eBook
Khan Academy

Khan Academy: Using Recursion to Determine Whether a Word Is a Palindrome

For Students 9th - 10th
Learn how to use recursion to determine whether a word is a palindrome.
eBook
Khan Academy

Khan Academy: Multiple Recursion With the Sierpinski Gasket

For Students 9th - 10th
See a good example of a mathematical construct that is a fractal known as a Sierpinski gasket.
eBook
Khan Academy

Khan Academy: The Factorial Function

For Students 9th - 10th
See examples of recursion, and look how to compute the factorial function.
eBook
Khan Academy

Khan Academy: Recursion

For Students 9th - 10th
Learn about recursion and how it applies to different situations.
eBook
Khan Academy

Khan Academy: Storing Strings in Variables

For Students 9th - 10th
When we're making a program, we often want to store sequences of letters. In programming lingo, we call each letter a character and we call the sequence a string.
eBook
Khan Academy

Khan Academy: Rogue Access Points

For Students 9th - 10th
Learn about rogue access points to understand wireless internet access.
Unknown Type
Khan Academy

Khan Academy: Modular Multiplication

For Students 9th - 10th
Practice problems over modular multiplication in cryptography.
Unknown Type
Khan Academy

Khan Academy: Modular Addition

For Students 9th - 10th
Practice problems for reviewing modular addition in cryptography.
Article
Khan Academy

Khan Academy: What Is Modular Arithmetic?

For Students 9th - 10th
Find out the basics of modular arithmetic.
Article
Khan Academy

Khan Academy: Sensor Networks

For Students 9th - 10th
The concept of sensor data as related to a sensor network is examined and its applications.
Article
Khan Academy

Khan Academy: Computing Basic Statistics

For Students 9th - 10th Standards
Computing data statistics by examining data patterns.
Article
Khan Academy

Khan Academy: The Era of Big Data

For Students 9th - 10th
Zettabytes and big data is examined.
Article
Khan Academy

Khan Academy: The Power of Big Data

For Students 9th - 10th
Space and time are examined when storing big data.
Article
Khan Academy

Khan Academy: The Sources of Big Data

For Students 9th - 10th
Sources of big data and the issues of storage are examined.
Article
Khan Academy

Khan Academy: Copyright, Drm, and the Dmca

For Students 9th - 10th
Copyright laws as established by the Berne Convention, Fair Use, Digital Rights Management, and The Digital Millennium Copyright Act of 1998 are discussed.
Article
Khan Academy

Khan Academy: Shift Cipher

For Students 9th - 10th
The use of the Shift Cipher to encrypt and decrypt information.
Article
Khan Academy

Khan Academy: Creative Commons and Open Source

For Students 9th - 10th
After creative work has been copyrighted, licensing under Creative Commons, Open Source, or Public Domain allows digital information to be widely shared while not being compromised and maintaining attribution.
Article
Khan Academy

Khan Academy: Hypertext Transfer Protocol (Http)

For Students 9th - 10th
Explanation of HTML (Hypertext Transfer Protocol) and how it works.
Article
Khan Academy

Khan Academy: Sensors

For Students 9th - 10th
Part of the Internet of Things, types of sensors are examined including acoustic, visual, weather, GPS, and others.
Article
Khan Academy

Khan Academy: Http Secure (Https)

For Students 9th - 10th
The article examines Hypertext Transfer Protocol Secure (HTTPS) and how it protects the privacy of their user and prevents tampering of the website.
Article
Khan Academy

Khan Academy: Smart Buildings, Transport, and Grids

For Students 9th - 10th
The advantages and security risks of "Smart" uses of technology in buildings, transportation, and grids are discussed.
Article
Khan Academy

Khan Academy: Domain Name System (Dns)

For Students 9th - 10th
The Domain Name System (DNS) and its relationship to IP addresses is explained and illustrated. The article also discusses the anatomy of a domain name and issues of DNS spoofing.
Article
Khan Academy

Khan Academy: Symmetric Encryption Techniques

For Students 9th - 10th
Symmetric encryption techniques are explained including the Vigenere Cipher and AES-128.
Article
Khan Academy

Khan Academy: Encryption, Decryption, and Cracking

For Students 9th - 10th
Julius Caesar encrypted messages two thousand years ago. By knowing the techniques of deciphering a code--frequency analysis, known text, and brute force--one can begin to understand the three key aspects of data encryption, decryption,...

Other popular searches