Even though many people use the internet daily, not very many know …
Even though many people use the internet daily, not very many know how it works. In this lesson, students will pretend to flow through the internet, all the while learning about connections, URLs, IP Addresses, and the DNS.
Students learn about complex networks and how to represent them using graphs. …
Students learn about complex networks and how to represent them using graphs. They also learn that graph theory is a useful mathematical tool for studying complex networks in diverse applications of science and engineering, such as neural networks in the brain, biochemical reaction networks in cells, communication networks, such as the internet, and social networks. Topics covered include set theory, defining a graph, as well as defining the degree of a node and the degree distribution of a graph.
Learn about computers, programming and technology through these free, fun activities. Puzzles …
Learn about computers, programming and technology through these free, fun activities. Puzzles Activities Geometry Counting Algorithms Estimation Computers Robots Captcha & Much more!
DNA. It's what makes you unique. Unless you have an identical twin, …
DNA. It's what makes you unique. Unless you have an identical twin, your DNA is different from that of every other person in the world. And that's what makes DNA fingerprinting possible. Experts can use DNA fingerprints for everything from determining a biological mother or father to identifying the suspect of a crime. What, then, is a DNA fingerprint and how is it made? Here, you'll find out by solving a mystery—a crime of sorts. First, you'll create a DNA fingerprint (we'll supply the lab and all necessary materials). Then you'll compare this DNA fingerprint to those of all seven suspects to nab the perpetrator. Ready? Let's get to work!
Students conduct Internet research to investigate the purpose and current functioning status …
Students conduct Internet research to investigate the purpose and current functioning status of some of the largest dams throughout the world. They investigate the success or failure of eight dams and complete a worksheet. While researching the dams, they also gain an understanding of the scale of these structures by recording and comparing their reservoir capacities. Students come to understand that dams, like all engineered structures, have a finite lifespan and require ongoing maintenance and evaluation for their usefulness.
Psychologist Philip Zimbardo asks, "Why are boys struggling?" He shares some stats …
Psychologist Philip Zimbardo asks, "Why are boys struggling?" He shares some stats (lower graduation rates, greater worries about intimacy and relationships) and suggests a few reasons -- and challenges the TED community to think about solutions. A quiz, thought provoking question, and links for further study are provided to create a lesson around the 5-minute video. Educators may use the platform to easily "Flip" or create their own lesson for use with their students of any age or level.
In this activity, students will use a tutorial on the U.S. Environmental …
In this activity, students will use a tutorial on the U.S. Environmental Protection Agency's website to learn about how surface water is treated to make it safe to drink.
Students take part in a hypothetical scenario that challenges them to inform …
Students take part in a hypothetical scenario that challenges them to inform customers at a local restaurant of how their use and disposal of plastics relates/contributes to the Great Pacific garbage patch (GPGP). What students ultimately do is research information on the plastics pollution in the oceans and present that information as a short, eye-catching newsletter suitable to hand out to restaurant customers. This activity focuses on teaching students to conduct their own research on a science-technology related topic and present it in a compelling manner that includes citing source information without plagiarism. By doing this, students gain experience and skills with general online searching as well as word processing and written and visual communication.
While news from Iran streams to the world, Clay Shirky shows how …
While news from Iran streams to the world, Clay Shirky shows how Facebook, Twitter and TXTs help citizens in repressive regimes to report on real news, bypassing censors (however briefly). The end of top-down control of news is changing the nature of politics. A quiz, thought provoking question, and links for further study are provided to create a lesson around the 20-minute video. Educators may use the platform to easily "Flip" or create their own lesson for use with their students of any age or level.
Simply put, this is one of my most favorite topics when it …
Simply put, this is one of my most favorite topics when it comes to talking about computers. In this video we layout the order of this lesson, as well as give basic definitions of: •Machine-Level Security •Network Security •Internet Security •Social Engineering
The act of physically protecting the computers. The first rule of any …
The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access to it. If a bad guy can get their hands on the computer assume they will be able to gain access to all data contained within.
Our third video in our Information Security series (part of the Introduction …
Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are
There are three forms of authentication •Something you know •Something you have •Something about you
Our 6 video in the Information Security series (part of Introduction to …
Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security.
Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall.
Video 7 of our information security series (part of Introduction to Computers) …
Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware.
Links from Video: -AVG by Grisoft: http://free.avg.com/us-en/homepage -AVAST: http://www.avast.com -ClamWin: http://www.clamwin.com/ -Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download
The first video in the Internet series of videos supporting the Introduction …
The first video in the Internet series of videos supporting the Introduction to Computers and BCIS series.
In this video we talk about what is a computer network and how that relates to the Internet. We also talk about some of the basic types of network hardware we need to make a network as well as the difference between a LAN and WAN.
If you have no background in networking this is the video to start with before you go any further into the Internet series.
We love our definitions and in this video we define what the …
We love our definitions and in this video we define what the Internet is. We take a quick look at how the Internet got its start. Finally we look at how to get on the Internet, how to pick the right ISP and check to see how fast you are surfing.
Links from video: http://www.speedtest.net/ http://speedtest.comcast.net/
Get ready to Geek out. In this video we take a look …
Get ready to Geek out. In this video we take a look under the hood of the Internet. We see what technologies run the Internet and more importantly how the make our lives easier.
Topics we cover include : *TCP/IP *HTTP & HTTPS *FTP *SMTP *POP3 *Telnet
Links from Video: FileZilla https://filezilla-project.org/ CuteFTP: http://www.cuteftp.com/ SmartFTP; http://www.smartftp.com/ Cyberduck: http://cyberduck.io/?l=en Mozilla Thunderbird: http://www.mozilla.org/en-US/thunderbird/ Star Wars ASCII: http://youtu.be/Dgwyo6JNTDA
Because the World Wide Web is such an important part of the …
Because the World Wide Web is such an important part of the Internet it gets a two part video. In this part we look at the history of the World Wide Web, as well as what the web is, and Hypertext Transport Protocol (HTTP).
In part we examine: *Uniform Resource Locator (URL) *Dynamic Name Server (DNS) *Hypertext Markup Language (HTML)
We continue our look at the World Wide Web. in the previous …
We continue our look at the World Wide Web. in the previous video we looked the history of the web, as well as what Hypertext Transport Protocol (HTTP) was.
In this video we complete our look at the WWW and cover: *Uniform Resource Locator (URL) *Dynamic Name Server (DNS) *Hypertext Markup Language (HTML)
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.