Big Idea 5.3

As programmers, you now have the possibility of creating algorithms. It has been said, “Humans are error-prone and biased”. So, does that mean algorithms and the computers they run on are better?

Algorithms and computers are not neccesarily better or worse than humans. They can process large amounts of data quickly and accurately. However,algorithms can also reflect the biases and errors present in the data they are trained on and the humans who created them.

Google “What age groups use Facebook” vs “… TikTok”? What does the data say? Is there purposeful exclusion in these platforms? Is it harmful? Should it be corrected? Is it good business?

An older age group uses Facebook while a younger age group uses tik tok. I think this is some wha purposeful to the colors used on the platforms and the fact that the look of tik tok is much more appealing to a younger audience. I dont think this is neccessarily harmful becasue nobody is restricted from using the platforms.

Why do virtual assistants have female voices? Amazon, Alexa Google, Apple Siri. Was this purposeful? Is it harmful? Should it be corrected? Is it good business?

Virtual assisstants likely have female voices becasue they are more soothing, therefore, i think this is purposeful. A female voive also represents a mother like figure

Talk about an algorithm that influences your decisions, think about these companies (ie FAANG - Facebook, Amazon, Apple,Netflix, Google)

Algotrithms work off the things you intereact with and recommends you media that is related that the computer thinks you will also enjoy

Video: In the video the computer only recognizes the white person becasue when training the computer most of the test subjects were likely white. Additionally, the lighting in the room likely made it harder for the computer to capture the facial features of the black person. This could be harmful as people of color will probably feel left out. This could be fixed by giving the computer further training with people of color used as test subjects.

Big Idea 5.4

Discuss APIs you have used:

During the first trimester my group used a marvel api to get data about all marvel characters in the marel database. We used this to make a marvel searchbar that the user could use to learn about whtaever marvel character they wanted.

What is the biggest discovery you have found in GitHub?

The biggest discovery I have found on Github are many different features that help with our learning in this class. Such as the baility to make issues to track our progress and the insights feature to see how much work we have been doing.

CompSci has 150 ish principles students. Describe a crowdsource idea and how you might initiate it in our environment?

A possible crowdsource idea is to make some sort of coding challenege and students could submit there response to the challenges. At the end the responses of all the students could be shared for others to look at to furhter there learning

What about Del Norte crowdsourcing? Could your project be better with crowdsourcing?

Our project could be better wuth crowdsourcing as we can ask for feedback from many Del Norte students n how we could imporve our project. They could also help us come up with ideas

What kind of data could you capture at N@tM to make evening interesting? Perhaps use this data to impress Teachers during finals week.

Data that we could capture at N@tM is getting feedback from the guests and noting down any recommendations. We can use this data to make the following N@tM more interesting for the guests

Big Idea 5.5

When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in your personal blog.

Some of the mlicense types are the MIT License, Apache License 2.0, and GPL v3. The MIT License is one of the most permissive licenses, allowing anyone to use, modify, and distribute your code as long as they provide attribution and include a copy of the license. The Apache License 2.0 is similar, but also requires users to provide a notice that they are using your code and provide any changes they make back to the community. The GPL v3 license is more restrictive, requiring that any modifications made to the code must also be distributed under the GPL v3 license.

In your blog, summarize the discussions and personal analysis on Software Licenses/Options, Digital Rights, and other Legal and Ethical thoughts from this College Board topic.

It is important to be aware of issues such as copyright and intellectual property. The license you choose can have an impact on these rights, so it’s important to understand the implications before making a decision.

Big Idea 5.6

Describe PII you have seen on project in CompSci Principles.

I have seen PII on my computer science project in the fomr I am making for my quiz where the user inputs the score they recieved on the quiz. It will also be seen on our log in/sign up page if we end up making one since the user will be inputting their emial most likely.

What are your feelings about PII and your personal exposure?

I understand the importance of collecting and using this information for various purposes. But I am aware of the potential risks associated with PII, such as identity theft and privacy violations.

Describe good and bad passwords? What is another step that is used to assist in authentication.

A good password should be long, contain a mix of letters, numbers, and special characters. A bad password is one that is easily guessable. Another step that can be used to assist in authentication is two-factor authentication

Try to describe Symmetric and Asymmetric encryption.

Symmetric encryption and asymmetric encryption are two different types of encryption algorithms. Symmetric encryption uses the same key to both encrypt and decrypt data, making it faster and more efficient. Asymmetric encryption, also known as public key cryptography, uses two different keys for encryption and decryption, making it more secure but slower.

Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.

Some phishing techniques are ads that promote the user to click a link ot a website that wants you to input information that the website will steal and try to scam you. Fortunately I have not fallen for one of these scams but I have been close to when I was younger and saw an ad that proposed a free amazon giftcard.