UDL Redesigned COMP SCI Lesson Plan
UDL Redesigned COMP SCI Lesson Plan

UDL Redesigned COMP SCI Lesson Plan

Teacher: Mr. Fulcar

Grade Level: 6th/ 7th
Subject: Computer ScienceDate:
Unit/Theme: Intro to COMPUTER PROGRAMMING THEORY

Content Objective(s): SWBAT – Analyze the Main Idea and Author’s purpose from Non Fiction Online articles read independently.

Language Objective(s): SWBAT – Students will identify the Main Idea, supporting Textual Details and Key Vocabulary from an Online Multimedia video and Non Fiction Article in order to write an academic report.

Key Vocabulary: -Hackers, Massachusetts Institute of Technology (MIT, hacking, refining code, iteration, Super Computers, PDP-1, Space War 1st video game, Phreakers, Hackers Ethic, Black Hat vs White Hats Hackers, Homebrew Computer Club, Apple’s co-founder, Steve Wozniak, hacktivists, improving security, finding weaknesses in networks, Cybersecurity.

Materials: CHROMEBOOK LAPTOPS, SMART BOARD, GOOGLE CLASSROOM
Lesson Sequence:

ENTRANCE TICKET:
BIG QUESTION:
In your opinion, WHAT IS A HACKER? Ask students to TURN & TALK and discuss the question with their PARTNER/GROUP.

TURN AND TALK: DISCUSS WITH YOUR PARTNER/TABLE. SHARE YOUR RESPONSE. POST YOUR RESPONSE ON GOOGLE CLASSROOM

UDL principle: There are two or more options for multiple means of engagement in the learning activity.

DO NOW:
ASSIGNMENT No 5 NON FICTION ARTICLE “HACKERS”

UDL PRINCIPLE:
There is a description of two or more ways that the learning activity can be made accessible. Multimedia Video can be accessed On-Demand, in English or Spanish for English Language Learners, featuring Images, Audio for Vsual and Auditory Learners, and with Closed Captions for Hearing Impaired and ELLS.

DO NOW:
MOTIVATIONAL ACTIVITY:
1) Watch Multimedia video “HACKERS” at brainpop.com at least 3xs times.
Click on https://www.brainpop.com/technology/computerscience/hackers/

2) Read the NON FICTION ARTICLE “HACKERS” “HACKERS” Non Fiction Article
and Take CORNELL NOTES on your NOTEBOOK (TITLE/MAIN IDEA/5-10 IMPORTANT DETAILS FROM THE TEXT/KEY VOCABULARY WORDS)
3) WRITE an ACADEMIC REPORT on GOOGLE DOCS about the Video making sure to include:

RUBRIC FOR ACADEMIC REPORT:
-TITLE,
-AUTHOR, CENTRAL IDEA, SEQUENCE OF EVENTS/IMPORTANT DETAILS
-TRANSITION WORDS (Initially, Additionally, Subsequently, Finally) OR (FIRST, SECOND, THIRD, FOURTH, FIFTH…)
-PERSONAL TEXT-TO-SELF, TEXT-TO-WORLD OR TEXT-TO-TEXT CONNECTION.(One connection I can make to this topic is … This topic affects me, my family, and my community because… This topic is important to me because…)

UDL principle:
There are two or more options for multiple means of action & expression in the learning activity.

Students can use their Cornel Notes to write an Academic Report on a Google Doc or on a Google Slide as evidence of their comprehension of the Article and the Multimedia Video.

TEACHER PROVIDES A MODEL OF CORNELL NOTES AS SCAFFOLDING TO HELP STUDENTS IDENTIFY MAIN IDEA, SUPPORTING DETAILS AND KEY VOCABULARY WORDS.

TEACHER PROVIDES CORNELL NOTES AS A MODEL

TEACHER PROVIDES CORNELL NOTES AS A MODEL

3) USE your CORNELL NOTES to help you WRITE an ACADEMIC REPORT on a GOOGLE DOCS or on a GOOGLE SLIDE.

-3 WAYS THIS LEARNING AND CONTENT IS ACCESSIBLE TO ALL LEARNERS IN MY CLASSROOM:
ITS AVAILABLE IN AS A NON-FICTION ARTICLE
ITS AVAILABLE AS A MULTIMEDIA VIDEO
3) ITS AVAILABLE IN ENGLISH/SPANISH FORMAT

-ONE ASSISTIVE TECHNOLOGY AVAILABLE TO ALL LEARNERS IN JY CLASSROOM IS THE MULTIMEDIA VIDEOS ON BRAIPOP,COM. THEY FEATURE IMAGES, ANIMATIONS, CLOSED CAPTIONS AND EVEN A TRANSCRIPT OF THE VIDEO. VIDEO ALSO FEATURE KEY VOCABULARY WORDS AND IS AVAILABKE TO BE PLAYED BY STUDENTS ON-DEMAND, ON ANY DEVICE THAT IS INTERNET ABLE.

-ADDITIONALLY PRINTED COLIES OF THE ARTICLE AND THE 10 READING COMPREHENSION QUESTIONS ARE AVAILABLE IN ENGLISH/SPANISH.

TEACHER PROVIDES A FRAME MODEL AS SCAFFOLDING TO HELP STUDENTS WRITE AN ACADEMIC REPORT

ISLA Date
Computer Technology/CC NAME _______

Mr. Fulcar Class _

ACADEMIC REPORT

TITLE “______

This non fiction document is about __________________.

First or To begin with, according to the document that states, “__”.

This means that ______________________________________.

Second or Addtitionally, according to the document that states, “_”.

This means that ______________________________________.

Third, according to the document that states, “ _______________“.

This means that ______________________________________.

Fourth, according to the document that states, “________________

This means that ______________________________________.

Fifth, according to the document that states, “ ________________”.

This means that ______________________________________.

Finally, according to the document that states, “_______________.”

This means that ______________________________________.

One connection that I can make with this topic is ______________.

The Significance or Importance of this topic is that _____________.

This topic affects me, my family or my community because ______.

EXIT TICKET:
ONCE YOU ARE DONE TYPING YOUR ACADEMIC REPORT PLEASE SUBMIT AND TURN IT IN ON CLASSSWORK TAB FOR GRADING.

POST ASSESSMENT:
A COMPREHENSION QUIZ WILL BE ADMINISTERED ONLINE TO GAGE STUDENTS LEVEL OF READING COMPREHENSION AND UNDERSTANDING OF THE ARTICLE’S MAIN IDEA AND RELEVANT DETAILS.

SUPPORT FOR ENGLISH LANGUAGE LEARNERS:
MULTIMEDIA VIDEO, ARTICLE , POST ASSMT PLUS FRAME MODEL FOR ACADEMIC REPORT IS PROVIDED IN SPANISH

ARTICULO DE NO FICCION Brainpo en Español Titulado “HACKEADORES”
GRAN PREGUNTA: En tu opinion, Que son los Hackeadores Informaticos?
HACER AHORA:.
1) VER EL VIDEO MULTI MEDIA https://esp.brainpop.com/tecnologia/ciudadania_digital/hackers/
y LUEGO LEER EL ARTICULO
2) Tomar APUNTES CORNELL en su CUADERNO (TÍTULO / IDEA PRINCIPAL / 5-10 DETALLES IMPORTANTES DE LAS PALABRAS DE TEXTO / VOCABULARIO CLAVE)

3) ESCRIBIR un RESUMEN ACADEMICO en su CUADERNO asegurándose de incluir:

-TÍTULO,
-AUTOR, IDEA CENTRAL, SECUENCIA DE EVENTOS / DETALLES IMPORTANTES
-LAS PALABRAS DE TRANSICIÓN (Inicialmente, Adicional, Posteriormente, Finalmente) O (PRIMERO, SEGUNDO, TERCERO, CUARTO, QUINTO …)
TEXTO A PERSONA, TEXTO AL MUNDO O CONEXIÓN DE TEXTO A TEXTO. (Una conexión que puedo hacer con este tema es … Este tema me afecta a mí, a mi familia y a mi comunidad porque … Esto el tema es importante para mí porque …)

ISLA Fecha
Tecnología informática/CC NOMBRE _______

Sr. Fulcar Clase _

REPORTE ACADÉMICO

TÍTULO “______

Este documento de no ficción trata sobre __________________.

Primero o Para empezar, según el documento que dice, “_______ ”.
Esto significa que _______________________________________.

En segundo lugar o adicionalmente, según el documento que dice, “_”.
Esto significa que _______________________________________.

En tercer lugar, según el documento que dice, “_______________“.
Esto significa que _______________________________________.

Cuarto, según el documento que dice, “________________” .
Esto significa que _______________________________________.

Quinto, según el documento que dice, “_______________”.
Esto significa que _______________________________________.

Finalmente, según el documento que dice, “_______________”.
Esto significa que _______________________________________.

Una conexión que puedo hacer con este tema es ______________.
El significado o importancia de este tema es que _____________.

Este tema me afecta a mí, a mi familia o a mi comunidad porque

POST ASSESSMENT “HACKERS” LESSON
Quiz 1.

  1. A typical 1950s computer probably would be unable to: /Una tipica computadora los años 50 probablemente no podria:a. Calculate the volume of a lake/CALCULAR EL VOLUMEN DE UN LAGO. b. Connect to a network/CONECTARSE A UNA RED. c. Help determine the speed of Earth’s spin/AYUDAR A DETERMINAR LA VELOCIDAD DE ROTACION DE LA TIERRA.d. Process sales data/PROCESAR DATOS DE VENTAS.
  2. 2. What new feature did the PDP-1 have that made Spacewar! possible?/QUE NUEVO DETALLE TENIA LA COMPUTADORA PDP-1 QUE HIZO POSIBLE EL VIDEO JUEGO “SPACEWAR”? a. A hard drive/UN DISCO DURO. b. A full-sized keyboard/UN TECLADO. c. A laser printer/UNA IMPRESORA LASER.d. A graphic display/UN TARJETA GRAFICA.
  3. Phone phreakers were driven mainly by:/LOS PHEAKERS O HACKERS TELEFONICOS ERAN IMPULSADOS POR: :a. Curiosity CURIOSIDAD. b. Greed/AVARICIA. c. Selflessness/EGOISMO. d. Competitiveness/ COMPETITIVIDAD.
  4. Which word best describes the Home brew Club of the early 1970s?/QUE PALABRA MEJOR DESCRIBE EL HOMEBREW CLUB DE LOS PRINCIPIOS DE LOS ANOS 70S? Political/Politico. b. Hobbyist/Pasatiempo. c. Academic/Academico. d. Philanthropic/Filantropico
  5. ARPANET was built to help people do things like:El Arpanet FUE CONSTRUIDO PARA AYUDAR A LAS PERSONAS A HACER COSAS COMO: a. Sort through census data/ORGANIZAR DATOS DEL CENSO. b. Move troops around the country/MOVER TROPAS ALREDEDOR DEL PAIS. c. Track the movement of distant galaxies/RASTREAR EL MOVIMIENTO DE GALAXIAS DISTANTES. d. Connect with friends all over the world./CONECTARSE CON AMIGOS POR TODO EL MUNDO.
  6. Which of the following people would most likely be described as a “black hat?”/CUAL DE LAS SIGUIENTES PERSONAS PODRIAN SER MAS DECRITO COMO UN HACKER ‘SOMBRERO NEGRO”?
    A hacker who gathers credit card information/UN HACKER QUE OBTIENE INFORMACION DE TARJETAS DE CREDITO. b. A person who teaches herself to code/UNA PERSONA QUE ENSEÑA A CODIFICAR. c. A student programmer who snuck around MIT in the SIXTIES./UN ESTUDIANTE PROGRAMADOR DE LA MIT EN LOS AÑOS 6Os. d. A programmer who designs web sites anonymously/UN PROGRAMADOR QUE DISEÑA PAGINAS DE INTERNET ANONIMAMENTE.
  7. Why might a bank hire a “white hat?”/PORQUE QUERIA UN BANCO CONTRATAR A UN HACKER “SOMBRERO BLANCO”? a. To design an easier to use phone app/PARA DISEÑAR UNA APLICACION MOVIL MAS FACIL DE USAR. b. To calculate their projected profits for the upcoming year./PARA CALCULAR LAS GANANCIAS PROYECTADAS DEL AÑO PROXIMO. c. To teach their employees how to better use the Internet./PARA ENSEÑAR A SUS EMPLEADOS COMO USAR MEJOR LA INTERNET. d. To protect their database from unauthorized access./A FIN DE PROTEGER SU BASE DE DATOS DE ACCESO NO AUTORIZADO.
  8. 8. Which literary character would hacktivists most likely compare themselves to?/A QUE PERSONAJE LITERARIO SE PODRIAN COMPARA A SI MISMOS LOS ACTIVISTAS HACKERS? a. Cinderella/CENICIENTA. b. Robin Hood/ROBIN HOOD. c. The Wicked Witch/LA BRUJA MALVADA. d. The Big Bad Wolf/EL LOBO FEROZ 9.9. Which of these statements is most accurate?CUAL DE ESTAS DECLARACIONES IS LA MAS ACERTADA? a. Hackers include only those who steal and vandalize./LOS HACKERS SON SOLO AQUELLOS QUE ROBAN Y VANDALIZAN. b. Hacking can be constructive or destructive./HACKEAR PUEDE SER CONSTRUCTIVO O DESTRUCTIVO. c. Only white hats are true hackers./SOLO LOS “SOMBREROS BLANCOS” SON LOS VERDADEROS HACKERS. d. The difference between white and black hats is a matter of opinion./LA DIFERENCIA ENTRE LOS SOMBRREROS BLANCOS Y NEGROS ES PURA OPINION.
    1. Hackathons are events in which:/LOS HACKATONES SON EVENTOS EN LOS QUE:
      a. Black hats work on ways to break into systems./LOS SOMBREROS NEGROS TRABAJAN EN PENETRAR SISTEMAS. b. White hats trade ideas on improving system security./LOS SOMBREROS BLANCOS INTERCAMBIAN IDEAS PARA MEJORAR LA SEGURIDAD DEL SISTEMA. Hacktivists planned their next attack./LOS HACKTIVISTAS TRABAJAN EN SU PROXIMO ATAQUE. d. Programmers test their skills through competition./LOS PROGRAMADORES PRUEBAN SUS HABILIDADES A TRAVES DE COMPETENCIAS.
0 0 votes
Article Rating
Subscribe
Notify of
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x