NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Lefton, Phyllis – Mathematics Teacher, 1991
Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)
Descriptors: Creative Thinking, Cryptography, Experiential Learning, Learning Activities
Peer reviewed Peer reviewed
Gordon, Sheldon P.; Gordon, Florence S. – Mathematics Teacher, 1990
Considered are several mathematical models that can be used to study different waiting situations. Problems involving waiting at a red light, bank, restaurant, and supermarket are discussed. A computer program which may be used with these problems is provided. (CW)
Descriptors: Computer Simulation, Computer Uses in Education, Creative Thinking, Enrichment Activities