Home | Create | Python | TPT |
Week 0 | 5.1/5.2 Notes |
Week 1 | 5.3/5.4 Notes |
Week 2 | 5.5/5.6 Notes |
Week 6 | MC 1 and MC 2 Quiz Corrections |
Week 7 | MC 3 Quiz Corrections |
MCQ 5: 44/50
Q9:
- Original answer: C
- Correct answer: D
- Why: Have to go through and multply by 10 each time
Q17:
- My:A
- Correct: D
- Why: Version I calls the GetPrediction procedure once for each element of idList, or four times total. Since each call requires 1 minute of execution time, version I requires approximately 4 minutes to execute. Version II calls the GetPrediction procedure twice for each element of idList, and then again in the final display statement. This results in the procedure being called nine times, requiring approximately 9 minutes of execution time. Q22:
- Correct answer: B
- My answer: A
- Why:Selecting the best move is an optimization problem that cannot be solved in a reasonable time based on the information that the game runs slowly. If the algorithm for selecting the best move is running too slowly, the game may run more quickly if a heuristic is used to find approximate solutions. Q33:
- My: C
- Correct:A
- Why: The IETF develops and oversees standards such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP). Q44:
- My: D
- Correct: B
- Why: he Internet was designed to be scalable, using open protocols to easily connect additional computing devices to the network. Q45:
- MY: B
- Correct:C
- Why: Both code segments display the correct average. Code segment I requires more arithmetic operations
First Week Test Practice:
MCQ 1 47/50:
Second Week Test Practice:
MCQ 3: 46/50
Question 6: Algorithm to Print Integers:
- Original Answer: A and C
- Correct Answer: A and D
- Why: D is one of the option choices because the number correctly displays all the values that are multiples of three up until the number 20, and incrments to 21, but does not include it. C is incorrect because the number 20 is not displayed since the algorithm terminates immediately after x is assigned the value 20.
Question 23: Social Media Hypothesis:
- Original Answer: A
- Correct Answer: D
- Why: I picked A because I thought the pattern was unchanging between average number of daily messages sent per user. Instead, I should have looked at the active trend of characters per user decreasing after th emobile app was released.
Question 36: Test cases for grade assignment with nested if:
- Original Answer: B and C
- Correct Answer: B and D
- D is a correct option choice because when numCorrect is 6, the condition numCorrect > 7 evaluates to false. Therefore “check” is displayed instead of the intended “check minus”. C was an incorrect choice because I misread it and thoucht 7 was supposed to be evaluated to “check-minus”.
Question 41: Encrypting and decrypting using public key cryptography:
- Original Answer: C
- Correct Answer: D
- D is correct because in public cryptography, a message is encrypted with a recipient’s public key and decrypted with the recipient’s private key. I thought that public key cryptography involved both keys being public, which is incorrect.
MCQ 1 47/50:
Question 14:
- Original Answer: A
- Correct Answer: C (2 times as many bits can be identified)
- Why: If you think about it numerically, two the power of one more number is 2 times as possibilities, not just two more possibilities.
Question 15: Personal Cybersecurity Risks
- Original Answer: A
- Correct Answer: C
- Why: Using public key encryption in an online store purchase is a common thing to do. however, If you email credit card information to a hotel room, that’s a huge risk of personal privacy.
Question 39: Parallel Computing:
- Original Answer: D
- Correct Answer: C
- Why: WHen the 30 and 50 seconds are coupled together in one processor, it overlaps the other processor which takes 60 seconds, so the total process takes 80 seconds.
MCQ 2 46/50:
Question 12: Application most suited to crowdsourcing
- Original Answer: B
- Correct Answer: D
- Why: A museum that allows its users to purchase tickets is not an example of a large crowd contributing, rather it is just between a user and a company. An application that allows users to view descriptions and photographs of local landmarks is reliant on information obtained from a large group of individuals
Question 25:
- Original Answer: B
- Correct Answer: C
- Why: The application only sends notifications to compatible users who are nearby. Since not all people iwll be considered compatible, users are unlikely to be able to identify ALL OF THE OTHER users in the area.
Question 32: Bits needed to represent directions:
- Original answer: A
- Correct Answer: D
- Why: Four bits can represent 16 pieces of information, so it is not needed to add an extra bit. Thus, it can already store the 8 directions.
Question 42: Cloud computing and the internet:
- Original Answer: C and D
- Correct answer B and C
- Why: Cloud storage allows users to share files easily, which may make increased concerns abouto illegal distributions of copyrighted materials. However, on the flip side it increases collaboration.
5.5 and 5.6 Notes!
5.5
- (IP) is a work or invention that is the result of creativity to which one has rights
- Copyright protects the IP, and prevents people from using it unless permission is granted
- Plagiarism is when you present material as your own
- The legal ways to use material created by someone else is Creative Commons, open source, and open access
- Creative commons provides free licenses, they tell others how you want them to use the creations (tells people what they can do with your work)
- Open source are programs that are freely available for anyone to use
- Open access is online research that has not a lot of restrictions
5.6:
- PI = personally identifiable information
- Can be used to steal someone’s identity, bank funds, or to impersonate someone someone in order to gain access to an organization
- Search engines maintain a history of what you search
- PII can be used to enhance a user’s online experience
- Can be used to enhance a user’s online experience, but it can also be exploited (harmful impact)
- Google knows your email and your IP address
- The federal government knows where/learns where and when you are traveling
- To create a strong passwords: (10+ characters, must contain a symbol, must contain number and lowercase and uppercase letters)
- Multi-Factor Authentication: What you know, what you have, what you are
- Two types of encryption: Symmetric and Asymmetric encryption:
- Symmetric encyrption is when one key is used to both encrypt and decrypt data
- Asymettric Encryption is a Public Key Encryption: it uses two keys (a public key for encypting, and a private key for decrypting)
- The benefit here is that a sender does not need the receiver’s key to encrypt a message, but needs it to decrypt it.
5.5 Activity
Question 1:
- The tech-talk and the video covers some of the license types that are available to pick for the team/individual project. The creative commons license allows people to use your work but just clearly states what others can and cannot do with your work. The Open Source MIT license is an open source program that is free for anyone to use, and the tech talk specifices that it’s good for making and distributing closed source versions. Finally, the Open Source GPL LIcense is also an Open Source license, that provides a lot of leeway, but prevent distribution of closed source versions.
Question 2:
- For both my personal, and my team project, we chose the creative commons liscence. We chose this license because we felt that it was the best fit for the purpose of our website. After we graduate from Del Norte, we don’t want the reading website to become dormant. Rather, we want other APEL and CSP students to be able to use our code and continue to make changes to the website. Having the CC license allows us to provide that freedom, but we can still specify what we don’t want others to do with our code. For my personal project, I also chose the CC license, because I want others to be able to interact with my code, but I don’t want outright copying of everything and distribution (something that I can specify)
5.6 Activity
Question 1:
- The CRUD stuff that we enter (if we enter email, phone number, etc.) and we wanted that information to be private, it is actually a concern because that information gets published to google. THus, this is a PII I have seen on a project in CompSci Principles.
Question 2:
- I think that in this day and age, my friends and I definitley have a lot of PII concerns. With apps like instagram. snapchat, and tiktok, there is a lot of personal information that could be leaked out. Also, there is always the fear of stalkers gaining too much personal information
Question 3:
- A good password would be about 10 characters with a mix of symbols and characters. A weak password would consist of fewer than 10 characters with no symbols. Multi-Factor authentication is also implimented in many systems in order to assist in just normal password authentication. For example, some times when you log in to somehwere, they will send you an email/text with another code you will have to enter.
Question 4:
- Symmetric encryption is when both the receiver and the sender has a private key. Asymmetric Encyption is when the senders key is public, but there is a private key that the receiver has in order to decrypt the message.
Question 5:
- Certbot was used in deployment, and we use encryption in that process
Question 6:
- Luckily, I have not experienced the results of a phishing scheme, but I definitley have seen the attempts. I’ve gotten text messages from numbers urging me to click on a link to change login information, and I’ve gotten voice mails from numbers urging me to call a specific number or my bank info will be stolen. I know that most of the time, the older generations can fall for these schemes because they are unaware. Some other phishing techniques involve fradulent emails, voicemails, text messages, fake wifi spoofs, or popular website recreations.
</br>
5.3 and 5.4 Notes!
5.3
- Computing innovations can reflect existing human biases because of biases written into algorithms by the programmer,
- intentionally or unintentionally
- Programmers should take action to reduce bias in algorithms used for computing to combat human biases
- Netflix example: shows their originals as featured before others
- Your feed is customized to what you’ve watched before
- Companies can have a target audience, and algorithms can target people who fit in the “target”, and reject those who don’t. fit in their trends.
- Biases can be embedded at all levels of software development (more older people in facebook, more younger in Tiktok –> maybe unintentional)
- Intentionally harmful or hateful? Can receive feedback from a variety of people?
5.4:
- Widespread access to information and public data facilitates the identification of problems, development of solutions, and dissemnation of results
- Science can use citizen science to solve scientific problems
- Public Data sets –> people can give feedback by messing around with it
- Distributed computing –> donate spare computing power to help calculations
- Spotify: Collaborative Playlists
- Algorithm
- Crowdfunding
5.3 Activity
**HP Video:
- Black Man is using HP face tracking software (state of the art computer)
- He’s explaining how the computer isn’t following him around like it is supposed to
- White coworker Wanda tries the face recognition and it works perfectly fine
- As soon as black men enters the frame it doesn’t work!
- Gives insight to how the inherent algorthims of the HP tracking are biased?
Question 1:
- While it certainly was interesting how the HP computer suddenly started not working once a black men entered the frame, I don’t beleive he thinks that it was an intentional bias. Instead, he was poking fun at it, and just pointing out the irony of the situation that this is a state of the art computer, and that he even bought one for himself, only for his blackness to be interfering with one of the cool feautres that he purchased it for
Question 2:
- This was likely not an anomaly, and probably happened from a lack of testing on diverse people on the HP team’s part. The team likely tested the algorthim on plenty of fair skinned indviduals, and when they saw it working, decided to call it complete. Rather, if they had tested it on people iwth different skin tones, they could have ensured that the face tracking software worked for all skin tones, rather than just light ones.
Question 3:
- This is definitley both harmful and exclusive, because they are preventing darker skinned individuals to use the resources in a computer that they purchased. While I don’t think that this was an intentional bias, it still prevented everyone to be able to use the computer equally.
Question 4:
- The error should definitley be corrected, as it is preventing groups of people from being able to use/purchase this product
Question 5:
- I think the best step to take is to intiate more diverse testing, and testing the face tracking feature on people with a large variety of skin tones, and just a large variety of people in general.
5.4 Activity
Question 1:
- One crowdsource idea we could have is anytime we are having an issue with our code, we could have like a forum that we could post the error on. With so many students in CSP, the error would likely get caught very soon, and we would probably get feedback on many different ways on how to solve the problem Question 2:
- I know with the extensive coursload many Del Norte Students take on, they would likely benefit from true Del Norte students reflections and expereince on the AP Classes. Most of the time, we see the CRF course descriptions, or hear about classes through teachers, but if all Del Norte students gave their input on classes, it might aid in upcoming sophomores/juniors class selections. For our project, crowdsourcing could definitley be helpful, if we got like a survey from the students about what they like about English class reading and what they don’t like, so we could cater our website to them.
</br>
5.1 and 5.2 Notes!
5.1
- Computing innovations are created by people, and enable shifts into the way people program tasks (need to accommodate)
- Effects of computing innovation – it can be effective and beneficial and harmful by diff or same people, even just one effect
- Computer innovations have enabled innovations in medicine, engineering, etc.
- Originally World Wide web = intended for rapid and easy exchange of info between scientific community
- Targeted advertising – mostly used to help business, but can be misused by individuals
- Machine learning can enable data innovation in many fields, but can also be used as discrimination.
- Multirotor: benefits and harmful effects
5.2:
- The internet has a digital divide
- Which means that there is a DIFFERING amount of access to the internet based on a variety of characteristics
- Socioeconomic status, geographic status, or demographic characteristics
- This digital divide can affect a lot of people
- Differences in countries can also impact this digital divide based on what the government allows and if computers are not common in the area
5.1 Activity
Question 1:
I think that one beneficial aspect of computing is the increased security we have been able to provide in certain situations. Apps like life360 can help parents track and ensure their kids are getting home safely, and apps like Find my I phone have been used to make sure expensive devices are not lost. Convsersley, this ability of technology to have so much information on other people, cna lead to unsafe online situations. People can use apps like isngtagram, facebook, etc, and alot of the time this becomes the root of issues like stalking, or cyberbulling, Another beneficial aspect of computing is the increased access to more learning resources. The internet allows users to learn moe about history, new people, and current events. However, because the internet is so vast and hard to filter, it may lead to dangerous content for younger children. A beneficial effect of computing is the conncection in fosters between people who aren’t necessarily in the same place at the same time. However, the harmful effect of this can be the unsafe trends that and mob mentality culture that occurs on social media platforms.
Question 2:
Dopamine issues are not a consipiracy, in fact they can present a lot of issues to current highschool students. With the often overwhelming amount of homework a highschooler receives on average per night, it becomes easy to get distracted and get fixated on apps like tiktok, and instagram, which creates instant dopamine through endless, new content. For me, I feel like it’s so easy to pickup my phone and get distracted on tiktok while doing my homework, which just takes me longer to do the assignment overall.
5.2 Activity
Question 1:
An important part of being a user in the digital world is being able to spread awareness. The internet is full of opposing opinions, viewpoints, data, statistics, and perspectives. A user can consult that, and use the internet to learn new skills that can help them become an active contributer to the digital world. They can build programs, and cool websites to support groups that need it, or spread awareness after consulting sources. Question 2:
Like I said in the question above, a user could become a contributer to the digital world by building things that support other people. At Del Norte, we can build websites that are supporting/helping people (liek we are doing now), but we can even do something as simple as taking steps to decrease the digital divide, like donating old computers that still function to places that need it. Question 3:
I think that red tape, or rules and regulations, can definitely be a barrier to decreasing the digital divide. For example, at Del Norte, we have certain websties that our blocked that might benefit our education further (educational youtube videos, our own deployed websites).