This ebook is indicated in the Divide and Conquer lesson plan. To reinforce the concept of divide and conquer decomposition students can explore the silly “Santa’s Dirty Socks” ebook where savvy elves use divide and conquer to efficiently locate Santa’s dirty socks amid a sea of packages on more
From Code.org: With nothing but paper and markers, students will learn the four steps of computational thinking. After a brief introduction, students should be split into groups where they will have to create directions for other students to draw a specific monster (from a catalog of pre-selected mo more
Computers are often required to find information in large collections of data. They need to develop quick and efficient ways of doing this. This activity demonstrates three different search methods: linear searching, binary searching and hashing. Fun game!
This activity allows the user to explore Venn Diagrams and their various applications. This activity would work well in groups of two for about thirty to forty-five minutes if you use the exploration questions and fifteen to twenty minutes otherwise. By Shodor.org. One simple instruction you likely more
A cipher is a message that has been written in such a way (encoded) that it is unreadable by others. In this lesson, students will use mapping to encode a sentence. Students who have ever played “Hangman” or watched Wheel of Fortune may find that those experiences help in this exercise. Students more