W 488 SECRET CODES FROM FIRST WORLD WAR

3y ago
65 Views
2 Downloads
998.71 KB
5 Pages
Last View : 20d ago
Last Download : 3m ago
Upload by : Mia Martinelli
Transcription

W 488SECRET CODES FROMTHE FIRST WORLD WARWendy York, Middle School Teacher, McDougle Middle SchoolJennifer Richards, Curriculum Specialist, Tennessee 4-H Youth DevelopmentMANAGEMENT OF APHIDS AND BYD IN TENNESSEE WHEAT1

Tennessee 4-H Youth DevelopmentThis lesson plan has beendeveloped as part of the TIPPsfor 4-H curriculum.Secret Codes from the First World WarSkill LevelGrades 6-8Learner OutcomesThe learner will be able to: Understand the role secret codes playedin the First World War Identify the reasons the United Statesjoined the First World War Discuss ways to use secret codes intoday’s societyIntroduction to ContentThis lesson explores secret codes usedduring the First World War. Students areintroduced to the history of the codes andwhy they were used. Students then learnabout how codes are made, and finallycreate their own.Educational Standard(s) SupportedSchool Counseling and Career Guidance,Standard 7Success IndicatorLearners will be successful if they: Understand the reasons why the USentered World War I Create secret codes for modern messagesTime Needed45 MinutesIntroduction to MethodologyThis lesson begins by introducingstudents to the concept of secret codesby giving some background information.Students are then given the opportunityto decode a secret code that triggered theUS’s entrance into the First World War.Students then create their own secretcoded tweets.Materials ListCopies of the deciphering grid, 10 copiesCopies of each sentence in the ZimmermannTelegraphAuthorsYork, Wendy, Middle School Teacher,McDougle Middle School.3Richards, Jennifer, Curriculum Specialist,Tennessee 4-H Youth Development.Secret Codes from the First World WarPrepared using research based practices in youthdevelopment and experiential learning.2

Terms and Concepts IntroductionTips for EngagementZimmermann Telegraph- A secret diplomatic communication issued fromthe German Foreign Office in January 1917 that proposed a militaryalliance between Germany and Mexico in the event of the United Statesentering World War I against Germany.Setting the Stage and Opening QuestionsSay to the students, “Codes have been used for a long time to send secretmessages. Today, you will decipher the code that led to the US enteringWorld War I.”Share the following video with the students to allow them to gain abackground knowledge of the Zimmermann Telegraph:https://www.youtube.com/watch?v AXjLEMHbTgoAfter students have watched the video, write the word “cypher” on the board.Ask students to brainstorm a definition of the word, then share the definitionof cypher with the students.Cypher- A secret or disguised way of writing. A code.ExperienceAsk students to form 10 groups. After the groups have been formed, pass out the decoding cypher to each groupand one line of the telegraph.Say to the students, “You all now have a copy of the decoding cypher, which is a secret way of writing, anda line from the Zimmermann telegraph. You’ll use the cypher to decode the telegraph. To give you anexample of how to use the cypher, we are going to decode our own short message.”Write the following text on the board: FFGDD AVVFX AVAFD GVX. Say to the students “Each pair ofletters in the code corresponds to one letter in the message. The first letter of each pair corresponds to thevertical axis on the cypher, and the second letter corresponds to the horizontal axis. Let’s look at each pairand decode the message as a class.”Work through decoding the message above as a class. When finished, the message should read: 4H IS GREATSecret Codes from the First World War3

ShareAfter students have decoded the message as a class, say to them, “Nowit’s your turn. In your team, work to decide your line from theZimmermann Telegraph. When you have finished, come up to meto check it, and if it’s correct, we will write it on the board.”The text of the decoded message has been included in the supplementalinformation.ProcessAfter each line has been decoded, ask students to interpret what wasmeant by the telegraph and share it with the class.GeneralizeAsk students to write a tweet (280 characters) about somethingappropriate they want to share using the secret message. After theyhave written the tweet, ask them to convert it into a coded messageusing the cypher.Life Skill(s) from TIPPsfor 4-H6th GradeUnderstand why knowledge ofdifferent cultural, racial, andethnic groups are important(Heart Relating)Clearly state your needs andfeelings to others (HeartRelating)Make an action plan toachieve a goal (HeadThinking)Understand the meaning of theinformation (Head Thinking)7th GradeIdentify possible solutions to aproblem or situation (HeadThinking)8th GradeCommunicate effectively(Hands Working)Share some interest and goalswith others (Heart Caring)ApplyAfter students have converted their tweets, ask them to share their tweetwith someone else in the class and have them decode it.Secret Codes from the First World War4

Supplemental InformationEducational Standards MetStandard 7: Self Knowledge and Interpersonal SkillsStudents will acquire the attitudes, knowledge, and interpersonal skills to help them understand andrespect self and othersFebruary 22, 1917To: von EckhardtMexico CityBritish crack top secret code. U.S. press may leak German plot with Mexico. Prepare to leave embassy on shortnotice.BernstorffWashington, DCW 488 03/18 18-0065 Programs in agriculture and natural resources, 4-H youth development, family and consumer sciences, and resourcedevelopment. University of Tennessee Institute of Agriculture, U.S. Department of Agriculture and county governments cooperating.UT Extension provides equal opportunities in programs and employment.

Secret Codes from the First World War Skill Level Grades 6-8 Learner Outcomes The learner will be able to: Understand the role secret codes played in the First World War Identify the reasons the United States joined the First World War Discuss ways to use secret codes in today’s society Educational Standard(s) Supported

Related Documents:

THE SECRET SEVEN is the first adventure of the SECRET SEVEN SOCIETY The other books are called: SECOND The Secret Seven Adventure THIRD Well Done Secret Seven! FOURTH Secret Seven on the Trail FIFTH Go Ahead Secret Seven SIXTH Good Work Secret Seven SEVENTH Secret Seven Win Through EIGHTH Three Cheers Secret Seven NINTH Secret Seven Mystery

ANSI/IEEE Standard 488.2-2003 is an extension of IEEE 488.1 that provides a means for achieving significantly higher data transfer rates (3 10 Mbytes/s) while maintaining compatibility with existing devices. The ANSI/IEEE Standard 488.2-1992 extends IEEE 488.1 by defining a bus communication protocol, a common set of data codes and formats, and a

View the Secret audit log to see which users have accessed the Secret. Delete the Secret. Change which template is being used to store and display information in this Secret. Secret Server – End User Guide Page 8 Editing a Secret To edit a Secret, navigate to its Secret V

THE SEVEN SECRETS OF HIGHLY SUCCESSFUL RESEARCH STUDENTS 1 CONTENTS Secret 1: Care and maintenance of your supervisor 2 Secret 2: Write and show as you go 13 Secret 3: Be realistic 19 Secret 4: Say no to distractions 24 Secret 5: It s a job 29 Secret 6: Get help 33 Secret 7: You can do it! 39 Now do something 44

Windows 95, Windows 98, Windows NT version 4.0, or Windows 2000. This manual assumes that you are already familiar with Windows. Using the NI-488.2 Documentation The following NI-488.2 documentation is available on your NI-488.2 for Windows CD: The Getting Started card briefly describ

Oct 01, 2015 · Conformed to FSC New Codes Added No new codes. Added a definition for R&D Stage 7, Commercialization, to the manual (the related codes are already in use in FPDS). 30 new codes to capture missing services. 1 code added to match FSC list. Codes End Dated None 12 ended codes (combined with existing codes). 39 codes which have been in use in FPDS but

cheatcc.codes cheatcode.codes cheatcodes.codes cheats.codes chet.codes chets.codes chilltowin.codes

business seeking funds from a venture capitalist might be affected by this perception of risk. The answer to this question in turn will expose the reader to more questions about whether venture capital in the future will be provided by diversified funds and what a specialized venture capitalist (who invests in one sector alone) might need to do to survive in such an environment. This will .