View on GitHub

curly-spatula

the curliest spatula in the cupboard

<!DOCTYPE html>

Welcome to Sreeja's Individual Github Page!
Home TPT Create Task Code

Proctored MCQ Week3 : Quiz5 Corrections

Quiz5 Score: 38/50

Quiz5 Test Corrections: 12 Questions

Proctored MCQ Week2 : Quiz3 Corrections

Quiz3 Score: 28/50

Quiz3 Test Corrections: 22 Questions

* Question: 35

  • Original Answer: C
  • Correct Answer: D
  • Why I Got It Wrong: The user’s download history can be used to recommend similar artists based on aggregated data from many users.

Proctored MCQ Week1 : Quiz1, Quiz2 Test Corrections

Quiz1 Score: 37/50

Quiz1 Test Corrections: 13 Questions

* Question: 42

  • Original Answer: A
  • Correct Answer: D
  • Why I Got It Wrong: I need to study the binary system and the values of the binary number system more thoroughly.

* Question: 45

  • Original Answer: A
  • Correct Answer: C
  • Why I Got It Wrong: This question can be answered by filtering the data for the date and the sports category. The cost of a given product is not tracked by the described search engine.

* Question: 47

  • Original Answer: A D
  • Correct Answer: A C
  • Why I Got It Wrong: If devices E and F were to fail, devices A and C can still communicate. One possible path is A-D-C.

* Question: 48

  • Original Answer: B
  • Correct Answer: A
  • Why I Got It Wrong: Removing three connections could prevent devices A and F from communicating, but it can also be done by removing only two connections.

Quiz2 Score: 35/50

Quiz2 Test Corrections: 15 Questions

* Question: 2

  • Original Answer: A
  • Correct Answer: B
  • Why I Got It Wrong: While linking a social media account to a phone number may improve the security of the site, it does not improve access to devices and the Internet.

* Question: 7

  • Original Answer: A
  • Correct Answer: B
  • Why I Got It Wrong: The ability to keep data secure is not a primary function of a compression algorithm.

* Question: 9

  • Original Answer: B
  • Correct Answer: A
  • Why I Got It Wrong: If the same formula can be applied to every data element, then the computations can be done in parallel on multiple processors.

* Question: 12

  • Original Answer: C
  • Correct Answer: D
  • Why I Got It Wrong: Compressing a user’s pictures only affects data on the user’s device. It does not rely on information contributed by a large number of users.

* Question: 14

  • Original Answer: A
  • Correct Answer: D
  • Why I Got It Wrong: The two line graphs are roughly the same shape, indicating that the average amount of data stored per user remained about the same across all eight years.

* Question: 18

  • Original Answer: C
  • Correct Answer: D
  • Why I Got It Wrong: After initializing result to 2, the code segment multiplies result by 5 a total of three times rather than multiplying result by 3 a total of five times. This yields the result 2(53).

* Question: 19

  • Original Answer: D
  • Correct Answer: C
  • Why I Got It Wrong: When x is not negative, y is assigned the value false and the display statement is never executed.

* Question: 24

  • Original Answer: A
  • Correct Answer: C
  • Why I Got It Wrong: Redundancy on the Internet allows packets to be transmitted along multiple paths, but does not reduce the number of packets needed to transmit a particular message.

* Question: 30

  • Original Answer: A`
  • Correct Answer: C`
  • Why I Got It Wrong: The decimal equivalent of this triplet is (37, 0, 130).`

* Question: 31

  • Original Answer: D
  • Correct Answer: A
  • Why I Got It Wrong: The binary RGB triplet for vivid yellow is (11111111, 11111111, 00001110).

* Question: 34

  • Original Answer: B
  • Correct Answer: A
  • Why I Got It Wrong: This expression will not count books that have exactly one copy in stock because it uses the expression (1 < num) instead of (1 ≤ num).

* Question: 35

  • Original Answer: D
  • Correct Answer: C
  • Why I Got It Wrong: While fractions are sometimes represented by decimal approximations that are subject to rounding errors, integers are not.

* Question: 42

*Original Answer: A B

  • Correct Answer: B C
  • Why I Got It Wrong: Redundant routing provides fault tolerance, which enables a cloud storage site to continue to operate if some part of a network fails.

* Question: 43

  • Original Answer: B
  • Correct Answer: A
  • Why I Got It Wrong: The given code segment causes the robot to end in the lower-right corner of the grid, facing toward the top of the grid. This code segment causes the robot to rotate left before moving forward, causing the robot to follow a different path. The robot ends in the upper-right corner of the grid, facing toward the top of the grid.

* Question: 45

  • Original Answer: C
  • Correct Answer: A
  • Why I Got It Wrong: The desired information cannot be determined with these two spreadsheets because students with grade point averages of 3.5 or less cannot be identified.

TPT & Test Prep

5.5 Notes

5.5 Activity

  1. When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in GitHub pages.

    The tech-talk and the video covers some of the license types that are available to pick for the team/individual project. A license is a A unique string, typically non-guessable, that allows a user to activate the unique rights they have purchased for a given application or service and is often used interchangeably with Serial Number. In GitHub, it permits users to do anything with a given project as long as they credit the developer and don’t hold him or her liable for the project’s use.

  2. Make a license for your personal and Team project. Document license you picked and why.

    For our team project, we chose the creative commons license. This license is the best fit for our personal and team projects due to how it allows the creator to retain copyright whilst allowing others to copy and distribute and make use of their work non-commercially. The Creative Commons license also ensures creators get the recognition and credit for the work they produce and share.

Tri 3 Big Idea 5.6: Safe Computing

5.6 Notes

PII = Personal Identifiable Information

5.6 Activity

  1. Describe PII you have seen on project in CompSci Principles.

    In CSP, the CRUD that needs to be entered was an example of the PII stuff I have seen. Since we are entering information such as email and phone numbers, this is information that should be protected.

  2. What are your feelings about PII and your exposure?

    In the age of technology, it is important that individuals stay vigilant on what they post online. Whether it be comments on social media or actual posts, all of this information can be traced back to you.

  3. Describe good and bad passwords? What is another step that is used to assist in authentication.

    Good passwords are made up of a few key components including randomness, complexity and length. If your password is predictable, simple and or/short, chances are it is less secure. A combination of random letters, numbers and characters will be less likely to be hacked into.

  4. Try to describe Symmetric and Asymmetric encryption.

    Symmetric encryption uses the same key to encrypt and decrypt data making it very easy to use. Asymmetric encryption uses a public key to encrypt data and a private key to decrypt information.

  5. Provide and example of encryption we used in deployment.

    During deployment, something that we used was certbot. This was something that allowed us to ensure that out website was secure.

  6. Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.

    I don’t think there are an phishing schemes I have learned about in a hard way, however, I have definitely encountered it. I will often get emails or texts claiming to be from my bank and asking to enter in my information. Things like these are fake and are just a way to gain access to personal information.

Tri 3 Big Idea 5.3: Computing Bias

5.3 Notes

5.3 Activity

  1. Does the owner of the computer think this was intentional?

    I don’t think the HP computor’s creator intentionally made it so that mainly white men had access to the computor. However, it is impotant to note that no drastic steps have ben taken to improve this.

  2. If yes or no, justify you conclusion.

    HP computors were marketed for the general-public. There were no signifiers that it was marketed towards the west only and not outside of that.

  3. How do you think this happened?

    I think this happened due to the digital divide and how many people could actually get access to these computors. The digtal devide has been an issue even going past HP. The only ay to fix this is help end the rampant poverty and un-eduction while also introducing technology such as computors.

  4. Is this harmful? Was it intended to be harmful or exclude?

    This divide is harmful, however, it wasn’t in any way intentional. This unintentional exclusion can lead to a further seperation between the west and the rest of the country.

  5. Should it be corrected?

    This should be corrected in order to help introduce for progress into the world and close the digital divide.

  6. What would you or should you do to produce a better outcome?

    In order to produce a better outcome, we should be making electronics more available and inexpensive. As well as this, implementing more education on the internet can help people identify and emphasize the importance of technology.

Tri 3 Big Idea 5.4: Crowd-sourcing

5.4 Notes

5.4 Activity

  1. CompSci has 150 principles students. Describe a crowdsource idea and how you might initiate it in our environment?

    An example of crowd sourcing that can be done in our Computer Science class is a form of a forum where new discoveries of code can be shared. For example, if someone, in their free time were to create a new game or create a mini quiz, they could share the code for this so that their classmates could use this in their own works or to build upon this. As well as this, such as an API, students can create a sort of data base for said quizzes and so then other students can implement the data into their projets.

  2. What about Del Norte crowdsourcing? Could your final project be better with crowdsourcing?

    Especially for our project, croud sourcing is something that would be very beneficial. Since our website is a reading website, if we could implement a method for students to edit the summary of books it would help moer students and theorietically add in more reliable infromantion. While this would need a form of monitoring to ensure the information is true, it would add more exposure to more books.

Tri 3 Big Idea 5.1: Beneficial and Harmful Effects of Computing

5.1 Notes

5.1 Activity

  1. Come up with three of your own Beneficial and corresponding Harmful Effects of Computing
    • Computing and the internet helps introduce more ways to experience/view the world -> People may become wrapped up in what they see on the internet instead of actaully experiencing the internet.
    • There is an increased knowledge and understanding -> The overuse of the internet and mobile devices can lead to a numerous amounts of mental and physical health problems.
    • Improvements in industry and jobs and an interconnectedness of the world as a result of globalization -> human’s break their social interact with friends and families
  2. Talk about dopamine issues above. Real? Parent conspiracy? Anything that is impacting your personal study and success in High School?

    Dopamine is a type of neurotransmitter that is generally associated with how we as humans feel/experience pleasure. When using technology, Dopamine can be released and our body begins to associate feeling good to using technology. When this happens, our bodies can form a certain reliance on technology that can soon lead to an addiction. For example, when using social media apps, there is ofton a form of a ‘for you page’ where content is tailored and formed around what is apealing to the users. Pages like this can make people get addicted to viewing the content instead of focusing on resposibilites.

Tri 3 Big Idea 5.2: Digital Divide

5.2 Notes

5.2 Activity

  1. How does someone empower themself in a digital world?

    Someone can empower themselves in the digital world by confidently participating in the digital world and building upon the knowledge, experience and values that people already have.

  2. How does someone that is empowered help someone that is not empowered? Describe something you could do at Del Norte HS.

    In many ways they are preventing people from being digitally empowered as a system since it doesn’t always make it nesasaary for people to use paper. While paper is a vital part of our society and cannot be replaced, computers should become more accesable and available to the general public. At del norte, we can create technology drives and aother sorts of fundraisers to raise money for technological devices so that the digital devide can be closed in a way.

  3. Is paper or red tape blocking digital empowerment? Are there such barriers at Del Norte? Elsewhere?

    Yes, there are many elements preventing digital empowerment such as location, income, and general knowlege of the use of technology. Living in the US, and especially San Diego, many students and people are able to have multiple personal devices without an issue. However, moving away from the US, many developing countries such as India don’t necassarily have the same privilge. These barriers exists virtually everywhere, at a larger or smaller scale depending on where you live.