Search Results
Showing results 1 to 20 of 119
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-974.jpg?itok=fabJIthq)
Squeezing Pictures Into Codes
Source Institutions
In this activity, learners will explore how computers represent pictures using pixels.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-996.jpg?itok=Jq8XOQLX)
Programming Languages: Marching Orders
Source Institutions
In this activity about computer programming, learners follow instructions in a variety of ways in order to successfully draw figures.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-986.png?itok=PCuUa3kJ)
Artificial Intelligence: The Intelligent Piece of Paper
Source Institutions
This activity explores what it means for a computer to be intelligent and introduces the topic of what a computer program is and how everything computers do simply involves following instructions writ
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-000-261.png?itok=G8zqFYi5)
Colour by Numbers: Image Representation
Source Institutions
This activity shows learners how computers use numbers to represent pictures. A grid is used to represent the pixels (short for picture elements) of a computer screen.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-977.jpg?itok=mr-qdp1x)
Guess the Sentence
Source Institutions
In this activity, learners play a game similar to Hangman by guessing a secret phrase to understand how computer scientists measure the amount of "information" in a document.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-005-262.jpg?itok=8_9VV5Dj)
Find My Card
Source Institutions
In this activity, learners find the answer to the question, "if you have a pile of 8 cards, and you remove half, then half again, how many times can you do this until you get to just one card?" This w
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-987.jpg?itok=lA9IO2--)
The Turing Test: Conversations with Computers
Source Institutions
This activity aims to stimulate discussion on the question of whether computers can exhibit “intelligence,” or are ever likely to do so in the future.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-005-263.jpg?itok=J4Wyaceq)
Mind-Reading Magic
Source Institutions
In this activity, learners recreate a method of detecting and correcting errors in computers called 'parity'.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-978.jpg?itok=RxzWJlnY)
Guess My Number
Source Institutions
In this game, learners experience how computers divide a big problem into many smaller ones and how they use binary "yes"/"no" questions.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-995.png?itok=E9nL6ARP)
Programming Languages: Harold the Robot
Source Institutions
In this activity related to computer programming, learners give directions to a "robot" (either an adult or another learner) and find out which instructions the robot is able to follow, and how their
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-976.jpg?itok=2v6Nu0NE)
Unlocking the Secret in Product Codes
Source Institutions
In this activity, learners will explore how product barcodes are scanned accurately and be able to "guess" the last number in a 13 digit barcode correctly every time.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-651.jpg?itok=C4X5DdHl)
Battleships: Searching Algorithms
Source Institutions
This activity explores the main algorithms that are used as the basis for searching on computers, using different variations on the game of battleships.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-979.jpg?itok=89iyYpBv)
Binary Challenge
Source Institutions
In this activity, learners cut out 5 paper cards and label them with 1, 2, 4, 8, or 16 dot(s) to explore binary digits.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-975.jpg?itok=dT3ypJTh)
Kidbots
Source Institutions
In this activity, one person acts as a human robot while another acts as their developer by programming their actions.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-652.png?itok=7Y7WKinv)
Twenty Guesses: Information Theory
Source Institutions
This activity introduces the idea that computer scientists measure information by how "surprising" a message is.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-997.gif?itok=pVh9fQ_z)
Divide and Conquer: Santa's Dirty Socks
Source Institutions
This activity introduces the idea of "divide and conquer" using a fictitious but serious problem--a pair of dirty socks has accidentally been wrapped in one of the presents that Santa is about to deli
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-000-260.png?itok=pBbwbNrY)
You Can Say That Again!: Text Compression
Source Institutions
This activity helps students learn how computers "compress" text by identifying repeating patterns of letters, words, and phrases.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-999.jpg?itok=_4pzAVmU)
The Muddy City: Minimal Spanning Trees
Source Institutions
In this puzzle, learners investigate the decisions involved in linking a network between houses in a muddy city.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-994.jpg?itok=nUil-1Fj)
The Poor Cartographer: Graph Coloring
Source Institutions
In this activity, learners help a poor cartographer color in the countries on a map, making sure each country is colored a different color than any of its neighbors.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-989.jpg?itok=31BVjoBi)
Public Key Encryption: Kid Krypto
Source Institutions
In this activity, learners conduct a simulation exercise related to public key encryption and try to intercept a message sent between two learners.