Search Results
Showing results 21 to 30 of 30
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-893.jpg?itok=wF1dICEJ)
Cipher Wheel
Source Institutions
In this activity, learners make their own encrypted code to pass along secret messages using a printable cipher wheel.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-998.gif?itok=sfGxId-V)
Phylogenetics
Source Institutions
This activity lets learners participate in the process of reconstructing a phylogenetic tree and introduces them to several core bioinformatics concepts, particularly in relation to evolution.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-993.jpg?itok=q8igqcdr)
Tourist Town: Dominating Sets
Source Institutions
In this activity, learners use a fictitious map of "Tourist Town" and counters to problem solve how to place ice-cream vans on street intersections so that every other intersection is connected to one
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-987.jpg?itok=lA9IO2--)
The Turing Test: Conversations with Computers
Source Institutions
This activity aims to stimulate discussion on the question of whether computers can exhibit “intelligence,” or are ever likely to do so in the future.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-990.jpg?itok=npbYdK6Z)
Cryptographic Protocols: The Peruvian Coin Flip
Source Institutions
This activity about cryptographic techniques illustrates how to accomplish a simple, but nevertheless seemingly impossible task—making a fair, random choice by flipping a coin between two people who d
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-986.png?itok=PCuUa3kJ)
Artificial Intelligence: The Intelligent Piece of Paper
Source Institutions
This activity explores what it means for a computer to be intelligent and introduces the topic of what a computer program is and how everything computers do simply involves following instructions writ
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-992.jpg?itok=xxmQDDdb)
Ice Roads: Steiner Trees
Source Institutions
In this outdoor activity, learners use pegs (like tent pegs) and string or elastic to simulate drill sites and roads in Northern Canada.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-991.jpg?itok=kT23JQks)
Information Hiding: Sharing Secrets
Source Institutions
This activity about cryptographic techniques illustrates a situation where information is shared, and yet none of it is revealed.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-055.gif?itok=hnm5qR6Y)
Hand Biometrics Technology
Source Institutions
In this activity, learners explore how engineers incorporate biometric technologies into products as well as the challenges of engineers who must weigh privacy, security and other issues when designin
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-134.png?itok=iyUEG3WE)
Fruity-Glows: Pictures of Health on a Microarray Canvas
Source Institutions
In this activity (page 12), learners apply the concepts of pixilation and pointillism to the world of biomedical science.