Computer Science Lesson Plans

Computer Science Lesson Plans

Share This!

Computer Science Lesson Plans

As part of providing lesson plans for teachers. Students may also wish to work with Arduinos. Most of the lessons outlined require the use of the computer. There are some lessons, though, that are offline only.

Computer Science Lesson Plans: The Internet

Lesson 1: The Internet is for Everyone
Primary Source Reading Assignment:
The Internet is for Everyone
Lesson 2: The Need for Addressing Lesson 3:Invent an Addressing Protocol Lesson 4: Routers and Redundancy

Video Questions: How the Internet Works (MS Word)

Video: How the Internet Works

Lesson 5: Packets and Making a Reliable Internet
Peter the Packet Game
Lesson 6: Algorithms Detour – Minimum Spanning Tree

Algorithms Graphs and the MST Problem

Lesson 7: Algorithms Detour – Shortest Path

Intro to the Shortest Path Problem

Intro Dijkstras Shortest Path Algorithm

Dijkstras Shortest Path Algorithm A

Dijkstras Shortest Path Algorithm B

Dijkstras Shortest Path Algorithm C

Dijkstras Shortest Path Algorithm D

Dijkstras Shortest Path Algorithm E

Dijkstras Shortest Path Algorithm F

Dijkstras Shortest Path Algorithm G

Dijkstras Shortest Path Algorithm H

Lesson 8: How Routers Learn
Lesson 9: The Need for DNS Lesson 10: DNS in the Real World


Lesson 11: HTTP and Abstraction on the Internet

HTTP and Abstraction Handout

-Homework: Blown to Bits Questions

-Homework: Blown to Bits Reading- The Internet Spirit

Lesson 12: Global Impacts of the Internet

Rubric for Global Impact of the Internet Project

Resource Topic List for Global Impact of the Internet Project

Writing Directions Worksheet for Global Impacts of the Internet Project

Lesson 13: The Need for Encryption
Encryption Questions: Complete first two pages only

Blown to Bits Reading Encryption12-2 Caesar Cipher Assignment
Lesson 14: Cracking the Code: 14-2: Random Substitution Cipher 

Vignere Cipher Reading

– 14-3 Vigenere Cipher Questions and Activity

Lesson 15: Keys and Passwords

Keys and Password Questions

Keys and Passwords Reading

Crypto Keys and Your Password: How Secure

Lesson 16: Hard Problems – The Traveling Salesperson Problem

Traveling Salesperson Problem Background Activity

Lesson 17: One Way Functions – The WiFi Hotspot Problem

WiFi Hotspot Activity

Make your own WiFi HotSpot

Lesson 18: Asymmetric Keys – Cups and Beans

Asymmetric Keys Activity


Homework: Encryption on the Internet Reading

Encryption on the Internet Questions

Lesson 19: Public Key Cryptography

Activity Guide-Public Key Cryptography

How and Why Does the Public Key Crypto Really Work

Lesson 20: Practice performance task – Security and Hacking in the Real World

Video Guide for Cybersecurity and Crime

Security and Hacking in the Real World Project

Computer Science Lesson Plans: Digital Information Unit

Lesson 1: Personal Innovations Lesson 2:Sending Simple Binary Messages Lesson 3: Sending Complex Binary Messages Lesson 4:

Sending Binary Messages with the Internet Simulator

Koan Reading Assignment

Lesson 5: Sending Bits in the Real World Lesson 6: Number Systems
Lesson 7:
Binary Numbers
Lesson 8:
Sending Numbers
Lesson 9:
Encoding Numbers in Real WorldResearch Activity 
Lesson 10: Encoding and Sending Text Lesson 11: Sending Formatted Text

Blown to Bits: Chapter 3_pg_73-80-What You See Is Not What the Computers Knows

Blown to Bits 10 Questions on Chapter 3 Reading (Google Doc)

Lesson 12: Bytes and File Sizes

Digital Storage

Lesson 13: Text Compression

Text Compression Case Study (Google Doc)

Lesson 14: Encoding Black and White Images Lesson 15:
Encoding Color ImagesBlown to Bits Reading: Hiding Information in Images (pdf)Blown to Bits Questions: Hiding Information in Images(Google Doc) 
Second Quarter Project:

Favicon Assignment

Lesson 16: Lossy Compression and File Formats

Lossy vs Lossless Reading (Google Doc)

Lesson 17: Encode a Complex Thing