Skip to the content.
Home Create Task Data Structures Test Prep

Test Prep Notes

Table of Contents

  1. 5.1-5.2
  2. 5.3-5.4
  3. 5.5-5.6
  4. Quiz 1 Corrections
  5. Quiz 2 Corrections
  6. Quiz 3 Corrections
  7. Quiz 4 Corrections

TPT 5.1-5.2

Beneficial and Harmful Effects of Computing

  1. Come up with three of your own Beneficial and corresponding Harmful Effects of Computing.
    • Computing allows people to store data; however, if the data is not carefully protected, unauthorized users could potentially access it.
    • Computing allows for automation and completion of tasks; however, too much human reliance on technology could have negative effects on our own skills.
    • Computing allows for communication with people across the globe; however, communication through technology and none through live interaction is unhealthy.
  2. Talk about dopamine issues above. Real? Parent conspiracy? Anything that is impacting your personal study and success in High School?
    • Computing could produce dopamine. Personally, computing is enjoyable, but it doesn’t negatively affect my success in high school.

Digital Empowerment

  1. How does someone empower themselves in a digital world?
    • People can empower themselves in a digital world by using technology to communicate with others and improve their lives.
  2. How does someone that is empowered help someone that is not empowered? Describe something you could do at Del Norte HS.
    • Someone that is empowered can empower others by introducing them to computing. I can help my peers at Del Norte by teaching them about various computer science frameworks and tools they can use to develop beneficial apps and websites.
  3. Is paper or red tape blocking digital empowerment? Are there such barriers at Del Norte? Elsewhere?
    • Red tape: rules/regulations that prevent the convenient route/method
    • Example: school Wifi blocking certain sites, closing a closer gate to the cafeteria - Red tape doesn’t actually block digital empowerment. It’s a barrier, but it can often be overcome. At Del Norte, most students can probably overcome red tape such as blocked websites. Red tape can occur anywhere, in schools, homes, restaurants, and much more.

TPT 5.3-5.4

Computing Bias

  1. Does the owner of the computer think this was intentional? If yes or no, justify you conclusion.
    • The owner does think this malfunction with the screen detection was intentional. Although there wasn’t a clear pattern that the faces of certain ethnicities were not recognized, the owner thought this was an intentional error directed at him.
  2. How do you think this happened? Is this harmful? Was it intended to be harmful or exclude?
    • I think this happened because the HP programming team may not have been very diverse or the test cases were not inclusive of all possibilities. It may not have been meant to be harmful or exclusive, but it is harmful because some users may be offended and it’s clearly not good if the face recognition program doesn’t work for certain people.
  3. Should it be corrected? What would you or should you do to produce a better outcome?
    • This issue should definitely be corrected. A better outcome could be produced by using a more diverse team of product developers and a more diverse test case.

Crowdsourcing

  1. CompSci has 150 principles students. Describe a crowdsource idea and how you might initiate it in our environment?
    • A crowdsource idea for our CS Principles classes is a product that has a diverse group of programmers. The crodwsourcing process can occur in a CS classroom with the use of GitHub. Multiple students from various scrum teams can all contribute to a project.
  2. What about Del Norte crowdsourcing? Could your final project be better with crowdsourcing?
    • My final project could benefit from some crowd sourcing. If it appealed to more people, then maybe the club could attract a more diverse group of members.

TPT 5.5-5.6

  1. When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in GitHub pages. License Info
    • GNU GPLv3: open source, distributions must be public and changes must be documented
    • Creative Commons Zero v1.0 Universal: no copyright
    • Open Source MIT License: distribution doesn’t need to be public, changes may not be documented
  2. Make a license for your personal and Team project. Document license you picked and why.
    • Personal project: GNU GPLv3
    • My personal project is primarily just for my learning. However, if people want to use the code I develop for my Create Task, I think it should be public and changes should be documented. - Team project: GNU GPLv3
    • Anyone can use the code except for closed source versions

Safe Computing

  1. Describe PII you have seen on project in CompSci Principles.
    • PII (Personal Identifiable Information)
    • Name, picture, high school, residence
  2. What are your feelings about PII and your exposure?
    • Some forms of PII must be kept private while others are released
    • My PII has obviously been exposed but the ones that should be kept secret have been kept secret
  3. Describe good and bad passwords? What is another step that is used to assist in authentication.
    • Bad passwords are ones that are commonly used and short
    • Good passwords are probably 10 characters or longer and contain a wide variety of characters including letters, numbers, and symbols
    • Multi-factor authentication is a safe computing practice
  4. Try to describe Symmetric and Asymmetric encryption.
    • Symmetric encryption: secret key is used to encrypt and decrypt (sender and receiver share the same key)
    • Asymmetric encryption: public-key encryption - public key used to encrypt the information, private key used to decrypt (sender encrypts the data, only the receiver’s private key can be used to decrypt the information)
  5. Provide an example of encryption we used in deployment.
    • SSL encryption was used in the deployment process
    • Secure Sockets Layer creates encrypted channel between web server and web client
  6. Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
    • I can’t remember personally experiencing a phishing scheme, but I recently heard about someone who lost $ due to a phishing scheme by email or text message.
    • Vishing (phone call form of phishing)
    • Smishing (text message form of phishing)
    • Spear Phishing (email form of phishing, targeted by impersonating as internal request)

Quiz 1 Corrections

Score: 45/50

Quiz 2 Corrections

Score: 49/50

Quiz 3 Corrections

Score: 45/50

Quiz 4 Corrections

Score: 48/50