Search Results
Showing results 1 to 5 of 5
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-989.jpg?itok=31BVjoBi)
Public Key Encryption: Kid Krypto
Source Institutions
In this activity, learners conduct a simulation exercise related to public key encryption and try to intercept a message sent between two learners.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-651.jpg?itok=C4X5DdHl)
Battleships: Searching Algorithms
Source Institutions
This activity explores the main algorithms that are used as the basis for searching on computers, using different variations on the game of battleships.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-572.png?itok=iSKG-Rc4)
Coma Cluster of Galaxies
Source Institutions
In this activity, learners will first learn the basics of galaxy classification and grouping.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-692.gif?itok=p-QwwR6s)
Rutherford Roller
Source Institutions
In this activity, learners make a black box device that serves as an excellent analogy to Rutherford's famous experiment in which he deduced the existence of the atomic nucleus.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-990.jpg?itok=npbYdK6Z)
Cryptographic Protocols: The Peruvian Coin Flip
Source Institutions
This activity about cryptographic techniques illustrates how to accomplish a simple, but nevertheless seemingly impossible task—making a fair, random choice by flipping a coin between two people who d