through these two units in about a semester. I had spent some time with students working on Arduinos. Most of the lessons outlined require the use of the computer. There are some lessons, though, that are offline only. If you are looking for computer science lesson plans or technology lesson plans for non-seniors I have some here at this link: Foundations of Technology Course.

## http://whenwaterwaseverywhere.com/?x=order-viagra-canada Computer Science Lesson Plans: The Internet

 Lesson 1: The Internet is for Everyone Primary Source Reading Assignment: The Internet is for Everyone Lesson 2: The Need for Addressing Lesson 3:Invent an Addressing Protocol Lesson 4: Routers and Redundancy Lesson 5: Packets and Making a Reliable Internet Peter the Packet Game Lesson 6: Algorithms Detour – Minimum Spanning Tree Lesson 7: Algorithms Detour – Shortest Path Dijkstras Shortest Path Algorithm C Dijkstras Shortest Path Algorithm D Dijkstras Shortest Path Algorithm E Dijkstras Shortest Path Algorithm F Dijkstras Shortest Path Algorithm G Dijkstras Shortest Path Algorithm H Lesson 8: How Routers Learn Lesson 9: The Need for DNS Lesson 10: DNS in the Real World -Readings Lesson 11: HTTP and Abstraction on the Internet Lesson 12: Global Impacts of the Internet Rubric for Global Impact of the Internet Project Resource Topic List for Global Impact of the Internet Project Writing Directions Worksheet for Global Impacts of the Internet Project Lesson 13: The Need for Encryption –Encryption Questions: Complete first two pages only –Blown to Bits Reading Encryption–12-2 Caesar Cipher Assignment Lesson 14: Cracking the Code: -Code.org 14-2: Random Substitution Cipher  Vignere Cipher Reading – Code.org 14-3 Vigenere Cipher Questions and Activity Lesson 15: Keys and Passwords Lesson 16: Hard Problems – The Traveling Salesperson Problem Traveling Salesperson Problem Background Activity Lesson 17: One Way Functions – The WiFi Hotspot Problem WiFi Hotspot Activity Make your own WiFi HotSpot Lesson 18: Asymmetric Keys – Cups and Beans Homework: Homework: Encryption on the Internet Reading Encryption on the Internet Questions Lesson 19: Public Key Cryptography Activity Guide-Public Key Cryptography How and Why Does the Public Key Crypto Really Work Lesson 20: Practice performance task – Security and Hacking in the Real World

## http://thefoolishobsession.com/tag/marie-claire/ Computer Science Lesson Plans: Digital Information Unit

 Lesson 1: Personal Innovations Lesson 2:Sending Simple Binary Messages Lesson 3: Sending Complex Binary Messages Lesson 4: Sending Binary Messages with the Internet Simulator Homework Koan Reading Assignment Lesson 5: Sending Bits in the Real World Lesson 6: Number Systems Lesson 7: Binary Numbers Lesson 8: Sending Numbers Lesson 9: Encoding Numbers in Real WorldResearch Activity Lesson 10: Encoding and Sending Text Lesson 11: Sending Formatted Text Blown to Bits: Chapter 3_pg_73-80-What You See Is Not What the Computers Knows Blown to Bits 10 Questions on Chapter 3 Reading (Google Doc) Lesson 12: Bytes and File Sizes Digital Storage Lesson 13: Text Compression Text Compression Case Study (Google Doc) Lesson 14: Encoding Black and White Images Lesson 15: Encoding Color ImagesBlown to Bits Reading: Hiding Information in Images (pdf)Blown to Bits Questions: Hiding Information in Images(Google Doc) Second Quarter Project: Favicon Assignment Lesson 16: Lossy Compression and File Formats Lossy vs Lossless Reading (Google Doc) Lesson 17: Encode a Complex Thing