Search Results
Showing results 1 to 20 of 23
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-989.jpg?itok=31BVjoBi)
Public Key Encryption: Kid Krypto
Source Institutions
In this activity, learners conduct a simulation exercise related to public key encryption and try to intercept a message sent between two learners.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-651.jpg?itok=C4X5DdHl)
Battleships: Searching Algorithms
Source Institutions
This activity explores the main algorithms that are used as the basis for searching on computers, using different variations on the game of battleships.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-978.jpg?itok=RxzWJlnY)
Guess My Number
Source Institutions
In this game, learners experience how computers divide a big problem into many smaller ones and how they use binary "yes"/"no" questions.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-994.jpg?itok=nUil-1Fj)
The Poor Cartographer: Graph Coloring
Source Institutions
In this activity, learners help a poor cartographer color in the countries on a map, making sure each country is colored a different color than any of its neighbors.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-995.png?itok=E9nL6ARP)
Programming Languages: Harold the Robot
Source Institutions
In this activity related to computer programming, learners give directions to a "robot" (either an adult or another learner) and find out which instructions the robot is able to follow, and how their
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-997.gif?itok=pVh9fQ_z)
Divide and Conquer: Santa's Dirty Socks
Source Institutions
This activity introduces the idea of "divide and conquer" using a fictitious but serious problem--a pair of dirty socks has accidentally been wrapped in one of the presents that Santa is about to deli
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-996.jpg?itok=Jq8XOQLX)
Programming Languages: Marching Orders
Source Institutions
In this activity about computer programming, learners follow instructions in a variety of ways in order to successfully draw figures.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-000-261.png?itok=G8zqFYi5)
Colour by Numbers: Image Representation
Source Institutions
This activity shows learners how computers use numbers to represent pictures. A grid is used to represent the pixels (short for picture elements) of a computer screen.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-000-260.png?itok=pBbwbNrY)
You Can Say That Again!: Text Compression
Source Institutions
This activity helps students learn how computers "compress" text by identifying repeating patterns of letters, words, and phrases.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-000.gif?itok=cVNf8Wj4)
Sound Representation: Modems Unplugged
Source Institutions
In this activity, learners listen to songs and decode hidden messages based on the same principle as a modem. As a final challenge, learners decode the binary messages in a music video.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-000-259.png?itok=yDpeopFH)
Card Flip Magic: Error Detection & Correction
Source Institutions
This magic trick is based on how computers detect and correct data errors.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-988.jpg?itok=aewVqsKy)
Human Interface Design: The Chocolate Factory
Source Institutions
In this activity about human interface design issues, learners help the Oompa-Loompas of a great chocolate factory solve different problems.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-005-263.jpg?itok=J4Wyaceq)
Mind-Reading Magic
Source Institutions
In this activity, learners recreate a method of detecting and correcting errors in computers called 'parity'.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-979.jpg?itok=89iyYpBv)
Binary Challenge
Source Institutions
In this activity, learners cut out 5 paper cards and label them with 1, 2, 4, 8, or 16 dot(s) to explore binary digits.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-005-262.jpg?itok=8_9VV5Dj)
Find My Card
Source Institutions
In this activity, learners find the answer to the question, "if you have a pile of 8 cards, and you remove half, then half again, how many times can you do this until you get to just one card?" This w
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-999.jpg?itok=_4pzAVmU)
The Muddy City: Minimal Spanning Trees
Source Institutions
In this puzzle, learners investigate the decisions involved in linking a network between houses in a muddy city.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-998.gif?itok=sfGxId-V)
Phylogenetics
Source Institutions
This activity lets learners participate in the process of reconstructing a phylogenetic tree and introduces them to several core bioinformatics concepts, particularly in relation to evolution.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-993.jpg?itok=q8igqcdr)
Tourist Town: Dominating Sets
Source Institutions
In this activity, learners use a fictitious map of "Tourist Town" and counters to problem solve how to place ice-cream vans on street intersections so that every other intersection is connected to one
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-987.jpg?itok=lA9IO2--)
The Turing Test: Conversations with Computers
Source Institutions
This activity aims to stimulate discussion on the question of whether computers can exhibit “intelligence,” or are ever likely to do so in the future.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-990.jpg?itok=npbYdK6Z)
Cryptographic Protocols: The Peruvian Coin Flip
Source Institutions
This activity about cryptographic techniques illustrates how to accomplish a simple, but nevertheless seemingly impossible task—making a fair, random choice by flipping a coin between two people who d