Home | Data Structures Project | Test Prep Study | Create Task | Sponsered Project | Cross Over | Review Tickets | Accounts and Login | Week 5 | Week 6 | Week 7 |
5.1 to 5.6 Notes
5.1 Video 1
Learning Objective
- Explain how an effect of a computing innovation can be both beneficial and harmful
Essential Knowledge
- People create computing innovations
- The way people complete tasks often changes to incorporate new computing innovations
- Not every effect of computing innovation is anticipated in advance
- A single effect can be viewed as both beneficial and harmful by different people or even by the same person
- Advances in computing have generated and increased creativity in other fields
- Accelerometers
- Chip that detects acceleration
- Automobile industry drove price down
- Used for airbag deployment and lateral movement detection
- Quadcopter “brain”
- Censor
- Beneficial and Harmful Effects
- Multirotor (e.g. Quadcopter)
- Benefit - deliveries, finding lost people, aerial photography is easy
- Harmful - flying unregulated zones is illegal and dangerous, privacy concerns
- Wii controller
- Benefit - gets people active playing video games
- Harmful - broken TV’s and injuries
- 3D printers
- Open source software for the computer and printer
- In schools and homes
- New classes developed for 3D printing
- Special 3D printers can make
- organisms/prosthetics
- Houses
- Shoes and jewelry
- themselves
5.1 Video 2
Learning objective
- Explain how a computing innovation can have an impact beyond its intended purpose
Essential knowledge
- Responsible programmers try to consider the unintended ways their computing innovations can be used and the potential beneficial and harmful effects of these new uses
- It is not possible for a programmer to consider all the ways a computing innovation can be used
- Rapid sharing of a program or running a program with a large number of users can result in significant impacts beyond the intended purpose or control of the programmer
- Microtransactions
- Free games/apps
- cosmetics/pay-to-win/paywall to functionality
5.2 Video 1
- Internet access varies between socioeconomic, geographic, and demographic characteristics, as well as between countries
- The digital divide refers to differing access to computing devices and the internet, based on socioeconomic, geographic, or demographic characteristics
- The digital divide can affect both groups and individuals
- The digital divide raises issues of equity, access, and influence, both globally and locally
- The digital divide is affected by the actions of individuals organizations and government
- Demographics include, but not isolated to
-
- Age
-
- Religion
-
- In some countries
- Computers are not that common in rural areas
- Only a small number of websites
- The internet is used to protect and advocate the government
- There is a high level of surveillance on the internet to protect the government
5.3 Video 1
- Netflix
- Explicit data
- Thumbs
- Name, address, etc
- Implicit data
- When you watch
- What you binged
- Style of show frequently selected
- Bias
- Netflix exclusives are featured ahead of most
- Subscriptions
- Computing innovations can reflect existing human biases because of biases written into the algorithms or biases in the data used by the innovation
- Creating software to assist loan officers
- Find trends in successful loans
- Reject those who don’t fit their trends
- Age
- Gender
- race/ethnicity
- Programmers should take action to reduce bias in algorithms used for computing innovations as a way of combating existing human biases
Learning objective
- Describe issues that contribute to the digital divide
Essential knowledge
- Internet access varies between socioeconomic, geographic, and demographic characteristics, as well as between countries
- The digital divide refers to differing access to computing devices and the internet, based on socioeconomic, geographic, or demographic characteristics
- The digital divide can
5.4 Video 1
- Crowdsourcing
Essential knowledge
- Widespread access to information and public data facilitates the identification of problems, development of solutions, and dissemination of results
- Science has been affected by using distributed and citizen science to solve scientific problems
-
Citizen science is scientific research conducted in whole or part by distributed individuals, many of whom may not be scientist, who contribute relevant data to research using their own computing devices
- Public Data Sets
- Kaggle
- Courses in visualizations, machine learning, and more
- Competitions - cash prizes, swag, props
- Notebooks
- Google public datasets
- Free for the 1st terabyte
- All-in-one package that uses BigQuery
- Data.gov
- US Government data
- Agriculture, energy, water, health
- Local government
- Distributed Computing
- Donate spare computing power to help calculations
- Science has been affected by using distributed and citizen science to solve scientific problems
- Citizen science is scientific research conducted in whole or part by distributed individuals, many of whom many not be scientists, who contribute relevant data to research using their own computing devices
- Human capabilities can be enhanced by collaboration via computing
- Innovations made possible with crowdsourcing
- Spotify
- Collaborative playlists
- Algorithm
- Metadata write-in
- Crowdfunding
- Kickstarter
- IndieGoGo
- Blockchain
- Cryptocurrency
- Crowdsourcing is the practice of obtaining input or information from a large number of people via the Internet
- Crowdsourcing offers new models of collaboration, such as connecting businesses or social causes with funding
5.5 Video 1
Learning objectives
- Explain how the use of computing can raise legal and ethical concerns
Essential knowledge
- Material created on a computer is the intellectual property of the creator or an organization
- Ease of access and distribution of digitized information raises intellectual property concerns regarding ownership, value, and use
- Measures should be taken to safeguard intellectual property
- The use of material created by someone other than you should always be cited
- Creative commons, open source, and open access have enable board access to digital information
- As with any technology or medium, using computing to harm individuals or groups of people raises legal and ethical concerns
- Intellectual property
-
- a work or invention that is the result of creativity to which one has rights
- Copyright
-
- Copyright protects your IP and keeps anyone from using it, unless you give them your permission
- Plagiarism: presenting material as your own
- Legal ways to use material created by someone else
-
- Creative Commons
-
- Open source
-
- Open access
-
- Creative Commons
- Creative commons provides free licenses that you can use to tell others how you want them to use your creations
- Clearly tells others what they can and cannot do with your IP
- Open source and open access
-
- Open source: programs made freely available for anyone to use and may be redistributed and modified
-
- Open access: online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions
- Digital divide
-
- Unequal distribution of access to technology
5.6 Video 1
Learning objectives
- Unequal distribution of access to technology
- Describe the risks to privacy from collecting and storing personal data on a computer system
Essential knowledge
- Information placed online can be used in ways that were not intended and that may have a harmful impact
- PII can be used to stalk or steal the identity of a person or to aid in the planning of other criminal acts
- Personally identifiable information (PII)
- Social security number
- Age
- Race
- Phone number
- Date of birth
- Email address
- Mailing address
- Medical information
- Credit card information
- Can be used by people to steal someone’s identity, bank funds, or to impersonate someone in order to gain access to an organization
- PII
- Search engines matina a history of what you search
- Your search history is used to suggest other websites you may like or for targeted marketing
- Your location can even be collect
- PII: good and bad
- PII can be used to enhance a user’s online experience
- PII can be exploited if privacy and other protections are ignored
- Information placed online can be used in ways that were not intended and that may have a harmful impact
- Risks to privacy
- The information placed online is difficult to delete
- Information posted to social media can be used by others and combined with other sources to deduce private information about you
- This information can then be used in ways that were not intended anime have a harmful impact
5.6 Video 2
Learning objectives
- Explain how computing resources can be protected and can be misused
- Authentication
- Measures protect devices and information from unauthorized access
- Authentication measures
- Strong passwords
- Multi-factor authentication
- Strong passwords
- 10+ characters
- Must contain a symbol
- Must contain a number
- Must contain lowercase and uppercase letters
- Multi Factor authentication
- Types of authentication
- What you know
- What you have
- What you are
- Virus and Malware
- Virus: malicious programs that can copy themselves and gain access to systems that they are not supposed to be allowed in
- Malware: often intended to damage a computing system or take partial control over its operation
- Can infiltrate a system by posing as legitimate programs or by attaching itself to legitimate programs, like an email attachment
- Encryption and Decryption
- Once legitimate access to a system is gained, it is important to ensure data sent to and from the system remains uncompromised
- Encryption: the process of encoding data to prevent unauthorized access
- Decryption: the process of decoding data
- Two types of encryption
-
- Symmetric encryption
-
- Asymmetric encryption
- Symmetric encryption: one key used to both encrypt and decrypt data
-
- Example: caesar cipher
5.6 Video 3
Learning objectives: explaining how unauthorized access to computing resources is gained
- Example: caesar cipher
- The importance of internet
- Internet is an integral part of our lives
- Risks of personal safety
- Phishing
-
- An attempt to trick a user into providing personal information, like your usernames and passwords, account numbers, or social security numbers
- Phishing emails often look like they’re from a company you know and trust
- Your bank
- Your credit card company
- Social networking site
- Video streaming service
- Online store
- They trick you into clicking a link or opening an attachment
- Clicking a link or opening an attachment in a phishing email will cause unexpected harm
- Virus installed on your computer
- Spoofed baking website
- Keylogger
- Records every keystroke made by a user in order to gain fraudulent access to passwords or other confidential information
- Rogue access point
- A wireless network that can give unauthorized access to secure networks