Search Results
Showing results 1 to 20 of 29
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-989.jpg?itok=31BVjoBi)
Public Key Encryption: Kid Krypto
Source Institutions
In this activity, learners conduct a simulation exercise related to public key encryption and try to intercept a message sent between two learners.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-651.jpg?itok=C4X5DdHl)
Battleships: Searching Algorithms
Source Institutions
This activity explores the main algorithms that are used as the basis for searching on computers, using different variations on the game of battleships.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-994.jpg?itok=nUil-1Fj)
The Poor Cartographer: Graph Coloring
Source Institutions
In this activity, learners help a poor cartographer color in the countries on a map, making sure each country is colored a different color than any of its neighbors.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-664.jpg?itok=hkJtcN4-)
Pico Cricket Compass
Source Institutions
Learners can program a compass to draw a circle by itself using a Pico Cricket, some Legos, and lots of tape! Pico Cricket is required.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-997.gif?itok=pVh9fQ_z)
Divide and Conquer: Santa's Dirty Socks
Source Institutions
This activity introduces the idea of "divide and conquer" using a fictitious but serious problem--a pair of dirty socks has accidentally been wrapped in one of the presents that Santa is about to deli
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-996.jpg?itok=Jq8XOQLX)
Programming Languages: Marching Orders
Source Institutions
In this activity about computer programming, learners follow instructions in a variety of ways in order to successfully draw figures.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-003-460.jpg?itok=TIUyWvZh)
LEGO Orrery
Source Institutions
Use this model to demonstrate the goal of NASA's Kepler Mission: to find extrasolar planets through the transit method.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-000-261.png?itok=G8zqFYi5)
Colour by Numbers: Image Representation
Source Institutions
This activity shows learners how computers use numbers to represent pictures. A grid is used to represent the pixels (short for picture elements) of a computer screen.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-007.jpg?itok=rieoNpZ7)
Coral Snapshots: Biodiversity in Marine Protected Areas
Source Institutions
In this data activity, learners analyze data from coral reef snapshots taken by scientists at the Virginia Institute of Marine Science.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-000-260.png?itok=pBbwbNrY)
You Can Say That Again!: Text Compression
Source Institutions
This activity helps students learn how computers "compress" text by identifying repeating patterns of letters, words, and phrases.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-000.gif?itok=cVNf8Wj4)
Sound Representation: Modems Unplugged
Source Institutions
In this activity, learners listen to songs and decode hidden messages based on the same principle as a modem. As a final challenge, learners decode the binary messages in a music video.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-882.gif?itok=6a9GbEGg)
Locating a Point
Source Institutions
In this activity, learners work in teams to simulate the process used by Global Positioning Systems (GPS) to determine the location of a fallen meteorite in Antarctica.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-003-978.jpg?itok=IQMgNFCX)
EEEEK--A Mouse!
Source Institutions
In this activity, learners explore the concept of how engineering solved the problem of human/computer interface.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-906.jpg?itok=-vXZe1jv)
Binary Code Bracelets
Source Institutions
In this activity, learners make their own binary code bracelets by translating their initials into 0s and 1s represented by beads of 2 different colors.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-000-259.png?itok=yDpeopFH)
Card Flip Magic: Error Detection & Correction
Source Institutions
This magic trick is based on how computers detect and correct data errors.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-988.jpg?itok=aewVqsKy)
Human Interface Design: The Chocolate Factory
Source Institutions
In this activity about human interface design issues, learners help the Oompa-Loompas of a great chocolate factory solve different problems.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-000-734.jpg?itok=9pEZEfPW)
Slide Rules
Source Institutions
Learners make their own simple slide rules out of paper and learn how they work.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-999.jpg?itok=_4pzAVmU)
The Muddy City: Minimal Spanning Trees
Source Institutions
In this puzzle, learners investigate the decisions involved in linking a network between houses in a muddy city.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-893.jpg?itok=wF1dICEJ)
Cipher Wheel
Source Institutions
In this activity, learners make their own encrypted code to pass along secret messages using a printable cipher wheel.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-998.gif?itok=sfGxId-V)
Phylogenetics
Source Institutions
This activity lets learners participate in the process of reconstructing a phylogenetic tree and introduces them to several core bioinformatics concepts, particularly in relation to evolution.