This is the second of two videos where Sal derives Bernoulli's equation. …
This is the second of two videos where Sal derives Bernoulli's equation. In the second half of the video Sal also begins an example problem where liquid exits a hole in a container. Created by Sal Khan.
Crash Course is a fast, funny, irreverent look at history. In this …
Crash Course is a fast, funny, irreverent look at history. In this episode, brothers John and Hank Green gives us their take on what makes Big History so darn important.. Created by Big History Project.
Rap song on the Bill of Rights, hosted by Smart Songs, an …
Rap song on the Bill of Rights, hosted by Smart Songs, an educational music group, creating songs about history, social studies, geography, and science---providing kids and teachers with content that makes learning fun. ABC News Los Angeles and The Boston Globe have described the group as the current version of Schoolhouse Rock.
The first ten amendments to the US Constitution are known as the …
The first ten amendments to the US Constitution are known as the "Bill of Rights." These amendments protect individual liberties and limit the power of the federal government.
Adafruit founder Limor Fried and program manager Federico Gomez Suarez explain how …
Adafruit founder Limor Fried and program manager Federico Gomez Suarez explain how computers represent numbers, text, images, and sound using tiny electric signals.
How can you tell if harmful bacteria are in your food or …
How can you tell if harmful bacteria are in your food or water that might make you sick? What you eat or drink can be contaminated with bacteria, viruses, parasites and toxins—pathogens that can be harmful or even fatal. Students learn which contaminants have the greatest health risks and how they enter the food supply. While food supply contaminants can be identified from cultures grown in labs, bioengineers are creating technologies to make the detection of contaminated food quicker, easier and more effective.
A high-level explanation of digital signature schemes, which are a fundamental building …
A high-level explanation of digital signature schemes, which are a fundamental building block in many cryptographic protocols. Created by Zulfikar Ramzan.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.