Search Results


Showing results 1 to 4 of 4

Source Institutions
Add to list Details
In this activity, learners conduct a simulation exercise related to public key encryption and try to intercept a message sent between two learners.

free Ages 11 - 18 30 to 45 minutes
Source Institutions
Add to list Details
This activity explores the main algorithms that are used as the basis for searching on computers, using different variations on the game of battleships.

1 cent - $1 per group Ages 8 - adult 30 to 45 minutes
Source Institutions
Add to list Details
This activity aims to stimulate discussion on the question of whether computers can exhibit “intelligence,” or are ever likely to do so in the future.

free Ages 11 - 18 10 to 30 minutes
Source Institutions
Add to list Details
This activity about cryptographic techniques illustrates how to accomplish a simple, but nevertheless seemingly impossible task—making a fair, random choice by flipping a coin between two people who d

$1 - $5 per group Ages 8 - 18 30 to 45 minutes