ALEX Classroom Resources

ALEX Classroom Resources  
   View Standards     Standard(s): [DLIT] (3) 7 :
1) Use numbers or letters to represent information in another form.

Examples: Secret codes/encryption, Roman numerals, or abbreviations.

[DLIT] (8) 28 :
22) Encrypt and decrypt various data.

Example: Create and decipher a message sent in a secret code.

Subject: Digital Literacy and Computer Science (3 - 8)
Title: Code Breaking: Harley Gets a Hint
URL: https://aptv.pbslearningmedia.org/resource/mwnet-math-nbt-gethint/harley-gets-a-hint/
Description:

In this video, Harley moves in with Harry and makes Harry's life miserable. Harley spies on Harry writing in his diary. When Harley "borrows" the diary, he finds it is written in a code using numbers. Harley figures out a pattern with numbers and letters and decodes the page to find it is a message for Harley saying it is time to move out. 



   View Standards     Standard(s): [DLIT] (3) 7 :
1) Use numbers or letters to represent information in another form.

Examples: Secret codes/encryption, Roman numerals, or abbreviations.

[DLIT] (8) 28 :
22) Encrypt and decrypt various data.

Example: Create and decipher a message sent in a secret code.

Subject: Digital Literacy and Computer Science (3 - 8)
Title: Doorman's Code
URL: https://aptv.pbslearningmedia.org/resource/arct14.math.zcode/doormans-code/
Description:

Figure out the secret code using your problem-solving skills. This activity from Zoom focuses on your critical thinking and operational skills to solve the problem and find the pattern. This video can be used during a lesson on encryption and secret codes.



   View Standards     Standard(s): [DLIT] (3) 7 :
1) Use numbers or letters to represent information in another form.

Examples: Secret codes/encryption, Roman numerals, or abbreviations.

[DLIT] (5) 7 :
1) Construct a complex system of numbers or letters to represent information.

Example: Student-created complex secret codes using more than one form to solve a problem or answer a question.

[DLIT] (8) 28 :
22) Encrypt and decrypt various data.

Example: Create and decipher a message sent in a secret code.

Subject: Digital Literacy and Computer Science (3 - 8)
Title: Scytale Messages
URL: https://aptv.pbslearningmedia.org/resource/arct14.math.zscytale/scytale-messages/
Description:

Make a coded message called a scytale message to send to a friend. This activity from Zoom focuses on your ability to follow directions and requires a cylinder. This learning activity can be used during a lesson on encryption.



   View Standards     Standard(s): [DLIT] (6) 26 :
20) Identify data transferring protocols, visualization, and the purpose of data and methods of storage.

Examples: Using an online collection tool or form to collect data that is then stored in a spreadsheet or database.

[DLIT] (6) 27 :
21) Identify varying data structures/systems and methods of classification, including decimal and binary.

Examples: Difference between a bit and a byte, bit representation, pixels.

[DLIT] (8) 28 :
22) Encrypt and decrypt various data.

Example: Create and decipher a message sent in a secret code.

Subject: Digital Literacy and Computer Science (6 - 8)
Title: Sound Representation / Modems Unplugged
URL: https://classic.csunplugged.org/modems-unplugged-2/
Description:

This activity involves listening to songs and finding hidden messages based on the same principle as a modem.

The binary number activity briefly mentions how text could be coded using sound — high and low beeps represent binary digits, which in turn can be decoded to numbers that represent the letters of the alphabet.

All data on computers is stored and transmitted using the binary number system.  When the binary digits need to be sent over phone lines which used to be standard in home internet connections, the digits are converted to sound and decoded at the other end, using a modem. This activity uses an audio coding similar to that used by a modem, but the sounds are recorded as songs, which students can decode.



   View Standards     Standard(s): [DLIT] (3) 7 :
1) Use numbers or letters to represent information in another form.

Examples: Secret codes/encryption, Roman numerals, or abbreviations.

[DLIT] (4) 7 :
1) Construct a basic system of numbers, letters, or symbols to represent information as a cipher.

Examples: Combine data from multiple sources, sorting multi-level.

[DLIT] (7) 15 :
9) Identify common methods of securing data.

Examples: Permissions, encryption, vault, locked closet.

[DLIT] (8) 28 :
22) Encrypt and decrypt various data.

Example: Create and decipher a message sent in a secret code.

Subject: Digital Literacy and Computer Science (3 - 8)
Title: What Is Cryptography?
URL: https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/intro-to-cryptography
Description:

What is Cryptography? A story which takes us from Caesar to Claude Shannon. Created by Brit Cruise.

On the left side of the linked webpage, there are additional resources related to cryptology, including Caesar cipher, polyalphabetic cipher, and the Enigma machine.



   View Standards     Standard(s): [DLIT] (8) 28 :
22) Encrypt and decrypt various data.

Example: Create and decipher a message sent in a secret code.

Subject: Digital Literacy and Computer Science (8)
Title: Computer Science Discoveries Unit 5 Chapter 1 Lesson 6: Keeping Data Secret (18-19)
URL: https://studio.code.org/s/csd5-2018/stage/6/puzzle/1
Description:

Students have a discussion on the different levels of security they would like for personal data. Once the class has developed an understanding of the importance of privacy, they learn about the process of encrypting information by enciphering a note for a partner and deciphering the partner's note. The class concludes with a discussion about the importance of both physical and digital security.

Note: You will need to create a free account on code.org before you can view this resource.



ALEX Classroom Resources: 6

Go To Top of page