Search Results
Showing results 1 to 20 of 24
   
Public Key Encryption: Kid Krypto
Source Institutions
    
  In this activity, learners conduct a simulation exercise related to public key encryption and try to intercept a message sent between two learners.
   
Battleships: Searching Algorithms
Source Institutions
    
  This activity explores the main algorithms that are used as the basis for searching on computers, using different variations on the game of battleships.
   
The Poor Cartographer: Graph Coloring
Source Institutions
    
  In this activity, learners help a poor cartographer color in the countries on a map, making sure each country is colored a different color than any of its neighbors.
   
Pico Cricket Compass
Source Institutions
    
  Learners can program a compass to draw a circle by itself using a Pico Cricket, some Legos, and lots of tape! Pico Cricket is required.
   
The Muddy City: Minimal Spanning Trees
Source Institutions
    
  In this puzzle, learners investigate the decisions involved in linking a network between houses in a muddy city.
   
Human Interface Design: The Chocolate Factory
Source Institutions
    
  In this activity about human interface design issues, learners help the Oompa-Loompas of a great chocolate factory solve different problems.
   
Phylogenetics
Source Institutions
    
  This activity lets learners participate in the process of reconstructing a phylogenetic tree and introduces them to several core bioinformatics concepts, particularly in relation to evolution.
   
Programming Languages: Marching Orders
Source Institutions
    
  In this activity about computer programming, learners follow instructions in a variety of ways in order to successfully draw figures.
   
Divide and Conquer: Santa's Dirty Socks
Source Institutions
    
  This activity introduces the idea of "divide and conquer" using a fictitious but serious problem--a pair of dirty socks has accidentally been wrapped in one of the presents that Santa is about to deli
   
Artificial Intelligence: The Intelligent Piece of Paper
Source Institutions
    
  This activity explores what it means for a computer to be intelligent and introduces the topic of what a computer program is and how everything computers do simply involves following instructions writ
   
Ice Roads: Steiner Trees
Source Institutions
    
  In this outdoor activity, learners use pegs (like tent pegs) and string or elastic to simulate drill sites and roads in Northern Canada.
   
What am I?
Source Institutions
    
  In this activity, learners examine nanoscale structures of common things.
   
Cryptographic Protocols: The Peruvian Coin Flip
Source Institutions
    
  This activity about cryptographic techniques illustrates how to accomplish a simple, but nevertheless seemingly impossible task—making a fair, random choice by flipping a coin between two people who d
   
The Turing Test: Conversations with Computers
Source Institutions
    
  This activity aims to stimulate discussion on the question of whether computers can exhibit “intelligence,” or are ever likely to do so in the future.
   
Information Hiding: Sharing Secrets
Source Institutions
    
  This activity about cryptographic techniques illustrates a situation where information is shared, and yet none of it is revealed.
   
Tourist Town: Dominating Sets
Source Institutions
    
  In this activity, learners use a fictitious map of "Tourist Town" and counters to problem solve how to place ice-cream vans on street intersections so that every other intersection is connected to one
   
Sound Representation: Modems Unplugged
Source Institutions
    
  In this activity, learners listen to songs and decode hidden messages based on the same principle as a modem. As a final challenge, learners decode the binary messages in a music video.
   
Binary Code Bracelets
Source Institutions
    
  In this activity, learners make their own binary code bracelets by translating their initials into 0s and 1s represented by beads of 2 different colors.
   
EEEEK--A Mouse!
Source Institutions
    
  In this activity, learners explore the concept of how engineering solved the problem of human/computer interface.
   
Card Flip Magic: Error Detection & Correction
Source Institutions
    
  This magic trick is based on how computers detect and correct data errors.
  