Search Results
Showing results 1 to 18 of 18
Public Key Encryption: Kid Krypto
Source Institutions
In this activity, learners conduct a simulation exercise related to public key encryption and try to intercept a message sent between two learners.
Battleships: Searching Algorithms
Source Institutions
This activity explores the main algorithms that are used as the basis for searching on computers, using different variations on the game of battleships.
Plugged in to CO2
Source Institutions
In this activity, learners investigate various appliances and electronics, discovering how much energy each uses and how much carbon dioxide (CO2) is released to produce that energy.
Strengthen a Paper Bridge
Source Institutions
In this quick activity (page 1 of the PDF under SciGirls Activity: Tug O' War), learners will test how many pennies a flat paper index card bridging the gap between two stacks of books is able to supp
Soaring Towers: Building with Recycled Materials
Source Institutions
In this activity, learners will build the highest tower they can out of recycled materials.
Bark Beetle Infestation Investigation: Estimation and Pheromones
Source Institutions
This activity investigates how bark beetles can threaten forests by having learners estimate the number of infected trees from a photo.
Cooling the Mummy's Tomb
Source Institutions
In this activity, learners conduct an experiment to help Pharaoh design a better insulated tomb.
Doghouse Design
Source Institutions
This activity (on page 2 of the PDF under SciGirls Activity: Doghouse Design) is a full inquiry investigation into absorption and reflection of radiant energy.
Locating a Point
Source Institutions
In this activity, learners work in teams to simulate the process used by Global Positioning Systems (GPS) to determine the location of a fallen meteorite in Antarctica.
Launch Altitude Tracker
Source Institutions
In this activity, learners construct hand-held altitude trackers. The device is a sighting tube with a marked water level that permits measurement of the inclination of the tube.
Can Energy be Created or Destroyed?
Source Institutions
In this activity, learners explore conservation of energy by experimenting with a solar cell light device.
Multi-Variable Relations: Stressed to the Breaking Point
Source Institutions
In this math lesson, learners explore the relationship between the thickness of a spaghetti bridge, the length of the bridge, and the amount of weight that can be supported by the bridge.
Decode the Barcode
Source Institutions
In this online activity, learners crack the special code imprinted on envelopes to help the U.S. Postal Service deliver the mail.
Zero-Energy Housing
In this activity, learners investigate passive solar building design with a focus solely on heating.
Ramps 2: Ramp Builder
Source Institutions
In this inquiry-based learning activity, learners design, build, and test their own ramps. They are introduced to a variety of materials and explore putting them together.
The Turing Test: Conversations with Computers
Source Institutions
This activity aims to stimulate discussion on the question of whether computers can exhibit “intelligence,” or are ever likely to do so in the future.
Cryptographic Protocols: The Peruvian Coin Flip
Source Institutions
This activity about cryptographic techniques illustrates how to accomplish a simple, but nevertheless seemingly impossible task—making a fair, random choice by flipping a coin between two people who d
Telephone Talk
Source Institutions
In this math activity, learners find patterns in telephone numbers.