"Introducing our AI Teaching Assistant: Designed for CS educators, it offers instant, …
"Introducing our AI Teaching Assistant: Designed for CS educators, it offers instant, insightful project assessments, enabling teachers to concentrate on inspiring and connecting with their students."
Also: AI curriculum, Professional Learning, AI Videos
The Hour of Code started as a one-hour introduction to computer science, …
The Hour of Code started as a one-hour introduction to computer science, designed to demystify "code", to show that anybody can learn the basics, and to broaden participation in the field of computer science. It has since become a worldwide effort to celebrate computer science, starting with 1-hour coding activities but expanding to all sorts of community efforts. Check out the tutorials and activities. This grassroots campaign is supported by over 400 partners and 200,000 educators worldwide.
Students can code for just an hour, or complete full courses.
The courses are in 45 different languages.
There are even coding activities that can be down without computers called "unplugged".
Today we’re going to step back from hardware and software, and take …
Today we’re going to step back from hardware and software, and take a closer look at how the backdrop of the cold war and space race and the rise of consumerism and globalization brought us from huge, expensive codebreaking machines in the 1940s to affordable handhelds and personal computers in the 1970s. This is an era that saw huge government funded projects - like the race to the moon. And afterward, a shift towards the individual consumer, commoditization of components, and the rise of the Japanese electronics industry.
So last episode we talked about some basic file formats, but what …
So last episode we talked about some basic file formats, but what we didn’t talk about is compression. Often files are way too large to be easily stored on hard drives or transferred over the Internet - the solution, unsurprisingly, is to make them smaller. Today, we’re going to talk about lossless compression, which will give you the exact same thing when reassembled, as well as lossy compression, which uses the limitations of human perception to remove less important data. From listening to music and sharing photos, to talking on the phone and even streaming this video right now the ways we use the Internet and our computing devices just wouldn’t be possible without the help of compression.
This is a great guide from ITSE about how to use Computational …
This is a great guide from ITSE about how to use Computational Thinking in your classroom. It includes an introduction, definition, vocab and progression chart as well as lessons on: *Sequenciong *Growing Plants *Food Chain *Persaude Me *Budget Buddy *Research Skills *Traffic Jam *Conway's Game of Life It also looks at Middle School and High School scenarios, and resources for educators,
BBC lesson series on Computational Thinking. This series would be a good …
BBC lesson series on Computational Thinking. This series would be a good resource for teachers, and older students. The lesson provide some information, a video clip, and each section in the series has a quiz at the end to check understanding. The start of the topic is broken down into the sections of computational thinking: Decomposition, Pattern Recognition, Abstraction and Algorithms.
Grades 3-5 "The Day of the Programmer is celebrated on the 256th …
Grades 3-5
"The Day of the Programmer is celebrated on the 256th day of the year. This is because programmers are familiar with bytes and 1 byte = 8 bits, which gives 256 (2 to the power of 8) different combinations of binary digits. In this lesson, students can celebrate programmers by creating art that showcases different programming languages! Students are provided a step-by-step tutorial, code blocks, and instructions to create a Computer Linguist project using Tynker. By the end of this lesson, students will have combined creativity and coding concepts such as simple motion, simple drawing, basic math, and input/output."
You can complete this task by using Tynker block coding - or click in the bottom right corner of the screen to use JavaScript.
This is a great activity to learn about programming languages.
Today we start a three episode arc on the rise of a …
Today we start a three episode arc on the rise of a global telecommunications network that changed the world forever. We’re going to begin with computer networks, and how they grew from small groups of connected computers on LAN networks to eventually larger worldwide networks like the ARPANET and even the Internet we know today. We'll also discuss how many technologies like Ethernet, MAC addresses, IP Addresses, packet switching, network switches, and TCP/IP were implemented to new problems as our computers became ever-increasingly connected. Next week we’ll talk about the Internet, and the week after the World Wide Web!
Students will recognize that computer science is so important because it can …
Students will recognize that computer science is so important because it can be found in almost every career. Don't wait, start learning how to code today.
This two-semester course provides instruction in the basics of computer construction and …
This two-semester course provides instruction in the basics of computer construction and repair; emphasizes troubleshooting and diagnosis of hardware and software failures; provides the skills necessary to gain entry-level employment in the field of computer servicing. Students have the opportunity to service and repair a wide range of personal computers while learning theory of operation and gaining programming skills. Students will use a variety of service tools. The operation of each component of a computer is studied and tested while assembling test computers. Designed to provide a solid foundation as a basis for a student's continuing education in the computer sciences.
Today we’re going to talk about how computers see. We’ve long known …
Today we’re going to talk about how computers see. We’ve long known that our digital cameras and smartphones can take incredibly detailed images, but taking pictures is not quite the same thing. For the past half-century, computer scientists have been working to help our computing devices understand the imagery they capture, leading to advancements everywhere, from tracking hands and whole bodies, biometrics to unlock our phones, and eventually giving autonomous cars the ability to understand their surroundings.
Starting February 22nd, Carrie Anne Philbin will be hosting Crash Course Computer …
Starting February 22nd, Carrie Anne Philbin will be hosting Crash Course Computer Science! In this series, we're going to trace the origins of our modern computers, take a closer look at the ideas that gave us our current hardware and software, discuss how and why our smart devices just keep getting smarter, and even look towards the future! Computers fill a crucial role in the function of our society, and it's our hope that over the course of this series you will gain a better understanding of how far computers have taken us and how far they may carry us into the future.
Today we’re going to talk about how to keep information secret, and …
Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence. This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers. So today, we’re going to walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure.
Students gain experience with the software/system design process, closely related to the …
Students gain experience with the software/system design process, closely related to the engineering design process, to solve a problem. First, they learn about the Mars Curiosity rover and its mission, including the difficulties that engineers must consider and overcome to operate a rover remotely. Students observe a simulation of a robot being controlled remotely. These experiences guide discussion on how the design process is applied in these scenarios. The lesson culminates in a hands-on experience with the design process as students simulate the remote control of a rover. In the associated activity, students gain further experience with the design process by creating an Android application using App Inventor to control one aspect of a remotely controlled vehicle. (Note: The lesson requires a LEGO® MINDSTORMS® Education NXT base set.)
The AI Family Challenge is a free, hands-on AI education program that …
The AI Family Challenge is a free, hands-on AI education program that brings families, schools, communities, and technology know-it-alls together to give everyone the chance to learn, play and create with AI.
Find the right K-12 lesson plans -- for free. Curriki is the …
Find the right K-12 lesson plans -- for free. Curriki is the best online learning site for Teacher Lessons, activities, videos, and more in all subject areas.
Go to the "Search Resource Library" tab to get started.
Cybersecurity is a set of techniques to protect the secrecy, integrity, and …
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible as possible. From massive Denial of Service, or DDos attacks, to malware and brute force password cracking there are a lot of ways for hackers to gain access to your data, so we’ll also discuss some strategies like creating strong passwords, and using 2-factor authentication, to keep your information safe.
DASHlink is a virtual laboratory for scientists and engineers to disseminate results …
DASHlink is a virtual laboratory for scientists and engineers to disseminate results and collaborate on research problems in health management technologies for aeronautics systems. Managed by the Integrated Vehicle Health Management project within NASA's Aviation Safety program, the Web site is designed to be a resource for anyone interested in data mining, IVHM, aeronautics and NASA.
A Document Type Definition (DTD) defines the structure and the legal elements …
A Document Type Definition (DTD) defines the structure and the legal elements and attributes of an XML document. A DTD can be declared inside an XML document or in an external file.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.