Home Data Structures Project Test Prep Study Create Task Sponsered Project Cross Over Review Tickets Accounts and Login Week 5 Week 6 Week 7

5.1 to 5.6 Notes

5.1 Video 1

Learning Objective

  • Explain how an effect of a computing innovation can be both beneficial and harmful

    Essential Knowledge

  • People create computing innovations
  • The way people complete tasks often changes to incorporate new computing innovations
  • Not every effect of computing innovation is anticipated in advance
  • A single effect can be viewed as both beneficial and harmful by different people or even by the same person
  • Advances in computing have generated and increased creativity in other fields
  • Accelerometers
  • Chip that detects acceleration
  • Automobile industry drove price down
  • Used for airbag deployment and lateral movement detection
  • Quadcopter “brain”
  • Censor
  • Beneficial and Harmful Effects
  • Multirotor (e.g. Quadcopter)
  • Benefit - deliveries, finding lost people, aerial photography is easy
  • Harmful - flying unregulated zones is illegal and dangerous, privacy concerns
  • Wii controller
  • Benefit - gets people active playing video games
  • Harmful - broken TV’s and injuries
  • 3D printers
  • Open source software for the computer and printer
  • In schools and homes
  • New classes developed for 3D printing
  • Special 3D printers can make
  • organisms/prosthetics
  • Houses
  • Shoes and jewelry
  • themselves

    5.1 Video 2

    Learning objective

  • Explain how a computing innovation can have an impact beyond its intended purpose

    Essential knowledge

  • Responsible programmers try to consider the unintended ways their computing innovations can be used and the potential beneficial and harmful effects of these new uses
  • It is not possible for a programmer to consider all the ways a computing innovation can be used
  • Rapid sharing of a program or running a program with a large number of users can result in significant impacts beyond the intended purpose or control of the programmer
  • Microtransactions
  • Free games/apps
  • cosmetics/pay-to-win/paywall to functionality

    5.2 Video 1

  • Internet access varies between socioeconomic, geographic, and demographic characteristics, as well as between countries
  • The digital divide refers to differing access to computing devices and the internet, based on socioeconomic, geographic, or demographic characteristics
  • The digital divide can affect both groups and individuals
  • The digital divide raises issues of equity, access, and influence, both globally and locally
  • The digital divide is affected by the actions of individuals organizations and government
  • Demographics include, but not isolated to
    • Age
    • Religion
    • In some countries
  • Computers are not that common in rural areas
  • Only a small number of websites
  • The internet is used to protect and advocate the government
  • There is a high level of surveillance on the internet to protect the government

    5.3 Video 1

  • Netflix
  • Explicit data
  • Thumbs
  • Name, address, etc
  • Implicit data
  • When you watch
  • What you binged
  • Style of show frequently selected
  • Bias
  • Netflix exclusives are featured ahead of most
  • Subscriptions
  • Computing innovations can reflect existing human biases because of biases written into the algorithms or biases in the data used by the innovation
  • Creating software to assist loan officers
  • Find trends in successful loans
  • Reject those who don’t fit their trends
  • Age
  • Gender
  • race/ethnicity
  • Programmers should take action to reduce bias in algorithms used for computing innovations as a way of combating existing human biases

Learning objective

  • Describe issues that contribute to the digital divide

    Essential knowledge

  • Internet access varies between socioeconomic, geographic, and demographic characteristics, as well as between countries
  • The digital divide refers to differing access to computing devices and the internet, based on socioeconomic, geographic, or demographic characteristics
  • The digital divide can

    5.4 Video 1

  • Crowdsourcing

    Essential knowledge

  • Widespread access to information and public data facilitates the identification of problems, development of solutions, and dissemination of results
  • Science has been affected by using distributed and citizen science to solve scientific problems
  • Citizen science is scientific research conducted in whole or part by distributed individuals, many of whom may not be scientist, who contribute relevant data to research using their own computing devices

  • Public Data Sets
  • Kaggle
  • Courses in visualizations, machine learning, and more
  • Competitions - cash prizes, swag, props
  • Notebooks
  • Google public datasets
  • Free for the 1st terabyte
  • All-in-one package that uses BigQuery
  • Data.gov
  • US Government data
  • Agriculture, energy, water, health
  • Local government
  • Distributed Computing
  • Donate spare computing power to help calculations
  • Science has been affected by using distributed and citizen science to solve scientific problems
  • Citizen science is scientific research conducted in whole or part by distributed individuals, many of whom many not be scientists, who contribute relevant data to research using their own computing devices
  • Human capabilities can be enhanced by collaboration via computing
  • Innovations made possible with crowdsourcing
  • Spotify
  • Collaborative playlists
  • Algorithm
  • Metadata write-in
  • Crowdfunding
  • Kickstarter
  • IndieGoGo
  • Blockchain
  • Cryptocurrency
  • Crowdsourcing is the practice of obtaining input or information from a large number of people via the Internet
  • Crowdsourcing offers new models of collaboration, such as connecting businesses or social causes with funding

    5.5 Video 1

    Learning objectives

  • Explain how the use of computing can raise legal and ethical concerns

    Essential knowledge

  • Material created on a computer is the intellectual property of the creator or an organization
  • Ease of access and distribution of digitized information raises intellectual property concerns regarding ownership, value, and use
  • Measures should be taken to safeguard intellectual property
  • The use of material created by someone other than you should always be cited
  • Creative commons, open source, and open access have enable board access to digital information
  • As with any technology or medium, using computing to harm individuals or groups of people raises legal and ethical concerns
  • Intellectual property
    • a work or invention that is the result of creativity to which one has rights
  • Copyright
    • Copyright protects your IP and keeps anyone from using it, unless you give them your permission
  • Plagiarism: presenting material as your own
  • Legal ways to use material created by someone else
    • Creative Commons
    • Open source
    • Open access
    • Creative Commons
  • Creative commons provides free licenses that you can use to tell others how you want them to use your creations
  • Clearly tells others what they can and cannot do with your IP
  • Open source and open access
    • Open source: programs made freely available for anyone to use and may be redistributed and modified
    • Open access: online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions
  • Digital divide
    • Unequal distribution of access to technology

      5.6 Video 1

      Learning objectives

  • Describe the risks to privacy from collecting and storing personal data on a computer system

    Essential knowledge

  • Information placed online can be used in ways that were not intended and that may have a harmful impact
  • PII can be used to stalk or steal the identity of a person or to aid in the planning of other criminal acts
  • Personally identifiable information (PII)
  • Social security number
  • Age
  • Race
  • Phone number
  • Date of birth
  • Email address
  • Mailing address
  • Medical information
  • Credit card information
  • Can be used by people to steal someone’s identity, bank funds, or to impersonate someone in order to gain access to an organization
  • PII
  • Search engines matina a history of what you search
  • Your search history is used to suggest other websites you may like or for targeted marketing
  • Your location can even be collect
  • PII: good and bad
  • PII can be used to enhance a user’s online experience
  • PII can be exploited if privacy and other protections are ignored
  • Information placed online can be used in ways that were not intended and that may have a harmful impact
  • Risks to privacy
  • The information placed online is difficult to delete
  • Information posted to social media can be used by others and combined with other sources to deduce private information about you
  • This information can then be used in ways that were not intended anime have a harmful impact

    5.6 Video 2

    Learning objectives

  • Explain how computing resources can be protected and can be misused
  • Authentication
  • Measures protect devices and information from unauthorized access
  • Authentication measures
  • Strong passwords
  • Multi-factor authentication
  • Strong passwords
  • 10+ characters
  • Must contain a symbol
  • Must contain a number
  • Must contain lowercase and uppercase letters
  • Multi Factor authentication
  • Types of authentication
  • What you know
  • What you have
  • What you are
  • Virus and Malware
  • Virus: malicious programs that can copy themselves and gain access to systems that they are not supposed to be allowed in
  • Malware: often intended to damage a computing system or take partial control over its operation
  • Can infiltrate a system by posing as legitimate programs or by attaching itself to legitimate programs, like an email attachment
  • Encryption and Decryption
  • Once legitimate access to a system is gained, it is important to ensure data sent to and from the system remains uncompromised
  • Encryption: the process of encoding data to prevent unauthorized access
  • Decryption: the process of decoding data
  • Two types of encryption
    • Symmetric encryption
    • Asymmetric encryption
  • Symmetric encryption: one key used to both encrypt and decrypt data
    • Example: caesar cipher

      5.6 Video 3

      Learning objectives: explaining how unauthorized access to computing resources is gained

  • The importance of internet
  • Internet is an integral part of our lives
  • Risks of personal safety
  • Phishing
    • An attempt to trick a user into providing personal information, like your usernames and passwords, account numbers, or social security numbers
  • Phishing emails often look like they’re from a company you know and trust
  • Your bank
  • Your credit card company
  • Social networking site
  • Video streaming service
  • Online store
  • They trick you into clicking a link or opening an attachment
  • Clicking a link or opening an attachment in a phishing email will cause unexpected harm
  • Virus installed on your computer
  • Spoofed baking website
  • Keylogger
  • Records every keystroke made by a user in order to gain fraudulent access to passwords or other confidential information
  • Rogue access point
  • A wireless network that can give unauthorized access to secure networks

5.1 Github Page Action- Beneficial and Harmful Effects of Computing

Come up with three of your own Beneficial and corresponding Harmful Effects of Computing.

A: A benefit is that computing helps families connect online no matter where they are in the world. A harmful effect is that this computing is costly since devices that access the internet isn’t in everyone’s budget. Another benefit is that people can create online art and make a living off of it, like photo editing or being editors for YouTubers. A harmful effect is that people might get sucked up in the online world and not attention to their surroundings and real life. A third beneficial effect is that people can create programs to spread information throughout the world in times of crisis, like with the Russia scenario right now. A drawback is that the internet can be regulated by the government, creating a false narrative of the events taking place.

Talk about dopamine issues above. Real? Parent conspiracy? Anything that is impacting your personal study and success in High School?

A: I’ve never personally experienced dopamine issues relating to playing too many video games or being online to much. Even in my junior year, I enjoyed the virtual environment since it allowed to much more flexibility in my schedule. However, I can see why some video games might draw players too close to fantasy, making them forget their real life goals.

5.2 Github Page Action- Digital Divide

How does someone empower themself in a digital world?

A: A person empowers themself in the digital world by making themselves aware of all the possibilities around them regarding the internet. Even if they don’t have the resources to access the internet, they learn more about what they can achieve with the resources they have, and stays curious. We can help these students without resources by creating websites with quick and easy tutorials for how they can make use of what they have.

How does someone that is empowered help someone that is not empowered? Describe something you could do at Del Norte HS.

A: We can create resources that aids them in their ability to make use of the internet. One thing I could do here is create a club where all students use their resources to help lower income students under the internet.

Is paper or red tape blocking digital empowerment? Are there such barriers at Del Norte? Elsewhere?

A: There isn’t red tape blocking digital empowerment, rather access to the same resources. Students without computers at home won’t be able to understand and work on the content the same way other students might, leaving them with lower grades and limiting understanding of the material.

5.3 Github Page Action- Computer Bias

Does the owner of the computer think this was intentional? If yes or no, justify your conclusion. How do you think this happened? Is this harmful? Was it intended to be harmful or exclude? Should it be corrected? What would you or should you do to produce a better outcome?.

A: The owner of the computer does not think it was intentional, yes there would be serious reprocussions if it were inteneded to exlude people with darker skin tones. I think this happened since in testing they might have only used people with lighter skin tones. This is harmful since it untentionally excludes specific races from using their product’s features, which makes the company look quite bad. It should definitely be corrected by testing face ID on different skin colors of test subjects.

5.4 Github Page Action- Crowdsourcing

CompSci has 150 principles students. Describe a crowdsource idea and how you might initiate it in our environment?

A: A crowdsourcing idea is to have students share out their experiences from the last two trimesters, and then touch upon where they struggled. Especially in this class, I feel that there is a big disconnect between high performing and low performing students, and bridging the gap could be done by going over where they struggled. This could be initiated by creating an editable web page like wikepedia where people would list concerns.

What about Del Norte crowdsourcing? Could your final project be better with crowdsourcing?

A: Del Norte crowdsourcing can be implemented by setting up a webpage where all users can edit and leave comments on what they want to see. The final project would be better since we would have a large sample size telling us exactly where to improve before our sponser sees our page.

5.5 Github Page Action- Legal and Ethical Concerns

When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in GitHub pages.

Make a license for your personal and Team project. Document license you picked and why.

A: For both projects I choose the MIT license which allows users to freely access my project while I keep credit for my work and the idea.

5.6 Github Page Action- Safe Computing

Describe PII you have seen on project in CompSci Principles.

A: I have seen personal information on our ‘about us’ page on my scrum team’s home page like our names, our pictures, our school, state, and even emails in our CRUD database (we inputted a random email).

What are your feelings about PII and your exposure?

A: I feel that PII is very sensitive information that shouldn’t be accessed by just anyone. However, with instagram and other social media platforms, the information is getting easier and easier to access.

Describe good and bad passwords? What is another step that is used to assist in authentication.

A: Bad passwords and easy to guess, generic, symmetrical, and short. Good passwords have potentially multiple layers of identification to ensure that even if someone guesses the password they still can’t log in to your account. Another step in authentication is the use of encryption and keys to protect sensitive messages from the public.

Try to describe Symmetric and Asymmetric encryption.

Provide and example of encryption we used in deployment.

A: An example of encryption in deployment is when web browsers creates a session key that is encrypted with the server’s public key. The server uses a private key to decrypt the session key.

Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.

A: I thankfully haven’t learned about phishing schemes the hard way, but my parents have. I remember my Mom’s old office computor shut down and wouldn’t restart when she opened an email from ‘google.com’ instead of just ‘google’. One example of a technique is where emails are sent, and when opened install malware that might leak private information like your social security number. Another example of phishing are false urls that look correct but when clicked on install malware.