NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Lefton, Phyllis – Mathematics Teacher, 1991
Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)
Descriptors: Creative Thinking, Cryptography, Experiential Learning, Learning Activities
Hutcheson, Polly, Ed. – 1999
This report highlights the various strategies used to relate cooperative education (CE) work experience to students' academic programs by profiling 17 colleges and universities that are members of the National Commission for Cooperative Education's College Partner Program. Each profile includes a brief statement from the institution's president;…
Descriptors: College Students, Colleges, Community Colleges, Cooperative Education