Posts

Showing posts from September, 2017

Unit 1 Lesson 7 Reflection (Homework- 9/29/17)

Homework: Reflections Share with stark.brooklinehighschool@gmail.com then post to your blog: How might the way you choose to represent numbers in a computer go wrong? Of all the number systems why have modern computers settled on binary? List a few rules number encoding systems must follow in order to be useful. Why do you think some number encoding systems are more successful than others? Finish up the review questions in Unit 1 lesson 7 on code.org Unit 1 Lesson 7 Reflection: I think using the base-10 number system we use without technology might cause the computer to do something wrong due to it only recognizing 1’s and 0’s. Of all the number systems, modern computers have settled on binary because the computer is able to efficiently do its job, using its knowledge on only 1’s and 0’s. Make sure it doesn’t cause the computer to go into overflow. Also, the computer needs to know what to do with that particular system like translate it into ASCII...

Reflections from Blown to Bits Ch. 3 (Homework- 9/28/17)

Read Blown to Bits (www.bitsbook.com), Chapter 3 , Ghosts in the Machine, pp. 80-88 (Representation, Reality, and Illusion), then answer the following questions: You can find this under forms and docs/Blown to Bits How does highlighting in a PDF doc work? What are the computational ideas utilized? Continue the exploration of HTML by determining how you would complete today’s activity in HTML. Further compare your own protocol with HTML. Reflections from Blown to Bits Chapter 3: Highlighting in a PDF docs works by using a Highlight tool that will send bits over to the letters and alter the binary. The binary is changed so that when the bits processes through, the letters will be the same but highlighted in a color instead. Between my own protocol and today’s activity, they look pretty similar since they are in the same HTML format. My own protocol was a little less precise about fully doing it in HTML due to being new at the protocol.

Reflection from Day 2 Protocol (Homework- 9/28/17)

Blown to Bits (www.bitsbook.com), Chapter 3 Ghosts in the Machine, pp. 73-80 (What You See Is Not What the Computer Knows), then answer the following questions: Give an example of your own when just knowing what a computer did wasn’t sufficient - you really needed to know how and why it was doing what it was doing as well. Talk about file metadata and how it “fingerprints” a file. Include a discussion of file metadata benefits and challenges. Reflection from Day 2 Protocol: An example of a computer’s work is not sufficient enough is when a computer cover parts of text that the user chooses to be hidden in front of other viewers. Even though it can hide the words, the document can be run through and bring up an exact copy with the words no longer covered. Metadata is a set of data that gives information about another type of data which can “fingerprint” a file. Metadata can support or refute a claim in any situation. The benefits of metadata is that it can back up ...

Protocol Reflection Questions (Homework- 9/27/17)

Reflections for homework due Monday:   share with stark.brooklinehighschool@gmail.com in a google doc. Then post on your blog Develop a protocol that allows the user to send a calendar date (mm/dd). What is the minimum number of bits necessary? Develop a protocol that allows the user to send a time (use 24hr military time hh:mm:ss). What is the minimum number of bits necessary? Develop a protocol designed for a graph that is not square, e.g. 50 * 200. How does this alter the format of your protocol Develop a protocol that can communicate locations on the surface of the earth. Longitude and latitude might be helpful tools to use. Protocol Reflection Questions- The minimum number of bits necessary to develop a protocol that would allow the user to send a calendar date would be 9 bits because 2^8 would give you 256 unique representations but you need 366 unique patterns. Therefore, 2^9 should give you more than enough patterns to send any date of the year with the...

Blown to Bits Ch. 1 Reflection (Homework- 9/25/17)

Reflect on your reading of Blown to Bits Chapter 1(reread if you didn't read yet)Post as a google doc then copy and paste to your blog Read about the following koans (or truths) of bits related to the Internet in Chapter 1, pages 4-13. Koan 1: It’s All Just Bits Koan 2: Perfection Is Normal Koan 6: Nothing Goes Away Koan 7: Bits Move Faster Than Thought Pick one of the above koans and address the following questions: Argue if you agree that it is a "truth" and if it will always be a "truth." How does this koan intersect with your life as a student? Koan 1: It’s Just Bits (Reflection) I agree that this will always be a “truth” because the fact that whatever we see, listen, or communicate with over technology is made up of bits will never change. Bits are the essential building blocks for any type of data to be sent to any electronic. Without bits, we couldn’t be able to watch shows on TV, listen to songs on the radio, and te...

Reflection on Number System

Reflection on Number System- 1.) If I just had a circle and a square, I could make eight 3-shape permutations. (2 base 3 = 8) 2.) The concept of a number system is to have a linear pattern with a set of rules. These rules are be useful because it can keep any type of measurement consistent and in the same pattern.

Blown to Bits Ch. 4 Reflection (Homework- 9/18/17)

Read Chapters 1 and 4 from Blown to Bits.  These chapters can be found on our web site under: forms and docs /Blown to Bits Reflect on the following after reading Chapter 4 from Blown to Bits: Share with stark.brooklinehighschool@gmail.com subject line:Reflection Blown to bits 4. Post this as well on your blog. Discuss the positive and negative results of Overture’s three search engine innovations. How did those innovations turn out today? Search engines from Overture is such a useful way for people to gain knowledge about anything on the inter. Positive consequences is that search engines help us get that tiny bit of specific data we need without looking around too much. Finding data like this without a search engine can be like finding a needle in a haystack. Innovations like the ones listed in the article prove to be useful even today as this can result into people being saved from accidents like Tanya Rider and to further predict danger. However, there can be...

Innovation Reflection (Homework- 9/13/17)

Homework (Day 3): Select an innovation. It can be anything.Describe the positive and negative impacts it has had on the world. (A satisfactory answer reflects awareness and analysis of the effects on populations beyond the students’ immediately locale.) Speculate on how students 25 years from now will answer, "What computing innovation has had a significant impact on your life?" (A satisfactory answer includes a non-trivial consideration of how technology will likely change from, and perhaps build upon, what is currently available) Now think about your parent or an adult in your life and answer the following question based on what you think they would answer (You can also ask an adult this question in your life)"What computing innovation has had the most significant personal impact on your life?“     One innovation I have is that when you have rechargeable batteries but don’t have an outlet around you but you have a laptop, the batteries should have an ...

The Ten Commandments of Computer Ethics (Examples)

The Ten Commandments of Computer Ethics by the  Computer Ethics Institute Thou shalt not use a computer to harm other people.  Thou shalt not interfere with other people's computer work.  Thou shalt not snoop around in other people's computer files.  Thou shalt not use a computer to steal.  Thou shalt not use a computer to bear false witness. Thou shalt not copy or use proprietary software for which you have not paid. Thou shalt not use other people's computer resources without authorization or proper compensation. Thou shalt not appropriate other people's intellectual output. Thou shalt think about the social consequences of the program you are writing or the system you are designing. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. Examples: 1.) Go into someone's computer and delete their files. 2.)  Look into someone else's emails. 3.)  Hack into someone's computer files...

First Entry (My Commitment to Computer Science)

2.) As a student, I would like to commit problem solving and diligence. 3.) My values are being successful while having fun. 4.) I would like to eventually get better through fencing and get national points.