Skip to the content.
Test Prep Notes
Table of Contents
- 5.1-5.2
- 5.3-5.4
- 5.5-5.6
- Quiz 1 Corrections
- Quiz 2 Corrections
- Quiz 3 Corrections
- Quiz 4 Corrections
TPT 5.1-5.2
Beneficial and Harmful Effects of Computing
- Come up with three of your own Beneficial and corresponding Harmful Effects of Computing.
- Computing allows people to store data; however, if the data is not carefully protected, unauthorized users could potentially access it.
- Computing allows for automation and completion of tasks; however, too much human reliance on technology could have negative effects on our own skills.
- Computing allows for communication with people across the globe; however, communication through technology and none through live interaction is unhealthy.
- Talk about dopamine issues above. Real? Parent conspiracy? Anything that is impacting your personal study and success in High School?
- Computing could produce dopamine. Personally, computing is enjoyable, but it doesn’t negatively affect my success in high school.
Digital Empowerment
- How does someone empower themselves in a digital world?
- People can empower themselves in a digital world by using technology to communicate with others and improve their lives.
- How does someone that is empowered help someone that is not empowered? Describe something you could do at Del Norte HS.
- Someone that is empowered can empower others by introducing them to computing. I can help my peers at Del Norte by teaching them about various computer science frameworks and tools they can use to develop beneficial apps and websites.
- Is paper or red tape blocking digital empowerment? Are there such barriers at Del Norte? Elsewhere?
- Red tape: rules/regulations that prevent the convenient route/method
- Example: school Wifi blocking certain sites, closing a closer gate to the cafeteria
- Red tape doesn’t actually block digital empowerment. It’s a barrier, but it can often be overcome. At Del Norte, most students can probably overcome red tape such as blocked websites. Red tape can occur anywhere, in schools, homes, restaurants, and much more.
TPT 5.3-5.4
Computing Bias
- Does the owner of the computer think this was intentional?
If yes or no, justify you conclusion.
- The owner does think this malfunction with the screen detection was intentional. Although there wasn’t a clear pattern that the faces of certain ethnicities were not recognized, the owner thought this was an intentional error directed at him.
- How do you think this happened?
Is this harmful? Was it intended to be harmful or exclude?
- I think this happened because the HP programming team may not have been very diverse or the test cases were not inclusive of all possibilities. It may not have been meant to be harmful or exclusive, but it is harmful because some users may be offended and it’s clearly not good if the face recognition program doesn’t work for certain people.
- Should it be corrected?
What would you or should you do to produce a better outcome?
- This issue should definitely be corrected. A better outcome could be produced by using a more diverse team of product developers and a more diverse test case.
Crowdsourcing
- CompSci has 150 principles students. Describe a crowdsource idea and how you might initiate it in our environment?
- A crowdsource idea for our CS Principles classes is a product that has a diverse group of programmers. The crodwsourcing process can occur in a CS classroom with the use of GitHub. Multiple students from various scrum teams can all contribute to a project.
- What about Del Norte crowdsourcing? Could your final project be better with crowdsourcing?
- My final project could benefit from some crowd sourcing. If it appealed to more people, then maybe the club could attract a more diverse group of members.
TPT 5.5-5.6
Legal and Ethical Concerns
- When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in GitHub pages.
License Info
- GNU GPLv3: open source, distributions must be public and changes must be documented
- Creative Commons Zero v1.0 Universal: no copyright
- Open Source MIT License: distribution doesn’t need to be public, changes may not be documented
- Make a license for your personal and Team project. Document license you picked and why.
- Personal project: GNU GPLv3
- My personal project is primarily just for my learning. However, if people want to use the code I develop for my Create Task, I think it should be public and changes should be documented.
- Team project: GNU GPLv3
- Anyone can use the code except for closed source versions
Safe Computing
- Describe PII you have seen on project in CompSci Principles.
- PII (Personal Identifiable Information)
- Name, picture, high school, residence
- What are your feelings about PII and your exposure?
- Some forms of PII must be kept private while others are released
- My PII has obviously been exposed but the ones that should be kept secret have been kept secret
- Describe good and bad passwords? What is another step that is used to assist in authentication.
- Bad passwords are ones that are commonly used and short
- Good passwords are probably 10 characters or longer and contain a wide variety of characters including letters, numbers, and symbols
- Multi-factor authentication is a safe computing practice
- Try to describe Symmetric and Asymmetric encryption.
- Symmetric encryption: secret key is used to encrypt and decrypt (sender and receiver share the same key)
- Asymmetric encryption: public-key encryption - public key used to encrypt the information, private key used to decrypt (sender encrypts the data, only the receiver’s private key can be used to decrypt the information)
- Provide an example of encryption we used in deployment.
- SSL encryption was used in the deployment process
- Secure Sockets Layer creates encrypted channel between web server and web client
- Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
- I can’t remember personally experiencing a phishing scheme, but I recently heard about someone who lost $ due to a phishing scheme by email or text message.
- Vishing (phone call form of phishing)
- Smishing (text message form of phishing)
- Spear Phishing (email form of phishing, targeted by impersonating as internal request)
Quiz 1 Corrections
Score: 45/50
- 23 - D is incorrect because a public key is meant to be public, thus it isn’t supposed to compromise user privacy. A is correct because cookies could provide additional information about the user such as
- 29 - A is incorrect because the program doesn’t work for all test cases. If the initial value isn’t 0, then the sum will be larger than the actual sum of the numbers because the element at index 1 will be added twice. Thus, C is correct. There are not enough test cases to determine whether the program is correct. D is also wrong because the program doesn’t work for all instances where the elements of the list are increasing.
- 38 - B is incorrect and C is the correct answer because not only can the metadata be used to analyze the number of phone calls, the metadata can be used to retrieve the other phone numbers of possible criminal suspects.
- 49 - The privacy of the users could be affected because common sites that they visit are being stored (B is wrong). However, the websites that are not frequently visited will still be accessible in the same manner as before. Thus, D is the correct answer.
- 50 - I mixed up the definitions of lossless and lossy compression. Lossless compression is where the number of bits are reduced but complete reconstruction of the data is possible. Lossy compression is where the number of bits are reduced and the original data can only be approximated. Answer choice B is incorrect because an averaging of the pixels would be lossy compression. Answer choice C is correct because it allows for complete reconstruction by readjusting each RGB value.
Quiz 2 Corrections
Score: 49/50
- 49 - Answer C is wrong because the price of individual items was not included, thus the most expensive item cannot be determined. Answer D is correct because the transactions can be sorted by date, then the number of items purchased on that day can be determined.
Quiz 3 Corrections
Score: 45/50
- 35 - Answer D is correct because the user is not violating the Digital Millenium Copyright Act (DMCA) since the album was downloaded from a licensed seller. Answer B is wrong because the user´s location can be accessed by the website, it can provide reviews of nearby users.
- 41 - Answer C is incorrect because the recipient´s public key can´t be used to decrypt the message. In public key cryptography, a public key is used for encryption and the user´s private key is used for decryption. The message can only be decrypted with the user´s private key so Answer D is correct.
- 42 - Answer D is incorrect because 2^8 = 256 and only 100 items need to be stored. This means that only 2^7 = 128 (7 bits) are necessary. Answer C is the correct answer. I accidentally did this wrong because I thought the value 100 had to be stored, not 100 items.
- 44 - Answer B is incorrect. I accidentally clicked the wrong answer but I knew that D is correct because it allows for the calculation of varying powers.
- 46 - Answer A is wrong because it´s an example of assymetric encryption. Symmetric encryption is where both the encryption and decryption keys are the same. Answer B is correct because a shared step size is used to convert from the English alphabet to the secret language.
Quiz 4 Corrections
Score: 48/50
- 15 - Answer D is incorrect because Program A displays numbers 1-10 while Program B displays numbers 2-11. Thus, both programs display the same number of values.
- 21 - 32 bits: 2^32 values, 64 bits: 2^64 values
- Answer A is incorrect because 2^64 = 2^32 + 2^32, thus Answer C is correct, there are 2^32 more values that can be represented.