July 2022
Cybersecurity Basics: How to Manage Cyber Risks
Event run by Girls Computing League. Take cybersecurity into your own hands! We all rely on electronic information. But what would happen if it was stolen, corrupted, or unavailable? In this workshop, students will learn about why cybersecurity is important and the practices and tools that can help people and organizations protect their critical information. We will conduct exercises to examine some of the technology that is used to help protect computer systems and networks. Students will participate in online…
Find out more »Artificial Intelligence: How Computers Learn
Event run by Girls Computing League. Have you ever wondered how Alexa or Siri recognizes your voice, or how Facebook is able to automatically recognize your friends in pictures? The answer is Artificial Intelligence (AI), or also known as Machine Learning! In this workshop, students will learn about how machine learning techniques such as artificial neural networks learn from data to answer real world questions.
Find out more »August 2022
Python Programming
Event run by Girls Computing League. Did you know that Disney, Netflix, Google and NASA, just to name a few, are all using Python? Python can be used for creating web applications, automation, programming robots and artificial intelligence. Python is the language of choice from beginners to experts. Students will learn how to program using Python starting with simple data types, including numbers, letters and strings, and lists. Students will also explore comparisons, if-statements, and loops. Finally, students will use…
Find out more »Intro to Encryption – How to Protect Your Information
Event run by Girls Computing League. Whether it is your teacher’s test questions or your parent’s credit card number, this information must be privacy protected. During this TechShop, you will learn how information is protected online. Throughout the workshop students will work on puzzles, encryption and code breaking. At the end of the lesson students will see if they can figure out encrypted information, i.e. Can they crack the code? Let’s see who can succeed in protecting their information!
Find out more »