# PROBLEM SOLVING ELAPSED TIME LESSON 12.9

Understand how these forms of bit representation are used in modern technology. Ask students what they learned: Point out that some computers have more than one processor and an algorithm can be written to do 2 or more processes in parallel. Using a single light switch, how can you represent the value 0? Measure Area Mid-Chapter Checkpoint.

Students will understand that the page rank algorithm depends on many factors, has changed over time, and has a large impact on the traffic that a site gets. Students describe ways that greater speed, detail and precision in processing information is possible because of computation. They develop fluency with efficient procedures formultiplying whole numbers; understand and explain why the procedures work based on place value and properties of operations; and use them to solveproblems. Students will study types of cyber attacks and the vulnerabilities they exploit, and identify the roles of software, hardware, people, and the Internet. They will take the remaining 25 minutes to:.

Keep a tally of how many times you repeated the process. Part 3 – Game Activity with Student Algorithms 15 min Students should use their new algorithm to play against each other.

## Monthly Archives: February 2018

Students describe and analyze shapes by examining their sides and angles. They will then share their findings with the class. Session 1 Getting Started 5 min – Journal The purpose of this session is to make students think about the different ways in which they as individuals use computers and the Internet to communicate.

COMPARE AND CONTRAST ESSAY ON THE MONKEYS PAW AND THE THIRD WISH

Show the various combinations. After Activity D, Have students compare results with their elbow partners.

# Rita Antoni / Fourth Grade Flipped Lessons

However, teachers may not require selection of ldsson topics for students. The group with the most points, when all notes have been posted, chooses the poster they want to work on.

See Teacher Resources for online tools that can be used to create concept maps. Multistep within ; identify whole numbers as prime or Division Problems composite 4. Students read commandments and individually identify the two they think are most frequently violated.

Problem Solving – Model Addition. Give the students the practice problem from Independent Activity 1 below. If this was done in the practice task, then questions addressed in this session may be assigned as homework, with elaapsed using the first day to do preliminary research.

Respond to each of the student’s questions posted on the board. How can computing extend traditional forms of human expression and experience?

They will pair off to discuss their answers, then share their findings with the class. This is the first day of a two-session lesson sequence with topics covered by mini-lectures, explorations, and practice exercises.

Be careful not to make any student feel awkward for lack of a home computer they are allowed to install softare on. How does redundancy of routers contribute to Internet fault tolerance? The algorithm is the set of steps that you follow to accomplish the encryption.

Have students discuss with their partner the answers to the pre-reading questions from Blown To Bits Chapter 1 see Questions to Consider in Teacher Resources. They are welcome to use online sources for pictures or create their own.