This week we are going to be working on the following:
Introduction
to Unit 4: Big Data and Privacy
To Think; To Develop Problem-Solving Skills; To Discover; and To
Create;
Learning
to Compute and Computing to Learn
Classroom
Protocol:
This is where you will come every day to find out what we are
going to do in class for that day. Every day you are to come to your Quia class
web page upon arriving to class, go to your class web page, and follow the
directions for today.
Homework
Policy:
All assignments will be due on the deadline date given. It is the
responsibility for all students to complete their assignments on time. Any
assignments received late will not be accepted and a grade will not be given for
that assignment.
Accessing
your Class Weekly Agenda:
Each
week’s agenda and assignments will be updated and posted on your Quia class
web page on a weekly basis.Previous
weeks Assignments/Agendas will be provided with a link at the end of the current
week’s Class Web Page in case you need to revisit due to an absence, or
you’re required to make up, or catch up on your course assignments.
Homework Assignment:Daily homework assignments may be found at the end of each
day’s agenda. Daily Journal Entries as seen in Daily
Ticket to Leave are to be entered as part of your daily homework. All
students will receive a homework grade on a weekly basis, and your journal will
receive a project grade each mid-term and final semester.
IMPORTANT
DATES:Saturday November 17th @ Bay Path HS
Saturday February 2nd @ Auburn HS
Saturday April 6th Mock Exam @ your school
Explore Performance Task:8
hours
To
Be Completed by December 22, 2017
This
Week’s Agenda:
Unit
4: Big Data and Privacy
Unit 4 - Big Data and Privacy
In this unit students explore the technical,
legal, and ethical questions that arise from computers enabling the collection
and analysis of enormous amounts of data. In the first half of the unit,
students learn about both the technological innovations enabled by data and the
privacy and security concerns that arise from collecting it. In the second half
of the unit, students learn how cryptography can be used to help protect private
information in the digital age.
Chapter
1: Big Data and Privacy
Big
Questions
What
opportunities do large data sets provide for solving problems and creating
knowledge?
How
is cybersecurity impacting the ever-increasing number of Internet users?
How
does cryptography work?
Enduring
Understandings
3.2
Computing facilitates exploration and the discovery of connections in
information.
3.3
There are trade offs when representing information as digital data.
4.2
Algorithms can solve many but not all computational problems.
6.3
Cybersecurity is an important concern for the Internet and the systems
built on it.
7.1
Computing enhances communication, interaction, and cognition.
7.3
Computing has a global affect -- both beneficial and harmful -- on people
and society.
7.4
Computing innovations influence and are influenced by the economic,
social, and cultural contexts in which they are designed and used.
Unit
4 Vocabulary
Vocabulary
Big Data: a broad term for datasets
so large or complex that traditional data processing applications are
inadequate.
Moore's
Law: a predication made by Gordon Moore in 1965 that computing power will
double every 1.5-2 years, it has remained more or less true ever since.
One-pager: A business/corporate term
for a one-page document that summarizes a large issue, topic or plan.
Caesar Cipher : a technique for
encryption that shifts the alphabet by some number of characters
Cipher:
the generic term for a technique (or algorithm) that performs encryption
Cracking
encryption: When you attempt to decode a secret message without knowing
all the specifics of the cipher, you are trying to "crack" the
encryption.
Decryption:
a process that reverses encryption, taking a secret message and
reproducing the original plain text
Encryption:
a process of encoding messages to keep them secret, so only
"authorized" parties can read it.
Random
Substitution Cipher: an encryption technique that maps each letter of the
alphabet to a randomly chosen other letters of the alphabet.
Computationally Hard: a "hard'
problem for a computer is one in which it cannot arrive at a solution in a
reasonable amount of time.
asymmetric encryption: used in public
key encryption, it is scheme in which the key to encrypt data is different
from the key to decrypt.
modulo:
a mathematical operation that returns the remainder after integer
division. Example: 7 MOD 4 = 3
Private
Key: In an asymmetric encryption scheme the decryption key is kept private
and never shared, so only the intended recipient has the ability to
decrypt a message that has been encrypted with a public key.
Public
Key Encryption: Used prevalently on the web, it allows for secure messages
to be sent between parties without having to agree on, or share, a secret
key. It uses an asymmetric encryption scheme in which the encryption key
is made public, but the decryption key is kept private.
Antivirus Software: usually keeps big
lists of known viruses and scans your computer looking for the virus
programs in order to get rid of them.
DDoS
Attack: Distributed Denial of Service Attack. Typically a virus installed
on many computers (thousands) activate at the same time and flood a target
with traffic to the point the server becomes overwhelmed.
Firewall:
software that runs on servers (often routers) that only allows traffic
through according to some set of security rules.
Phishing
Scam: a thief trying to trick you into sending them sensitive information.
Typically these include emails about system updates asking you send your
username and password, social security number or other things.
SSL/TLS:
Secure Sockets layer / Transport Layer Security - An encryption layer of
HTTP that uses public key cryptography to establish a secure connection.
Virus:
a program that runs on a computer to do something the owner of the
computer does not intend.
Explore - AP
Performance Task Prep
·This unit contains lessons to help students with
preparation and execution of the AP® Performance Tasks: Create and Explore
·The lessons in this unit are meant to be taken
piecemeal rather than as a typical unit sequence. Instead of a sequence of
connected lessons, these represent a more modular breakdown of the things you
need to do to:
1) Understand the AP Performance Tasks
2) Make a plan for completing the tasks in the
time allotted and
3) Actually doing the tasks and submitting
Monday
Day B - 10-29-18 – Friday Day F – 11-2-18
Monday
Day B - 10-29-18
Lesson
1: What is Big Data?
Standards Alignment
CSTA K-12
Computer Science Standards
Computer Science
Principles
3.2 -
Computing facilitates exploration and the discovery of connections in
information.
3.2.2 -
Use large data sets to explore and discover information and knowledge. [P3]
3.2.2A -
Large data sets include data such as transactions, measurements, text,
sound, images, and video.
3.2.2B -
The storing, processing, and curating of large data sets is challenging.
3.2.2C -
Structuring large data sets for analysis can be challenging.
3.2.2D -
Maintaining privacy of large data sets containing personal information can
be challenging.
3.2.2E -
Scalability of systems is an important consideration when data sets are
large.
3.2.2F -
The size or scale of a system that stores data affects how that data set
is used.
3.2.2G -
The effective use of large data sets requires computational solutions.
3.2.2H -
Analytical techniques to store, manage, transmit, and process data sets
change as the size of data sets scale.
7.2 -
Computing enables innovation in nearly every field.7.2.1 -
Explain how computing has impacted innovations in other fields. [P1]
7.2.1A -
Machine learning and data mining have enabled innovation in medicine,
business, and science.
7.2.1B -
Scientific computing has enabled innovation in science and business.
7.2.1C -
Computing enables innovation by providing access to and sharing of
information.
7.2.1D -
Open access and Creative Commons have enabled broad access to digital
information.
7.2.1E -
Open and curated scientific databases have benefited scientific
researchers.
7.2.1F -
Moore’s law has encouraged industries that use computers to
effectively plan future research and development based on anticipated
increases in computing power.
7.2.1G -
Advances in computing as an enabling technology have generated and
increased the creativity in other fields.
7.5 -
An investigative process is aided by effective organization and selection of
resources. Appropriate technologies and tools facilitate the accessing of
information and enable the ability to evaluate the credibility of sources.7.5.2 -
Evaluate online and print sources for appropriateness and credibility [P5]
7.5.2A -
Determining the credibility of a soruce requires considering and
evaluating the reputation and credentials of the author(s), publisher(s),
site owner(s), and/or sponsor(s).
7.5.2B -
Information from a source is considered relevant when it supports an
appropriate claim or the purpose of the investigation
CSTA K-12
Computer Science Standards
DA -
Data & Analysis
3B-DA-05 -
Use data analysis tools and techniques to identify patterns in data
representing complex systems.
IC -
Impacts of Computing
3A-IC-25 -
Evaluate the ways computing impacts personal, ethical, social, economic,
and cultural practices.
Students will be able to:
Identify
sources of data produced, used, and consumed by a web application.
Given
a tool that provides access to a large dataset, explain the kinds of
problems such a tool could solve.
Use
a tool that provides access to “big data” and investigate its sources.
Explain
that new techniques are necessary to store, manage, transmit, and process
data at the scale it is currently being produced.
Activator:
Open
up your Engineering Journal and review what you entered last class. Review the
Standards, Objectives, above, for today’s lesson. Click on https://studio.code.org/
and log in. Locate the Unit 4: The ‘Big Data and Privacy’ tile and click
‘View course’.
Direct Instruction and
Guided Instruction:
Vocabulary
Big
Data -
a broad term for datasets so large or complex that traditional data
processing applications are inadequate.
Moore's
Law -
a predication made by Gordon Moore in 1965 that computing power will
double every 1.5-2 years, it has remained more or less true ever since.
Big data is a big deal right now, both in the field of
computer science and more broadly across fields and industries. Understanding
the types of things that can be captured in data and anticipating the types of
innovations or new knowledge that can be built upon this data is increasingly
the role of the computer scientist. A first step toward understanding big data
is a survey of how big data is already being used to learn and solve problems
across numerous disciplines. The scale of big data makes it hard to “see”
sometimes, and techniques for looking at, working with, and understanding data
change once the data is “big.” Everything, from how it’s stored to how
it’s processed to how it's visualized, is a little different once you enter
the realm of big data.
Prompt: Based
on what you saw in the video, what is big data?
Part of what contributes to data being "big" is the
sheer growth of the amount of data in the world. Let’s have a look at a
graph that shows us just how large big data is.
It is not a law of
nature or mathematics but simply a surprisingly accurate prediction that was
made a long time ago.
In 1965, a computer
chip designer named Gordon Moore predicted that the number of transistors one
could fit on a chip would double every 18 months or so.
Amazingly, that
prediction has more or less held true to the present day!
The result is that
since about 1970, computers have gotten twice as fast, at half the cost,
roughly every 1.5-2 years.
With some small
differences, the same is true for data storage capacity.
This is
extraordinarily fast growth - we call it exponential growth. With more and
more machines that are faster and faster, the amount of data being pushed
around, saved, and processed is growing exponentially.
This is so fast that
it's hard to fathom and even harder to plan for. For example:
If
the average hard drive today is 1 TB and you are planning for something or
6 years away, you should expect that average hard drives will be 8-10 TB.
Activity:
Big data surrounds us but it is sometimes surprisingly
challenging to get access to it, use it, or see it. Much of the data out there
is in the “wild.” Even when the data is “available,” it can sometimes
be challenging to figure out where it came from, or how to use it.
2)Answer the following questions within your engineering notebooks:
i.What
kinds of data are out there?
ii.What
format does it come it?
iii.Where
does it come from?
iv.Did
anyone find a link to an actual data source?
v.Did
anyone find an API? What’s an API?
Summarizer:
Mr.
PC will review each day what each student accomplished and the focus of
tomorrow. Wikipedia: Big Data
Assessment for/of
learning:
Students are to be assessed on the completion of this Lesson 1
activity.
Ticket
to Leave:
In
order to prepare you for your two AP CSP college-board performance tasks we
need to get use to reflecting on our daily work and experiences. This is a
skill that will prove to be useful when you go on to college, enter the
workforce, and even in every aspect of your everyday life.Every day at the end of class you should save your work, open up your
journal, put down today’s date, and provide the following information.
1.Provide
at least on new thing that you learned today – Refer to today’s Objectives
2.What
did you accomplish today?
3.Indicate
any problems or obstacles you experienced
4.How
did you solve the problems or obstacles that you experienced?
Feel
free to provide screen shots of your daily work in order to illustrate your
day’s activities. Windows provides a Snipping
Tool within its provided Accessories that may be used for this purpose.
Homework:
1)Complete
your ticket to leave journal entry.
2)Make
sure you begin to search for a computing innovation that you will use for your
college board Explore Performance task that allows you to meet and be able to
submit all requirements of the task.Make
sure data is computed by your computing innovation, that you can identify
beneficial and potential harmful effects of the innovation in society,
culture, or the economy, and data security and/or storage concerns can be
identified.
Tuesday
Day C - 10-30-18
Lesson 2: Finding Trends with Visualizations
Standards Alignment
CSTA K-12
Computer Science Standards
Computer Science
Principles
3.1 -
People use computer programs to process information to gain insight and
knowledge.
3.2 -
Computing facilitates exploration and the discovery of connections in
information.