Ethics, Linear Regression and Machine Learning
Students will use Python and a known algorithm to produce a solution using Linear Regression to predict an Artificial Intelligence (AI) solution in either Education, Music, Credit Card Fraud, or Sports.
Connecting classrooms to careers
There are currently no featured resources.
Students will use Python and a known algorithm to produce a solution using Linear Regression to predict an Artificial Intelligence (AI) solution in either Education, Music, Credit Card Fraud, or Sports.
Inspired by my work with cybersecurity company, Palo Alto Networks, this lesson centers on how data moves through networks. It touches on Newton’s discovery of the color spectrum, the capture of the German Enigma coding machine during World War II, cryptography, and modern ASCII code.
Meet STEM Professionals who work in cybersecurity-related fields!
This ETP lays the groundwork for an eight-week project-based learning curriculum unit to explore the complexities of solving an engineering problem that combines technical challenges and ethical considerations.
Blockchain: animated tutorial is a team project for a computer science course. Students, in a small team setting, research blockchain technology: what it is and how it works; then produce animated tutorial videos that explain blockchain.
Decrypting secret messages has been around for decades. The need to decrypt different algorithms is essential in cyber warfare and the understanding of the threats that surround us on the internet daily.
Cyberattacks have been happening for a long time, so now there are experts in the field of cybersecurity to prevent cyberattacks. There are a lot more devices now (including computers, phones, tablets) that attacks can target.
People use apps everyday all over the world. Their personal data is flowing through the internet even when people are not actively using their devices. To this end, people need to learn how to protect their data.
Networks, hosts, clients, and servers are components of computer communication. Each component is vulnerable in different ways to cyberattacks that can result in personal and monetary loss. Students will demonstrate their learning through a game of Kahoot.
Ignited’s e-newsletter distributes useful information and resources to educators in a concise, easy to navigate format!