Starting February 22nd, Carrie Anne Philbin will be hosting Crash Course Computer …
Starting February 22nd, Carrie Anne Philbin will be hosting Crash Course Computer Science! In this series, we're going to trace the origins of our modern computers, take a closer look at the ideas that gave us our current hardware and software, discuss how and why our smart devices just keep getting smarter, and even look towards the future! Computers fill a crucial role in the function of our society, and it's our hope that over the course of this series you will gain a better understanding of how far computers have taken us and how far they may carry us into the future.
Today we’re going to talk about how to keep information secret, and …
Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence. This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers. So today, we’re going to walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure.
Students gain experience with the software/system design process, closely related to the …
Students gain experience with the software/system design process, closely related to the engineering design process, to solve a problem. First, they learn about the Mars Curiosity rover and its mission, including the difficulties that engineers must consider and overcome to operate a rover remotely. Students observe a simulation of a robot being controlled remotely. These experiences guide discussion on how the design process is applied in these scenarios. The lesson culminates in a hands-on experience with the design process as students simulate the remote control of a rover. In the associated activity, students gain further experience with the design process by creating an Android application using App Inventor to control one aspect of a remotely controlled vehicle. (Note: The lesson requires a LEGO® MINDSTORMS® Education NXT base set.)
Cybersecurity is a set of techniques to protect the secrecy, integrity, and …
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible as possible. From massive Denial of Service, or DDos attacks, to malware and brute force password cracking there are a lot of ways for hackers to gain access to your data, so we’ll also discuss some strategies like creating strong passwords, and using 2-factor authentication, to keep your information safe.
DASHlink is a virtual laboratory for scientists and engineers to disseminate results …
DASHlink is a virtual laboratory for scientists and engineers to disseminate results and collaborate on research problems in health management technologies for aeronautics systems. Managed by the Integrated Vehicle Health Management project within NASA's Aviation Safety program, the Web site is designed to be a resource for anyone interested in data mining, IVHM, aeronautics and NASA.
A Document Type Definition (DTD) defines the structure and the legal elements …
A Document Type Definition (DTD) defines the structure and the legal elements and attributes of an XML document. A DTD can be declared inside an XML document or in an external file.
Today we’re going to talk about on how we organize the data …
Today we’re going to talk about on how we organize the data we use on our devices. You might remember last episode we walked through some sorting algorithms, but skipped over how the information actually got there in the first place! And it is this ability to store and access information in a structured and meaningful way that is crucial to programming. From strings, pointers, and nodes, to heaps, trees, and stacks get ready for an ARRAY of new terminology and concepts.
Today we’re going to go a little meta and talk about how …
Today we’re going to go a little meta and talk about how computer science can support learning with educational technology. We here at Crash Course are big fans of interactive in-class learning and hands-on experiences, but we also believe in the additive power of educational technology inside and outside the classroom from the Internet itself and Massive Open Online Courses, or MOOCs to AI driven intelligent tutoring systems and virtual reality.
So we ended last episode at the start of the 20th century …
So we ended last episode at the start of the 20th century with special purpose computing devices such as Herman Hollerith’s tabulating machines. But as the scale of human civilization continued to grow as did the demand for more sophisticated and powerful devices. Soon these cabinet-sized electro-mechanical computers would grow into room-sized behemoths that were prone to errors. But is was these computers that would help usher in a new era of computation - electronic computing.
Students are introduced to the concepts of digital organisms and digital evolution. …
Students are introduced to the concepts of digital organisms and digital evolution. They learn about the research that digital evolution software makes possible, and compare and contrast it with biological evolution.
A hypothetical scenario is introduced in which the class is asked to …
A hypothetical scenario is introduced in which the class is asked to apply their understanding of the forces that drive natural selection to prepare a proposal along with an environmental consulting company to help clean up an area near their school that is contaminated with trichloroethylene (TCE). Students use the Avida-ED software application to test hypotheses for evolving (engineering) a strain of bacteria that can biodegrade TCE, resulting in a non-hazardous clean-up solution. Conduct this design challenge activity after completion of the introduction to digital evolution activity, Studying Evolution with Digital Organisms.
So we ended last episode with programming at the hardware level with …
So we ended last episode with programming at the hardware level with things like plugboards and huge panels of switches, but what was really needed was a more versatile way to program computers - software! For much of this series we’ve been talking about machine code, or the 1’s and 0’s our computers read to perform operations, but giving our computers instructions in 1’s and 0’s is incredibly inefficient, and a “higher-level” language was needed. This led to the development of assembly code and assemblers that allow us to use operands and mnemonics to more easily write programs, but assembly language is still tied to underlying hardware. So by 1952 Navy officer Grace Hopper had helped created the first high-level programming language A-0 and compiler to translate that code to our machines. This would eventually lead to IBM’s Fortran and then a golden age of computing languages over the coming decades. Most importantly, these new languages utilized new abstractions to make programming easier and more powerful giving more and more people the ability to create new and amazing things.
Students design and create flow charts for the MIT App Inventor tutorials …
Students design and create flow charts for the MIT App Inventor tutorials in this computer science activity about program analysis. In program analysis, which is based on determining the behavior of computer programs, flow charts are an important tool for tracing control flow. Control flow is a graphical representation of the logic present in a program and how the program works. Students work through tutorials, design and create flow charts about how the tutorials function, and present their findings to the class. In their final assessment, they create an additional flow chart for an advanced App Inventor tutorial. This activity prepares students with the knowledge and skills to use App Inventor in the future to design and create Android applications.
Find materials free course materials for educators. The materials are all free, …
Find materials free course materials for educators. The materials are all free, open and can be customized to suit your needs.
Education Academic/Career Success Art & Design Biological/Physical Sciences Business Communication & Writing Computer Science Earth/Ocean Science Engineering Health and Medical Hospitality Tourism Humanities Language Learning Law and Criminal Justice Math and Statistics Social Sciences Trades Digital Literacy
This comprehensive resource from Saskatchewan Rivers Public School Division includes units of …
This comprehensive resource from Saskatchewan Rivers Public School Division includes units of study plus curricular and assessment resources for Grade 11 Arts Education, ELA, Physical Education and Wellness, Practical and Applied Arts, Mathematics, Sciences and Social Studies. Look for rubrics, unit plans, sample year plans (and templates), Treaty Education outcomes and indicators as well lots of other teacher resources. Some of the information is not available as a login is required.
This comprehensive resource from Saskatchewan Rivers Public School Division includes units of …
This comprehensive resource from Saskatchewan Rivers Public School Division includes units of study plus curricular and assessment resources for Grade 12 Arts Education, ELA, Physical Education and Wellness, Practical and Applied Arts, Mathematics, Sciences and Social Studies. Look for rubrics, unit plans, sample year plans (and templates), Treaty Education outcomes and indicators as well lots of other teacher resources. Some of the information is not available as a login is required.
TWENTY amazing lessons to teach computer science to Grades 3 to 5. …
TWENTY amazing lessons to teach computer science to Grades 3 to 5. The curriculum is organized into 5 units: sequence, events, Makey Makey, loops and final project. This fabulous resource has everything you need to get started coding and computer science with your students TODAY! Green is the starting level - you can progress to Blue (Level 2) once you complete this level, and then onto Purple (Level 3). These resources are also in the bank or available using the tabs along the top of the website.
Today, we're going to discuss the critical role graphical user interfaces, or …
Today, we're going to discuss the critical role graphical user interfaces, or GUIs played in the adoption of computers. Before the mid 1980's the most common way people could interact with their devices was through command line interfaces, which though efficient, aren't really designed for casual users. This all changed with the introduction of the Macintosh by Apple in 1984. It was the first mainstream computer to use a GUI, standing on the shoulder of nearly two decades of innovation including work from the father of the GUI himself, Douglas Englebart, and some amazing breakthroughs at Xerox Parc.
Today we're going to talk about hackers and their strategies for breaking …
Today we're going to talk about hackers and their strategies for breaking into computer systems. Now, not all hackers are are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White Hats who hunt for bugs, close security holes, and perform security evaluations for companies. And there are a lot of different motivations for hackers—sometimes just amusement or curiosity, sometimes for money, and sometimes to promote social or political goals. Regardless, we're not going to teach you how to become a hacker in this episode but we are going to walk you through some of the strategies hackers use to gain access to your devices, so you can be better prepared to keep your data safe.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.