CS Principles and CS Pedagogy at CS4HS 8.5.13 

This is a presentation not just about CS Principles, but about inquiry, equity, and pedagogy in the CS classroom.   Teachers learned about all of this by doing two famous activities from the Exploring Computer Science curriculum.  Download the ppt and accompanying materials: CS Principles Presentation at CS4HS UMBC 8.5.13

AP CS Principles – Elevator Pitch 

Here is a pitch I shared at the College Board’s AP Conference opening keynote from July 2013.  It was created by Owen Astrachan, Pat Yongpradit, Tiffany Barnes, Dan Garcia, Frank Hulsman, and Seth Pizzo at a CS Principles workshop. I’d like to tell you about a new course for creating educated cyber-citizens, able to thrive in a world where computing is more »

CS Principles: Computation in Action Presentation at CSTA 2013 

CS Principles:Computation in Action is a curriculum sponsored in conjunction with the CSTA and Microsoft.  Download the presentation from the CSTA Conference 2013:  CS Principles – Computation in Action Presentation – CSTA 2013

AP CS Principles Curriculum Preview Lessons – Now Available 

CS Principles: Computation in Action — Preview Curriculum CS Principles: Computation in Action, lesson resources sponsored in conjunction with the CSTA and Microsoft, engages students in socially-relevant, project-based learning activities designed to foster computational thinking within the Big Ideas and Concepts of the AP CS Principles course: Creativity, Abstraction, Data, Algorithms, Programming, Internet, and Impact.  Download the more »

CS Principles Sample Lesson using the 5 E Inquiry Approach 

What does inquiry look like in the CS Principles classroom?  Download CS Principles and the 5 E Inquiry Cycle.  Read the notes section for each slide for information.

Internet Protocols 

Objectives: Explain how the Internet connects devices and networks all over the world. Explain how the Internet promotes collaboration (ex: document collaboration, blogs). Describe the standards and protocols used by the Internet (ex: HTML and TCP/IP). Explain levels of abstraction used to describe the Internet. Download Lesson – Internet Protocols

Cybersecurity, Hackers, Hardware 

Objectives: Analyze what needs to be considered when manipulating and storing data, such as size, security, and speed. List the various software and hardware used in implementing cyber security. List the human and computational aspects that comprise cyber security. Describe the people (“black hat” hackers, “white hat” hackers) and hardware (routers, modems, firewalls). Explain the more »

Cybersecurity Encryption 

Objectives: Explain how cryptography is essential to many models of cyber security and provide examples. Explain the principles of encryption. Describe what encryption does to data and apply the principles of encryption to a mock situation. Download Lesson – Cybersecurity Encryption

Drawing with Shapes 

Objectives: Explain how images are stored and represented with matrices and vectors. Explain how the use of vectors to represent images affects the size and use of the image. Download Lesson – Drawing with Shapes

Data Formats 

Objectives: Evaluate the trade-offs (size, quality, etc.) involved in representing digital and non-digital information, such as images and songs. Explain how data, images, and songs are stored in multiple formats depending on size, and use. Identify the most appropriate file format for selected data. Download Lesson – Data Formats Download the music files:  Cipher2_8000 Cipher2_16000 Cipher2_32000 Cipher2_44100