Math in Nature Part 3: Fibonacci Numbers in Nature
Part 3 delves into Fibonacci numbers and where they appear in nature.
Part 3 delves into Fibonacci numbers and where they appear in nature.
Part 2 looks at spirals in nature. The video explains two different types of spirals as well as the Coriolis Effect
Part 1 explores different types of symmetry and where they can be found in nature.
The Math in Nature Video Series is an excellent tool for connecting math and the world around us.
The Inuktitut Digital Literacy Game Engine hosts three games (when launched but educators can add more game iterations they create), designed in partnership with Ilitaqsiniq Nunavut Literacy Council.
Have fun and improve your typing skills by playing Iqalliarluk – ᐃᖃᓪᓕᐊᕐᓗᒃ, a new game developed by Ilitaqsiniq – Nunavut Literacy Council and Pinnguaq!
This is an introductory tutorial on how to assemble a PC desktop. In this video, we will learn about the different parts of a computer and how to assemble the computer.
This learning program is divided into two courses: Introduction to Google Workspace and Advanced Google Workspace. The first course is intended to provide learners with practical training on how to use Google Workspace. This introductory...
This course is an introduction to podcasting. It will take the learner through the process of planning a series and the production skills needed to produce an episode. This course introduces key concepts through a...
This course introduces learners to the world of video production by taking them along a three-step process for video creation: Pre-Production, Production, and Post-Production. Topics covered include: creating a video strategy, scripting, storyboarding, filming tips,...
Cole Pauls explores the importance of Indigenous representation in video games through a personal story he wrote and illustrated.
Serious games are games whose primary purpose is education and training as opposed to entertainment. They take advantage of the ability of computer games to attract and engage players/learners for a specific purpose such as...
We’re excited to launch a new podcast, bringing you an audio version of everything you love about Root & STEM.
In this course, social media’s essentials for business are introduced to provide learners with the foundational understanding required to promote their small business on major social media platforms. Note: As this is an introductory course, it...
Self-guided Security Check Ups are simple things you can do with software you already have that can make a big difference to your safety online.
Software updates can do wonderful things: Protect against emerging security risks, improve your software and battery performance, fix software problems and make your device run more smoothly.
Encryption is a process that makes data inaccessible to anyone who doesn’t have the right key. Encryption is already used in many of the tech products and tools we use today, and forms the basis...
If your device happens to be damaged, compromised, lost or stolen, having a copy of your files on hand will help you get back up and running quickly and easily. Backup software can also help...
A web browser is an application that can take you anywhere on the internet. Simply put, it gets information from other places, and displays it on your device. The best browsers can do things to...
The more you engage and interact on the internet, the higher the chances that your privacy and safety could be violated. Learners will explore how someone could gain access to your email account, read your...
By now, most people know what a password is. A password is a secret code that you make up, usually with a combination of letters and numbers. It allows you to access your online accounts,...
Two-factor authentication is an added layer of security used when logging into your accounts, such as email. It’s where access to your online accounts require not just a password but an additional, one-time code, sent...
Ransomware is malicious software that uses encryption to lock you out of your computer and make your files inaccessible. The attacker usually demands payment, and in return, promises to give you back access to your...