Musings in STEM Education
  • Home
  • Research Spring 2017
    • Research Paperwork and Resources
    • Reading
  • Foundations Spring 2017
    • Nested Loop Challenge
    • Random Challenges
    • String and List Challenges
    • Mock Create PT Challenges
  • Research Fall 16
  • Foundations 2016
  • Algebra II Spr 16
  • Research Spr 16
  • Found of Engineering and Tech
  • Differentiation Strategies
    • Artifacts
    • Class Standards
    • Reflections
  • Research Fall 2015
  • VTB ICM
  • FOET Student Blogs
    • Marcos P.
    • Vinny P.
    • Rebecca S.
    • Jerome S.
    • Andrew S.
    • Zach Y.
    • Daniel Z.
    • Shayan B.
    • Mariah B.
    • Eddie C.
    • Eli H.
    • Ben Ha.
    • Ben Ho.
    • Nick H.
    • Raymond J.
    • Andrew K.
    • Andrew M.
    • Sejal P.
    • Abhi P.
    • Adam P.
    • Erica R.
    • Avni S.
    • Ethan S.
    • Stephen S.
    • Alex T.
    • Hanna W.
  • STEM Workshop Research Notebook Blogs
    • Research Notebook User 1
    • Research Notebook User 2
    • Research Notebook User 3
    • Research Notebook User 4
    • Research Notebook User 5
    • Research Notebook User 6
    • Research Notebook User 7
    • Research Notebook User 8
    • Research Notebook User 9
    • Research Notebook User 10
    • Research Notebook User 11
    • Research Notebook User 12
    • Research Notebooks User 13
    • Research Notebook User 14
    • Research Notebook User 15
    • Research Notebook User 16
    • Research Notebook User 17
    • Research Notebook User 18
    • Research Notebook User 19
    • Research Notebook User 20
  • WHS Girls' Lax
  • FOET Spr15
  • Research Spr15
  • IDD Spr15
  • Research
  • Intro to Drafting and Design
  • Architectural Drawing and Design I
  • Student Blogs
    • Kevin
    • Forrest
    • Sarfarez
    • Thomas
    • Rachel
    • Parth
    • Dani
    • Derek
    • Virinchi
    • Anusha
    • Alex
    • Melam
    • Jeet
    • Pranav
    • Tarun
    • Jeffery
    • Assata
    • Justin
    • Kristin
    • Mary
    • Udo
    • Praveen
    • Carter
    • Clay
    • Adie
    • Christian
    • Luke
    • Colin
  • About
  • Untitled

Foundations spring 2017

Wed - Fri (3/1 - 3/3)

2/28/2017

0 Comments

 
Wed and Thu: 2 day partner Mock Explore PT.

You and your partner will explore one of the following computing innovations:
1. RFID 2. SRAM flash memory 3. digital speech recognition 4. magnetic stripes (as in Metrocards)

Following the directions on the right sidebar of the blog, you will create a mock Explore PT. You and your partner will submit two files to Google Classroom before school on Friday. These two files are the computing artifact and a pdf of the responses 2a - 2e. 
Naming convention: Lastname1Lastname2Artifact and Lastname1Lastname2Responses.pdf

On Friday, you will self-grade on the rubric, then peer-grade with another team, and finally we will quickly look through all of them as a class.

Next week, you will start your individual Explore PT with most of the class time devoted to the performance task. During this time, you will need to work quietly, without input from others or from me. You might want to bring headphones. You will also update your progress in your AN each day.
0 Comments

week of 2/27 - 3/3/2017

2/27/2017

0 Comments

 
Monday: Preview Kahoot, albert.io, data and information vocab in your AN

Tuesday Ticket out the Door: your computing innovation for the Explore PT - how is data used (input, process and/or, output)

​How can we model computing in terms of input, process, output, and data?  How do you think feedback could be part of this model?

What is Big Data and How Does it Work?
Link 1                     Link 2                   How Stuff Works Video            Link 3

What is the Cloud and How Does it Work?

Tuesday:
In your Abstraction Notebook:
1. Define:  Data, Big Data, Text Compression, Analytics
2. Define Digital Data
3. Define Audio Data
4. Define Video Data
Using the ppt below:
5. Define input, process and output
6. List several examples of input and output devices
7. What is the relationship between data, processing and instructions?
8. Think of one everyday computing example that you see or experience.  Describe it in terms of input, process and output. 


Resources:
What is Data Mining?

How Does Walmart Use Data?
How Does Google Use Data from Social Media?
How Does Google Search Work?

computersystems-120427153532-phpapp02.pptx
File Size: 9241 kb
File Type: pptx
Download File

0 Comments

Thursday Feb 16

2/15/2017

0 Comments

 
Cybersecurity Assignment: Due in Google Classroom end of Class Thursday
Partners and Topics:
Malware and Mobile Malware: Vibhav, Jared
Phishing/Reconnaissance: Joel, John
DDoS/DoS Attacks: Hannah, Navya
SQLinjection: Tony, Surina
Malvertising: Zach, Rohit
Password Attack/Third Party Attack: Lucy, Risha
Code Backdoor: Patrick, Tahj
Internet of Things Vulnerability:  Reaux, Elizabeth
Infrastructure (power grid, communications, etc.) Vulnerability: Jack, Weston
Cloud Storage Vulnerability: Chase, Mateen, Aryan

Overview of Required Slides and Information (Minimum):
  1. One-slide overview of cybersecurity incidents of 2016
  2. One-slide overview of cybersecurity concerns for the future
For your specific assignment (if you have a vulnerability, replace attack with vulnerability):
  1. Locate, analyze and record the definition and examples of each of the types of attack.
  2. Locate an example of the specific type of attack.
  3. Catalog as much possible the impact of the attack on the business, economy, culture and/or society.
  4. Determine measures recommended to combat such attacks and where within the hierarchy of the network or internet such protection is recommended to be executed.
  5. Provide a clear, complete reference page for all resources used during the project.  
  6. Prepare a presentation of your findings. Each of the above should be a minimum of 1 slide.
0 Comments

wed Feb 15

2/15/2017

0 Comments

 
Picture
0 Comments

explore pt

2/14/2017

0 Comments

 
Questions to ask yourself as you start your Explore PT:
1. In what way is your computing innovation an innovation (i.e., in what way did it substantially change the behavior of a population?)
2. How can you describe that population's behavior before and after your innovation?
3. Is there an economic impact?  social? cultural?
4. How does your innovation use data?  as input (consume)? as output (produce?) as process (transform?)
5. What is a security, privacy, and/or storage concern?
6. Which sources help you to understand and share the answers to the above?
7. What are the most important pieces of information you want your artifact to convey?

Flow Chart App

​

Picture
0 Comments

Survey link

2/13/2017

0 Comments

 
Click here to take this survey today.
0 Comments

week of Feb 13-17

2/12/2017

0 Comments

 
Mon: Cybersecurity in class assignment
Tue: Intro to Explore, HTML Assignment, Cybersecurity notes and presentations
Wed: Media Center
Thu: HTML Assignment work day/due at end of class
Fri: Cybersecurity and Internet Protocol Quiz; Sphero Maze, Game and Python Choice Day
Explore Performance Task Intro: 
In addition to your Innovation Summary from last week, this week you will have a chance to go to the Media Center to learn how to use the various search engines, how to find new articles, and how to reference reputable sources. 
HTML Assignment:
1. Open the file below, intro-html-assignment.  Complete the worksheet and submit to Google classroom.
2.  Work through the Code Academy Tutorial.
3.  Complete HTML Project 1 per the instructions.  Use the HTML Resource and HTML Code links for extra resources.  You will need to go to the studrive, to Handouts/Maloney/Notepad++.  Either copy that folder to your stu number or run the application from the studrive location.  You can type your code in Notepad++ and then click on run to see it run in Google Chrome.  When you are finished, upload a copy of your code to Google classroom.  
Cybersecurity Assignment:
  1. One-slide overview of cybersecurity incidents of 2016
  2. One-slide overview of cybersecurity concerns for the future
For your specific assignment (if you have a vulnerability, replace attack with vulnerability):
  1. Locate, analyze and record the definition and examples of each of the types of attack.
  2. Locate an example of the specific type of attack.
  3. Catalog as much possible the impact of the attack on the business, economy, culture and/or society.
  4. Determine measures recommended to combat such attacks and where within the hierarchy of the network or internet such protection is recommended to be executed.
  5. Provide a clear, complete reference page for all resources used during the project.  
  6. Prepare a presentation of your findings. Each of the above should be a minimum of 1 slide.
Resources for this week:
magnet_foundations_referencing_and_retrieving_spring17.doc
File Size: 41 kb
File Type: doc
Download File

code.tutsplus.com/tutorials/http-headers-for-dummies--net-8039
IP Location
Online Visual Traceroute
How Stuff Works: information traveling on the internet
Network Tools
IP Address
​Layers and Models of the Internet
Real Time Cyberattacks
Resources for this week:
intro-html-assignment-1emfbch.doc
Download File
 
Code Academy Tutorial
HTML Project 1 Instructions
​
HTML Resource   
​Try HTML Code

For later: Using html code on your google site.
Modeling and Simulation Examples:
Solar System to Scale https://www.youtube.com/watch?v=zR3Igc3Rhfg
Navy Aviation Training Video https://www.youtube.com/watch?v=TeJmT7e0oLU
​Airforce Training Simulator Video https://www.youtube.com/watch?v=BIJv33ivCo0
0 Comments

Explore pt submission requirements

2/12/2017

0 Comments

 
Submission requirements are below. Files should be named in the following way: Name-ExplorePT-Artifact and Name-ExplorePT-Responses
1. Computational Artifact: Submit a video, audio, or PDF file. Use computing tools and techniques to create one original computational artifact (a visualization, graphic, video, or audio recording). Acceptable multimedia file types include .mp3, .mp4, .wmv, .avi, .mov, .wav, .aif, or .pdf format. PDFs must not exceed 3 pages in length. Video or audio files must not exceed 1 minute in length and must not exceed 30MB in size.
2. Written Responses: Submit one PDF document in which you respond directly to each prompt. Clearly label your responses
2a – 2e in order. ​
0 Comments

intro to cybersecurity

2/8/2017

0 Comments

 
Take this survey first

Day 1: Thursday, Feb 9

What is it, and why do we need it?
Explore cryptography.
Enigma Machine    What was it's flaw?
The Moral Dilemma
Assignment:  Find an article from WWII to today about military cryptography issues, methods, concerns and/or programs. Use the Impact Research Summary sheet to document and summarize your reading.  In the citation space, provide an APA Citation, along with a notation of reputability.  Due Monday at the beginning of class.

Thursday TOTD: Using a Ceasar's Cypher, encrypt a message to any key of your choice on an index card.  On a second card, write it's solution and key.  Make sure your name is on both index cards.
Day 2: Friday, February 10
How fast can you decode?
Modern Techniques: Alice and Bob and PKE
Explore Modern Cryptography
In your Abstraction Notebook, date and title the next available page as "Research Notes, Cybersecurity."
Using the resources above and below:
  1. Draw a diagram of Alice, Bob and Eve -- label each as to their analogy to enryption
  2. Explain what is mean by the "key" of an encryption algorithm
  3. Explain what a "back door" is and how/when used or exploited.
  4. Explain biometrics and provide two examples of use.
  5. Explain components of strong passwords; provide samples of weak, medium and strong passwords.
  6. Define the word "credentials" as related to computer security.
  7. Define and diagram HTTPS, public key, private key from the slide on the Carnegie Mellon video.
  8. Create a Venn Diagram comparing Worms/Virus & Trojan Horse.

More resources:
code.org videos

Cyber Safety Resources
0 Comments

week of feb 6-10

2/3/2017

0 Comments

 
Monday: Finish videos and reflect on your own process.
Tuesday: Use Feldman's Model to analyze an infographic. Expand on answers.
Wednesday: Day to improve infographic
Thursday: Intro to Cybersecurity
Friday: Coding and Cybersecurity

Resources:
Monday: Unintended Consequences
​Click here for a link to amazing data visualization that we will use during class on Tuesday.
What is the Internet Doing for Emerging Countries?
​Creative Routines
​The Graphic Continuum
​
​
feldmans_model.pptx
File Size: 227 kb
File Type: pptx
Download File

0 Comments
    Python Reference
    python_quick_reference_sheet.pdf
    File Size: 147 kb
    File Type: pdf
    Download File

    Create PT
    creatept_2016_overview__1_.pdf
    File Size: 153 kb
    File Type: pdf
    Download File

    create-sample-tasks-rubric.pdf
    File Size: 75 kb
    File Type: pdf
    Download File

    create-sample-tasks-rubric.pdf
    File Size: 75 kb
    File Type: pdf
    Download File

    computer-science-principles-digital-portfolio-student-guide.pdf
    File Size: 1332 kb
    File Type: pdf
    Download File

    Explore PT Resources
    Student Samples 
    Explore PT Overview   
    Overview (Nov. 2016)

    Explore PT Rubric
    Explore PT Q & A 

    Author

    Dr. Kate Maloney has been teaching at Wheeler since 2011, following a career as faculty at Georgia Tech, technical writing and as a small engineering business owner. She is happy to be sharing these days with Wheeler students and believes that teaching students to think critically and creatively is paramount.

    Archives

    May 2017
    April 2017
    March 2017
    February 2017
    January 2017

    Categories

    All

    RSS Feed

Proudly powered by Weebly