{"id":262,"date":"2020-03-14T23:33:48","date_gmt":"2020-03-15T03:33:48","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/?page_id=262"},"modified":"2020-03-14T23:36:07","modified_gmt":"2020-03-15T03:36:07","slug":"code-nights","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/code-nights\/","title":{"rendered":"Code Night @ Granby High School &#8211; March 2020"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<ul class=\"wp-block-gallery columns-3 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"662\" src=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/3D_PrintClub_03052020_FamilyCodeNight-1024x662.jpg\" alt=\"\" data-id=\"264\" data-link=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/code-nights\/3d_printclub_03052020_familycodenight\/\" class=\"wp-image-264\" srcset=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/3D_PrintClub_03052020_FamilyCodeNight-1024x662.jpg 1024w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/3D_PrintClub_03052020_FamilyCodeNight-300x194.jpg 300w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/3D_PrintClub_03052020_FamilyCodeNight-768x497.jpg 768w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/3D_PrintClub_03052020_FamilyCodeNight.jpg 1174w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"612\" src=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/BookDisplay_032020_FamilyCodeNight-1024x612.jpg\" alt=\"\" data-id=\"265\" data-link=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/code-nights\/bookdisplay_032020_familycodenight\/\" class=\"wp-image-265\" srcset=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/BookDisplay_032020_FamilyCodeNight-1024x612.jpg 1024w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/BookDisplay_032020_FamilyCodeNight-300x179.jpg 300w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/BookDisplay_032020_FamilyCodeNight-768x459.jpg 768w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/BookDisplay_032020_FamilyCodeNight.jpg 1204w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"836\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Cryptology_03052020_FamilyCodeNight-1-836x1024.jpg\" alt=\"\" data-id=\"266\" data-link=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/code-nights\/cryptology_03052020_familycodenight-1\/\" class=\"wp-image-266\" srcset=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Cryptology_03052020_FamilyCodeNight-1-836x1024.jpg 836w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Cryptology_03052020_FamilyCodeNight-1-245x300.jpg 245w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Cryptology_03052020_FamilyCodeNight-1-768x941.jpg 768w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Cryptology_03052020_FamilyCodeNight-1.jpg 955w\" sizes=\"(max-width: 836px) 100vw, 836px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"691\" height=\"989\" src=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/FirstTechChallenge_03052020_FamilyCodeNight-1.jpg\" alt=\"\" data-id=\"267\" data-link=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/code-nights\/firsttechchallenge_03052020_familycodenight-1\/\" class=\"wp-image-267\" srcset=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/FirstTechChallenge_03052020_FamilyCodeNight-1.jpg 691w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/FirstTechChallenge_03052020_FamilyCodeNight-1-210x300.jpg 210w\" sizes=\"(max-width: 691px) 100vw, 691px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"587\" src=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Food_03052020_FamilyCodeNight-1-1024x587.jpg\" alt=\"\" data-id=\"268\" data-link=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/code-nights\/food_03052020_familycodenight-1\/\" class=\"wp-image-268\" srcset=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Food_03052020_FamilyCodeNight-1-1024x587.jpg 1024w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Food_03052020_FamilyCodeNight-1-300x172.jpg 300w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Food_03052020_FamilyCodeNight-1-768x440.jpg 768w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Food_03052020_FamilyCodeNight-1.jpg 1255w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"878\" height=\"665\" src=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/GIE2_03052020_FamilyCodeNight-1.jpg\" alt=\"\" data-id=\"269\" data-link=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/code-nights\/gie2_03052020_familycodenight-1\/\" class=\"wp-image-269\" srcset=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/GIE2_03052020_FamilyCodeNight-1.jpg 878w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/GIE2_03052020_FamilyCodeNight-1-300x227.jpg 300w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/GIE2_03052020_FamilyCodeNight-1-768x582.jpg 768w\" sizes=\"(max-width: 878px) 100vw, 878px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"537\" src=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/MergeCube_03052020_FamilyCodeNight-1-1024x537.jpg\" alt=\"\" data-id=\"270\" data-link=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/code-nights\/mergecube_03052020_familycodenight-1\/\" class=\"wp-image-270\" srcset=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/MergeCube_03052020_FamilyCodeNight-1-1024x537.jpg 1024w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/MergeCube_03052020_FamilyCodeNight-1-300x157.jpg 300w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/MergeCube_03052020_FamilyCodeNight-1-768x403.jpg 768w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/MergeCube_03052020_FamilyCodeNight-1.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/MergeCube3_03052020_FamilyCodeNight-1-768x1024.jpg\" alt=\"\" data-id=\"271\" data-link=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/code-nights\/mergecube3_03052020_familycodenight-1\/\" class=\"wp-image-271\" srcset=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/MergeCube3_03052020_FamilyCodeNight-1-768x1024.jpg 768w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/MergeCube3_03052020_FamilyCodeNight-1-225x300.jpg 225w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/MergeCube3_03052020_FamilyCodeNight-1.jpg 960w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Robots_03052020_FamilyCodeNight-1-1024x768.jpg\" alt=\"\" data-id=\"272\" data-link=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/code-nights\/robots_03052020_familycodenight-1\/\" class=\"wp-image-272\" srcset=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Robots_03052020_FamilyCodeNight-1-1024x768.jpg 1024w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Robots_03052020_FamilyCodeNight-1-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Robots_03052020_FamilyCodeNight-1-768x576.jpg 768w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Robots_03052020_FamilyCodeNight-1.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"967\" height=\"721\" src=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Robots2_03052020_FamilyCodeNight-1.jpg\" alt=\"\" data-id=\"273\" data-link=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/code-nights\/robots2_03052020_familycodenight-1\/\" class=\"wp-image-273\" srcset=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Robots2_03052020_FamilyCodeNight-1.jpg 967w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Robots2_03052020_FamilyCodeNight-1-300x224.jpg 300w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Robots2_03052020_FamilyCodeNight-1-768x573.jpg 768w\" sizes=\"(max-width: 967px) 100vw, 967px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Robots6_03052020_FamilyCodeNight-768x1024.jpg\" alt=\"\" data-id=\"274\" data-link=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/code-nights\/robots6_03052020_familycodenight\/\" class=\"wp-image-274\" srcset=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Robots6_03052020_FamilyCodeNight-768x1024.jpg 768w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Robots6_03052020_FamilyCodeNight-225x300.jpg 225w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/Robots6_03052020_FamilyCodeNight.jpg 960w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/ROTC_03052020_FamilyCodeNight-1-1024x768.jpg\" alt=\"\" data-id=\"275\" data-link=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/code-nights\/rotc_03052020_familycodenight-1\/\" class=\"wp-image-275\" srcset=\"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/ROTC_03052020_FamilyCodeNight-1-1024x768.jpg 1024w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/ROTC_03052020_FamilyCodeNight-1-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/ROTC_03052020_FamilyCodeNight-1-768x576.jpg 768w, https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-content\/uploads\/sites\/18988\/2020\/03\/ROTC_03052020_FamilyCodeNight-1.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2384,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-json\/wp\/v2\/pages\/262"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-json\/wp\/v2\/users\/2384"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-json\/wp\/v2\/comments?post=262"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-json\/wp\/v2\/pages\/262\/revisions"}],"predecessor-version":[{"id":278,"href":"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-json\/wp\/v2\/pages\/262\/revisions\/278"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/odu-nps-cs-cybersecurity-pathway-for-cte\/wp-json\/wp\/v2\/media?parent=262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}