Posts

END-OF-SEMESTER SELF-EVALUATION

I WOULD LIKE YOU TO DO AN EVALUATION OF YOURSELF IN RELATION TO THIS CLASS. THIS WILL NOT COUNT IN ANY WAY TOWARD YOUR GRADE, HOWEVER IT IS REQUIRED TO COMPLETE THE CLASS. PLEASE ANSWER THE FOLLOWING QUESTIONS, NOT NECESSARILY IN THE GIVEN ORDER.  PLEASE FEEL FREE TO ADD ANYTHING ELSE YOU WOULD CONSIDER APPROPRIATE TO HELP ME UNDERSTAND HOW THIS COURSE WENT FOR YOU.  * HAS YOUR APPROACH TO Computer Science, Coding CHANGED DURING THIS COURSE  OR COMPARED TO OTHER COURSES OR PROGRAMMING LANGUAGES THAT YOU HAVE TAKEN OR TAUGHT YOURSELF?    IF YES HOW? My approach to Computer Science and Coding has changed in a positive way as I enjoyed many of the assignments that were given to me. Because of this, I now am able to view things in the perspective of a computer science student.  * HAVE YOU ATTITUDES OR FEELINGS ABOUT Computer Science CHANGED?   My positive attitude about Computer Science stayed the same.  ...

Post AP-Exam Reflection

How prepared were you for each of the following topics? Very, somewhat, not prepared Here are the major topics of the course: 1.      Creativity 2.      Big Data and information 3.     Algorithms 4.    Abstraction 5. Programming 6.    The Internet 7. Global Impact I was very prepared for Creativity, Algorithms, Abstraction, and Programming unit because I really enjoyed the content we learned during each unit and I wanted to learn more about it. I was somewhat prepared for Internet unit but I wasn’t sure about some protocols that occur over the Web with data. I don’t think I was prepared with the Big Data unit as I forgot a lot of the concept and key vocab. But, on the multiple choice exam, I believed that everything worked as I wanted to. In addition to the above topics which were incorporated into the curriculum, tell me your thoughts about the following: ...

AP Exam- Performance Task Proposal

I plan to make a World Clock app that translates the time you have in your region and allows you to see different times from other regions in the world. First, you are prompted to input your region and time in so you can see the other times. I will make it so you can click on each different time zone that lets you see every time zone one by one. This will have the abstraction and algorithms implemented in the code. I am currently working on this project alone.

Computer Virus Rapid Research (One-Pager)

Image
Cybersecurity and Crime One-Pager Template <change this to your title> Note: All text in Italics, including this text, is intended to be replaced by your responses, and deleted once you’ve completed your one-pager. Overview When did the event happen? Whose data was lost / stolen / leaked? How many people / organizations were affected? Provide any other context necessary to understand the “big picture” of the event. The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred on the internet from 5 September 2013 to late May 2014. The attack utilized a trojan that affected computers running Microsoft Windows. It propagated via infected email attachments, when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography and then takes that private key back to their servers. [1] By then, your data is unable to decrypted without the malware’s private k...

Blown to Bits Chapter 2 Prompt

Prompt: “This lesson is entitled The Cost of ‘Free.’ What does that mean to you now?” “How would you explain The Cost of ‘Free’ to a family member, or person you just met, if you had only 60 seconds?” Reflect on your reading the Wall street Journal below  the reading “Right now, which way are you leaning? Too little privacy? Right amount?“ I am leaning towards too little privacy. Most apps free tend to just want access to information that has no relevance to making a better experience for the user. For example, a puzzle game application wanting to know my phone contacts. However, I’m fine with apps wanting some of my data as long as it is secure, and relevant like Google Maps asking for my location data. “Are you willing to give up some privacy (and potentially some security) to have free access to modern innovative tools - do you trust companies to be good stewards of your data?“ I am willing to give up privacy to have free access to tools. I already do ...

Blown to Bits Chapter 5- Reflection Questions

Homework:  Read Chapter 5 in Blown to Bits (located under forms and docs in the "Blown to Bits" folder. Answer the following reflection questions . Share your reflections with stark.brooklinehighschool@gmail.com as well as post your reflections to your blog: What is encryption? What is cryptography? Provide an example. What is security through obscurity? Why is it bad? What is the key agreement protocol? Why is it important to Internet commerce? What is a certificate? What role does it play in Internet security? Free response: In your opinion are digital signatures more important than handwritten signatures?  Explain your opinion with good reasons Encryption is a way of encoding messages so they can't be read by eavesdroppers. An example would be a Cesar Cipher, it is used to move letters and encode messages. Cryptography is a is the art of sending indecipherable messages. A Vigenere Cipher is a type of cryptography where letters are shifted...

Activity Guide- Research One Pager (Energy Microgrids)

Image
Data Innovation One-Pager Template <change this to your title> Note: All text in Italics, including this text, is intended to be replaced by your responses, and deleted once you’ve completed your one-pager. Innovation Purpose What is the intended goal or objective of the innovation? Why was it created in the first place? What need or problem led to it being created? Assume that the audience doesn’t know much about the topic. The intended goal of this innovation is to have more low-cost energy sources available to the public. This innovation is being created in the first place because U.S. electric consumers are now paying 43 percent more to construct and maintain local power grids than in 2002. Additionally, the grid is also becoming less reliable, now creating blackouts taking 20 percent longer than in 2002 to fix. Overall, the power grid should be reengineered to meet the need of people in 2017 since demand is increasing, supply is getting scarce, and q...