This is a lesson plan to teach bruteforce and divide and conquer …
This is a lesson plan to teach bruteforce and divide and conquer to elementary students. This lesson plans comes with activities and a quizlet study deck.
This activity will allow students to compare Brute Force and Divide and …
This activity will allow students to compare Brute Force and Divide and Conquer sorting algorithms.This activity will show the sorting process of a Brute Force algorithm and a Divide and Conquer algorithm that is used by a computer when sorting data.
In this first part of a three part series, students will explore …
In this first part of a three part series, students will explore the ideas around Brute Force algorithm/programs to further understand the importance of password development, use, safety, and safekeeping while completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each). These activites can be completed seperately with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired. Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes. Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged). These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.
In this second part of a three part series, students will explore …
In this second part of a three part series, students will explore the ideas around Decrease, or Divide, and Conquer algorithm/programs to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each). These activites can be completed seperately (stand-alone) with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired. Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes. Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged). These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.
In this final part of a three part series, students will practice …
In this final part of a three part series, students will practice Brute Force and Decrease (or Divide) and Conquer methods to try to crack a password puzzle to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged sorting activities over the course of three class periods (approximately 30-45 minutes each). These activites can be completed seperately with a few minor adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired. Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes. Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged). These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.