Updating search results...

Search Resources

3 Results

View
Selected filters:
  • sorting-algorithms
Brute Force vs Divide and Conquer Sorting
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

 This activity will allow students to compare Brute Force and Divide and Conquer sorting algorithms.This activity will show the sorting process of a Brute Force algorithm and a Divide and Conquer algorithm that is used by a computer when sorting data.

Subject:
Algorithms and Programming
Material Type:
Activity/Lab
Author:
Ronald Sparks
Date Added:
04/18/2022
Part 1 Password Safety: Brute Force
Unrestricted Use
CC BY
Rating
0.0 stars

In this first part of a three part series, students will explore the ideas around Brute Force algorithm/programs to further understand the importance of password development, use, safety, and safekeeping while completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately with a few adjustments as well.  Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Networking and the Internet
Material Type:
Activity/Lab
Game
Homework/Assignment
Author:
Emily Ball
Date Added:
03/20/2022
Part 2 Password Safety:  Decrease (Divide) and Conquer
Unrestricted Use
CC BY
Rating
0.0 stars

In this second part of a three part series, students will explore the ideas around Decrease, or Divide, and Conquer algorithm/programs to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately (stand-alone) with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Measurement and Geometry
Networking and the Internet
Material Type:
Activity/Lab
Homework/Assignment
Author:
Emily Ball
Date Added:
03/21/2022