Search Results
Showing results 1 to 16 of 16
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-651.jpg?itok=C4X5DdHl)
Battleships: Searching Algorithms
Source Institutions
This activity explores the main algorithms that are used as the basis for searching on computers, using different variations on the game of battleships.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-652.png?itok=7Y7WKinv)
Twenty Guesses: Information Theory
Source Institutions
This activity introduces the idea that computer scientists measure information by how "surprising" a message is.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-469.gif?itok=2E-QNEH1)
Paint by the Numbers
Source Institutions
In this pencil and paper activity, learners work in pairs and simulate how astronomical spacecraft and computers create images of objects in space.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-994.jpg?itok=nUil-1Fj)
The Poor Cartographer: Graph Coloring
Source Institutions
In this activity, learners help a poor cartographer color in the countries on a map, making sure each country is colored a different color than any of its neighbors.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-997.gif?itok=pVh9fQ_z)
Divide and Conquer: Santa's Dirty Socks
Source Institutions
This activity introduces the idea of "divide and conquer" using a fictitious but serious problem--a pair of dirty socks has accidentally been wrapped in one of the presents that Santa is about to deli
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-000-261.png?itok=G8zqFYi5)
Colour by Numbers: Image Representation
Source Institutions
This activity shows learners how computers use numbers to represent pictures. A grid is used to represent the pixels (short for picture elements) of a computer screen.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-000-260.png?itok=pBbwbNrY)
You Can Say That Again!: Text Compression
Source Institutions
This activity helps students learn how computers "compress" text by identifying repeating patterns of letters, words, and phrases.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-000.gif?itok=cVNf8Wj4)
Sound Representation: Modems Unplugged
Source Institutions
In this activity, learners listen to songs and decode hidden messages based on the same principle as a modem. As a final challenge, learners decode the binary messages in a music video.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-000-259.png?itok=yDpeopFH)
Card Flip Magic: Error Detection & Correction
Source Institutions
This magic trick is based on how computers detect and correct data errors.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-643.png?itok=-yxi0F0c)
How to Train Your Robot
Source Institutions
In this activity, learners discover that training a robot can be hard work! Learners investigate how robots complete a task by following a list of sequential instructions.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-000-735.jpg?itok=zK6vC6u8)
Secret Writing Devices
Source Institutions
In this activity about encryption, learners cut out a secret decoder badge from a handout and use it to encode messages to each other.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-999.jpg?itok=_4pzAVmU)
The Muddy City: Minimal Spanning Trees
Source Institutions
In this puzzle, learners investigate the decisions involved in linking a network between houses in a muddy city.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-025.png?itok=2ClaFbNh)
Forward Thinking
Source Institutions
In this activity, learners create their own weather forecast map.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-893.jpg?itok=wF1dICEJ)
Cipher Wheel
Source Institutions
In this activity, learners make their own encrypted code to pass along secret messages using a printable cipher wheel.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-998.gif?itok=sfGxId-V)
Phylogenetics
Source Institutions
This activity lets learners participate in the process of reconstructing a phylogenetic tree and introduces them to several core bioinformatics concepts, particularly in relation to evolution.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-990.jpg?itok=npbYdK6Z)
Cryptographic Protocols: The Peruvian Coin Flip
Source Institutions
This activity about cryptographic techniques illustrates how to accomplish a simple, but nevertheless seemingly impossible task—making a fair, random choice by flipping a coin between two people who d