This collection uses primary sources to compare American responses to Pearl Harbor …
This collection uses primary sources to compare American responses to Pearl Harbor and September 11. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.
Steganography is the science and art of hiding messages in plain sight …
Steganography is the science and art of hiding messages in plain sight so only the sender and intended recipient know the existence of a message. Steganography can be characterized as security through obscurity. Through this lesson, students experience a portion of the engineering design process as they research steganography and steganographic methods; identify problems, criteria and constraints; brainstorm possible solutions; and generate ideas. These are the critical first steps in the engineering design process, often overlooked by students who want to get to the "doing" phases—designing, building and testing. In computer science, a thorough design phase makes program implementation much easier and more effective. Students obtain practice with a portion of the design process that may be less exciting, but is just as important as the other steps in the process.
Cyber Security, the protection of our information via computers and the internet …
Cyber Security, the protection of our information via computers and the internet is one of the fastest growing industries in Virginia and around the world. According to the US Bureau of Labor Statistics Cyber Security Analysts (also known as Information Security Analysts) will grow by 37% over the next 10 years. That’s a much faster growth rate than the average for all other occupations.
Cyber Security, the protection of our information via computers and the internet …
Cyber Security, the protection of our information via computers and the internet is one of the fastest growing industries in Virginia and around the world. According to the US Bureau of Labor Statistics Cyber Security Analysts (also known as Information Security Analysts) will grow by 37% over the next 10 years. That’s a much faster growth rate than the average for all other occupations.
Students apply the design process to the problem of hiding a message …
Students apply the design process to the problem of hiding a message in a digital image using steganographic methods, a PictureEdit Java class, and API (provided as an attachment). They identify the problems and limitations associated with this task, brainstorm solutions, select a solution, and implement it. Once their messages are hidden, classmates attempt to decipher them. Based on the outcome of the testing phase, students refine and improve their solutions.
This lesson plan is intended to guide teachers on how to direct …
This lesson plan is intended to guide teachers on how to direct second grade students to create strong passwords that will help protect privacy of information.
Students learn about infrared energy and how it is used to sense …
Students learn about infrared energy and how it is used to sense the surrounding environment. They review where infrared falls on the electromagnetic spectrum and learn how infrared sensors work, as well as various ways engineers and scientists create and apply infrared technology to study science and collect information for security, communications, medical, research and other purposes. Pre/post-quizzes and a take-home assignment are provided. Learning the concepts prepares students to conduct the associated activity in which they design and program Arduino-controlled robots that use IR sensors to follow a line and make designated stops, much like the automated guided vehicles used in industry and commerce.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.