Skip to the content.
Home Notes Create Task Final Quiz1,2,3 Replit

Tech Talk Notes and Video Notes

  1. When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in GitHub pages.
    • Creative Commons, Open Source are free terminologies! However, businesses will not last without income. And today, businesses won’t last without engineers pulling Open Source software.
    • I think we woudl be best for creative commons because want our website to be avaliable to everyone but not editable to everyone. In that point, we want our website to include a sign in utility.
  2. Make a license for your personal and Team project. Document license you picked and why. The Creative Commons CC0 Public Domain Dedication waives copyright intereste in a work you’ve created, dedicates it to the world wide web domain. Want it to be accessible to other teams who don’t know how.

Tri 3 TPT 2.0 Safe Computing 5.6

  1. Describe PII you have seen on project in CompSci Principles.
  2. What are your feelings about PII and your exposure?
    • Some concerns of including a database or PII in our website is that the personal information of lacrosse team members (such as name, date of birth, email, etc.) can be taken through hacking or phishing. We plan to address this issue by either not requiring users to input this information, or by requiring further authentication such as security phrases, forgetting the password email feature, facial recognition, etc. to verify the user.
  3. Describe good and bad passwords? What is another step that is used to assist in authentication.
    • Good passwords are ones that do not have personal information that is common knowledge, do not know any known pattern, and does not expose any private information.
  4. Try to describe Symmetric and Asymmetric encryption.
    • Symmetric encryption uses the same key to encrypt and decrypt data making it very easy to use. Asymmetric encryption uses a public key to encrypt data and a private key to decrypt information.
  5. Provide and example of encryption we used in deployment.
    • AWS domain.
  6. Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
    • For photo distribution we plan to have a privacy policy stated that explains that the users are giving up the rights to these photos. We also plan to create and establish a secure domain for the website to also prevent attempts of hacking and phishing.

Tri 3 TPT 1.0 Computing Bias 5.3

Watch the video… HP computers are racist Come up with some thoughts on the video and be ready to discuss them as I call on you. Here are some ideas…

  1. Does the owner of the computer think this was intentional? I don’t think they thought it was intentional because he did not want it to be this way either. If yes or no, justify you conclusion. He had shown his friend as well in light that he doesn’t think the acts done by the peopel around his are not done with bad intention. How do you think this happened? Is this harmful? Was it intended to be harmful or exclude? It is definetely harmful to exclude one so we should not follow in pursuit of this misconduct. Should it be corrected? This shoudl be corrected in hopes of people in the future to not misunderstand of this intential bias. What would you or should you do to produce a better outcome? To produce a better outcome, I would work to ensure equality for everyone.

Tri 3 TPT 1.1 Crowdsourcing 5.4

CompSci has 150 principles students. Describe a crowdsource idea and how you might initiate it in our environment? We can use the power of freidnnship and communication to work together in creating a wonderful project. What about Del Norte crowdsourcing? Could your final project be better with crowdsourcing? yes because it has the perspectives of many different people.

5.3: Computing Bias Explicit Data: data that you voluntarily give to companies Thumbs Name, address… Implicit Data: When you watch What you binge(d) Style of show frequently selected Computing innovations can reflect existing tendencies Biases can be embedded at all levels of software development

5.4: Crowdsourcing Citizen Science Describes scientific research that the common population helps to conduct. Ordinary citizens help contribute data to research projects using computing devices. Citizen science gives a wide range of people the ability to contribute to scientific studies and, in turn, provides more diverse data for scientists to work with. Crowdsourcing Practice of getting a large amount of input or information from people on the Internet. Citizen science is an example of crowdsourcing, but crowdsourcing can also take other forms. Crowdsourcing can also take the form of financial support in a process known as crowdfunding like GoFundMe


5.1, 5.2 Notes: Digital Divide and Harmful and Beneficial Effects

5.1: Beneficial and Harmful Effects Accelerometers: automobile industry drove price down Used for airbag deployment and lateral movement detection Benefits of multirotor- deliveries, harmful- flying in unregulated zones is illegal and dangerous, privacy Benefits of Wii- active playing video games, harmful- broken TVs/ injuries 3D printers: open source software for computer and printer Organs, prosthetics, houses, shoes, jewelry Internet originally for scientists but now used by many people all the time Dopamine feedback loops Sleep deprivation, depression, anxiety, impulsivity Microtransactions: “free” games/apps Cosmetics paywall to functionality, pay to win Gold, v-bucks, chips Loot boxes- banned in some countries; gambling

5.2: Digital Divide Digital divide: differing access to computing devices/ internet based on socioeconomic, geographic, demographic (age, religion) Some countries computers not common in rural areas, small # of websites, internet used to protect and advocate the government

5.1, 5.2 notes and actions

GitHub pages action ***

  1. Come up with three of your own Beneficial and corresponding Harmful Effects of Computing 3 Beneficial on Computing: Increase your productivity, Connects you to the Internet, Can store vast amounts of information and reduce waste 3 Harmful Effects of Computing: Relationships and Social Skills Issues, Health Problems, Browsing Online Can Be Dangerous. 2
  2. Talk about dopamine issues above. Real? Parent conspiracy? Anything that is impacting your personal study and success in High School? It is still astounding that we must still require a human response to answer our most important calls. it would be better to combine this trust with machine learning. Based on the flow chart, it is also a complicated process that is not fault-tolerant at all, but it is extremely realistic. Sometimes when making important calls such as job offers, can impact my personal study and success in High School negatively.

5.2 GitHub pages action – Digital Empowerment


  1. How does someone empower themself in a digital world? Empowerment in the digital world is important because it assists organizations in opening up the knowledge, experience and values that people already have. Through resources such as slack and github, students like me can express their unique talent through these tools. Then being is linked is what is important and makes our work known.

  2. How does someone that is empowered help someone that is not empowered? Describe something you could do at Del Norte HS. Build trust. At times, it is necessary that we trust others to complete specific tasks or own certain goals without much oversight, Ask for feedback, Offer instructions. For places such as the nighthawk center, it allows students to have a safe space where they can relax. Equip with many helpful mentors and other students, they are able to gain help to be empowered in a digital world over there.

  3. Is paper or red tape blocking digital empowerment? Are there such barriers at Del Norte? Elsewhere? Red tape is particularly burdensome to smaller businesses and may act as a disincentive to new business start-ups. Paper is definitely now blocking digital empowerment because it allows people to print and put their work on paper making it easier for others to see visually and be more accessible to those who do not have a computer device.