Welcome to AP Computer Science Principles




This week we are going to be working on the following:

Continuation of Unit 4: Big Data and Privacy

To Think; To Develop Problem-Solving Skills; To Discover; and To Create;

Learning to Compute and Computing to Learn

Classroom Protocol:

 

This is where you will come every day to find out what we are going to do in class for that day. Every day you are to come to your Quia class web page upon arriving to class, go to your class web page, and follow the directions for today.

 

Homework Policy:

 

All assignments will be due on the deadline date given. It is the responsibility for all students to complete their assignments on time. Any assignments received late will not be accepted and a grade will not be given for that assignment.

Accessing your Class Weekly Agenda:

Each week’s agenda and assignments will be updated and posted on your Quia class web page on a weekly basis.  Previous weeks Assignments/Agendas will be provided with a link at the end of the current week’s Class Web Page in case you need to revisit due to an absence, or you’re required to make up, or catch up on your course assignments.

Homework Assignment: Daily homework assignments may be found at the end of each day’s agenda. Daily Journal Entries as seen in Daily Ticket to Leave are to be entered as part of your daily homework. All students will receive a homework grade on a weekly basis, and your journal will receive a project grade each mid-term and final semester.

 

IMPORTANT DATES:     Saturday November 17th @ Bay Path HS

 

                                      Saturday February 2nd @ Auburn HS

 

                                      Saturday April 6th Mock Exam @ your school

Explore Performance Task:  8 hours

To Be Completed by December 22, 2017

 

This Week’s Agenda:

Unit 4: Big Data and Privacy

Creation of Digital Portfolio Accounts

 

Unit 4 - Big Data and Privacy

In this unit students explore the technical, legal, and ethical questions that arise from computers enabling the collection and analysis of enormous amounts of data. In the first half of the unit, students learn about both the technological innovations enabled by data and the privacy and security concerns that arise from collecting it. In the second half of the unit, students learn how cryptography can be used to help protect private information in the digital age.

Chapter 1: Big Data and Privacy

Big Questions

 

Enduring Understandings

 

 

Unit 4 Vocabulary

 

Vocabulary

 

Explore - AP Performance Task Prep

 

·         This unit contains lessons to help students with preparation and execution of the AP® Performance Tasks: Create and Explore

·         The lessons in this unit are meant to be taken piecemeal rather than as a typical unit sequence. Instead of a sequence of connected lessons, these represent a more modular breakdown of the things you need to do to:

1) Understand the AP Performance Tasks

2) Make a plan for completing the tasks in the time allotted and

3) Actually doing the tasks and submitting

 

Monday Day G - 11-5-18 – Friday Day C – 11-9-18

 

Monday Day G - 11-5-18

NOTE: Make sure you have attached your one-pager data innovation project to the assignment on your Google Classroom!

 

Lesson 5: Identifying People with Data

 

Standards Alignment

CSTA K-12 Computer Science Standards

Computer Science Principles

3.2 - Computing facilitates exploration and the discovery of connections in information.

3.2.2 - Use large data sets to explore and discover information and knowledge. [P3]

3.3 - There are trade-offs when representing information as digital data.

3.3.1 - Analyze how data representation, storage, security, and transmission of data involve computational manipulation of information. [P4]

7.3 - Computing has a global affect -- both beneficial and harmful -- on people and society.

7.3.1 - Analyze the beneficial and harmful effects of computing. [P4]

 

Objectives

Students will be able to:

Activator: Open up your Engineering Journal and review what you entered last class. Review the Standards, Objectives, above, for today’s lesson. Click on https://studio.code.org/ and log in. Locate the Unit 4: The ‘Big Data and Privacy’ tile and click ‘View course’.

Direct Instruction:

While there are many potential benefits associated with the collection and analysis of large amounts of data, these advances pose a constant risk to our collective security and privacy. Large-scale data breaches mean that the details of our personal, professional, and financial lives may be at risk. In order to prevent personal data from being linked to an individual person, personally identifying information, such as name, address, or identification number, is often removed from publicly available data. Nevertheless, through the use of computational analysis, it is often possible to “re-identify” individuals within data, based on seemingly innocuous information. As more of our lives is digitized, questions of security and privacy become ever more prevalent.

1)  Review  World's Biggest Data Breaches Visualization - Web Site 

2)  Within your engineering notebooks take notes about the following:

What kind of data is being lost? And how much?

What kinds of issues could arise from this data getting into the wrong hands?

3)  Share findings with rest of the class.

We’ve spent a lot of time looking at potential benefits of collecting and analyzing data. As we’ve already seen today, however, there are some risks associated with collecting all of this information. If it falls into the wrong hands or is used in ways we didn’t intend, there may be serious risks imposed on our privacy or security. We’re going to start looking more deeply at this problem.

Guided Instruction:

Log into code.org and go to Unit 4: Lesson 5.

Data Privacy Lab: How easily can you be identified?

In the data breaches we just looked at, some fairly important pieces of information were stolen. Credit card numbers, passport information, or government security clearances are obviously not something we’d like to fall into the wrong hands. Other pieces of information, however, don’t seem that bad. So what if people know your ZIP code? So what if people know your birthday? This is information we usually share without a second thought.

Thinking Prompt:

 

4)  Open the following Guide as found on code.org and complete the exercise on researching yourself. Once completed submit to the assignment found on your google classroom:

 

Activity Guide - Research Yourself - Activity Guide.

 

5)  On code.org complete the assessment question at the end of lesson 5.

6)  With any time you have left go to Lesson 6: The Cost of Free, and review the information provided.

7)  If you finish and have time you should review the information listed in Homework below in preparation for your EPT for the College Board.

Summarizer:

Mr. PC will review each day what each student accomplished and the focus of tomorrow.

Assessment for/of learning:

Students are to be assessed on the completion of all tasks associated with this Lesson.

Ticket to Leave:

In order to prepare you for your two AP CSP college-board performance tasks we need to get use to reflecting on our daily work and experiences. This is a skill that will prove to be useful when you go on to college, enter the workforce, and even in every aspect of your everyday life.  Every day at the end of class you should save your work, open up your journal, put down today’s date, and provide the following information.

1.   Provide at least on new thing that you learned today – Refer to today’s Objectives

2.   What did you accomplish today?

3.   Indicate any problems or obstacles you experienced

4.   How did you solve the problems or obstacles that you experienced?

Feel free to provide screen shots of your daily work in order to illustrate your day’s activities. Windows provides a Snipping Tool within its provided Accessories that may be used for this purpose.

Homework:

 

1)   Complete your ticket to leave journal entry.

2)   Make sure you begin to search for a computing innovation that you will use for your college board Explore Performance task that allows you to meet and be able to submit all requirements of the task.  Make sure data is computed by your computing innovation, that you can identify beneficial and potential harmful effects of the innovation in society, culture, or the economy, and data security and/or storage concerns can be identified.

 

Tuesday Day H - 11-6-18

Russ DeSimone from Johnson and Wales is coming to visit!

 

Lesson 7: Simple Encryption

 

 

Standards Alignment

CSTA K-12 Computer Science Standards

CI - Community, Global, and Ethical Impacts

CL – Collaboration

CPP - Computing Practice & Programming

CT - Computational Thinking

 

Computer Science Principles

1.2 - Computing enables people to use creative development processes to create computational artifacts for creative expression or to solve a problem.

3.3 - There are trade offs when representing information as digital data.

6.3 - Cybersecurity is an important concern for the Internet and the systems built on it.

7.3 - Computing has a global affect -- both beneficial and harmful -- on people and society.

Objectives

Students will be able to:

Activator: Open up your Engineering Journal and review what you entered last class. Review the Standards, Objectives, above, for today’s lesson. Click on https://studio.code.org/ and log in. Locate the Unit 4: The ‘Big Data and Privacy’ tile and click ‘View course’.

Direct Instruction:

Vocabulary

 

The critical role of encryption in everyday life

"In your daily life what things do you or other people rely on keeping a secret? Who are these secrets being kept from? How are these things kept secret?"

Secrecy is a critical part of our lives, in ways big and small. As our lives increasingly are conducted on the Internet, we want to be sure we can maintain the privacy of our information and control who has access to privileged information.

Digital commerce, business, government operations, and even social networks all rely on our ability to keep information from falling into the wrong hands.

Recall: As we saw with our activities on the Internet Simulator the internet is NOT secure

Classic Encryption - The Caesar Cipher

Many of the ideas we use to keep secrets in the digital age are far older than the Internet. The process of encoding a plain text message in some secret way is called Encryption

For example in Roman times Julius Caesar is reported to have encrypted messages to his soldiers and generals by using a simple alphabetic shift - every character was encrypted by substituting it with a character that was some fixed number of letters away in the alphabet.

As a result an alphabetic shift is often referred to as the Caesar Cipher.

Prompt:

serr cvmmn va gur pnsrgrevn

HINT:

With this simple encryption technique it only took a few minutes to decode a small message. What if the message were longer BUT you had a computational tool to help you?!

Guided Instruction:

1)   Log into code.org and go to Unit 4: Lesson 7.

2)   Complete all the challenges provided in this lesson and enter your work into your engineering notebooks. Attach completed activity guides to the assignment found on your Google Classroom.

3)   Complete the Assessment for this Lesson within Code.org

Summarizer:

Mr. PC will review each day what each student accomplished and the focus of tomorrow.

Assessment for/of learning:

Students are to be assessed on the completion of all tasks associated with this Lesson. All work should be provided within your engineering notebook in order to receive credit.

Ticket to Leave:

In order to prepare you for your two AP CSP college-board performance tasks we need to get use to reflecting on our daily work and experiences. This is a skill that will prove to be useful when you go on to college, enter the workforce, and even in every aspect of your everyday life.  Every day at the end of class you should save your work, open up your journal, put down today’s date, and provide the following information.

1.   Provide at least on new thing that you learned today – Refer to today’s Objectives

2.   What did you accomplish today?

3.   Indicate any problems or obstacles you experienced

4.   How did you solve the problems or obstacles that you experienced?

Feel free to provide screen shots of your daily work in order to illustrate your day’s activities. Windows provides a Snipping Tool within its provided Accessories that may be used for this purpose.

Homework:

 

1)   Complete your ticket to leave journal entry.

2)   Make sure you begin to search for a computing innovation that you will use for your college board Explore Performance task that allows you to meet and be able to submit all requirements of the task.  Make sure data is computed by your computing innovation, that you can identify beneficial and potential harmful effects of the innovation in society, culture, or the economy, and data security and/or storage concerns can be identified.

 

 

Wednesday Day A - 11-7-18 and Thursday Day B – 11-8-18

 

Lesson 8: Encryption with Keys and Passwords

 

Standards Alignment

CSTA K-12 Computer Science Standards

CPP - Computing Practice & Programming

 

CT - Computational Thinking

 

Computer Science Principles

2.3 - Models and simulations use abstraction to generate new understanding and knowledge.

3.1 - People use computer programs to process information to gain insight and knowledge.

4.2 - Algorithms can solve many but not all computational problems.

6.3 - Cybersecurity is an important concern for the Internet and the systems built on it.

 

Objectives

 

Students will be able to:

Activator: Open up your Engineering Journal and review what you entered last class. Review the Standards, Objectives, above, for today’s lesson. Click on https://studio.code.org/ and log in. Locate the Unit 4: The ‘Big Data and Privacy’ tile and click ‘View course’.

Direct Instruction:

Vocabulary

In the previous lesson you saw how relatively easy it was to crack a substitution cipher with a computational tool.

Today we’ll try to crack a different code to see what it’s like. Beforehand, however, we should consider why someone might want to crack a cipher in the first place.

"Are there ethical reasons to try to crack secret codes?" – Write your responses within your Engineering Notebook

Today, we will attempt to crack codes, paying particular attention to the processes and algorithms that we use to do so.

So, before starting today we want to make sure that we distinguish between an encryption algorithm and an encryption key

For example:

So, There is a difference between the algorithm (how to execute the encryption and decryption) and key (the secret piece of information).

Today we’ll learn a little more about it and about keys and their relationship to passwords you use every day.

Guided Instruction:

1)   Log into code.org and go to Unit 4: Lesson 8.

2)   Complete all the challenges provided in this lesson and enter your work into your engineering notebooks. Attach completed activity guides to the assignment found on your Google Classroom.

3)   Complete the Assessment for this Lesson within Code.org

 

Summarizer:

Mr. PC will review each day what each student accomplished and the focus of tomorrow.

Assessment for/of learning:

Students are to be assessed on the completion of all tasks associated with this Lesson.

Ticket to Leave:

In order to prepare you for your two AP CSP college-board performance tasks we need to get use to reflecting on our daily work and experiences. This is a skill that will prove to be useful when you go on to college, enter the workforce, and even in every aspect of your everyday life.  Every day at the end of class you should save your work, open up your journal, put down today’s date, and provide the following information.

1.   Provide at least on new thing that you learned today – Refer to today’s Objectives

2.   What did you accomplish today?

3.   Indicate any problems or obstacles you experienced

4.   How did you solve the problems or obstacles that you experienced?

Feel free to provide screen shots of your daily work in order to illustrate your day’s activities. Windows provides a Snipping Tool within its provided Accessories that may be used for this purpose.

Homework:

 

1)   Complete your ticket to leave journal entry.

2)   Make sure you begin to search for a computing innovation that you will use for your college board Explore Performance task that allows you to meet and be able to submit all requirements of the task.  Make sure data is computed by your computing innovation, that you can identify beneficial and potential harmful effects of the innovation in society, culture, or the economy, and data security and/or storage concerns can be identified.

 

Friday Day C – 11-9-18

 

Make sure to create College Board Digital Portfolio Account

 

 

Objectives

Students will be able to:

Direct Instruction and Guided Instruction:

1)    Preparation of your AP CSP Digital Portfolios: Click on the link below.

Student Digital Portfolio Guide – Save a copy of the Student Digital Portfolio Guide to your Google Drive

Ø  Please review the Student Digital Portfolio Guide and follow the directions for setting up your digital portfolio for your AP CSP course. Thanks.

2)  Complete all lessons and activities from this week.

3)  Make sure you have a computing innovation ready for the college board Explore Performance Task beginning soon!

Ticket to Leave:

In order to prepare you for your two AP CSP college-board performance tasks we need to get use to reflecting on our daily work and experiences. This is a skill that will prove to be useful when you go on to college, enter the workforce, and even in every aspect of your everyday life.  Every day at the end of class you should save your work, open up your journal, put down today’s date, and provide the following information.

1.   Provide at least on new thing that you learned today – Refer to today’s Objectives

2.   What did you accomplish today?

3.   Indicate any problems or obstacles you experienced

4.   How did you solve the problems or obstacles that you experienced?

Feel free to provide screen shots of your daily work in order to illustrate your day’s activities. Windows provides a Snipping Tool within its provided Accessories that may be used for this purpose.

Homework:

 

1)   Complete your ticket to leave journal entry.

2)   Make sure you begin to search for a computing innovation that you will use for your college board Explore Performance task that allows you to meet and be able to submit all requirements of the task.  Make sure data is computed by your computing innovation, that you can identify beneficial and potential harmful effects of the innovation in society, culture, or the economy, and data security and/or storage concerns can be identified.

 

 

Thanks for a great week!

Mr. PC 

 

 

Online Explore Performance Task Resources:

AP CSP Performance Task Directions for Students - College Board Student Handout

 

 

Explore Performance Task Rubric

More Resources for finding computing innovations:

http://www.ted.com/talks

 

www.digg.com

 

http://www.teachersdomain.org

 

http://www.pbslearningmedia.org/

 

 

Tools for building computing artifacts:

 

https://sites.google.com/view/cool-tools-for-schools/home

 

 

 

To Do: Create Digital Portfolios for Performance Tasks Submissions. Our goal is to complete our Explore Performance Task before the end of 2018.

 

 

UNIT 1 Overview: The Internet:

This unit explores the technical challenges and questions that arise from the need to represent digital information in computers and transfer it between people and computational devices. The unit then explores the structure and design of the internet and the implications of those design decisions.

In this unit students learn how computers represent all kinds of information and how the Internet allows that information to be shared with millions of people.

The first chapter explores the challenges and questions that arise when representing information in a computer or sending it from one computer to another. It begins by investigating why on-off signals, also known as binary signals, are used to represent information in a computer. It then introduces the way common information types like text and numbers are represented using these binary signals. Finally, it illustrates the importance of establishing shared communication rules, or protocols, for successfully sending and receiving information.

In the second chapter, students learn how the design of the internet allows information to be shared across billions of people and devices. Making frequent use of the Internet Simulator, they explore the problems the original designers of the internet had to solve and then students “invent” solutions. To conclude the unit, students research a modern social dilemma driven by the ubiquity of internet and the way it works.

 

Chapter 1: Representing and Transmitting Information

Big Questions

 

Enduring Understandings

·         2.1 A variety of abstractions built upon binary sequences can be used to represent all digital data.

·         3.3 There are trade-offs when representing information as digital data.

·         6.2 Characteristics of the Internet influence the systems built on it.

7.2 Computing enables innovation in nearly every field.

 

Unit 1 Vocabulary

 

Vocabulary

Unit 1: Chapter 2: Inventing the Internet

Big Questions

 

Enduring Understandings

·         2.1 A variety of abstractions built upon binary sequences can be used to represent all digital data.

·         6.1 The Internet is a network of autonomous systems.

·         6.2 Characteristics of the Internet influence the systems built on it.

·         7.3 Computing has a global affect -- both beneficial and harmful -- on people and society.

Introduction to UNIT 2: Digital Information:

This unit further explores the ways that digital information is encoded, represented and manipulated. Being able to digitally manipulate data, visualize it, and identify patterns, trends and possible meanings are important practical skills that computer scientists do every day. Understanding where data comes from, having intuitions about what could be learned or extracted from it, and being able to use computational tools to manipulate data and communicate about it are the primary skills addressed in the unit.

This unit explores the way large and complex pieces of digital information are stored in computers and the associated challenges. Through a mix of online research and interactive widgets, students learn about foundational topics like compression, image representation, and the advantages and disadvantages of different file formats. To conclude the unit, students research the history and characteristics of a real-world file format.

Chapter 1: Digital Information

 

Big Questions

 

 

 

Enduring Understandings

 

 

Vocabulary

Unit 3 - Intro to Programming

In Unit 3, students explore the fundamental topics of programming, algorithms, and abstraction as they learn to programmatically draw pictures in App Lab. An unplugged sequence at the beginning of the unit highlights the need for programming languages as well as the creativity involved in designing algorithms. Students then begin working in App Lab where they use simple commands to draw shapes and images using a virtual “turtle.” As they’re introduced to more complex commands and programming constructs, students learn to break down programming problems into manageable chunks. The unit ends with a collaborative project to design a digital scene.

Chapter 1: Intro to Programming

Big Questions

Enduring Understandings

 

Unit 3 Vocabulary

 

Vocabulary

 

 

AP CSP Syllabus

AP CSP Week 1 Agenda  

AP CSP Week 2 Agenda

AP CSP Week 3 Agenda

AP CSP Week 4 Agenda  

AP CSP Week 5 Agenda

AP CSP Week 6 Agenda  

AP CSP Week 7 Agenda

AP CSP Week 8 Agenda  

AP CSP Week 9 Agenda

AP CSP Week 10 Agenda