5.1

Come up with three of your own Beneficial and corresponding Harmful Effects of Computing

Three benefits and corresponding harms of computing are:

  • Increasing efficancy at the expense of human jobs since people will probably lose their jobs to AI and computers
  • Access to more information at the expense of some people not having access to this information
  • Allowing for communication at the expense of dividing the world since not all people will have access to this communication the digital divide whould just be enhanced

Talk about dopamine issues above. Real? Parent conspiracy? Anything that is impacting your personal study and success in High School?

Many people especially high schoolers have dopamine issues and it’s something many of them have expirienced including me. The issue I have is the lack of motivation especially when it comes to school work. Something that I’m doing to fix this is by giving myself rewards for completing tasks with a break. And that allows me to decrease the impact of my dopamine issues.

5.2

How does someone empower themself in a digital world?

As technology beocmes more prevalent in society things such as fake news, getting hacked, or phished become more common and the best way to combat that is through being informed. Things such as checking muliple sites for news and being suspicious of random links people tell you to follow can prevent such events having a negative impact on one’s digital life. And having a safe and healthy place digitally can help someone empower themselves in the digital world.

How does someone that is empowered help someone that is not empowered? Describe something you could do at Del Norte HS.

Empowered people should help those who are not empowered by supporting them thorugh their goals and helping them progress. This allows for the creation of a healthy and supportive environment similar to the one they made themselves when they weren’t empowered. Something that can be done in Del Norte is by providing mentorship through clubs such as Peer Counselling or Link Crew which are aimed to help those in need.

Is paper or red tape blocking digital empowerment? Are there such barriers at Del Norte? Elsewhere?

Paper and red tape limit digital empowerment since they slow down decision making it inefficienct to do things. However it’s important to have necessary regulations in a digital environment to keep people protected. Digital safety is one of the most important things in the digital world and the only way to ensure privacy and security of information is by limiting paper or red tape.

5.3

Write summary/thoughts/conclusions from each of the exercises above. Focus on avoiding Bias in algorithms or code you write.

This section focused on how there can be a bias in computing especially if somehting such as AI is being used. The example shown was the HP computer video where the person stated that HP computers are racist. There are probably many reasons behind why the computer software didn’t work but I believe it’s because they didn’t test the AI with people who have a different skin color making it not work once the product was launched. And such bias can be really harmful for a coumpany since it limits the number of customers they get and decreases user satisfaction.

5.4

CompSci has 150-ish principles students. Describe a crowdsource idea and how you might initiate it in our environment?

A crowdsource idea is an online forum where CSP students can communicate with other CSP students in other schools. How it would work is that students can post something (like code that isn’t working) and other students can reply with ideas to either improve or fix the other student’s code. This will allow for a creation of a healthy environment that will allow students to collaborate with each other across the nation and show what other classes are doing in their CSP. A Del Norte specific version could be done on slack with students utilizing the different channels to communicate their thoughts and difficulties.

What about Del Norte crowdsourcing? Could your project be better with crowdsourcing?

Crowdsourcing for Del Norte as a school can be done on social media since it’s common for students to have it. Accounts such as dnhsasb can be used to spread polls and forms to get input and ideas from the students from our school. And our project can be better with crowdsourcing since it would allow us to know more about what the user wants from our website. Which would lead to a more innovated design for our site.

What kind of data could you capture at N@tM to make evening interesting? Perhaps use this data to impress Teachers during finals week.

Something we can capture at N@tM is user satisfaction with our services or how much our service actually helped them. This is similar to what my team did last trimester where we had a review portion for our project where people could give us a 1-5 rating on questions we ask about their experience. And this data can help us to improve or change our features so that it’s more beneficial to those who need our service.

5.5

When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in your personal blog.

One License typw that can be seen on GitHub is the MIT License which is an open-source license that allows others to use, modify, and distribute code as long as they provide attribution. Another one is the GPL License which is also an open-source license that requires others to release the source code of their derivative works if they distribute the code.

In your blog, summarize the discussions and personal analysis on Software Licenses/Options, Digital Rights, and other Legal and Ethical thoughts from this College Board topic.

They talk about things such as licenses and how sometimes they are needed and as for legal and ethical thoughts are often about ethical considerations associated with the use and distribution of software and digital content, such as privacy, security, and intellectual property rights.

5.6

Describe PII you have seen on project in CompSci Principles.

PIIs that are mostly used in CSP are things such as names and emails since we use them to sign up into our Github accounts and Slack. And we don’t have to worry about thhings like our SSN or finantial passwords leaking since there isn’t anything that involves such transactions.

What are your feelings about PII and your personal exposure?

I would say that I have a constant exposure to PIIs since they are asked for everywhere whenever you want to sign-up for a website or whenever you go out to a store. And becasue of this I would say that I’m desensitized to putting in most of this information, and to some extent I also expect a pop-up which shows that we need to sign-in in order to use the service.

Describe good and bad passwords? What is another step that is used to assist in authentication.

Typically a good password is considered to be one which is eight or more characters long, has both upper and undercase letter, and has numbers and symbols. You can make your password Pa$$w0rd since all of the above critirion are met but not 12345678 since it only fits having 8 or more characters and having numbers. Most bad passwords are those which can easily be guessed such as birthdays or “password.” However if a person has a password like that they still have a chance to be secure. This is through two-factor-authentication which gives the person a notification on code that needs to be used in order to use the other device.

Try to describe Symmetric and Asymmetric encryption.

In Symmetric encryption the encryption and decryption key is the same while in Asymmetric encryption the encryption and decryption key are different and that allows for more security since it stops unauthorized people from gaining access.

Provide an example of encryption we used in AWS deployment.

In AWS an exaple of encryption we can see is SSH encrytion when we are making an instance and have to make an SSH client which gives an unique key that can be used by us.

Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.

A phishing scheme I have learned about is the one where there is an email sent out to users saying that they have a debt that they need to give their credit card information and this causes the hacker to gain access to the bank account of the person and use it to do malacious things.