Thursday, September 27, 2018
Thursday, September 27, 2018
Today in class, we will have he Unit 1 Exam. Students who are absent may make it up upon return. Once we are done with the exam, we will continue reading in our online text.
Wednesday, September 26, 2018
Wednesday, September 26, 2018
Today in class, we will:
- Take a practice Unit 1 Test
- Grade and review the practice test
Today's applicable Oklahoma curriculum standards
(L2.AP.PD.05 Develop programs for multiple computing platforms.)
(L1.NI.C.01 Compare various security measures by evaluating tradeoffs between
the usability and security of a computing system.)
(L2.NI.C.01 Compare and refine ways in which software developers protect devices and
information from unauthorized access.)
(L1.NI.C.02 Illustrate how sensitive data can be affected by attacks.
Not addressed at this level.)
(L1.NI.C.03 Recommend security measures to address various scenarios based on
the principles of information security.) (L1.DA.S.01 Translate and compare different bit representations of real-world
phenomena, such as characters, numbers, and images.)
(L1.AP.A.01 Use algorithms (e.g., sequencing, selection, iteration, recursion, etc.) to
create a prototype to provide a possible solution for a common problem.)
- Take a practice Unit 1 Test
- Grade and review the practice test
Today's applicable Oklahoma curriculum standards
(L2.AP.PD.05 Develop programs for multiple computing platforms.)
(L1.NI.C.01 Compare various security measures by evaluating tradeoffs between
the usability and security of a computing system.)
(L2.NI.C.01 Compare and refine ways in which software developers protect devices and
information from unauthorized access.)
(L1.NI.C.02 Illustrate how sensitive data can be affected by attacks.
Not addressed at this level.)
(L1.NI.C.03 Recommend security measures to address various scenarios based on
the principles of information security.) (L1.DA.S.01 Translate and compare different bit representations of real-world
phenomena, such as characters, numbers, and images.)
(L1.AP.A.01 Use algorithms (e.g., sequencing, selection, iteration, recursion, etc.) to
create a prototype to provide a possible solution for a common problem.)
Tuesday, September 25, 2018
Tuesday, September 25, 2018
Today in class, we will:
- Read and discuss Pseudocode and Pseudocode for the AP Exam
- Review the AP CS Principles Exam Reference Sheet in Pseudocode for the AP Exam
Homework: Outline Unit 1 in preparation for the Unit 1 Exam. Due by 8:00 a.m. Wednesday, September 26.
Today's applicable Oklahoma curriculum standards
(L2.AP.PD.05 Develop programs for multiple computing platforms.)
- Read and discuss Pseudocode and Pseudocode for the AP Exam
- Review the AP CS Principles Exam Reference Sheet in Pseudocode for the AP Exam
Homework: Outline Unit 1 in preparation for the Unit 1 Exam. Due by 8:00 a.m. Wednesday, September 26.
Today's applicable Oklahoma curriculum standards
(L2.AP.PD.05 Develop programs for multiple computing platforms.)
Monday, September 24, 2018
Monday, September 24, 2018
Today in class, we will cover:
- Homework review
- Explanation and discussion of high v low level instructions in relation to idea execution
- In pairs, students will investigate how much of a CPU’s workload is spent doing nothing.
Today's applicable Oklahoma curriculum standards:
L2.AP.PD.01 Compare multiple programming languages and discuss features that make them
useful for solving problems and developing systems.
- Homework review
- Explanation and discussion of high v low level instructions in relation to idea execution
- In pairs, students will investigate how much of a CPU’s workload is spent doing nothing.
Today's applicable Oklahoma curriculum standards:
L2.AP.PD.01 Compare multiple programming languages and discuss features that make them
useful for solving problems and developing systems.
Thursday, September 20, 2018
Wednesday, September 19, and Thursday, September 20, 2018
Wednesday and Thursday we are having study hall due to the large number of people out of class to participate in extracurricular activities.
Tuesday, September 18, 2018
Test Next Week
The Unit 1 test will be on Thursday, September 27. Please use our online text and study guide to prepare. The study guide covers some, but not all the material on the test. Please be sure to study our online text.
Tuesday, September 18, 2018
Today in class, we will:
- Have group presentations about how failures of the CIA triad can impact electronic voting
- Introduce the midpoint test study guide and discuss
- Read and discuss
Grammar, Vocabulary, and Syntax;
Clarity and Ambiguity;
Artificial Languages;
High-level vs. Low-level Languages;
Idea to Execution
- Homework: Students research a programming language and write a short reflection. This is due by 8:00 a.m. on Monday, September 24. This deadline applies even if you will not be in class Wednesday and Thursday. The reflection must be at least 100 words, but may be more. Some examples of programming languages are Pearl, Java, C++, and Basic. There are many more.
Today's applicable Oklahoma curriculum standards:
L2.AP.PD.01 Compare multiple programming languages and discuss features that make them
useful for solving problems and developing systems.
- Have group presentations about how failures of the CIA triad can impact electronic voting
- Introduce the midpoint test study guide and discuss
- Read and discuss
Grammar, Vocabulary, and Syntax;
Clarity and Ambiguity;
Artificial Languages;
High-level vs. Low-level Languages;
Idea to Execution
- Homework: Students research a programming language and write a short reflection. This is due by 8:00 a.m. on Monday, September 24. This deadline applies even if you will not be in class Wednesday and Thursday. The reflection must be at least 100 words, but may be more. Some examples of programming languages are Pearl, Java, C++, and Basic. There are many more.
Today's applicable Oklahoma curriculum standards:
L2.AP.PD.01 Compare multiple programming languages and discuss features that make them
useful for solving problems and developing systems.
Monday, September 17, 2018
Monday, September 17, 2018
Today in class, we will:
- Read Electronic Voting in online text
- Discuss a news article on electronic voting -- https://www.wired.com/2016/08/americas-voting-machines-arent-ready-election/
- Select one component of CIA triad and explore its implications for electronic voting
- Groups will present to the class during the next class period
Today's applicable Oklahoma curriculum standards:
L1.NI.C.04 Explain trade-offs when selecting and implementing cyber security recommendations from multiple perspectives such as the user, enterprise, and government.
- Read Electronic Voting in online text
- Discuss a news article on electronic voting -- https://www.wired.com/2016/08/americas-voting-machines-arent-ready-election/
- Select one component of CIA triad and explore its implications for electronic voting
- Groups will present to the class during the next class period
Today's applicable Oklahoma curriculum standards:
L1.NI.C.04 Explain trade-offs when selecting and implementing cyber security recommendations from multiple perspectives such as the user, enterprise, and government.
Friday, September 14, 2018
Friday, September 14, 2018
Today in class, we will:
-- Do an in-class simulation of a DDoS attack and discuss. (second hour only)
-- Reread the section about social engineering in our online text and discuss. Then we will research and report on malware. Reports are due Monday before class starts and should be emailed to my email address on the white board.
Please research and report on one of these examples of malware:
Viruses/Worms
Botnets
Keyloggers
Backdoors
Trojan Horses
Time Bombs
Spyware
Please answer the following questions. Be sure to write the question number and question before each answer.
1. What is your chosen malware?
2. How does it work?
3. How does social engineering figure into its distribution? (i.e., what is misleading about its installation or use?)
4. What are some real-world examples?
5. How is it prevented and/or removed?
Grading rubric:
Typed and neatly formatted: 10 points
Each question is answered and answered correctly: 75 points total
Sources are credited and fully cited: 15 points
(i.e. from the article "Lawsuit renews focus on privacy policies for mobile apps"
By SUSAN MONTOYA BRYAN, ASSOCIATED PRESS ALBUQUERQUE, N.M. — Sep 13, 2018, 7:58 PM found at https://abcnews.go.com/Technology/wireStory/lawsuit-renews-focus-privacy-policies-mobile-apps-57811647)
* Please cite sources immediately following information given. We are not using formal MLA style, just an informal source citation, as shown, that provides the source information).
Today's applicable Oklahoma curriculum standards:
(L1.NI.C.01 Compare physical and cybersecurity measures by evaluating trade-offs between the usability and security of a computing system.)
(L1.NI.C.04 Explain trade-offs when selecting and implementing cybersecurity recommendations from multiple perspectives such as the user, enterprise, and government. )
-- Do an in-class simulation of a DDoS attack and discuss. (second hour only)
-- Reread the section about social engineering in our online text and discuss. Then we will research and report on malware. Reports are due Monday before class starts and should be emailed to my email address on the white board.
Please research and report on one of these examples of malware:
Viruses/Worms
Botnets
Keyloggers
Backdoors
Trojan Horses
Time Bombs
Spyware
Please answer the following questions. Be sure to write the question number and question before each answer.
1. What is your chosen malware?
2. How does it work?
3. How does social engineering figure into its distribution? (i.e., what is misleading about its installation or use?)
4. What are some real-world examples?
5. How is it prevented and/or removed?
Grading rubric:
Typed and neatly formatted: 10 points
Each question is answered and answered correctly: 75 points total
Sources are credited and fully cited: 15 points
(i.e. from the article "Lawsuit renews focus on privacy policies for mobile apps"
By SUSAN MONTOYA BRYAN, ASSOCIATED PRESS ALBUQUERQUE, N.M. — Sep 13, 2018, 7:58 PM found at https://abcnews.go.com/Technology/wireStory/lawsuit-renews-focus-privacy-policies-mobile-apps-57811647)
* Please cite sources immediately following information given. We are not using formal MLA style, just an informal source citation, as shown, that provides the source information).
Today's applicable Oklahoma curriculum standards:
(L1.NI.C.01 Compare physical and cybersecurity measures by evaluating trade-offs between the usability and security of a computing system.)
(L1.NI.C.04 Explain trade-offs when selecting and implementing cybersecurity recommendations from multiple perspectives such as the user, enterprise, and government. )
Thursday, September 13, 2018
Thursday, September 13, 2018
Today in class, due to many students participating off-campus activities, we will have study hall. You may use the computers to study vocabulary on Quizlet, work on class work for this class, or work on papers for English classes. Other use of the computers is not allowed.
Wednesday, September 12, 2018
Wednesday, September 12, 2018
Today in class, we will:
- Review yesterday's lesson on binary
- Draft and submit at least two proposed test questions with answers. At least one of them must include creating an algorithm that uses iteration. The submitted answer must include an example algorithm and flowchart.
If time allows, we will reread the online text section discussing DDoS attacks and do a DDoS attack simulation in class.
Today's applicable Oklahoma curriculum standards:
(L1.AP.A.01 Use algorithms (e.g., sequencing, selection, iteration, recursion, etc.) to create a prototype to provide a possible solution for a common problem. )
(L2.NI.C.01 Compare and refine ways in which software developers protect devices and information from unauthorized access.)
- Review yesterday's lesson on binary
- Draft and submit at least two proposed test questions with answers. At least one of them must include creating an algorithm that uses iteration. The submitted answer must include an example algorithm and flowchart.
If time allows, we will reread the online text section discussing DDoS attacks and do a DDoS attack simulation in class.
Today's applicable Oklahoma curriculum standards:
(L1.AP.A.01 Use algorithms (e.g., sequencing, selection, iteration, recursion, etc.) to create a prototype to provide a possible solution for a common problem. )
(L2.NI.C.01 Compare and refine ways in which software developers protect devices and information from unauthorized access.)
Tuesday, September 11, 2018
Tuesday, September 11,208
Today in class, we will:
- Work in groups
- Discuss binary digits (bits) (2 mins)
- Watch a magic trick (8 mins)
- Discuss the magic trick and try to determine how it was done (5 mins)
- Discuss how the magic trick was done whether the magic trick will work if adapted (10 mins)
- Watch a visual demonstration of the concept of binary digits (9 mins)
- Brainstorm ideas in groups to ensure data correctness (10 mins)
- Discuss your groups' ideas with the class (5 mins)
Today's applicable Oklahoma curriculum standards:
(L2.NI.C.01 Compare and refine ways in which software developers protect devices and information from unauthorized access.)
(L1.NI.C.03 Recommend security measures to address various scenarios based on information security principles.)
Sunday, September 9, 2018
Monday, September 10, 2018
Today in class, we will:
- Discuss designing a more secure algorithm than Ceasar Cipher
- Read text sections on confidentiality in our online text
- Discuss the CIA triad (confidentiality, integrity, availability)
- Discuss Vigenere cipher and view an explanatory video
- Discuss Vigenere cipher and view an explanatory video
- Use a Vigenere cipher tool as group
Today's applicable Oklahoma curriculum standards:
(L1.AP.A.01 Use algorithms (e.g., sequencing, selection, iteration, recursion, etc.) to create a prototype to provide a possible solution for a common problem. )
(L2.NI.C.01 Compare and refine ways in which software developers protect devices and information from unauthorized access.)
(L1.AP.A.01 Use algorithms (e.g., sequencing, selection, iteration, recursion, etc.) to create a prototype to provide a possible solution for a common problem. )
(L2.NI.C.01 Compare and refine ways in which software developers protect devices and information from unauthorized access.)
Friday, September 7, 2018
Friday, September 7, 2018
Today in class:
-- We will study vocabulary on Quizlet for the first ten minutes of class.
-- Then we will take the the vocabulary test.
-- Then we will discuss yesterday's assignment on decoding.
-- Then we will discuss your submitted flowcharts.
-- Then we will move to the lab for flowchart product demonstrations.
-- We will study vocabulary on Quizlet for the first ten minutes of class.
-- Then we will take the the vocabulary test.
-- Then we will discuss yesterday's assignment on decoding.
-- Then we will discuss your submitted flowcharts.
-- Then we will move to the lab for flowchart product demonstrations.
Wednesday, September 5, 2018
Thursday, September 6, 2018
Today in class:
-- Please sit with your groups and do the "Encoding Exercise" at the end of the Encryption section in our online text. (10 minutes)
-- Then please decode the following. (YOU MAY NOT USE AN APP OR ONLINE TOOL, ONLY YOUR OWN INTELLECTUAL ABILITIES. :-) ) This is a competition and the first group to email me the correct decoded messages and key for deciphering the code for all five will win a prize! (20 minutes maximum)
1. PGGTFU CZ POF
2. DRO YPPCOD SC DOX
3. JC IJ TJP CVQZ YDNXJQZMZY HT NZXMZO
4. LUJYFWAPVU PZ MBU
5. MVKZGXBQWV QA ABQTT NCV
-- Please sit with your groups and do the "Encoding Exercise" at the end of the Encryption section in our online text. (10 minutes)
-- Then please decode the following. (YOU MAY NOT USE AN APP OR ONLINE TOOL, ONLY YOUR OWN INTELLECTUAL ABILITIES. :-) ) This is a competition and the first group to email me the correct decoded messages and key for deciphering the code for all five will win a prize! (20 minutes maximum)
1. PGGTFU CZ POF
2. DRO YPPCOD SC DOX
3. JC IJ TJP CVQZ YDNXJQZMZY HT NZXMZO
4. LUJYFWAPVU PZ MBU
5. MVKZGXBQWV QA ABQTT NCV
-- Next, working in your groups, write a paragraph response to, “Consider designing a more sophisticated algorithm that would be more secure than the Caesar cipher. What sequence of steps could you perform to securely encode your message that would make it harder for an ‘Eve’ to crack your code?” Then email it to me before the end of class. (15 minutes maximum)
-- Then please read the TOPIC: Cybersecurity section in our online text, paying special attention to the CIA triangle (confidentiality, integrity, availability). Please read through the end of the section on Social Engineering. (Do not do the exercise at the end of this section.) If you do not finish reading in class, please finish reading this tonight as homework.
***Please be sure to include all your group members' names on all you submitted work.
***Please remember we have a vocabulary test tomorrow. If you have additional time in class, after completing today's assignments, you may study for the vocabulary test.
Wednesday, September 5, 2018
Today in class:
Please work in your assigned groups. Please manage your time wisely. From the beginning of class, you have 15 minutes to review the text, example flowchart ("Hey Jude"), and link for flowchart symbols and meanings, and project instructions and brainstorm to choose your topic for your flowchart. For the next 15 minutes, work with your groups to complete your flowcharts. For the next 10 minutes, exchange your flowchart with another group and provide written feedback, noting both strengths, weaknesses, and suggested improvements. *Your group will be graded not only on your flowchart, but also on the feedback you provide the other group, so please be sure to put all group member names on your project as well as the feedback you provide the other group. For the last 10 minutes of class, we will read our text "CODING SKILLS: Encryption."
This means second hour will exchange projects for review at 9:24 a.m. and sixth hour will exchange projects for review at 1:46 p.m.
Please thoroughly review the instructions below before beginning.
Review the text on flow patterns and flow charts. Discuss the example flowchart illustrating how to sing "Hey Jude" and how it could be better. It is flawed. Then, as a group, create a flowchart illustrating a process, such as making a great peanut butter and jelly sandwich. (Use the explanation of common flowchart symbols and meanings found at https://en.wikipedia.org/wiki/Flowchart#Building_blocks to choose your symbols.)
Each flowchart must meet the following requirements:
-- Must have a least six steps. May have more.
-- Must use sequencing, selection, and iteration. Must use either a definite loop or an indefinite loop. Sequencing, selection, iteration, and definite or indefinite loop must be labeled within the chart.
-- You may bring examples to illustrate your flowchart on Friday. Some suggestions during sixth hour yesterday were how to bake brownies, how to make pizza, getting ready for school, and how to apply makeup. Enjoy!
Your flowcharts and feedback to the other group are due by the end of the hour.
Please work in your assigned groups. Please manage your time wisely. From the beginning of class, you have 15 minutes to review the text, example flowchart ("Hey Jude"), and link for flowchart symbols and meanings, and project instructions and brainstorm to choose your topic for your flowchart. For the next 15 minutes, work with your groups to complete your flowcharts. For the next 10 minutes, exchange your flowchart with another group and provide written feedback, noting both strengths, weaknesses, and suggested improvements. *Your group will be graded not only on your flowchart, but also on the feedback you provide the other group, so please be sure to put all group member names on your project as well as the feedback you provide the other group. For the last 10 minutes of class, we will read our text "CODING SKILLS: Encryption."
This means second hour will exchange projects for review at 9:24 a.m. and sixth hour will exchange projects for review at 1:46 p.m.
Please thoroughly review the instructions below before beginning.
Review the text on flow patterns and flow charts. Discuss the example flowchart illustrating how to sing "Hey Jude" and how it could be better. It is flawed. Then, as a group, create a flowchart illustrating a process, such as making a great peanut butter and jelly sandwich. (Use the explanation of common flowchart symbols and meanings found at https://en.wikipedia.org/wiki/Flowchart#Building_blocks to choose your symbols.)
Each flowchart must meet the following requirements:
-- Must have a least six steps. May have more.
-- Must use sequencing, selection, and iteration. Must use either a definite loop or an indefinite loop. Sequencing, selection, iteration, and definite or indefinite loop must be labeled within the chart.
-- You may bring examples to illustrate your flowchart on Friday. Some suggestions during sixth hour yesterday were how to bake brownies, how to make pizza, getting ready for school, and how to apply makeup. Enjoy!
Your flowcharts and feedback to the other group are due by the end of the hour.
Tuesday, September 4, 2018
Today in class:
-- We studied vocabulary set two on Quizlet and took the accompanying test.
-- We studied vocabulary three on Quizlet.
-- We read the section on Flow Patterns in our online text and discussed flowcharts.
-- Reading the section on Algorithms was assigned as homework.
-- Sixth hour brainstormed ideas for process flowcharts. Second hour will do this Wednesday, and both classes will complete the flowchart project.
-- We studied vocabulary set two on Quizlet and took the accompanying test.
-- We studied vocabulary three on Quizlet.
-- We read the section on Flow Patterns in our online text and discussed flowcharts.
-- Reading the section on Algorithms was assigned as homework.
-- Sixth hour brainstormed ideas for process flowcharts. Second hour will do this Wednesday, and both classes will complete the flowchart project.
Subscribe to:
Posts (Atom)
Semester Test Study Links
In case you didn't write down the links given in class for studying for the semester test, they are listed below: Unit 4 Test - www.te...
-
On today's class agenda: - Study Processing Unit 4 Study Guide first 15 minutes of class - Review with students for missing assignmen...
-
In case you didn't write down the links given in class for studying for the semester test, they are listed below: Unit 4 Test - www.te...
-
On today's class agenda: - Review Unit 4 Study Guide first 15 minutes of class - collaborative study - Unit 4 Practice Test 2 (addit...