Code.org
The Need for Encryption
Scholars investigate the need for encryption as they read a portion of the book Blown to Bits and discuss encryption techniques. They finish by attempting to decode a message written using a Caesar cipher.
Code.org
Public Key Cryptography
Investigate how public key cryptography works. Scholars continue their study of one-way functions and asymmetric keys and apply this information to public key cryptography. They use an app to explore public key cryptography and its...
Curated OER
President Jefferson's Cipher: Cracking the Code
Students examine the journey out west by Lewis and Clark. Using a cipher from President Jefferson, they solve a code he gave to the explorers before setting out on their exploration. They share his message with the class and state...
Curated OER
The Rotating Grille
Students experience the geometric method of coding by actual construction and use of a rotating grille. Students use rotations and reflections to code and decode messages. Students explore nomenclature and symmetry.
Howard Hughes Medical Institute
Stalking the Genetic Basis of a Trait
Need an a-maize-ing lesson to show your class how regulatory genes work? If you use the well-written resource, they'll be all ears! Biology scholars discover the gene responsible for the evolution of the modern-day corn plant through a...
Code.org
Keys and Passwords
Scholars explore the relationship between cipher keys and passwords and as they learn more about the Vigenere cipher and continue to read from the book Blown to Bits in the seventh lesson of the series. They conduct an activity where...
Curated OER
Matrices: A Secret Weapon
Students perform operations with matrices. In this algebra lesson, students use cryptography and cryptanalysis to solve problems. They add, subtract, and multiply matrices.
Spreading Gratitude Rocks
Generation of Respect
R.E.S.P.E.C.T. Learners find out what it means to them. Scholars write sentences, do a word sort, and list what makes them grateful. Additionally, pupils learn how to be more respectful by completing worksheets that would make Aretha...
Curated OER
Basic Crypto Systems
Students try to solve codes mathematically. The use of a code needs a key. Students try to decipher a code with a mathematical key. This requires focus and higher order thinking skills like analysis.
Curated OER
SHHH It's a Secret
Students rewrite word problems using expressions and equations. In this algebra instructional activity, students use the correct variable to solve and write equations. They use the TI to graph their solution.
Curated OER
Detective Digis and the Computer Caper
Mathematicians participate in an hands-on activity to investigate the binary number system and write messages in binary code and have classmates decipher the messages. A said video on the topic does not seem to be available, but the...
Beauty and Joy of Computing
Algorithms
Introduces the class to the idea of searching a list by building a script. Learners modify a guessing game script that will find a number in a list.
Curated OER
Caesar Ciphers: An Introduction to Cryptography
Students brainstorm and discuss the concept of cryptography, the science of secrets in today's world and then focus on a system for sending secret messages used by Julius Caesar. They make a Caesar wheel assessing encrypting and...
Curated OER
Caesar Ciphers: An Introduction to Cryptography
Students encode and decode messages using a Caesar Cipher. In this encoding and decoding messages using a Caesar Cipher lesson, students discuss cryptography and how it is used. Students make a Caesar wheel to encode and decode...
Curated OER
And Justice For All
Students compare three justice systems currently in place in the United States: the civilian criminal justice system, the military criminal justice system (courts-martial) and the secret wartime tribunals that President Bush has proposed...
Curated OER
Communism and Containment
Students "discover" top secret documents that describe the "Patriot" program. They are assigned the task of educating the American people about the threat of Soviets taking over America, including the key points of the Truman Doctrine...
Curated OER
Cryptography Implementation
Students explore cryptology. They write a research paper on cryptography. Using linear equations, students invent a code and write a secret message. Students complete cryptography puzzles.
Curated OER
An Adaptable Four-Skill ESL Information-gap Acivity
Students encounter a variety of grammar structures and vocabularies in the English language. Students get involved with teacher statistics as well with this lesson. Students correlate facts thru chronological order steps. Students...
Whole Person Associates
Teen Self Esteem Workbook
Happy teens are healthy teens! Pupils embark on a self-reflective journey using a series of assessments and discussions to promote personal development. The lessons focus on identifying low and high self-esteem attitudes and behaviors,...
Curated OER
Have I Been Hacked?
Students investigate how effective SNEAK strategies are in detecting hackers. In this technology lesson, students explain the ethical issues about hacking. They graph and analyze their experimental results.
Computer Science Unplugged
Kid Krypto–Public-Key Encryption
Class members have an opportunity to experience how to use a public key to encrypt information and a private key to decrypt it. Groups create their own public key and encrypt information then develop private keys to decrypt this...
Southern Nevada Regional Professional Development Program
“Double Double Speak Speak”
Bilateral suborbital hematoma? Call an audible? 404? Have fun with “the twittering or warbling of birds,” or as 14th century French speakers would say, have fun with “jargon.” Groups match specialized jargon with plain speech, decode...
Smithsonian Institution
POWs
Why did Vietnam POWs and their families receive more media attention than POWs in previous wars? To answer this question, class members view artifacts, read articles, and engage in class discussion. Individuals then assume the voice of...
Curated OER
Learning to Hate Math
Give your class a different kind of reading assignment with the text included here. Anne Miller's essay "Learning to Hate Mathematics" details a hatred of math that grew from early childhood and still haunts the author today. After...
Other popular searches
- Secret Code Multiplication
- Secret Service Codename
- Grid Coordinates Secret Code
- Math Secret Codes
- Math Secret Code Riddles
- Squigly Secret Codes
- Secret Code Division
- Dna Secret Codes
- Secret Code Free Printables
- Squiggly Secret Codes
- Number Sense Secret Codes
- Secret Codes Using Fractions