Unit 4 - Big Data
12/10/19 - Objective(s): Correction
Bell Work: Get on code studio
One Pager
Documents
12/9/19 - Objective(s):
Bell Work: Open one pager!
Test results are in...
First 15 mins
12/9/19 - Objective(s):
Bell Work: Open one pager!
Test results
Last 10 mins
Bell Work: Study for a bit! Review Guide - Answers
Lesson 10
12/5/19 - Objective(s):
Bell Work: Open up lesson 9 on code studio
Lesson 10
12/9/2019 - Objective(s):
Bell Work: Study for a bit! Review Guide - Answers
Today
12/4/19 - Objective(s):
Bell Work: Last Activity Guide
Check for understanding questions
Finish Lesson 9 (135)
"How Not to Get Hacked" Reading
Kahoot!
Test later with 8 bonus questions!
12/3/19 - Objective(s):
Bell Work: Last Activity Guide
Papers graded
Finish Lesson 9
12/2/19 - Objective(s):
Bell Work: How the internet works
Congrats boys!
Lesson 8
Later
Help with Modular Arithmetic
"How Not to Get Hacked" Reading
11/27/19 Objective(s):
Lesson 7
Finish Lesson 8
11/26/19 - Objective(s):
Last paper - did you get my email about your images in the one pager?
Lesson 7
Lesson 8
11/25/19 - Objective(s):
Bell Work: none
Bell Work: https://youtu.be/gn4nRCC9TwQ
Finish up Lesson 6
11/21/19 - Objective(s):
Bell Work: https://youtu.be/gn4nRCC9TwQ
Finish up Lesson 6
Lesson 6 Day 1 https://youtu.be/gn4nRCC9TwQ
11/14/19 - Objective(s):
Bell Work: Talk at your table about new technologies that you are interested in.
Today - Lesson 4
11/17/19 - Monday
Objective(s): Synthesize information taken from multiple online sources to create a cohesive description of a computing innovation.
Research
11/18/19 TUESDAY
Peer Review
11/13/19 - Objective(s):
From Yesterday Lesson 5
What or who is to blame for this problem?
What could be a solution to having good data, but still keeping privacy?
Lesson 4
11/12/19 - Objective(s):
From Yesterday
Bell Work: Get to this website!
From last week
Answers to lesson 3 activity guide
11/8/19 - Objective(s):
Today
11/7/19 - Objective(s):
From Yesterday
11/6/19 -
Objective(s):
Bell Work: Take out your movie notes!
The Great Hack
3 conclusions
More on Cambridge and Facebook Scandal
11/4-5/19 -
Objective(s):
Bell Work: Fill this out!
The Great Hack
3 conclusions
More on Cambridge and Facebook Scandal
11/1/19 -
Objective(s):
Bell Work: Get on code studio
Test Correction!
Later
3 conclusions
10/30/19 -
Objective(s):
Bell Work: Write 2019 in binary
Grades are updated!
Today
2018
12/5/18 - Objective(s): Correction
Bell Work: Get on code studio
Today
12/4/18 - Objective(s): Correction
Bell Work: Get on code studio
Today
12/3/18 - Objective(s):
Bell Work: Open your research!
Today
11/30/18 - Objective(s):
Bell Work: Study for a bit! Review Guide - Answers
Today
Test retake with notes?
11/29/18 - Objective(s):
Wrap up Lesson 9
11/28/18 - Objective(s):
Begin Lesson 9
11/27/18 - Objective(s):
Begin Lesson 9
Later
Help with Modular Arithmetic
11/21/18 - Objective(s):
Data innovations
11/20/18 - Objective(s):
Finish Lesson 8
11/19/18 - Objective(s):
Updates
Lesson 8? (website changed)
11/16/18 - Objective(s):
Grades will be updated this weekend!
Lesson 6
11/14/18 - Objective(s):
Finish up Lesson 6 Day 1
11/13/18 - Objective(s):
Lesson 6 Day 1
11/12/18 - Objective(s):
Lesson 5
Lesson 6 Day 1
11/8-9/18 - Objective(s):
Peer Review
Today - Lesson 4
Bell Work: Talk at your table about new technologies that you are interested in.
Today - Lesson 4
11/5/18 - Objective(s):
Bell Work: Talk at your table about new technologies that you are interested in.
Today - Lesson 4
From Yesterday
Today - Lesson 3
From Yesterday
Today - Lesson 1 and 2
Grades are up!
Today
Later?
Bell Work: Get on code studio
One Pager
- New seats for today
- Final one pager - Please have Two other students comment on your paper and grade.
- Comment on one positive thing cited in the rubric
- Comment one two things that are unclear or any one or twos from the rubric.
- Make any needed correction.
- Submit on classroom.
- The test will be opened and you can make corrections in google docs - submit on classroom.
- Begin to explore ideas for your AP performance task
- AP CSP Performance Task Directions for Students - Resource
Documents
12/9/19 - Objective(s):
- Identifying security breaches
- Research and describe a cyber attack found in the news
- Reason about the threats posed by, and methods of recourse for, various types of cyber attacks
- Describe plausible storage, security, or privacy concerns for particular pieces of data
Bell Work: Open one pager!
Test results are in...
First 15 mins
- What happened?
- What was lost or stolen ? What was the device capturing the data and the data itself?
- What types of cyber security techniques might be used to help prevent this from happening again?
- What specific concerns from this data being used in unintended way or by unintended people?
(Data privacy/security/storage concern)
12/9/19 - Objective(s):
- Identifying security breaches
- Research and describe a cyber attack found in the news
- Reason about the threats posed by, and methods of recourse for, various types of cyber attacks
- Describe plausible storage, security, or privacy concerns for particular pieces of data
Bell Work: Open one pager!
Test results
Last 10 mins
- What happened ?
- What was lost or stolen ? What was the device capturing the data and the data itself?
- What types of cybersecurity techniques might be used to help prevent this from happening again?
- What specific concerns from this data being used in unintended way or by unintended people?
(Data privacy/security/storage concern)
- Test
- Identifying security breaches
- Research and describe a cyber attack found in the news
- Reason about the threats posed by, and methods of recourse for, various types of cyber attacks
- Describe plausible storage, security, or privacy concerns for particular pieces of data
Bell Work: Study for a bit! Review Guide - Answers
Lesson 10
- Review Final one pager - Why? It will prepare you best!
- Unit 4 Test
- Research time (pick a topic before you leave)
- Template
- Rubric and Directions
12/5/19 - Objective(s):
- Explain the characteristics of a phishing attack
- Explain how a DDoS attack works
- Describe how one computer virus works
- Research and describe a cyber attack found in the news
- Reason about the threats posed by, and methods of recourse for, various types of cyber attacks
- Describe plausible storage, security, or privacy concerns for particular pieces of data
Bell Work: Open up lesson 9 on code studio
Lesson 10
- Watch Video
- Read this "How not to get hacked" - assignment on classroom
- Review Guide -
- Work through each as a group
- Certificates? (optional)
- Kahoot
- Test tomorrow!
12/9/2019 - Objective(s):
- Test
- Identifying security breaches
Bell Work: Study for a bit! Review Guide - Answers
Today
- Review Final one pager - Why? It will prepare you best!
- Test
- Research time (pick a topic before you leave)
- Video?
12/4/19 - Objective(s):
- Describe the basic process of encrypting data using public key encryption
- Follow an asymmetric encryption algorithm to encrypt a numerical message using the Public Key Crypto widget.
- Explain the difference between symmetric and asymmetric encryption.
- Explain the benefits of public key cryptography
- Explain what the modulo operation does and how it operates as a "one-way" function
Bell Work: Last Activity Guide
Check for understanding questions
- 8 points (2 pts each for lessons 5-8)
Finish Lesson 9 (135)
- Finish activity
- Finish last few slides
- Optional - How it really works
"How Not to Get Hacked" Reading
- Visit this site - Summarize the article (2 fact/points from each tip)
Kahoot!
Test later with 8 bonus questions!
12/3/19 - Objective(s):
- Describe the basic process of encrypting data using public key encryption
- Follow an asymmetric encryption algorithm to encrypt a numerical message using the Public Key Crypto widget.
- Explain the difference between symmetric and asymmetric encryption.
- Explain the benefits of public key cryptography
- Explain what the modulo operation does and how it operates as a "one-way" function
Bell Work: Last Activity Guide
Papers graded
- Overall most are decent, but half would not passing the AP rubric
- If you picked a good topic I did not leave many comments or none at all
- User data vs company given data (fantasy football)
- No place for personal opinion, just public concerns
- Picking a specific app, database, website is best
- Almost all apps do not keep the data just on your phone
- MUST be most specif about how the data is collected and how it is used by the company! - Google Maps Example - is it about google's data or about the user's data?
- The user agreement would be something to look at next time.
Finish Lesson 9
- Activity guide - multiplication + modulo
- Google Calculator works well too
- Help with Modular Arithmetic
- Written explanation (How it really works?)
12/2/19 - Objective(s):
- Describe the basic process of encrypting data using public key encryption
- Follow an asymmetric encryption algorithm to encrypt a numerical message using the Public Key Crypto widget.
- Explain the difference between symmetric and asymmetric encryption.
- Explain the benefits of public key cryptography
- Explain what the modulo operation does and how it operates as a "one-way" function
Bell Work: How the internet works
Congrats boys!
Lesson 8
- Graded both worksheets
- Review objectives
- Teacher link
- Activity guide - multiplication + modulo
Later
Help with Modular Arithmetic
"How Not to Get Hacked" Reading
- Visit this site - Summarize the article (2 fact/points from each tip)
11/27/19 Objective(s):
- Explain the relationship between cryptographic keys and passwords.
- Explain in broad terms what makes a key difficult to “crack.”
- Understand that exponential growth is related to an encryption algorithm’s strength.
- Reason about strong vs. weak passwords using a tool that shows password strength.
- Explain how and why the Vigenère cipher is a stronger form of encryption than plain substitution.
- Explain properties that make for a good key when using the Vigenère Cipher.
Lesson 7
- Please finish lesson 7 tonight and fixing your one pager image.
Finish Lesson 8
- howsecureismypassword.net
- Complete the check for understanding
- Turn in both worksheets
- "How Not to Get Hacked" Reading
- Visit this site - Jigsaw at your tables (act out 2 ideas)
11/26/19 - Objective(s):
- Explain the relationship between cryptographic keys and passwords.
- Explain in broad terms what makes a key difficult to “crack.”
- Understand that exponential growth is related to an encryption algorithm’s strength.
- Reason about strong vs. weak passwords using a tool that shows password strength.
- Explain how and why the Vigenère cipher is a stronger form of encryption than plain substitution.
- Explain properties that make for a good key when using the Vigenère Cipher.
Last paper - did you get my email about your images in the one pager?
Lesson 7
- How did it go for lesson 7?
- I see some finished and some did not???
- Was it difficult to crack a Cesar or Random Substitution cipher? Did it take longer than you thought? shorter? Why?
- Review wrap up
- What wasn't clear?
Lesson 8
11/25/19 - Objective(s):
- Explain the relationship between cryptographic keys and passwords.
- Explain in broad terms what makes a key difficult to “crack.”
- Reason about strong vs. weak passwords using a tool that shows password strength.
- Understand that exponential growth is related to an encryption algorithm’s strength.
- Explain how and why the Vigenère cipher is a stronger form of encryption than plain substitution.
- Explain properties that make for a good key when using the Vigenère Cipher.
Bell Work: none
- Sorry I am not here!
- Complete Lesson 7 in your table groups using this presentation to guide you.
- You will hopefully complete all the bubbles on lesson 7 on code.org in class today
- I will clarify anything confusing tomorrow!
- Explain how and why personal data is exchanged for use of free software.
- Explain some of the privacy and economic trade offs involved in the collection and use of personal data.
- Describe the ways and reasons organizations collect information about individuals.
- Read and critically evaluate a data privacy policy.
Bell Work: https://youtu.be/gn4nRCC9TwQ
Finish up Lesson 6
- How could you send a secret message to someone?
11/21/19 - Objective(s):
- Explain how and why personal data is exchanged for use of free software.
- Explain some of the privacy and economic trade offs involved in the collection and use of personal data.
- Describe the ways and reasons organizations collect information about individuals.
- Read and critically evaluate a data privacy policy.
Bell Work: https://youtu.be/gn4nRCC9TwQ
Finish up Lesson 6
- Review WSJ concerns
- Activity Guide
- Add to your group work from yesterday. Turn in.
- Flashlight App - FTC Article
- How could you send a secret message to someone?
- Explain how and why personal data is exchanged for use of free software.
- Explain some of the privacy and economic trade offs involved in the collection and use of personal data.
- Describe the ways and reasons organizations collect information about individuals.
- Read and critically evaluate a data privacy policy.
Lesson 6 Day 1 https://youtu.be/gn4nRCC9TwQ
11/14/19 - Objective(s):
- Identify a suitable computing innovation for a research project.
- Identify reliable and authoritative sources of information about a computing innovation.
- Synthesize information taken from multiple online sources to create a cohesive description of a computing innovation.
- Explain how data drives a specific innovation, both in writing and visually.
Bell Work: Talk at your table about new technologies that you are interested in.
Today - Lesson 4
- Begin Lesson 4
- Get assignment guide and rubric on classroom!
- One pager due Tuesday
11/17/19 - Monday
Objective(s): Synthesize information taken from multiple online sources to create a cohesive description of a computing innovation.
Research
- One pager due Tomorrow
- Lesson 4
11/18/19 TUESDAY
Peer Review
- Combine your research page, the one pager, artifact, and 2 rubrics into one document
- Switch with shoulder buddy....then person across from you
- Leave comments in google docs and score them in their rubric
11/13/19 - Objective(s):
- Explain privacy concerns that arise through the mass collection of data
- Analyze the personal privacy and security concerns that arise with any use of computational systems.
- Explain how multiple sources of data can be combined in order to uncover new knowledge or information.
- Use online search tools to find and connect information about a person or topic of interest.
From Yesterday Lesson 5
What or who is to blame for this problem?
What could be a solution to having good data, but still keeping privacy?
Lesson 4
11/12/19 - Objective(s):
- Explain privacy concerns that arise through the mass collection of data
- Analyze the personal privacy and security concerns that arise with any use of computational systems.
- Explain how multiple sources of data can be combined in order to uncover new knowledge or information.
- Use online search tools to find and connect information about a person or topic of interest.
From Yesterday
- Wrap up lesson 3
- World's Biggest Data Breaches Visualization - Website
- Data Privacy Lab - Website
- Activity Guide - Research Yourself - Activity Guide
- Define the digital divide as the variation in access or use of technology by various demographic characteristics.
- Identify assumptions made when drawing conclusions from data and data visualizations
- I will evaluate an intended use of big data and how assumptions can negatively impact our judgement of data collected.
Bell Work: Get to this website!
From last week
- Grade updated
- Google Trends - What stories did you find?
- CNN, Fox News, 2016 election results
Answers to lesson 3 activity guide
11/8/19 - Objective(s):
- Identify sources of data produced, used, and consumed by a web application.
- Given a tool that provides access to a large data set, explain the kinds of problems such a tool could solve.
- Use a tool that provides access to “big data” and investigate its sources.
- Explain that new techniques are necessary to store, manage, transmit, and process data at the scale it is currently being produced.
- Complete Lesson 1 check for understanding modules.
Today
- Unit 4 Finish Lesson 2 (slide 14)
11/7/19 - Objective(s):
- Identify sources of data produced, used, and consumed by a web application.
- Given a tool that provides access to a large data set, explain the kinds of problems such a tool could solve.
- Use a tool that provides access to “big data” and investigate its sources.
- Explain that new techniques are necessary to store, manage, transmit, and process data at the scale it is currently being produced.
- Complete Lesson 1 check for understanding modules.
From Yesterday
- Big Data website assignment - missing a few
- Complete Lesson 1 check for understanding modules.
- https://apcentral.collegeboard.org/pdf/ap-csp-student-task-directions.pdf
- Unit 4 Lesson 1 & 2 (slide 14)
11/6/19 -
Objective(s):
- Identify sources of data collection, manipulation, and societal impact
- Use a tool that provides access to “big data” and investigate its sources.
- Explain that new techniques are necessary to store, manage, transmit, and process data at the scale it is currently being produced.
Bell Work: Take out your movie notes!
The Great Hack
3 conclusions
- 2 supporting facts/details/examples for each conclusion
- Today - Small group discussion
- Tomorrow - writing due and maybe socratic circle
More on Cambridge and Facebook Scandal
- Facebook - $5 billion fine
- Undercover video
- Fear?
- Finish lesson 1
- https://apcentral.collegeboard.org/pdf/ap-csp-student-task-directions.pdf
- Lesson 2
- Unit 4 Lessons and Links
11/4-5/19 -
Objective(s):
- Identify sources of data collection, manipulation, and ethical uses
- Use a tool that provides access to “big data” and investigate its sources.
- Explain that new techniques are necessary to store, manage, transmit, and process data at the scale it is currently being produced.
Bell Work: Fill this out!
The Great Hack
3 conclusions
- 2 supporting facts/details/examples for each conclusion.
- I would summarize and focus on
- Collection of data
- Manipulation of data
- Policy and law
- Psychographics
- Influence
- Connectivity
- Security
- Russia
- What could/should be done
More on Cambridge and Facebook Scandal
- Facebook - $5 billion fine
- Undercover video
- Fear?
11/1/19 -
Objective(s):
- Identify sources of data produced, used, and consumed by a web application.
- Given a tool that provides access to a large data set, explain the kinds of problems such a tool could solve.
- Use a tool that provides access to “big data” and investigate its sources.
- Explain that new techniques are necessary to store, manage, transmit, and process data at the scale it is currently being produced.
Bell Work: Get on code studio
Test Correction!
- Stand alone assignment
- Each table 2 questions
- Explain the question
- Go over each answer and explain why it is correct or incorrect
Later
- Finish lesson 1
- Lesson 2 or video?
- Unit 4 Lessons and Links
3 conclusions
- 2 supporting facts/details/examples for each conclusion.
10/30/19 -
Objective(s):
- Identify sources of data produced, used, and consumed by a web application.
- Given a tool that provides access to a large data set, explain the kinds of problems such a tool could solve.
- Use a tool that provides access to “big data” and investigate its sources.
- Explain that new techniques are necessary to store, manage, transmit, and process data at the scale it is currently being produced.
Bell Work: Write 2019 in binary
Grades are updated!
- Last day to get late work in!
Film Format worksheet missing from a few!
Today
- Unit 4 Lessons and Links
2018
12/5/18 - Objective(s): Correction
Bell Work: Get on code studio
Today
- New seats?
- How did test correction and the final one pager go?
- Did you submit on classroom?
- Begin AP PT instructions
12/4/18 - Objective(s): Correction
Bell Work: Get on code studio
Today
- New seats!
- Test correction day - the test are open and you can make corrections in google docs - submit on classroom.
- Final one pager - Please have THREE other students comment on your paper and grade.
- Make any needed correction.
- Submit on classroom.
- Begin to explore ideas for your AP performance task
- Begin AP PT instructions
12/3/18 - Objective(s):
- Identifying security breaches
Bell Work: Open your research!
Today
- Did everyone complete the test?
- Complete your final one pager.
11/30/18 - Objective(s):
- Test
- Identifying security breaches
Bell Work: Study for a bit! Review Guide - Answers
Today
- Review Final one pager - Why? It will prepare you best!
- Test
- Research time (pick a topic before you leave)
- Video?
Test retake with notes?
11/29/18 - Objective(s):
- Explain what the modulo operation does and how it operates as a "one-way" function
- Follow an asymmetric encryption algorithm to encrypt a numerical message using the Public Key Crypto widget.
- Explain the difference between symmetric and asymmetric encryption.
- Describe the basic process of encrypting data using public key encryption
- Explain the benefits of public key cryptography
Wrap up Lesson 9
- Complete check for understanding questions
- Written explanation
- Review Guide - Answers
- only answer the ones you are not confident in
- Work through each as a group
- Certificates?
- Kahoot
- Test tomorrow!
11/28/18 - Objective(s):
- Explain what the modulo operation does and how it operates as a "one-way" function
- Follow an asymmetric encryption algorithm to encrypt a numerical message using the Public Key Crypto widget.
- Explain the difference between symmetric and asymmetric encryption.
- Describe the basic process of encrypting data using public key encryption
- Explain the benefits of public key cryptography
Begin Lesson 9
- Activity guide - multiplication + modulo
- Google Calculator works well too
- Help with Modular Arithmetic
- Written explanation
11/27/18 - Objective(s):
- Explain what the modulo operation does and how it operates as a "one-way" function
- Follow an asymmetric encryption algorithm to encrypt a numerical message using the Public Key Crypto widget.
- Explain the difference between symmetric and asymmetric encryption.
- Describe the basic process of encrypting data using public key encryption
- Explain the benefits of public key cryptography
Begin Lesson 9
- Review objectives
- Teacher link
- Activity guide - multiplication + modulo
Later
Help with Modular Arithmetic
11/21/18 - Objective(s):
- Identify potential data concerns.
- Catch up!
Data innovations
- Make a copy of your one pager and move it here!
- Read 2 other innovations and leave comments about their innovation:
- Read the entire one pager, focus on how the data is collected, stored, used or potentially used.
- Speculate one potential data concern that could come with their innovation.
- Identify what kind of a concern it is: data storage concern, data privacy concern, or data security concern.
- Complete the check for understanding
- Turn in both worksheetsd
- Visit this site - Summarize the article (2 fact/points from each tip)
11/20/18 - Objective(s):
- Explain the relationship between cryptographic keys and passwords.
- Explain in broad terms what makes a key difficult to “crack.”
- Reason about strong vs. weak passwords using a tool that shows password strength.
- Understand that exponential growth is related to an encryption algorithm’s strength.
- Explain how and why the Vigenère cipher is a stronger form of encryption than plain substitution.
- Explain properties that make for a good key when using the Vigenère Cipher.
Finish Lesson 8
- howsecureismypassword.net
- Turn in both worksheets
- visit this site
- Summarize the article (2 fact/points from each tip)
11/19/18 - Objective(s):
- Explain the relationship between cryptographic keys and passwords.
- Explain in broad terms what makes a key difficult to “crack.”
- Reason about strong vs. weak passwords using a tool that shows password strength.
- Understand that exponential growth is related to an encryption algorithm’s strength.
- Explain how and why the Vigenère cipher is a stronger form of encryption than plain substitution.
- Explain properties that make for a good key when using the Vigenère Cipher.
Updates
- Good work on your last one-pager! I only left comments for those that did not get 15/15.
- Don't quote too much, please summarize the information.
- Finish the check for understanding
Lesson 8? (website changed)
11/16/18 - Objective(s):
- Explain why encryption is an important need for everyday life on the Internet.
- Crack a message encrypted with a Caesar cipher using a Caesar Cipher Widget
- Crack a message encrypted with random substitution using Frequency Analysis
- Explain the weaknesses and security flaws of substitution ciphers
Grades will be updated this weekend!
Lesson 6
11/14/18 - Objective(s):
- Explain how and why personal data is exchanged for use of free software.
- Explain some of the privacy and economic trade offs involved in the collection and use of personal data.
- Describe the ways and reasons organizations collect information about individuals.
- Read and critically evaluate a data privacy policy.
Finish up Lesson 6 Day 1
- Review WSJ concerns
- Activity Guide
- Add to your group work from yesterday. Turn in.
- Time left? Flashlight App - FTC Article
11/13/18 - Objective(s):
- Explain how and why personal data is exchanged for use of free software.
- Explain some of the privacy and economic trade offs involved in the collection and use of personal data.
- Describe the ways and reasons organizations collect information about individuals.
- Read and critically evaluate a data privacy policy.
Lesson 6 Day 1
11/12/18 - Objective(s):
- Explain privacy concerns that arise through the mass collection of data
- Use online search tools to find and connect information about a person or topic of interest.
- Explain how multiple sources of data can be combined in order to uncover new knowledge or information.
- Analyze the personal privacy and security concerns that arise with any use of computational systems.
Lesson 5
- Review lesson 5
- Activity Guide - Research Yourself - Activity Guide
- AP practice
Lesson 6 Day 1
11/8-9/18 - Objective(s):
- Explain privacy concerns that arise through the mass collection of data
- Use online search tools to find and connect information about a person or topic of interest.
- Explain how multiple sources of data can be combined in order to uncover new knowledge or information.
- Analyze the personal privacy and security concerns that arise with any use of computational systems.
Peer Review
- Combine your research page, the one pager, artifact, and 2 rubrics into one document
- Switch with shoulder buddy....then person across from you
- Leave comments in google docs and score them in their rubric
- World's Biggest Data Breaches Visualization - Website
- Data Privacy Lab - Website
- Activity Guide - Research Yourself - Activity Guide
- Synthesize information taken from multiple online sources to create a cohesive description of a computing innovation.
Today - Lesson 4
- One pager due Thursday 10:00
- Lesson 4
- Identify a suitable computing innovation for a research project.
- Identify reliable and authoritative sources of information about a computing innovation.
- Synthesize information taken from multiple online sources to create a cohesive description of a computing innovation.
- Explain how data drives a specific innovation, both in writing and visually.
Bell Work: Talk at your table about new technologies that you are interested in.
Today - Lesson 4
- Continue research and writing
- New lesson tomorrow or peer review???
- One pager due Thursday 10:00
- Lesson 4
- Review purpose
11/5/18 - Objective(s):
- Identify a suitable computing innovation for a research project.
- Identify reliable and authoritative sources of information about a computing innovation.
- Synthesize information taken from multiple online sources to create a cohesive description of a computing innovation.
- Explain how data drives a specific innovation, both in writing and visually.
Bell Work: Talk at your table about new technologies that you are interested in.
Today - Lesson 4
- Finished grading your one pagers.
- Be careful with your sources
- Use APA
- Be specific, avoid blanket statements like "best"
- When you compare, make sure you are comparing apples to apples
- Begin Lesson 4
- Get assignment guide and rubric on classroom!
From Yesterday
- Define the digital divide as the variation in access or use of technology by various demographic characteristics.
- Identify assumptions made when drawing conclusions from data and data visualizations
Today - Lesson 3
- I got some papers graded!
- Biggest issues - lack specific or poor comparison
- Google Trends - What stories did you find?
- Could Lilly, Mitchell, Ethan share out?
- CNN, Fox News, 2016 election results
- Finish up Lesson 3
- Identify sources of data produced, used, and consumed by a web application.
- Given a tool that provides access to a large data set, explain the kinds of problems such a tool could solve.
- Use a tool that provides access to “big data” and investigate its sources.
- Explain that new techniques are necessary to store, manage, transmit, and process data at the scale it is currently being produced.
From Yesterday
- Complete Lesson 1 check for understanding modules.
- In this unit we're going to be looking into how growth in data and computing more generally is impacting society. In almost every industry and every aspect our lives, computing and data is affecting our lives in both positive and negative ways. This will also be very useful preparation as we begin to look towards the Explore PT.
Today - Lesson 1 and 2
- Unit 4 Lessons and Links
- AP Performance Task
- If time - Go to maps.google.com and zoom in on Grand Rapids, where does it get the data?
- Identify sources of data produced, used, and consumed by a web application.
- Given a tool that provides access to a large data set, explain the kinds of problems such a tool could solve.
- Use a tool that provides access to “big data” and investigate its sources.
- Explain that new techniques are necessary to store, manage, transmit, and process data at the scale it is currently being produced.
Grades are up!
- Please talk to me or email me the assignment (I might not check classroom)
- Your flash talk will go on the 2nd qtr.
Today
- Unit 4 Lessons and Links
- AP Performance Task
- 10/29/18 - Objective(s):
- Identify sources of data produced, used, and consumed by a web application.
- Given a tool that provides access to a large data set, explain the kinds of problems such a tool could solve.
- Use a tool that provides access to “big data” and investigate its sources.
- Explain that new techniques are necessary to store, manage, transmit, and process data at the scale it is currently being produced.
- Bell Work: Write 2018 in binary
- Grades are up!
- Please talk to me or email me the assignment (I might not check classroom)
- Your flash talk might need to go on the 2nd qtr.
- Today
- Unit 4 Lessons and Links
Later?