Search Results
Showing results 1 to 6 of 6
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-989.jpg?itok=31BVjoBi)
Public Key Encryption: Kid Krypto
Source Institutions
In this activity, learners conduct a simulation exercise related to public key encryption and try to intercept a message sent between two learners.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-651.jpg?itok=C4X5DdHl)
Battleships: Searching Algorithms
Source Institutions
This activity explores the main algorithms that are used as the basis for searching on computers, using different variations on the game of battleships.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-882.gif?itok=6a9GbEGg)
Locating a Point
Source Institutions
In this activity, learners work in teams to simulate the process used by Global Positioning Systems (GPS) to determine the location of a fallen meteorite in Antarctica.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-078.gif?itok=9qLZqfsY)
Decode the Barcode
Source Institutions
In this online activity, learners crack the special code imprinted on envelopes to help the U.S. Postal Service deliver the mail.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-987.jpg?itok=lA9IO2--)
The Turing Test: Conversations with Computers
Source Institutions
This activity aims to stimulate discussion on the question of whether computers can exhibit “intelligence,” or are ever likely to do so in the future.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-990.jpg?itok=npbYdK6Z)
Cryptographic Protocols: The Peruvian Coin Flip
Source Institutions
This activity about cryptographic techniques illustrates how to accomplish a simple, but nevertheless seemingly impossible task—making a fair, random choice by flipping a coin between two people who d