Search Results
Showing results 1 to 20 of 28
Public Key Encryption: Kid Krypto
Source Institutions
In this activity, learners conduct a simulation exercise related to public key encryption and try to intercept a message sent between two learners.
Battleships: Searching Algorithms
Source Institutions
This activity explores the main algorithms that are used as the basis for searching on computers, using different variations on the game of battleships.
Robot Body Language
Source Institutions
In this robotics activity, learners find ways to express emotions and feelings using only body movements, not facial expressions.
Electric Messages: Then and Now
Source Institutions
In this activity, learners explore electronic communication, the Morse Code system, and advances all the way through text messaging. Learners build a simple circuit, send messages to one another.
Divide and Conquer: Santa's Dirty Socks
Source Institutions
This activity introduces the idea of "divide and conquer" using a fictitious but serious problem--a pair of dirty socks has accidentally been wrapped in one of the presents that Santa is about to deli
Art Cars
Source Institutions
In this activity, learners design miniature cars. Learners can create a telephone car, soccer car, merry-go-round car, or any other theme car they can imagine.
Night Lights
Source Institutions
In this activity, learners create night lights using a plastic cup, programmable PICO Cricket, tri-color LED, and sensor.
Push Pull Painter
Source Institutions
In this activity, learners create painting machines that can paint moving forwards and backwards.
Solving Playground Network Problems
Source Institutions
In this activity, learners use cooperation and logical thinking to find solutions to network problems on the playground.
Passion for Pixels
Source Institutions
In this technology activity, learners explore digital imaging and pixels. Learners "transmit" an image to a partner by creating an image on grid paper.
Coral Snapshots: Biodiversity in Marine Protected Areas
Source Institutions
In this data activity, learners analyze data from coral reef snapshots taken by scientists at the Virginia Institute of Marine Science.
Sound Representation: Modems Unplugged
Source Institutions
In this activity, learners listen to songs and decode hidden messages based on the same principle as a modem. As a final challenge, learners decode the binary messages in a music video.
Locating a Point
Source Institutions
In this activity, learners work in teams to simulate the process used by Global Positioning Systems (GPS) to determine the location of a fallen meteorite in Antarctica.
EEEEK--A Mouse!
Source Institutions
In this activity, learners explore the concept of how engineering solved the problem of human/computer interface.
Wandering Wands
Source Institutions
In this activity, learners construct wands that play different notes depending on information from light sensors programmed via a PICO Cricket.
Program a Friend
Source Institutions
In this activity (on page 2), one person "programs" the other like a robot to move through a space, trying to get them to avoid obstacles and reach a goal.
How to Train Your Robot
Source Institutions
In this activity, learners discover that training a robot can be hard work! Learners investigate how robots complete a task by following a list of sequential instructions.
Decode the Barcode
Source Institutions
In this online activity, learners crack the special code imprinted on envelopes to help the U.S. Postal Service deliver the mail.
The Muddy City: Minimal Spanning Trees
Source Institutions
In this puzzle, learners investigate the decisions involved in linking a network between houses in a muddy city.
Cipher Wheel
Source Institutions
In this activity, learners make their own encrypted code to pass along secret messages using a printable cipher wheel.