Tuesday, May 31, 2016

May 31, 2016

Objective: Visualize and interpret data using histograms

Starting activity- Notebook
  • Categorical data is ....  (write a definition).  Give an example and a appropriate way to visualizing it.
  • Quantitative data is ....  (write a definition).  Give an example and a appropriate way to visualizing it.
Activities
  • Big data example: Yahoo Finance (S&P500, Ford)
  • Continue with 3.1.5: Histograms
  • #12: discuss as a class - transforming data before plotting 
  • #14b - is ages[200] the median?  Why or why not?  Why is the median age so high?
  • #16 is optional
  • #19 - Will grade in class.  Save As histogram_age_income.py to a new file histogram_age.py.  Modify this file to make the plots and calculations requested.  Call me over and show me your plots and your Python code when  ready.
  • #19 challenge: Show the mean and median on the graph. 
  • #21 - discuss as a class

Friday, May 27, 2016

May 27, 2016

Objective:  Use histograms to visualize and interpret large data sets

Activities
  • Review conclusions to 3.1.4 Pie Charts
  • Present or assign 3.1.5 Histograms.pptx and 3.1.5 DescribingDistributions.pptx.
  • Introduce Activity 3.1.5 and circulate while students complete Parts I, II and III.
  • Present 3.1.5 TransformingData and have students complete Parts IV and V of the activity.

May 25-26, 2016

Objective:  Visualize and interpret data with pie charts

Activities
  • Seniors take the end-of-course exam
  • Review conclusions to 3.1.1
  • Do 3.1.4 - Pie charts

Tuesday, May 24, 2016

May 24, 2016

Objective:  Extract patterns from Big Data

Activities
  • Key terms: heuristic algorithm, metadata, compression, sequencing, selection, interation
  • Seniors: Practice test B.   Answer form for practice test B
  • Finish 3.1.1


Monday, May 23, 2016

May 23, 2016

Objective: Analyze trends in Internet "big data"

Activities
  • Activity 3.1.1 - Time Series Analysis
  • Seniors: Review Jeopardy, Practice Test A

Friday, May 20, 2016

May 20, 2016

Objective: Analyze trends in Internet "big data"

Activities
  • Check Key Terms 2.1 in notebooks
  • Review Internet protocols: IP, TCP, HTTP, DNS
  • Quiz 2.1
  • Activity 3.1.1 - Time Series Analysis

Thursday, May 19, 2016

May 19, 2016

Objective: Evaluate the trade-offs between privacy, liberty, and law enforcement.

Starting activity:  Start on definitions for Lesson 2.1 Key Terms in your notebook. Include page titles - "Lesson 2.1 Key Terms". 

2.3.3 - Security and Liberty
  • Review of key concepts from 2.1 Internet Architecture
  • Download 2.3.3 Alternate, rename 2.3.3 name1_name2.docx, work through activities.
  • Answer the conclusion questions, save as a pdf, and submit for 2.3.3.
Homework due Friday:   Finish definitions for Lesson 2.1 Key Terms  in notebook. Include page titles - "Lesson 2.1 Key Terms". 

Friday: Quiz 2.1 on Internet Architecture

Wednesday, May 18, 2016

May 18, 2016

Objective: Evaluate the trade-offs between privacy, liberty, and law enforcement.

Starting activity:  Start on definitions for Lesson 2.1 Key Terms in your notebook. Include page titles - "Lesson 2.1 Key Terms". 

Old Business
  • Check PowerSchool and myPLTW for current grades and upcoming due dates
  • Key terms for 2.2 - still due as late work for 8/10.  Show me when done.  Important for final exam and end-of-course exam.
  • Take Quiz 2.2 if haven't
  • Review conclusions to 2.3.2 Security and Encryption
  • Notes: hierarchy and autonomy in organizations and networks
2.3.3 - Security and Liberty
  • Preview of 2.3.3 Security and Liberty
  • Download 2.3.3 Alternate, rename 2.3.3 name1_name2.docx, work through activities.
  • Answer the conclusion questions, save as a pdf, and submit for 2.3.3.
Homework due Friday:   Finish definitions for Lesson 2.1 Key Terms  in notebook. Include page titles - "Lesson 2.1 Key Terms". 

Friday: Quiz 2.1 on Internet Architecture

Tuesday, May 17, 2016

May 17, 2016

Objectives: Explain the role of encryption in cybersecurity. 

Activities
  • Check PowerSchool.  Check To Do and Coming Up on myPLTW Home. 
  • Take Quiz 2.2 if haven't
  • Key terms 2.2 - show me when done for later credit
  • Review Conclusions to 2.3.2 - Security by Encryption 
Homework:  Download Chapter 2 from Blown to Bits on your home computer. Read:
     1984 is Here, and We Like it:  PDF pp. 4-7
     Big Brother, Abroad and in the U.S.: PDF pp. 33-40


Sunday, May 15, 2016

May 16, 2016

Objective: Explain the role of encryption in cybersecurity.

Questions:
  • How are large prime numbers used to encrypt messages? 
  • Can this type of encryption be broken? 
  • How does the execution time of an algorithm depend on the size of the data set?  

Activities
  • Check PowerSchool.  Check To Do and Coming Up on myPLTW Home.
  • Finish 2.3.2 - Security by Encryption

Friday, May 13, 2016

May 13, 2016

Objective: Explain the role of encryption in cybersecurity.
Questions:
   How are large prime numbers used to encrypt messages? 
   Can this type of encryption be broken? 
   How does the execution time of an algorithm depend on the size of the data set?  

Activities
  • Check PowerSchool.  Check To Do and Coming Up on myPLTW Home.
  • Present career talk (2.2.5) or web programming project (2.2.4) if haven't
  • Notebook check if wasn't done yesterday
  • Quiz 2.2:  average of two attempts
  • Start 2.3.2 - Security by Encryption
Monday - Substitute. You will work on a simulated hacking game called The Heist.

Wednesday, May 11, 2016

May 12, 2016

Objective: Learn techniques of good "cyber hygiene"

Activities
  • Do Conclusion Question 5 in 2.3.1 - Top 10 Email Scams
  • Check for notebook completion - key terms for 2.2 Web Programming
  • Present Web Programming project if haven't
  • Present 2.2.5 Career elevator talk if haven't
  • Finish 2.3.1 The Vulnerable User and submit
Friday - Quiz 2.2 on web programming

May 11, 2016

Essential Questions for Lesson 2.3: Cybersecurity
Q1 - What is the nature of attack and defense in cybersecurity?
Q2 - How can we protect ourselves, our privacy, and our assets when working on the Internet?
Q3 - How has the Internet affected society?

Activities
  • 2.3.1

Monday, May 9, 2016

May 10, 2016

Objective: Explore careers in computing

Activities
  • Presentations for web programming project
  • Start 2.2.5
Thu - Key terms for 2.2 due in notebook
Fri - Quiz 2.2

May 6, 2016

Objective: Use and agile development to improve a data-driven web application

Activities
  • Discuss conclusions to 2.2.2A - What language is PHP similar to?
  • Calendar
  • Work on 2.2.4 image artist project

May 9, 2016

Objective: Use and agile development to improve a data-driven web application

Activities
  • Discuss conclusions to 2.2.2A - What language is PHP similar to?
  • Calendar
  • Finish 2.2.4 image artist project
Thu - Key terms for 2.2 due in notebook
Fri - Quiz 2.2

Thursday, May 5, 2016

May 5, 2016

Objective: Use and agile development to improve a data-driven web application

Activities
  • Review requirements for project plan and project grading
  • Work on 2.2.4 - Image artist project

Tuesday, May 3, 2016

May 4, 2016

Objective: Create a data-driven web application using a SCRUM development process

Check PowerSchool & Gradebook in myPLTW
Reminder on grading policy
Mastery assignments - be sure to complete and show me.  Will take late.
     2.1.5 Send me a secure message
     2.2.2A Checkerboard and Calculator



due May 11
  • Lesson 2.2 key terms - with definitions in notebook
  • Quiz 2.2

Monday, May 2, 2016

May 2, 2016

Objective: Create a web-based database application

Activities
  • New teams - professional introductions
  • Demo 2.2.2 application - image artist gallery
  • Code walk through for 2.2.2
  • Requirements for 2.2.4 - web-based database project
  • Product concept for your database project
  •      Team brainstorm on project concept
  •      Create Google Doc for project concept, 
  •          share with all team members and me (coupland@aaps.k12.mi.us)
  •      Fill in product name, development, team, due date, concept
  •      Start sketches of important pages on paper
  •      Start product backlog in Google Doc