Search Results
Showing results 1 to 11 of 11

Artificial Intelligence: The Intelligent Piece of Paper
Source Institutions
This activity explores what it means for a computer to be intelligent and introduces the topic of what a computer program is and how everything computers do simply involves following instructions writ

The Turing Test: Conversations with Computers
Source Institutions
This activity aims to stimulate discussion on the question of whether computers can exhibit “intelligence,” or are ever likely to do so in the future.

Divide and Conquer: Santa's Dirty Socks
Source Institutions
This activity introduces the idea of "divide and conquer" using a fictitious but serious problem--a pair of dirty socks has accidentally been wrapped in one of the presents that Santa is about to deli

Public Key Encryption: Kid Krypto
Source Institutions
In this activity, learners conduct a simulation exercise related to public key encryption and try to intercept a message sent between two learners.

Sound Representation: Modems Unplugged
Source Institutions
In this activity, learners listen to songs and decode hidden messages based on the same principle as a modem. As a final challenge, learners decode the binary messages in a music video.

How to Train Your Robot
Source Institutions
In this activity, learners discover that training a robot can be hard work! Learners investigate how robots complete a task by following a list of sequential instructions.
Team Up: Fun With Division
Source Institutions
In this activity, learners will divide into teams or groups of equal size. “How many teams of three can we make?” “We need an equal number of children at each of the four computers.

Metal Heads
Source Institutions
Pairs of learners play the roles of programmer and robot. The programmer gives specific directions to the robot to accomplish a simple task (e.g. walk across the room and pick up a pencil).

Hand Biometrics Technology
Source Institutions
In this activity, learners explore how engineers incorporate biometric technologies into products as well as the challenges of engineers who must weigh privacy, security and other issues when designin

Coral Snapshots: Biodiversity in Marine Protected Areas
Source Institutions
In this data activity, learners analyze data from coral reef snapshots taken by scientists at the Virginia Institute of Marine Science.

From the Internet to Outer Space
Source Institutions
In this activity, learners will use Google Sky to observe features of the night sky and share their observations.