Activities Offer

Due to the current situation, activities will resume in JANUARY.

Page to sign up for activities. Link

For more information, contact: activitats.museu @ etsinf.upv.es

Guided Tours

The best way to visit our facilities. The activity includes the projection of a ducumentary about the History of Informatics. After that a guided visit through all the permanent exhibition is made. During the visit you will be able to see all kind of computing devices, the milestones of personal computing and also a great number of great-sized computers. The visit will be organised in each case to adapt it to the visiting group. Guided Visits are designed for people of all ages.

Vintage Informatics

This activity takes the visitor into the world and uses of informatics of the first home computers. We use Amstrad microcomputers from the decade of 1980s to study little BASIC written programs and play some vintage videogames. Due to the material, the museum staff recalls teachers and visitors to be responsible and careful when using it. This workshop can take up to 32 students.

Programming Workshops

Criptography and Cryptoanalysis workshops

Cyber awareness

To take in consideration by teachers:

  1. As a public museum, our resources are limited. Despite that, we invert tons of illusion, dedication and effort to try to improve our society education, awake vocations and teach good citizens.
  2. Not paying money to enjoy our activities does not mean that making them is free. We request our visitors a Sustainable Ticket in form of RAEEs (electrical and electronic waste pieces) as a little gesture with our planet’s future.
  3. The activities last, approximately, two hours and they have no break during them. That’s the reason why we request the complicity and the participation of teachers acting as responsibles in the process of booking the activity as well as during it. We expect from teachers the maximum degree of cooperation and punctuality on the visit day.
  4.  In those workshops where computers are used, UPV’s cybersecurity policy requires the identification of each one of the participants in the workshop (name, surnames and ID). The museum will request this information to the person in charge of the visit with the proper advance so credentials can be obtained without any problem.
  5. Before the visit, we strongly recommend to work on the area of the workshop booked in class, so students can develop the workshop without problems. Some classroom activities can be found here.
  6. The museum has the right to cancel any activity not fullfilling all the requisites above.