Khan Academy
Khan Academy: User Authentication Methods
Some practice problems on user authentication methods regarding computer security.
Khan Academy
Khan Academy: Static Functions vs. Instance Methods
Understanding and programming vectors and the PVector object: the difference between using static functions and instance methods.
Texas Instruments
Texas Instruments: Numerical Methods and Series
In this activity, students take a closer look at numerical methods used to solve initial-value differential equations, including the methods used internally by the calculator. They also learn to solve numerical computations for the...
National Council of Teachers of Mathematics
Nctm: Illuminations: Computing Pi
This resource investigates approximating the value of pi through the calculation of perimeters of inscribed or circumscribed polygons. The interactive tool allows learners to examine and compare both methods.
Other
Iae Pedia: Computational Thinking
Find some facts behind computational thinking, learn the history of this problem solving method, and understand how it affects different disciplines.
Khan Academy
Khan Academy: Custom Distribution of Random Numbers
A function that will generate random numbers but prefer higher numbers, the Monte Carlo Method is explaine.
Other
Project Euler
A collection of challenging mathematical and computer programming problems that will require more than just mathematical insights to solve. The use of math skills will help students arrive at efficient methods, while the use of...
Google
Google for Education: Randomness in Stochastic Models
In this lesson, young scholars are introduced to methods used to create random numbers as well as ways in which they can be used in scientific experiments.
University of Canterbury
University of Canterbury; Cs Unplugged: Text Compression
Learn how compressed formats such as zip, gzip, or gif images are all based on a method called Ziv-Lempel coding, which turns out to be an interesting exercise in finding patterns in text.
OpenStax
Open Stax: Lydia E. Kavraki: Protein Folding
This module introduces students to the problem of Protein Folding, its importance, and current computational methods used to attack its complexity.
Texas Instruments
Texas Instruments: Depreciation
In this activity, students perform computations involving depreciation of assets. They will study methods such as straight line depreciation, sum of the digits method and double declining balance depreciation.
University of Canterbury
University of Canterbury: Cs Unplugged: Image Representation
This activity explores how images are displayed, based on the pixel as a building block using data compression. The compression method used in this activity is based on the one used in fax machines, for black and white images.
University of Canterbury
University of Canterbury: Cs Unplugged: Error Detection
This activity is a magic trick where the demonstrator is "magically" able to figure which one out of dozens of cards has been turned over, using the same methods that computers use to figure out if an error has occurred in data storage.
University of Houston
University of Houston: Engines of Our Ingenuity: No. 401: Ibm and the 1890 Census
Learn about the history of the Ferris wheel in this transcript of a radio broadcast. In this transcript of a radio broadcast, we learn about Herman Hollerith, who invented a method of quickly tabulating information from the 1890 census...
University of Cambridge
University of Cambridge: Nrich: Napier's Bones
Use this one page website to learn how to multiply and divide a "new" way. This method was invented over 400 years ago by John Napier. A detailed explanation is only a click away.
Scholastic
Scholastic: Max's Math Adventures: A Sweet Story
In this Max's Math Adventure, estimate pieces of candy with Max, Ruthie, and Pop. Features include a teacher's guide, activity sheet, and extra challenges.
Texas Instruments
Texas Instruments: Numb3 Rs: Not So Great Expectations
Based off of the hit television show NUMB3RS, this lesson exposes students to the concept of expected values (or expected outcomes). The method for computing the expectation is explained, and then many examples are given for students to...
Alabama Learning Exchange
Alex: How Tall Is Hagrid?
This activity uses data collection method for young scholars to mathematically compute the height and shoulder width of the character Hagrid from Harry Potter. Students will measure their own heights and shoulder widths to come up with a...
Common Sense Media
Common Sense Media: Cyber Smart! Student Curriculum Lesson: Can You Hack It? [Pdf]
Learners learn that computers and electronic files are property and explore the reasons for, consequences, and ethics of teen hacking. This ISTE-aligned lesson plan for Grades 6-8 includes student activity and Home Connection sheets....
AAA Math
Aaa Math: Estimating a Sum by Rounding
Use rounding to estimate the answer to an addition problem in this online game. As you play the game, running totals of correct and incorrect answers and your score are displayed.
Khan Academy
Khan Academy: Multi Factor Authentication
Find out about the security of the most common form of authentication, multi-factor authentication.
Khan Academy
Khan Academy: Strong Passwords
Find out how setting up secure passwords help users protect their private information.