Search Results


Showing results 1 to 10 of 10

Source Institutions
Add to list Details
This activity explores the main algorithms that are used as the basis for searching on computers, using different variations on the game of battleships.

1 cent - $1 per group Ages 8 - adult 30 to 45 minutes
Add to list Details
Computers store drawings, photographs, and other pictures using only numbers. Through this activity, learners decode numbers to create pictures using the same process that computers use.

1 cent - $1 per student Ages 8 - 14 45 to 60 minutes
Source Institutions
Add to list Details
In this activity about computer programming, learners follow instructions in a variety of ways in order to successfully draw figures.

1 cent - $1 per group Ages 6 - 18 45 to 60 minutes
Source Institutions
Add to list Details
This activity shows learners how computers use numbers to represent pictures. A grid is used to represent the pixels (short for picture elements) of a computer screen.

1 cent - $1 per student Ages 6 - adult 30 to 45 minutes
Add to list Details
In this computer science activity about finite-state automaton (on page 45 of the PDF), learners use a map and choose various pathways to find Treasure Island.

1 cent - $1 per student Ages 8 - 14 45 to 60 minutes
Source Institutions
Add to list Details
In this activity, learners use cooperation and logical thinking to find solutions to network problems on the playground.

1 cent - $1 per group Ages 8 - 14 10 to 30 minutes
Source Institutions
Add to list Details
In this activity, learners cut out 5 paper cards and label them with 1, 2, 4, 8, or 16 dot(s) to explore binary digits.

1 cent - $1 per group Ages 6 - 18 5 to 10 minutes
Source Institutions
Add to list Details
In this puzzle, learners investigate the decisions involved in linking a network between houses in a muddy city.

1 cent - $1 per student Ages 8 - 18 30 to 45 minutes
Add to list Details
When a lot of people share one network (such as cars using roads, or messages getting through the Internet), there is the possibility that competing processes will create a “deadlock," or an interrupt

1 cent - $1 per student Ages 8 - 14 45 to 60 minutes
Source Institutions
Add to list Details
This activity about cryptographic techniques illustrates a situation where information is shared, and yet none of it is revealed.

1 cent - $1 per group Ages 11 - adult 5 to 10 minutes