+
eBook
Khan Academy

Khan Academy: Using Recursion to Determine Whether a Word Is a Palindrome

For Students 9th - 10th
Learn how to use recursion to determine whether a word is a palindrome.
+
eBook
Khan Academy

Khan Academy: Multiple Recursion With the Sierpinski Gasket

For Students 9th - 10th
See a good example of a mathematical construct that is a fractal known as a Sierpinski gasket.
+
eBook
Khan Academy

Khan Academy: The Factorial Function

For Students 9th - 10th
See examples of recursion, and look how to compute the factorial function.
+
eBook
Khan Academy

Khan Academy: Recursion

For Students 9th - 10th
Learn about recursion and how it applies to different situations.
+
eBook
Khan Academy

Khan Academy: Storing Strings in Variables

For Students 9th - 10th
When we're making a program, we often want to store sequences of letters. In programming lingo, we call each letter a character and we call the sequence a string.
+
eBook
Khan Academy

Khan Academy: Rogue Access Points

For Students 9th - 10th
Learn about rogue access points to understand wireless internet access.
+
Unknown Type
Khan Academy

Khan Academy: Modular Multiplication

For Students 9th - 10th
Practice problems over modular multiplication in cryptography.
+
Unknown Type
Khan Academy

Khan Academy: Modular Addition

For Students 9th - 10th
Practice problems for reviewing modular addition in cryptography.
+
Article
Khan Academy

Khan Academy: What Is Modular Arithmetic?

For Students 9th - 10th
Find out the basics of modular arithmetic.
+
Article
Khan Academy

Khan Academy: Sensor Networks

For Students 9th - 10th
The concept of sensor data as related to a sensor network is examined and its applications.
+
Article
Khan Academy

Khan Academy: Computing Basic Statistics

For Students 9th - 10th Standards
Computing data statistics by examining data patterns.
+
Article
Khan Academy

Khan Academy: The Era of Big Data

For Students 9th - 10th
Zettabytes and big data is examined.
+
Article
Khan Academy

Khan Academy: The Power of Big Data

For Students 9th - 10th
Space and time are examined when storing big data.
+
Article
Khan Academy

Khan Academy: The Sources of Big Data

For Students 9th - 10th
Sources of big data and the issues of storage are examined.
+
Article
Khan Academy

Khan Academy: Copyright, Drm, and the Dmca

For Students 9th - 10th
Copyright laws as established by the Berne Convention, Fair Use, Digital Rights Management, and The Digital Millennium Copyright Act of 1998 are discussed.
+
Article
Khan Academy

Khan Academy: Shift Cipher

For Students 9th - 10th
The use of the Shift Cipher to encrypt and decrypt information.
+
Article
Khan Academy

Khan Academy: Creative Commons and Open Source

For Students 9th - 10th
After creative work has been copyrighted, licensing under Creative Commons, Open Source, or Public Domain allows digital information to be widely shared while not being compromised and maintaining attribution.
+
Article
Khan Academy

Khan Academy: Hypertext Transfer Protocol (Http)

For Students 9th - 10th
Explanation of HTML (Hypertext Transfer Protocol) and how it works.
+
Article
Khan Academy

Khan Academy: Sensors

For Students 9th - 10th
Part of the Internet of Things, types of sensors are examined including acoustic, visual, weather, GPS, and others.
+
Article
Khan Academy

Khan Academy: Http Secure (Https)

For Students 9th - 10th
The article examines Hypertext Transfer Protocol Secure (HTTPS) and how it protects the privacy of their user and prevents tampering of the website.
+
Article
Khan Academy

Khan Academy: Smart Buildings, Transport, and Grids

For Students 9th - 10th
The advantages and security risks of "Smart" uses of technology in buildings, transportation, and grids are discussed.
+
Article
Khan Academy

Khan Academy: Domain Name System (Dns)

For Students 9th - 10th
The Domain Name System (DNS) and its relationship to IP addresses is explained and illustrated. The article also discusses the anatomy of a domain name and issues of DNS spoofing.
+
Article
Khan Academy

Khan Academy: Symmetric Encryption Techniques

For Students 9th - 10th
Symmetric encryption techniques are explained including the Vigenere Cipher and AES-128.
+
Article
Khan Academy

Khan Academy: Encryption, Decryption, and Cracking

For Students 9th - 10th
Julius Caesar encrypted messages two thousand years ago. By knowing the techniques of deciphering a code--frequency analysis, known text, and brute force--one can begin to understand the three key aspects of data encryption, decryption,...

Other popular searches