Search Results
Showing results 1 to 5 of 5
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-989.jpg?itok=31BVjoBi)
Public Key Encryption: Kid Krypto
Source Institutions
In this activity, learners conduct a simulation exercise related to public key encryption and try to intercept a message sent between two learners.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-652.png?itok=7Y7WKinv)
Twenty Guesses: Information Theory
Source Institutions
This activity introduces the idea that computer scientists measure information by how "surprising" a message is.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-997.gif?itok=pVh9fQ_z)
Divide and Conquer: Santa's Dirty Socks
Source Institutions
This activity introduces the idea of "divide and conquer" using a fictitious but serious problem--a pair of dirty socks has accidentally been wrapped in one of the presents that Santa is about to deli
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-000.gif?itok=cVNf8Wj4)
Sound Representation: Modems Unplugged
Source Institutions
In this activity, learners listen to songs and decode hidden messages based on the same principle as a modem. As a final challenge, learners decode the binary messages in a music video.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-025.png?itok=2ClaFbNh)
Forward Thinking
Source Institutions
In this activity, learners create their own weather forecast map.