At some point we reach a physical limit of how fast we …
At some point we reach a physical limit of how fast we can send bits and if we want to send a large amount of information faster, we have to find a way to represent the same information with fewer bits - we must **compress** the data. In this lesson, students will use the Text Compression Widget to compress segments of English text by looking for patterns and substituting symbols for larger patterns of text.
In this lesson, students are introduced to the need for encryption and …
In this lesson, students are introduced to the need for encryption and simple techniques for breaking (or cracking) secret messages. Students try their own hand at cracking a message encoded with the classic Caesar cipher and also a Random Substitution Cipher. Students should become well-acquainted with idea that in an age of powerful computational tools, techniques of encryption will need to be more sophisticated. The most important aspect of this lesson is to understand how and why encryption plays a role in all of our lives every day on the Internet, and that making good encryption is not trivial. Students will get their feet wet with understanding the considerations that must go into making strong encryption in the face of powerful computational tools that can be used to crack it. The need for secrecy when sending bits over the Internet is important for anyone using the Internet.
Students will learn that events are a useful way to control when …
Students will learn that events are a useful way to control when an action happens, and can even be used to make make multiple things act in sync. In programming, you can use events to respond to a user controlling it (like pressing buttons or clicking the mouse). Events can make your program more interesting and interactive.
This illustrated essay from A Science Odyssey Web site explains the science …
This illustrated essay from A Science Odyssey Web site explains the science behind radio waves, including the role of electrons and electromagnetic fields.
This is a fast-paced introductory course to the C++ programming language. It …
This is a fast-paced introductory course to the C++ programming language. It is intended for those with little programming background, though prior programming experience will make it easier, and those with previous experience will still learn C++-specific constructs and concepts. This course is offered during the Independent Activities Period (IAP), which is a special 4-week term at MIT that runs from the first week of January until the end of the month.
This is a computer science lesson plan created by educators in the …
This is a computer science lesson plan created by educators in the South Sanpete School District. Students will learn what algorithms are by walking in a sequence from one item to another. They will write an algorithm using symbols of the sequence from one spot to another. The lesson is designed for third grade and includes modifications for grade 4.
The aim of this video lesson is to teach students about the …
The aim of this video lesson is to teach students about the different topologies of computer networks and how they function. The approach that is used is highly correlated with common knowledge about weddings and the local Malay culture associated with weddings. Students should be able to relate the act of delivering food to a large crowd of people to the basic principles of network topologies and the method of data transfer within each type of topology. The lesson will begin in a classroom with students working in small groups, answering assigned questions. Teaching aids such as color cards will be used. One student from each group will be appointed as the wedding event manager, and she/he will have to discuss and act out with group members in order to answer more challenging questions. At the end of the lesson, students will be asked to come up with their own version of a hybrid computer network topology. The lesson concept taught here not only educates students on computer topologies, but also introduces students to an important cultural perspective of Malaysia. Above all, this video is designed to assist students with their study of Computer Literacy in schools. The lesson will take up to 60 minutes to complete. Materials needed include: 10 red cards representing waitresses; 10 green cards representing waiters; 10 blue cards representing tables in the hall; a sketch book; and classroom tables and chairs.
In this video segment adapted from the Massachusetts Institute of Technology, researchers …
In this video segment adapted from the Massachusetts Institute of Technology, researchers in the Artificial Intelligence Laboratory working to engineer smarter robots are now building a machine that interacts socially with people.
In this segment adapted from ZOOM, cast members use computers to program …
In this segment adapted from ZOOM, cast members use computers to program a robot in preparation for the FIRST LEGO League Challenge tournament. Despite meticulous planning and programming by its designers, an autonomous robot can encounter unexpected challenges. This is true for both LEGOŰ_í__ robots and Martian rovers. In this video segment adapted from ZOOM, cast members enter the FIRST LEGOŰ_í__ League Challenge tournament and work as a team to program their LEGOŰ_í__ robot to navigate a complex obstacle course. Grades 3-8.
This is a computer science lesson plan created by educators in the …
This is a computer science lesson plan created by educators in the South Sanpete School District. This lesson utilizes BeeBot robots. Students will learn how to read other algorithms, find bugs and correct them! Lesson adapted from the San Francisco School District’s CS Program. The lesson is designed for second grade and includes modifications for grades 1-5.
This is a computer science lesson plan created by educators in the …
This is a computer science lesson plan created by educators in the South Sanpete School District. Using ozobots, the lesson challenges students to draw a map from their house to the school using color codes to show speed and cool moves. The lesson is designed for third grade and includes modifications for grades 1-5.
This is a computer science lesson plan created by educators in the …
This is a computer science lesson plan created by educators in the South Sanpete School District. Using Sphero robots, students will program their Sphero to drive as close to an object as possible without touching it and change color when it stops. They will then measure the distance from the object to their Sphero. The lesson is designed for second grade and includes modifications for grades 1-5.
This is a computer science lesson plan created by educators in the …
This is a computer science lesson plan created by educators in the South Sanpete School District. The lesson is an unplugged computer science lesson where students modify a game of line tag by placing and following various ozobot codes along the lines. They will familiarize themselves with the ozobot codes as they play the game. The lesson is designed for first grade and includes adaptations for younger and older students.
On this episode of UEN PDTV, Katie Blunt travels to Manti Elementary …
On this episode of UEN PDTV, Katie Blunt travels to Manti Elementary where computer science specialist, Julia Bratton, demonstrates how she incorporates critical thinking, project-based learning, and computational thinking into her classroom.
In this media-rich, self-paced lesson, students explore the industries that produce and …
In this media-rich, self-paced lesson, students explore the industries that produce and rely on advanced technology and assess how their goals and interests may make them well suited for a career in this cutting-edge sector.
Welcome to 6.041/6.431, a subject on the modeling and analysis of random …
Welcome to 6.041/6.431, a subject on the modeling and analysis of random phenomena and processes, including the basics of statistical inference. Nowadays, there is broad consensus that the ability to think probabilistically is a fundamental component of scientific literacy. For example: The concept of statistical significance (to be touched upon at the end of this course) is considered by the Financial Times as one of "The Ten Things Everyone Should Know About Science". A recent Scientific American article argues that statistical literacy is crucial in making health-related decisions. Finally, an article in the New York Times identifies statistical data analysis as an upcoming profession, valuable everywhere, from Google and Netflix to the Office of Management and Budget. The aim of this class is to introduce the relevant models, skills, and tools, by combining mathematics with conceptual understanding and intuition.
In this video segment from Cyberchase, the CyberSquad breaks down an action …
In this video segment from Cyberchase, the CyberSquad breaks down an action into a series of steps in order to program a robot to do what they need it to do.
This is a computer science lesson plan that utilizes Sphero robots. I …
This is a computer science lesson plan that utilizes Sphero robots. I was created by educators in the South Sanpete School District. Students will modify a current program so that a Sphero lands on a specified quadrilateral picture identified by a teacher or classmate. Students will identify the name of the quadrilateral with its attributes. The lesson is designed for third grade and includes modifications for grades 1-5.
Studies how randomization can be used to make algorithms simpler and more …
Studies how randomization can be used to make algorithms simpler and more efficient via random sampling, random selection of witnesses, symmetry breaking, and Markov chains. Models of randomized computation. Data structures: hash tables, and skip lists. Graph algorithms: minimum spanning trees, shortest paths, and minimum cuts. Geometric algorithms: convex hulls, linear programming in fixed or arbitrary dimension. Approximate counting; parallel algorithms; online algorithms; derandomization techniques; and tools for probabilistic analysis of algorithms.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.