Come up with three of your own Beneficial and corresponding Harmful Effects of Computing

Three beneficial effects of computing are advancements in medical fields, better ways of analyzing data, and more processes of communicating over distances. Three harmful effects are the it can imbalance your dopamine, take away jobs from real people, and can cause an addiction in many ways for people.

Talk about dopamine issues above. Real? Parent conspiracy? Anything that is impacting your personal study and success in High School?

Even from a personal account, I can say dopamine is a real issue. With new apps that use intricate algorithms, I feel like anything compared to it is anything but substantial. I had to delete TikTok because I felt like anything that wasn’t a 30 second video wasn’t worth my time and/or I didn’t care about it, and of course I found myself wondering how I had spent hours scrolling. I’ve been through the rabbit hole of technology addiction which is why I mostly cut myself off from a lot of it. I stopped using my phone before bed, limit my hours on my phone, and try my best to enjoy the moments that I can have in real life.

How does someone empower themself in a digital world?

Personally I think just research. Research is how I empower my knowledge regarding anything I inquire about. Digital empowerment does however have many different meanings. If not regarding knowledge, it can be about power. Digital power can be obtained through various methods with various meanings however.

How does someone that is empowered help someone that is not empowered? Describe something you could do at Del Norte HS.

Is paper or red tape blocking digital empowerment? Are there such barriers at Del Norte? Elsewhere?

I think it’s a bit of both. There are hardline rules in parallel with soft barriers everywhere you go. In Del Norte, there are you must rules but then their soft in other areas too. For example, racism is a hard no which is heavily punished. A soft example is vaping where the school can’t do a whole lot because they can only catch you outside the bathroom and/or with search you with evidence. It is kinda annoying dealing with false fire alarms and crowded bathrooms due to a problem that cannot easily be dealt with.

Computing Bias

Bias in the computer would can be interpreted in many ways. Things like TikTok are altered towards young audiences which have algorithms that influence young minds with these short videos. The algorithm stores what interests you have and shows you videos that will interest you, hence why many are turning towards the app in any amount of free time they have. However, Facebook, takes another route. They have routed towards another audience. Their older audience simply can be hooked on groups or articles. A completely different source of media but towards the same objective.

CompSci has 150 ish principles students. Describe a crowdsource idea and how you might initiate it in our environment?

A croudsource idea for the students should be something revolving a general consistence of education. Something regarding computer science would be a great idea because it would be a topic familiar with the audience. Also this would prevent feeding info that wouldn’t produce what the subject is for. An example would be if you crowdsourced the principle students for a topic like “how have you felt racism impact you in the work environment”. Not only would their people who have not worked, but the topic is completely irreverent to the crowd

What about Del Norte crowdsourcing? Could your project be better with crowdsourcing?

Del Norte crowdsouring does provide sufficient data depending on what your project is. There is a variety of cultures and people but all with the common knowledge of education. However, my project doesn’t really benefit as much as others would from crowdsourcing. My project results would vary but the product itself wouldn’t be helped much.

What kind of data could you capture at N@tM to make evening interesting? Perhaps use this data to impress Teachers during finals week.

Data that I could capture is what type of dog that people generally gravitate towards. I’m guessing a majority of people will go towards a quiet but playful house dog. Or maybe the data will be more spread out, only the final results could really say. With such data, I would maybe make a pie chart or table with the majority of wants from the inputs.

When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in your personal blog.

In your blog, summarize the discussions and personal analysis on Software Licenses/Options, Digital Rights, and other Legal and Ethical thoughts from this College Board topic.

Make a license for your personal (blog) and Team repositories for the CPT project. Be sure to have a license for both Team GitHub repositories (frontend/backend). Document license(s) you picked and why. FYI, frontend, since it is built on GitHub pages may come with a license and restrictions. Document in blog how team made license choice and process of update.

Describe PII you have seen on project in CompSci Principles.

One project that used PII was the table data that we edited. We had userIds, Ids, passwords, and more depending on user differentiation.

What are your feelings about PII and your personal exposure?

Personally, I have no information about me on the internet. Mostly because I was taught all my life to be safe on the internet because my dad is in tech as well. I was exposed to technology as a young age but always made sure to not expose my data. Seeing the effects of social media, I choose not to have any and put myself out there.

Describe good and bad passwords? What is another step that is used to assist in authentication.

Bad passwords are those that are shot and don’t vary in characters. Good passwords are those that have good length, have many types of characters, and use a mixture of capitalization. The more uniqueness that is used means the longer it takes to crack.

Try to describe Symmetric and Asymmetric encryption.

The key difference between the two is what types of keys they use. Symmetric uses a private key for decryption and encryption. Asymmetric uses a public key. Symmetric is faster however due to using a single key.

Provide an example of encryption we used in AWS deployment.

AWS uses hardware security modules to help secure user information. Amazon also uses server-side encryption in parallel with complex algorithms.

Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.

Phishing methods on the internet are very apparent. Most common are false ads on websites or laying in downloads. Theoretically, when pirating video games, there can be a virus that is hidden within the downloaded files. From personal experience, after downloading minecraft mods from shady websites, you need to have a ad-blocker, antivirus, and/or some other form of protection.

License notes

After look at different types of licenses and what they do, it makes sense. MIT, Apache, and GPL are the most commonly used ones. We used MIT because that is what we felt that remarked with us the best.

What license we choose and why

Each one is different in their own aspect and has certain aspects that make them unique. As a group we decided that the MIT license is bet fit for our project.