Cyber Sleuth: Which DMs Can I Trust?

Cyber Sleuth: Which DMs Can I Trust?

Back to STEM Activities Cyber Sleuth: Which DMs Can I Trust? Can you identify which direct messages (DMs) from a cell phone may pose a security risk and explain why? Favorite Please login to bookmark Username or Email Address Password Remember Me Print Overview STEM...
Stop the Cyberattacks!

Stop the Cyberattacks!

Back to STEM Activities Stop the Cyberattacks! This activity introduces students to the range of the most common kinds of cyberattacks and the ways cybersecurity specialists prevent or thwart them. Favorite Please login to bookmark Username or Email Address Password...
Lidar: Mapping with Lasers

Lidar: Mapping with Lasers

Back to STEM Activities Lidar: Mapping with Lasers As they map a simple landscape using a lidar laser measuring device, participants practice transferring data and translating it from one form to another. Save Print Overview STEM careers Civil Computer Science...
My Robot Friend

My Robot Friend

Back to STEM Activities My Robot Friend Teams of two see what it’s like to program a robot as one (the programmer) delivers instructions for building a structure that the other team member (the robot) tries to follow. Save Print Overview STEM careers Industrial...
Robot Challenge

Robot Challenge

Back to STEM Activities Robot Challenge Teams see what it’s like to program a robot as they develop a set of instructions and then deliver the instructions to guide their humanoid robot (a blindfolded team member) to navigate an obstacle course. Save Print...