Email
Password
Forgot password?
Stay logged in
or
New to ClassHook?
Sign up for FREE
Browse
Browse Subjects
Browse Genres
ClassHook Playlists
Clips by Standards
Vocabulary Finder
Movie Recommendations
Use Cases
Resources
Training Videos
Help Center
Contact us
Email
Password
Forgot password?
Stay logged in
or
New to ClassHook?
Sign up for FREE
Sign up for FREE
Sign in required
Sign up to
gain access to lesson features.
Create a free account
Already have an account?
Sign in
Sign in to access great benefits
Watch more clips for free
Organize clips into playlists
Access discussion questions and standards
Upload your own clips
And more
Create a free account
Already have an account?
Sign in
Numb3rs
Using Information Theory
HS
C
Subtitles settings
Subtitles Settings
Subtitles
Notice: Subtitles generated automatically.
Censor profanity
Notice: Replaces all profanity in subtitles with censored text.
Skip profanity
Notice: Automatically skips past the moments in the clip containing profanity.
Assign
Discuss
Add to playlist
Share
Share this clip
Embed
Facebook
Twitter
Classroom
Email
Link
Copy
Google Slides and PowerPoint
Google Slides and PowerPoint
Copy
Website, Blog, LMS
In this episode, Charlie uses information theory and information entropy to help understand the manifesto and probabilistic graph theory in an attempt to determine where the perpetrator is likely to be found.
computer science
information theory
Comments
Please
sign in
to write a comment.
Video Transcript
Related clips
01:37
Numb3rs
Magic Hard Drive Wand
HS
C
error-correcting codes
code theory
+1 more
information theory
02:14
Bill Nye, the Science Guy
How Circuits Work
E
MS
HS
electricity
electrons
+1 more
circuits
03:07
Schoolhouse Rock!
Think Computer
K
E
MS
binary
programming languages
+4 more
basic
units of information
bits and bytes
computers
00:34
Numb3rs
String Metrics Explanation
MS
HS
C
string comparison
string metrics
07:11
Beakman's World
Talking to Computers
MS
HS
coding
computer instruction
+3 more
types of software
video games
algorithm