skip to main content
10.1145/3059009.3059034acmconferencesArticle/Chapter ViewAbstractPublication PagesiticseConference Proceedingsconference-collections
research-article
Public Access

Educational Magic Tricks Based on Error-Detection Schemes

Published:28 June 2017Publication History

ABSTRACT

Magic tricks based on computer science concepts help grab student attention and can motivate them to delve more deeply. Error detection ideas long used by computer scientists provide a rich basis for working magic; probably the most well known trick of this type is one included in the CS Unplugged activities. This paper shows that much more powerful variations of the trick can be performed, some in an unplugged environment and some with computer assistance. Some of the tricks also show off additional concepts in computer science and discrete mathematics.

References

  1. Tim Bell, Ian H. Witten, Mike Fellows, Robyn Adams, Jane McKenzie, and Sam Jarman. 2015. CS Unplugged: An enrichment and extension programme for primary-aged students. http: //csunplugged.org/wp-content/uploads/2015/03/CSUnplugged OS 2015 v3.1.pdf .Google ScholarGoogle Scholar
  2. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clfford Stein. 2009. Introduction to Algorithms (third ed.). MIT Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Paul Curzon and Peter W. McOwan. 2008. Engaging with Computer Science Through Magic Shows. In 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education. ACM SIGCSE, 179--183. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Paul Curzon, Peter W. McOwan, and others. 2011. The Magic of Computer Science. http://www.cs4fun.org/magic. (2011). Accessed March 8, 2016.Google ScholarGoogle Scholar
  5. Martin Dietzfelbinger, Miroslaw Kutylowksi, and Rüdiger Reischuk. 1994. Exact Lower Bounds for Computing Boolean Functions on CREW PRAMs. J. Comput. System Sci. 48, 2 (1994), 231--254. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Daniel D. Garcia and David Ginat. 2012. Demystifying Computing with Magic. In SIGCSE '12. Association for Computing Machinery, 83--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Daniel D. Garcia and David Ginat. 2013. Demystifying Computing with Magic, continued. In SIGCSE '13. Association for Computing Machinery, 207--208. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Daniel D. Garcia and David Ginat. 2016. Presentation associated with {9} of a trick not described in the written publication. (March 2016).Google ScholarGoogle Scholar
  9. Daniel D. Garcia and David Ginat. 2016. Demystifying Computing with Magic, part III. In SIGCSE '16. Association for Computing Machinery, 158--159. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Ronald I. Greenberg. 2010. Activities (from high school presentation materials). http://www.illinoiscomputes.org/hspresent/what/activities. (Jan. 2010).Google ScholarGoogle Scholar
  11. R. W. Hamming. 1950. Error Detecting and Error Correcting Codes. Bell System Technical Journal 26, 2 (April 1950), 147--160.Google ScholarGoogle Scholar
  12. C. Heeren, T. Magliery, and L. Pitt. 1998. MATHmaniaCS Lesson 1: Binary Numbers. http://www.mathmaniacs.org/lessons/01-binary. (1998). Accessed 3/10/16.Google ScholarGoogle Scholar
  13. Joseph JáJá. 1992. An Introduction to Parallel Algorithms. Addison-Wesley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Miroslaw Kutylowski and Thomas Schwöppe. circa 1998. A lower bound for PARITY on randomized CRCW PRAMs. http://citeseerx.ist.psu.edu/viewdoc/versions?doi=10.1.1.46.5019 ac- cessed 1/15/17. (circa 1998).Google ScholarGoogle Scholar
  15. Steven McGee, Ronald I. Greenberg, Dale F. Reed, and Jennifer Duck. 2013. Evaluation of the IMPACTS Computer Science Presentations. The Journal for Computing Teachers (Summer 2013), 26--40. International Society for Technology in Education, www.iste.orgGoogle ScholarGoogle Scholar

Index Terms

  1. Educational Magic Tricks Based on Error-Detection Schemes

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader