Computer Hardware

Kramden Institute
Have you ever wondered what is inside of your computer? Today Zion visits Kramden Institute and builds his own computer.
8-CS-01 Understand the design of computing devices based on an analysis of how users interact with the devices.
68-CS-02 Design projects that combine hardware and software components to collect and exchange data.

Math and Compound Interest

Edward Jones
How can $100 today become $101 tomorrow and $1000 next year? Today we learn about interest and how to project the probability of growth.

Data Analysis, Statistics and Probability Find probabilities of compound events using organized lists, tables, tree diagrams and simulations.

a. Represent the sample space of a compound event.
b. Design and use a simulation to gener

Advanced Manufacturing

Crowder College
Today manufacturing is based on technology and engineering and will continue to be more so in the future. Join us today at Crowder College to discover some of the skills needed to help build the future of manufacturing.
ST.1.A.6-8 a. Explain how technological improvements, such as those developed for use in space exploration, the military, or medicine, have led to the invention of new products that may improve lives here on Earth

Technology and Art

E.S. Schubert Studio
What happens when you apply technology and art? Some very fascinating technics! Join us at Sculpture Studios to try some new and interesting applications in art design.
6-8.ETS1.A Define the criteria and constraints of a design problem with sufficient precision to ensure a successful solution, taking into account relevant scientific principles and potential impacts on people and the natural environment that may limit possible solutions.

Lions & Snakes

Montgomery Zoo
Join Mitch today at the Montgomery Zoo to learn about lions and snakes, some of their natural characteristics, how trained staff care for the animals and learn about their natural and learned behaviors.
“Citizen of a Digital Culture – Safety, Privacy, & Security
9. Identify common methods of securing data.
Ex: Permissions, encryption, vault, locked closet. Legal and Ethical Behavior
10. Explain social engineering, including countermeasures, and its impact on a digital society.
Examples: Phishing, hoaxes, impersonation, baiting, spoofing.”