Computer Science Unplugged
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-998.gif?itok=sfGxId-V)
Phylogenetics
Source Institutions
This activity lets learners participate in the process of reconstructing a phylogenetic tree and introduces them to several core bioinformatics concepts, particularly in relation to evolution.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-979.jpg?itok=89iyYpBv)
Binary Challenge
Source Institutions
In this activity, learners cut out 5 paper cards and label them with 1, 2, 4, 8, or 16 dot(s) to explore binary digits.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-652.png?itok=7Y7WKinv)
Twenty Guesses: Information Theory
Source Institutions
This activity introduces the idea that computer scientists measure information by how "surprising" a message is.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-004-978.jpg?itok=RxzWJlnY)
Guess My Number
Source Institutions
In this game, learners experience how computers divide a big problem into many smaller ones and how they use binary "yes"/"no" questions.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-988.jpg?itok=aewVqsKy)
Human Interface Design: The Chocolate Factory
Source Institutions
In this activity about human interface design issues, learners help the Oompa-Loompas of a great chocolate factory solve different problems.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-002-651.jpg?itok=C4X5DdHl)
Battleships: Searching Algorithms
Source Institutions
This activity explores the main algorithms that are used as the basis for searching on computers, using different variations on the game of battleships.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-001-989.jpg?itok=31BVjoBi)
Public Key Encryption: Kid Krypto
Source Institutions
In this activity, learners conduct a simulation exercise related to public key encryption and try to intercept a message sent between two learners.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-005-263.jpg?itok=J4Wyaceq)
Mind-Reading Magic
Source Institutions
In this activity, learners recreate a method of detecting and correcting errors in computers called 'parity'.
![](/sites/default/files/styles/square_100/public/resource_images/smile-000-000-005-262.jpg?itok=8_9VV5Dj)
Find My Card
Source Institutions
In this activity, learners find the answer to the question, "if you have a pile of 8 cards, and you remove half, then half again, how many times can you do this until you get to just one card?" This w