Unit 7: Days 6-8

START DATE:DUE DATE:STATUS:Open

Tasks

Over the last few days of the course, have students write the Official Released AP practice exam on AP Classroom. This can be done at one time or over several classes.  During that time, review the following topics if necessary.

CSP Word of the Day: Intellectual Property

  • Related terms: Creative Commons

CSP Word of the Day: Certificate Authorities

  • Certificate authorities issue digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model. 
  • Related terms:  Public Key Encryption, Cryptography

CSP Word of the Day: Multi-factor Authentication

  • Have them search to find out what the latest tech in Multi-factor Authentication
  • Related terms: malware

CSP Word of the Day: Geolocation

  • Related terms:  Personal Identifiable Information, search history, cookies

Complete Each Other’s Big Idea 4 Assignments

  • If you completed the ‘Create an Assignment’ activity from the last class

Khan Academy Review Course

Hot tip from a former student: Khan Academy’s Vocabulary list is an excellent last minute study guide. You can find it in the ‘Exam Preparation’ unit of the Khan Academy course.

Protecting Personal Data Review

  • Review outcomes IOC-2.A.1 through IOC-2.B.11
  • If you have not had students complete Activity 2 from the AP Teachers Resource (available only through the AP website) or an equivalent activity on protecting Personal Data you should look at it now.

Review Effects of Computing Innovations

  • Review the AP CSP Essential Knowledge Statements
    • IOC-1.A.1: People create computing innovations.
    • IOC-1.A.2: The way people complete tasks often changes to incorporate new computing innovations.
    • IOC-1.A.3: Not every effect of a computing innovation is anticipated in advance.
    • IOC-1.A.4: A single effect can be viewed as both beneficial and harmful by different people, or even by the same person. 
    • IOC-1.A.5: Advances in computing have generated and increased creativity in other fields, such as medicine, engineering, communications, and the arts.
    • IOC-1.B.1: Computing innovations can be used in ways that their creators had not originally intended:
      • The World Wide Web was originally intended only for rapid and easy exchange of information within the scientific community. 
      • Targeted advertising is used to help businesses, but it can be misused at both individual and aggregate levels.
      • Machine learning and data mining have enabled innovation in medicine, business, and science, but information discovered in this way has also been used to discriminate against groups of individuals.
    • IOC-1.B.2: Some of the ways computing innovations can be used may have a harmful impact on society, economy, or culture.
    • IOC-1.B.3: Responsible programmers try to consider the unintended ways their computing innovations can be used and the potential beneficial and harmful effects of these new uses.
    • IOC-1.B.4: It is not possible for a programmer to consider all the ways a computing innovation can be used.
    • IOC-1.B.5: Computing innovations have often had unintended beneficial effects by leading to advances in other fields.
    • IOC-1.B.6: Rapid sharing of a program or running a program with a large number of users can result in significant impacts beyond the intended purpose or control of the programmer.
  • Have students complete the Explore Teachers Resource Biometric Authentication Activity (available only through the AP website.


Continue to Introduction »