Teacher: Mr. Fulcar
Grade Level: 6th/ 7th
Subject: Computer ScienceDate:
Unit/Theme: Intro to COMPUTER PROGRAMMING THEORY
Content Objective(s): SWBAT – Analyze the Main Idea and Author’s purpose from Non Fiction Online articles read independently.
Language Objective(s): SWBAT – Students will identify the Main Idea, supporting Textual Details and Key Vocabulary from an Online Multimedia video and Non Fiction Article in order to write an academic report.
Key Vocabulary: -Hackers, Massachusetts Institute of Technology (MIT, hacking, refining code, iteration, Super Computers, PDP-1, Space War 1st video game, Phreakers, Hackers Ethic, Black Hat vs White Hats Hackers, Homebrew Computer Club, Apple’s co-founder, Steve Wozniak, hacktivists, improving security, finding weaknesses in networks, Cybersecurity.
Materials: CHROMEBOOK LAPTOPS, SMART BOARD, GOOGLE CLASSROOM
Lesson Sequence:
ENTRANCE TICKET:
BIG QUESTION:
In your opinion, WHAT IS A HACKER? Ask students to TURN & TALK and discuss the question with their PARTNER/GROUP.
TURN AND TALK: DISCUSS WITH YOUR PARTNER/TABLE. SHARE YOUR RESPONSE. POST YOUR RESPONSE ON GOOGLE CLASSROOM
UDL principle: There are two or more options for multiple means of engagement in the learning activity.
DO NOW:
ASSIGNMENT No 5 NON FICTION ARTICLE “HACKERS”
UDL PRINCIPLE:
There is a description of two or more ways that the learning activity can be made accessible. Multimedia Video can be accessed On-Demand, in English or Spanish for English Language Learners, featuring Images, Audio for Vsual and Auditory Learners, and with Closed Captions for Hearing Impaired and ELLS.
DO NOW:
MOTIVATIONAL ACTIVITY:
1) Watch Multimedia video “HACKERS” at brainpop.com at least 3xs times.
Click on https://www.brainpop.com/technology/computerscience/hackers/
2) Read the NON FICTION ARTICLE “HACKERS” “HACKERS” Non Fiction Article
and Take CORNELL NOTES on your NOTEBOOK (TITLE/MAIN IDEA/5-10 IMPORTANT DETAILS FROM THE TEXT/KEY VOCABULARY WORDS)
3) WRITE an ACADEMIC REPORT on GOOGLE DOCS about the Video making sure to include:
RUBRIC FOR ACADEMIC REPORT:
-TITLE,
-AUTHOR, CENTRAL IDEA, SEQUENCE OF EVENTS/IMPORTANT DETAILS
-TRANSITION WORDS (Initially, Additionally, Subsequently, Finally) OR (FIRST, SECOND, THIRD, FOURTH, FIFTH…)
-PERSONAL TEXT-TO-SELF, TEXT-TO-WORLD OR TEXT-TO-TEXT CONNECTION.(One connection I can make to this topic is … This topic affects me, my family, and my community because… This topic is important to me because…)
UDL principle:
There are two or more options for multiple means of action & expression in the learning activity.
Students can use their Cornel Notes to write an Academic Report on a Google Doc or on a Google Slide as evidence of their comprehension of the Article and the Multimedia Video.
TEACHER PROVIDES A MODEL OF CORNELL NOTES AS SCAFFOLDING TO HELP STUDENTS IDENTIFY MAIN IDEA, SUPPORTING DETAILS AND KEY VOCABULARY WORDS.
TEACHER PROVIDES CORNELL NOTES AS A MODEL
TEACHER PROVIDES CORNELL NOTES AS A MODEL
3) USE your CORNELL NOTES to help you WRITE an ACADEMIC REPORT on a GOOGLE DOCS or on a GOOGLE SLIDE.
-3 WAYS THIS LEARNING AND CONTENT IS ACCESSIBLE TO ALL LEARNERS IN MY CLASSROOM:
ITS AVAILABLE IN AS A NON-FICTION ARTICLE
ITS AVAILABLE AS A MULTIMEDIA VIDEO
3) ITS AVAILABLE IN ENGLISH/SPANISH FORMAT
-ONE ASSISTIVE TECHNOLOGY AVAILABLE TO ALL LEARNERS IN JY CLASSROOM IS THE MULTIMEDIA VIDEOS ON BRAIPOP,COM. THEY FEATURE IMAGES, ANIMATIONS, CLOSED CAPTIONS AND EVEN A TRANSCRIPT OF THE VIDEO. VIDEO ALSO FEATURE KEY VOCABULARY WORDS AND IS AVAILABKE TO BE PLAYED BY STUDENTS ON-DEMAND, ON ANY DEVICE THAT IS INTERNET ABLE.
-ADDITIONALLY PRINTED COLIES OF THE ARTICLE AND THE 10 READING COMPREHENSION QUESTIONS ARE AVAILABLE IN ENGLISH/SPANISH.
TEACHER PROVIDES A FRAME MODEL AS SCAFFOLDING TO HELP STUDENTS WRITE AN ACADEMIC REPORT
ISLA Date
Computer Technology/CC NAME _______
Mr. Fulcar Class _
ACADEMIC REPORT
TITLE “______“
This non fiction document is about __________________.
First or To begin with, according to the document that states, “__”.
This means that ______________________________________.
Second or Addtitionally, according to the document that states, “_”.
This means that ______________________________________.
Third, according to the document that states, “ _______________“.
This means that ______________________________________.
Fourth, according to the document that states, “________________”
This means that ______________________________________.
Fifth, according to the document that states, “ ________________”.
This means that ______________________________________.
Finally, according to the document that states, “_______________.”
This means that ______________________________________.
One connection that I can make with this topic is ______________.
The Significance or Importance of this topic is that _____________.
This topic affects me, my family or my community because ______.
EXIT TICKET:
ONCE YOU ARE DONE TYPING YOUR ACADEMIC REPORT PLEASE SUBMIT AND TURN IT IN ON CLASSSWORK TAB FOR GRADING.
POST ASSESSMENT:
A COMPREHENSION QUIZ WILL BE ADMINISTERED ONLINE TO GAGE STUDENTS LEVEL OF READING COMPREHENSION AND UNDERSTANDING OF THE ARTICLE’S MAIN IDEA AND RELEVANT DETAILS.
SUPPORT FOR ENGLISH LANGUAGE LEARNERS:
MULTIMEDIA VIDEO, ARTICLE , POST ASSMT PLUS FRAME MODEL FOR ACADEMIC REPORT IS PROVIDED IN SPANISH
ARTICULO DE NO FICCION Brainpo en Español Titulado “HACKEADORES”
GRAN PREGUNTA: En tu opinion, Que son los Hackeadores Informaticos?
HACER AHORA:.
1) VER EL VIDEO MULTI MEDIA https://esp.brainpop.com/tecnologia/ciudadania_digital/hackers/
y LUEGO LEER EL ARTICULO
2) Tomar APUNTES CORNELL en su CUADERNO (TÍTULO / IDEA PRINCIPAL / 5-10 DETALLES IMPORTANTES DE LAS PALABRAS DE TEXTO / VOCABULARIO CLAVE)
3) ESCRIBIR un RESUMEN ACADEMICO en su CUADERNO asegurándose de incluir:
-TÍTULO,
-AUTOR, IDEA CENTRAL, SECUENCIA DE EVENTOS / DETALLES IMPORTANTES
-LAS PALABRAS DE TRANSICIÓN (Inicialmente, Adicional, Posteriormente, Finalmente) O (PRIMERO, SEGUNDO, TERCERO, CUARTO, QUINTO …)
TEXTO A PERSONA, TEXTO AL MUNDO O CONEXIÓN DE TEXTO A TEXTO. (Una conexión que puedo hacer con este tema es … Este tema me afecta a mí, a mi familia y a mi comunidad porque … Esto el tema es importante para mí porque …)
ISLA Fecha
Tecnología informática/CC NOMBRE _______
Sr. Fulcar Clase _
REPORTE ACADÉMICO
TÍTULO “______“
Este documento de no ficción trata sobre __________________.
Primero o Para empezar, según el documento que dice, “_______ ”.
Esto significa que _______________________________________.
En segundo lugar o adicionalmente, según el documento que dice, “_”.
Esto significa que _______________________________________.
En tercer lugar, según el documento que dice, “_______________“.
Esto significa que _______________________________________.
Cuarto, según el documento que dice, “________________” .
Esto significa que _______________________________________.
Quinto, según el documento que dice, “_______________”.
Esto significa que _______________________________________.
Finalmente, según el documento que dice, “_______________”.
Esto significa que _______________________________________.
Una conexión que puedo hacer con este tema es ______________.
El significado o importancia de este tema es que _____________.
Este tema me afecta a mí, a mi familia o a mi comunidad porque
POST ASSESSMENT “HACKERS” LESSON
Quiz 1.
- A typical 1950s computer probably would be unable to: /Una tipica computadora los años 50 probablemente no podria:a. Calculate the volume of a lake/CALCULAR EL VOLUMEN DE UN LAGO. b. Connect to a network/CONECTARSE A UNA RED. c. Help determine the speed of Earth’s spin/AYUDAR A DETERMINAR LA VELOCIDAD DE ROTACION DE LA TIERRA.d. Process sales data/PROCESAR DATOS DE VENTAS.
- 2. What new feature did the PDP-1 have that made Spacewar! possible?/QUE NUEVO DETALLE TENIA LA COMPUTADORA PDP-1 QUE HIZO POSIBLE EL VIDEO JUEGO “SPACEWAR”? a. A hard drive/UN DISCO DURO. b. A full-sized keyboard/UN TECLADO. c. A laser printer/UNA IMPRESORA LASER.d. A graphic display/UN TARJETA GRAFICA.
- Phone phreakers were driven mainly by:/LOS PHEAKERS O HACKERS TELEFONICOS ERAN IMPULSADOS POR: :a. Curiosity CURIOSIDAD. b. Greed/AVARICIA. c. Selflessness/EGOISMO. d. Competitiveness/ COMPETITIVIDAD.
- Which word best describes the Home brew Club of the early 1970s?/QUE PALABRA MEJOR DESCRIBE EL HOMEBREW CLUB DE LOS PRINCIPIOS DE LOS ANOS 70S? Political/Politico. b. Hobbyist/Pasatiempo. c. Academic/Academico. d. Philanthropic/Filantropico
- ARPANET was built to help people do things like:El Arpanet FUE CONSTRUIDO PARA AYUDAR A LAS PERSONAS A HACER COSAS COMO: a. Sort through census data/ORGANIZAR DATOS DEL CENSO. b. Move troops around the country/MOVER TROPAS ALREDEDOR DEL PAIS. c. Track the movement of distant galaxies/RASTREAR EL MOVIMIENTO DE GALAXIAS DISTANTES. d. Connect with friends all over the world./CONECTARSE CON AMIGOS POR TODO EL MUNDO.
- Which of the following people would most likely be described as a “black hat?”/CUAL DE LAS SIGUIENTES PERSONAS PODRIAN SER MAS DECRITO COMO UN HACKER ‘SOMBRERO NEGRO”?
A hacker who gathers credit card information/UN HACKER QUE OBTIENE INFORMACION DE TARJETAS DE CREDITO. b. A person who teaches herself to code/UNA PERSONA QUE ENSEÑA A CODIFICAR. c. A student programmer who snuck around MIT in the SIXTIES./UN ESTUDIANTE PROGRAMADOR DE LA MIT EN LOS AÑOS 6Os. d. A programmer who designs web sites anonymously/UN PROGRAMADOR QUE DISEÑA PAGINAS DE INTERNET ANONIMAMENTE. - Why might a bank hire a “white hat?”/PORQUE QUERIA UN BANCO CONTRATAR A UN HACKER “SOMBRERO BLANCO”? a. To design an easier to use phone app/PARA DISEÑAR UNA APLICACION MOVIL MAS FACIL DE USAR. b. To calculate their projected profits for the upcoming year./PARA CALCULAR LAS GANANCIAS PROYECTADAS DEL AÑO PROXIMO. c. To teach their employees how to better use the Internet./PARA ENSEÑAR A SUS EMPLEADOS COMO USAR MEJOR LA INTERNET. d. To protect their database from unauthorized access./A FIN DE PROTEGER SU BASE DE DATOS DE ACCESO NO AUTORIZADO.
- 8. Which literary character would hacktivists most likely compare themselves to?/A QUE PERSONAJE LITERARIO SE PODRIAN COMPARA A SI MISMOS LOS ACTIVISTAS HACKERS? a. Cinderella/CENICIENTA. b. Robin Hood/ROBIN HOOD. c. The Wicked Witch/LA BRUJA MALVADA. d. The Big Bad Wolf/EL LOBO FEROZ 9.9. Which of these statements is most accurate?CUAL DE ESTAS DECLARACIONES IS LA MAS ACERTADA? a. Hackers include only those who steal and vandalize./LOS HACKERS SON SOLO AQUELLOS QUE ROBAN Y VANDALIZAN. b. Hacking can be constructive or destructive./HACKEAR PUEDE SER CONSTRUCTIVO O DESTRUCTIVO. c. Only white hats are true hackers./SOLO LOS “SOMBREROS BLANCOS” SON LOS VERDADEROS HACKERS. d. The difference between white and black hats is a matter of opinion./LA DIFERENCIA ENTRE LOS SOMBRREROS BLANCOS Y NEGROS ES PURA OPINION.
- Hackathons are events in which:/LOS HACKATONES SON EVENTOS EN LOS QUE:
a. Black hats work on ways to break into systems./LOS SOMBREROS NEGROS TRABAJAN EN PENETRAR SISTEMAS. b. White hats trade ideas on improving system security./LOS SOMBREROS BLANCOS INTERCAMBIAN IDEAS PARA MEJORAR LA SEGURIDAD DEL SISTEMA. Hacktivists planned their next attack./LOS HACKTIVISTAS TRABAJAN EN SU PROXIMO ATAQUE. d. Programmers test their skills through competition./LOS PROGRAMADORES PRUEBAN SUS HABILIDADES A TRAVES DE COMPETENCIAS.
- Hackathons are events in which:/LOS HACKATONES SON EVENTOS EN LOS QUE: