Students learn about identity theft. The resource consists of consumer and victim …
Students learn about identity theft. The resource consists of consumer and victim support, prevention information, and public education about identity theft. Topics examined are scams, consumer alerts, and victim solutions, and prevention tips.
Now that computer science learning standards have been approved for development in …
Now that computer science learning standards have been approved for development in Ohio, come find out more about where you can get computer science background and professional learning from the Ohio Ed Techs.
In this video segment adapted from the Massachusetts Institute of Technology, researchers …
In this video segment adapted from the Massachusetts Institute of Technology, researchers in the Artificial Intelligence Laboratory working to engineer smarter robots are now building a machine that interacts socially with people.
In this segment adapted from ZOOM, cast members use computers to program …
In this segment adapted from ZOOM, cast members use computers to program a robot in preparation for the FIRST LEGO League Challenge tournament. Despite meticulous planning and programming by its designers, an autonomous robot can encounter unexpected challenges. This is true for both LEGOŰ_í__ robots and Martian rovers. In this video segment adapted from ZOOM, cast members enter the FIRST LEGOŰ_í__ League Challenge tournament and work as a team to program their LEGOŰ_í__ robot to navigate a complex obstacle course. Grades 3-8.
This lesson will explain the process of data transfer throughout computer systems …
This lesson will explain the process of data transfer throughout computer systems and the form the data gets transferred into. Additionally, we will touch on some factors that alter the transfer speed. [23:18] (English Subtitles)
This video lesson provides a more advanced approach to cryptography than the …
This video lesson provides a more advanced approach to cryptography than the more experiential Sturtevant cryptography lesson also in the BLOSSOMS video library. Students will learn about the history of cryptography, and they will also learn how powerful even a limited knowledge of mathematics can be as they work through the math used in cryptography. [45:25] (English subtitles)
This computer science webpage features information supporting each part of Ohio’s educational …
This computer science webpage features information supporting each part of Ohio’s educational system: Ohio’s Learning Standards, the model curricula, assessments and additional resources to help teachers in their classrooms.
This computer science webpage features information supporting each part of Ohio’s educational …
This computer science webpage features information supporting each part of Ohio’s educational system: Ohio’s Learning Standards, the model curricula, assessments and additional resources to help teachers in their classrooms. Click on each section of the graphic below to explore how these components work together.
This is a link to the Ohio Department of Education Office of …
This is a link to the Ohio Department of Education Office of Career Technical Education Information Technology Webpage. This page contains resources including the Technical Content Standards, course outlines and other information that supports Ohio's Information Technology offerings.
In this media-rich, self-paced lesson, students explore the industries that produce and …
In this media-rich, self-paced lesson, students explore the industries that produce and rely on advanced technology and assess how their goals and interests may make them well suited for a career in this cutting-edge sector.
In this video segment from Cyberchase, the CyberSquad breaks down an action …
In this video segment from Cyberchase, the CyberSquad breaks down an action into a series of steps in order to program a robot to do what they need it to do.
Mentors are very valuable to your cyber club. Having individuals with subject …
Mentors are very valuable to your cyber club. Having individuals with subject matter expertise in information technology and cyber security will help your club focus on knowledge and skills attainment.
In this video from Science City, Shaundra Bryant Daily, an electrical engineer, …
In this video from Science City, Shaundra Bryant Daily, an electrical engineer, describes a software program she developed to help girls reflect on their emotions, and how her two passionsí_í_íŹscience and danceí_í_íŹare connected.
Students observe natural selection in action and investigate the underlying mechanism, including …
Students observe natural selection in action and investigate the underlying mechanism, including random mutation and differential fitness based on environmental characteristics. They do this through use of the free AVIDA-ED digital evolution software application.
Studying life on the seafloor beneath Antarctica's thick ice is a major …
Studying life on the seafloor beneath Antarctica's thick ice is a major challenge for ecologists. Learn about a new device that can reach those icy depths in this video segment adapted from WomenInAntarctica.com.
We live in a world run by algorithms, computer programs that make …
We live in a world run by algorithms, computer programs that make decisions or solve problems for us. In this riveting, funny talk, Kevin Slavin shows how modern algorithms determine stock prices, espionage tactics, even the movies you watch. But, he asks: If we depend on complex algorithms to manage our daily decisions- when do we start to lose control? [15:07]
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.