5.1 Reflcetion

  1. Come up with three of your own Beneficial and corresponding Harmful Effects of Computing? Navigation Systems
    • Allows people to find places with convienience and without paper maps
    • Incorrect Programing could help you get lost which would waste time and leave you for a problem to solve
    • In addition these navigational services can help you predict your eta and time it may take you to get form place to place.
  1. Talk about dopamine issues above. Real? Parent conspiracy? Anything that is impacting your personal study and success in High School?
    • Yes I think those issues of dopamine are real due to the fact that people can get addicted to something like video games or social media which prevent them from being active in todays society.

5.2 Reflection

  1. How does someone empower themself in a digital world?
    • In a digital world in order to be empowered it is all about knowledge, in order to get knowlege you should seek to educate yourself and make sure that everything you do is growing your mind and challenging you which will eventually empower you.
  2. How does someone that is empowered help someone that is not empowered? Describe something you could do at Del Norte HS.
    • You could help somebody that nots empowered by giving them guidence and showing them that there is a way, at del norte we have many clubs and buddy systems which can help people guide one another to being empowered.
  3. Is paper or red tape blocking digital empowerment? Are there such barriers at Del Norte? Elsewhere?
    • Yes a way that can block digital acknowlegement is the ability in digital rescources which can make other left behind leaving the world to create a divide. For example in third world countries where technology isn’t the best and most people cant afford it most liokely they wont be educated restriciting empowerment.

5.3 Reflection

  1. Write summary/thoughts/conclusions from each of the exercises above. Focus on avoiding Bias in algorithms or code you write.’
    • Bias in a computer program comes when a program has acsess to the rest of your apps allowing them to show you things you may agree with. However this creates a bias becuase it allows them to manipulate your feed in order for you to view things about a certain topic shaping your opinion and views. This is important because biased can be formed with programs rather than a rational thought out idea. I dont think this should be done by social media and other apps becuase they should just be used for content and nothing else.

5.4 Reflection

  1. CompSci has 150 ish principles students. Describe a crowdsource idea and how you might initiate it in our environment?
    • A crowdsource idea for APCSP would be a collaboritive chatting site on the class fastpages where we talk about the class and give tips for upcoming students and reflect on assignments. This will allow to give helpful information, and different perspectives.
  2. What about Del Norte crowdsourcing? Could your project be better with crowdsourcing?
    • An idea for crowdsourcing in del norte is to make a chatting service for all del norte students through a myplan discussion bard which allows to give information about different classes which can lead to new conversations and more club opportunites and connections throughout school. For my project is could be better with croud sourcing as we could use data to make charts and add reviews for diffent houses throughout our site
  3. What kind of data could you capture at N@tM to make evening interesting? Perhaps use this data to impress Teachers during finals week.
    • For our project we could take data about the different houses on our websites which can give us more data to help improve layouts and allow for better user experience. In addition we can add a chatting forum where we talk about houses on our site and the persons experience.

5.5 Reflection

  1. When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in your personal blog.
    • When you make a github repo it asks for specofic types of licenses that have relation to your code and how acsessible you want it. Some of the licenses are a community license such as an apache which allows for your repository to be acsessible to the public. In additon there is an mit license which also allows for acsessible use of your projects features.
  2. In your blog, summarize the discussions and personal analysis on Software Licenses/Options, Digital Rights, and other Legal and Ethical thoughts from this College Board topic.
    • In the coding world today programmers use code for many differnt situations and they also encouter different issues. When this happens many people use slackoverflow, and the github community for help where they can recieve help. However sometimes people also copy code which bring the idea of of licensing which can be used for people who allow other to use their code, people who have some open source code, and others who demand for credit and limit their open source code on their projects.
  3. Make a license for your personal (blog) and Team repositories for the CPT project. Be sure to have a license for both Team GitHub repositories (frontend/backend). Document license(s) you picked and why. FYI, frontend, since it is built on GitHub pages may come with a license and restrictions. Document in blog how team made license choice and process of update.
  • For our team we have decided to make an MIT license for both our front end and backend sites, we decided this would be the best Idea as we dont mind open sourcing our code as we are students so other peers could see our code giving us feedback or allowing us to help them as well. In addition I based this principle for my sites also implementing an MIT license
  • Licence for my PAGE
  • Licence for Team PAGE

5.6 Reflection

  1. Describe PII you have seen on project in CompSci Principles.
    • Project I have seen on APCSP is when people use logins in order to create accounts for a database.
  2. What are your feelings about PII and your personal exposure?
    • In some sense knowing more about pll can make it seem a bit scary however if you think from a consumer standpoint the developers are just trying to make your interaction feel more personal in order to keep you on their site for longer.
  3. Describe good and bad passwords? What is another step that is used to assist in authentication.
    • A good password that uses letters numbers and special symbols in addition it should be at least 9 characters long ensuring your online safety.
  4. Try to describe Symmetric and Asymmetric encryption.
    • symetric encryption is the use of one key to get public data and asymetric is the use of getting 2 keys one public and the other as private.
  5. Provide an example of encryption we used in AWS deployment.
    • An example is when you make an instance and use a certain key.
  6. Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
    • A phising scheme I have learned is peopel on social media send you a link with fake information and you log in which leaves your account hacked, also there are text messages phone calls.