It’s about that time again for K-12 students around the country to start doodling a Google logo for a chance to win the 6th annual Doodle 4 Google contests.
Google’s doodles have been used to wish Harry Houdini a happy birthday, celebrate the inventor of the guitar, honor the Mayor of Silicon Valley and wish the country a Happy Halloween. With over 15,000 created for homepages around the world, Google takes pride in its doodle celebrations.
The “National Winner of Doodle 4 Google” will have a chance for their logo to be used on Google.com. Along with cyberspace fame, they will also receive a $30,000 college scholarship and a $50,000 technology grant for their school.
Image Via Google Doodle
Fifty state winners and four national finalists will receive a $5,000 college scholarship, a trip to New York to attend the final awards ceremony and a Wacom digital tablet. The rest of the 250 state finalists will have their designs featured on the Doodle 4 Google website.
For this contest, coming in second place doesn’t seem half bad!
Students will enter their entries until May 22 and the winner will be decided by an online vote on May 22. In the meantime, let’s take a look back and check out our favorite Google Doodles.
For more information visit Google 4 Doodle for more and check out more doodles from the past.
TechZone360 Web Editor
Antivirus software is not enough. Apex Technology Services used its decades of IT and cybersecurity
experience to create budget-friendly network security packages every company needs.
Please take a moment to fill out your information so we can contact you directly regarding your request.
Shabodi, an Application Enablement Platform (AEP) provider unleashing advanced network capabilities in LTE, 5G, 6G, and Wi-Fi 6, announced they have l…
Endpoint protection, also known as endpoint security, is a cybersecurity approach focused on defending computers, mobile devices, servers, and other e…
Databricks is an innovative data analytics platform designed to simplify the process of building big data and artificial intelligence (AI) solutions. …
Blue/green deployment is a software release management strategy that aims to reduce downtime and risk by running two identical production environments…
Lateral movement is a term used in cybersecurity to describe the techniques that cyber attackers use to progressively move through a network in search…