Search Results
Showing results 21 to 24 of 24
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-974.jpg?itok=fabJIthq)
Squeezing Pictures Into Codes
Source Institutions
In this activity, learners will explore how computers represent pictures using pixels.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-562.jpg?itok=tDfyVUSs)
The Orange Game: Routing and Deadlock in Networks
Source Institutions
When a lot of people share one network (such as cars using roads, or messages getting through the Internet), there is the possibility that competing processes will create a “deadlock," or an interrupt
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-977.jpg?itok=mr-qdp1x)
Guess the Sentence
Source Institutions
In this activity, learners play a game similar to Hangman by guessing a secret phrase to understand how computer scientists measure the amount of "information" in a document.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-991.jpg?itok=kT23JQks)
Information Hiding: Sharing Secrets
Source Institutions
This activity about cryptographic techniques illustrates a situation where information is shared, and yet none of it is revealed.