Crossword Puzzle - VDOE's Essential Vocabulary for Algorithms and Programming
- Subject:
- Algorithms and Programming
- Material Type:
- Homework/Assignment
- Author:
- Julie Jessee
- Date Added:
- 05/16/2022
Crossword Puzzle - VDOE's Essential Vocabulary for Algorithms and Programming
This activity will allow students to compare Brute Force and Divide and Conquer sorting algorithms.This activity will show the sorting process of a Brute Force algorithm and a Divide and Conquer algorithm that is used by a computer when sorting data.
This activity will show the sorting process using the Bubble Sort Brute Force algorithm that is used by a computer when sorting data without using a computer.
This unplugged lesson will allow students to encrypt and decrypt message using the Caesar Cipher letter shift method of encryption. Cover the process of how this method works by doing an example and explaining the process of shifting the plaintext by the letter shift value to create the encrypted cipher text.
This lesson is designed to teach students basic encryption using the Caesar cipher method. This is a simple letter shift cipher that takes a plaintext message and encrypts it into cipher text by shifting each letter of the message by a value between 1 and 25 (1 less than the total number of letters in the English alphabet). This technique was used by Julius Caesar to encrypt messages by shifting each letter of the message by 3 letters. The message would be decrypted by taking each letter and shifting back 3 letters to reveal the plaintext message.
In this lesson, students will learn about using binary encoding to represent numbers and text. They’ll use several different encoding techniques, and then develop and test their own protocol for encoding other kinds of information into binary.
In this activity, students will compete in a shell game tournament while they learn about different search strategies that computers perform on sorted collections of data.
Students will use minimum spanning trees to analyze a problem and provide insights into addressing the problem. The lesson provides detailed support around analyzing transportation infrastructure in their community and assessing its impact on the lives of different people who use it. Students create minimum spanning trees based on data, solve the trees to generate insights about the data, and communicate those insights along with policy recommendations based on their analysis.
This resource has a YouTube video link and a website link on how the German Enigma Machine worked to encrypt messages during World War II.
The Josephus problem is based around Josephus Flavius; a Jewish soldier and historian who inspired an interesting set of mathematical problems. This resource is a PDF activity based on the Josephus problem.
This activity will show the sorting process using the Merge Sort Divide and Conquer algorithm that is used by a computer when sorting data without using a computer.
This activity will show the sorting process using the Quick Sort Divide and Conquer algorithm that is used by a computer when sorting data without using a computer.