K-2.NI.4 Model and describe how people connect to other people, places, information and ideas through a network.
K-2.NI.5 Explain why people use passwords.
K-2.NI.6 Create patterns to communicate a message.
3-5.NI.4 Model how information is broken down into smaller pieces, transmitted as packets through multiple devices over networks and the Internet, and reassembled at the destination.
3-5.NI.5 Describe physical and digital security measures for protecting personal information.
3-5.NI.6 Create patterns to protect information from unauthorized access.
Monday, April 10
Tuesday, April 11
Wednesday, April 12
Thursday, April 13
Share a recent victory or something you're proud of.
K-2.NI.4 Model and describe how people connect to other people, places, information and ideas through a network.
NGSS 5-PS3-1 Use models to describe that energy in animals’ food (used for body repair, growth, motion, and to maintain body warmth) was once energy from the sun.
NGSS 5-LS2-1 Develop a model to describe the movement of matter among plants, animals, decomposers, and the environment.
Model a food web with Scratch using TIPP & SEE
Title, Instructions, Purpose, Play --- Sprites, Events, Explore
What have you learned today?
What can you take back with you?
Who is your Willy Wonka?
How does information travel over long distances?
3-5.NI.4 Model how information is broken down into smaller pieces, transmitted as packets through multiple devices over networks and the Internet, and reassembled at the destination.
Lesson Plan: Data Packets and Networks
credit: Mark Loundy, Cupertino Union School DistrictYou can view the source behind any webpage!
Why do some webpages look different on different browsers?
What have you learned today?
What can you take back with you?
The Internet: Wires, Cables & Wifi (code.org)
Routing and Deadlock (CS Unplugged)
What is HTML? (code.org)
Try HTML (W3Schools)
What's your favorite science standard or concept?
K-2.NI.6 Create patterns to communicate a message.
3-5.NI.6 Create patterns to protect information from unauthorized access.
What have you learned today?
What can you take back with you?
K-2.NI.5 Explain why people use passwords.
3-5.NI.5 Describe physical and digital security measures for protecting personal information.
What have you learned today?
What can you take back with you?