Curated Video
Measuring Intelligence
Neuroscientist John Duncan (Cambridge) describes some of the tests associated with Charles Spearman's mysterious "g factor."
Curated Video
Mind vs. Brain
Cognitive scientist Victor Ferreira (UC San Diego) gives his perspective on the difference between the mind and the brain.
Teaching Without Frills
Informational Writing for Kids- Episode 4: Writing an Introduction
In this video, you will learn how to write an introduction for your informational book. We will discuss strategies to hook the reader and introduce your topic.
Teaching Without Frills
Informational Writing for Kids - Episode 3: Making a Plan
In this video, you will learn how to make a plan for your informational writing. You can think about the structure of your book and the subtopics you will include. This will help you organize your ideas before writing!
Teaching Without Frills
Informational Writing for Kids - Episode 2: Brainstorming & Choosing a Topic
In this video, you will learn how to brainstorm and then choose the best topic by thinking about the following questions: "What do I know a lot about?" "Who is my audience?" "What am I interested in?"
Teaching Without Frills
Economics for Kids: Goods and Services
In this economics video, you will learn the difference between goods and services!
Teaching Without Frills
Informational Writing for Kids - Episode 6: Writing a Closing
In this video, you will learn how to write a closing or conclusion for your informational writing. We will discuss different types of closing strategies, such as summarizing the main points and providing a next step for the reader.
Teaching Without Frills
Informational Writing for Kids - Episode 8: Making a Glossary
In this video, you will learn how to make a glossary for your informational writing book. We will discuss how to choose important key words and provide short definitions.
Teaching Without Frills
Informational Writing for Kids - Episode 7: Making a Table of Contents
In this video, you will learn how to make a table of contents for your own informational writing book.
Teaching Without Frills
Informational Writing for Kids - Episode 5: Writing a Draft
In this video, you will learn how to write a first draft of your informational book. We will discuss how to use headings to organize the facts that go together. We will also draw and label pictures that help to teach the reader more...
Vlogbrothers
Hackers, Cyber crime, and a New Kind of War.
In which Hank talks briefly about the fundamental shift in espionage, warfare, crime, and activism that may re-define our age. Hackers have been mounting increasingly sophisticated attacks. Billions of dollars have been stolen, and even...
Curated Video
Introduction to IT and Cybersecurity: Basics, Protocols, and Future Trends
Part 1/16 of Introduction to IT and Cybersecurity series: The video is an introduction to the course "Introduction to IT and Cybersecurity." The course covers topics such as IT hardware and software, networking, servers, databases,...
Curated Video
Firewalls and Security Appliances
Any type of server appliance intended to safeguard computer networks from unauthorized traffic is referred to as a security appliance.
Curated Video
Publish Your Weapons Online
This video will teach you how to prepare your lab for a real world attack
Curated Video
Spark Programming in Python for Beginners with Apache Spark 3 - Big Data History and Primer
In this video, we will cover big data history and primer. This clip is from the chapter "Apache Spark Introduction" of the series "Spark Programming in Python for Beginners with Apache Spark 3".In this section, we will cover an...
Curated Video
Introduction to IT and Cybersecurity: Web Infrastructure
Part 7/16 of Introduction to IT and Cybersecurity series: This video explains the basic building blocks of the Internet, including definitions of terms like ISP, NAP, IP address, DNS, URL, protocol, cloud service provider, server, and...
Curated Video
What is Cyber Warfare
The employment of cyberattacks against an adversary state to disrupt critical computer systems and/or inflict damage on the same scale as physical conflict is known as cyberwarfare. Espionage, sabotage, propaganda, manipulation, and...
Curated Video
Blended Attacks
A complex cyberattack described as a "blended attack" makes use of a variety of malicious malware, computer viruses, worms, or Trojan horses in addition to several vulnerabilities in hardware or software that the attacker is aware of.
FuseSchool
MATHS - Trigonometry - Uses of Pythagoras Theorem
One useful thing you can use Pythagoras Theorem for is to find the distance between two points using their coordinates. In this video you will learn how to use Pythagoras Theorem!
National Institute of Standards and Technology
Cybersecurity and Innovation in the Information Economy - Segment 1
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....
Science ABC
Human Brain vs Supercomputer: Which One Wins?
Since the birth of the first computers, there has been a direct comparison between these “calculating machines” and the human brain. One of the common phrases circulating for decades, promoting the idea of a “brain versus computer”...
National Institute of Standards and Technology
Cybersecurity and Innovation in the Information Economy - Segment 5
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC. ...
Bedtime History
Artificial Intelligence
What is artificial intelligence? How does it differ from other computer programs? Currently, artificial intelligence is being used to help people in many ways, such as detecting when and where earthquakes will occur before they happen,...
National Institute of Standards and Technology
Cybersecurity and Innovation in the Information Economy - Segment 9
As part of its initiative to ensure that the Internet continues to spawn growth and innovation, the U.S. Dept. of Commerce held a symposium on "Cybersecurity and Innovation in the Information Economy" on July 27, 2010 in Washington DC....