21
Dear Student, We have developed the course “The Beauty and Joy of Computing” (BJC) to interest more high school students in computer science. We are doing this research study to find out how well BJC helps students to enjoy and succeed at computer science. We will also use the information we collect to improve the curriculum materials used in teaching BJC. This research is not a required part of your coursework, and your responses will not affect your course grade. If you agree to be in the study (and your parents give permission), we will ask you to provide information about your attitudes and interest in computer science and your reactions to the course, via three surveys (pre-course, mid-course, and post-course). You will be asked to provide your name, birthdate, year in high school, gender, race/ethnicity, and disability status. You may also be asked to share copies of your coursework (e.g., projects and assessments). If you and your parents agree to be part of this study, we may collect your exams, writing assignments, and computer projects, and your final grade, from your teacher. If you take the Advanced Placement Computer Science Principles exam (starting spring 2017), we will collect your score on the exam from your school. The reason we need this information isn’t to evaluate you, but to see how well students, in general, learn in BJC classes. We may also observe your classroom to see how teachers and students are using the course. The purpose of these observations is not to evaluate you, but to evaluate how well the activities are helping all the students understand the ideas of the course. Benefits and Risks. There is no benefit to you personally for taking part in this study, but the results of the research will be used to improve the BJC course which was designed to help high school students learn computer science ideas and skills. There is very little risk to participation in the research, in that you might find it uncomfortable to answer questions about your classwork, but you may always withdraw from the study at any time. We ask for your honesty in completing this survey, and so we invite you to skip any questions that make you feel uncomfortable. Thank you, Beauty and Joy of Computing Research and Evaluation Team (This survey is based upon work supported by the National Science Foundation, grant DRL- 1441075. This survey includes some questions developed by the College Board CS Principles project (CNS-1246951). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF.) BJC4NYC 15-16: Student Content Assessment Form1 BJC4NYC 15-16: Student Content Assessment Form1 1

BJC4NYC 15-16: Student Content Assessment Form1bjc.berkeley.edu/BJC4NYC Teacher and Student Content Assessment... · BJC4NYC 15-16: Student Content Assessment Form1

  • Upload
    lyliem

  • View
    216

  • Download
    0

Embed Size (px)

Citation preview

Dear Student,

We have developed the course “The Beauty and Joy of Computing” (BJC) to interest more highschool students in computer science. We are doing this research study to find out how well BJChelps students to enjoy and succeed at computer science. We will also use the information wecollect to improve the curriculum materials used in teaching BJC. This research is not a requiredpart of your coursework, and your responses will not affect your course grade.

If you agree to be in the study (and your parents give permission), we will ask you to provideinformation about your attitudes and interest in computer science and your reactions to the course,via three surveys (pre-course, mid-course, and post-course). You will be asked to provide yourname, birthdate, year in high school, gender, race/ethnicity, and disability status. You may also beasked to share copies of your coursework (e.g., projects and assessments).

If you and your parents agree to be part of this study, we may collect your exams, writingassignments, and computer projects, and your final grade, from your teacher. If you take theAdvanced Placement Computer Science Principles exam (starting spring 2017), we will collect yourscore on the exam from your school. The reason we need this information isn’t to evaluate you, butto see how well students, in general, learn in BJC classes.

We may also observe your classroom to see how teachers and students are using the course. Thepurpose of these observations is not to evaluate you, but to evaluate how well the activities arehelping all the students understand the ideas of the course.

Benefits and Risks. There is no benefit to you personally for taking part in this study, but the resultsof the research will be used to improve the BJC course which was designed to help high schoolstudents learn computer science ideas and skills. There is very little risk to participation in theresearch, in that you might find it uncomfortable to answer questions about your classwork, but youmay always withdraw from the study at any time. We ask for your honesty in completing this survey,and so we invite you to skip any questions that make you feel uncomfortable.

Thank you, Beauty and Joy of Computing Research and Evaluation Team

(This survey is based upon work supported by the National Science Foundation, grant DRL-1441075. This survey includes some questions developed by the College Board CS Principlesproject (CNS-1246951). Any opinions, findings, and conclusions or recommendations expressed inthis material are those of the authors and do not necessarily reflect the views of the NSF.)

BJC4NYC 15-16: Student Content Assessment Form1

BJC4NYC 15-16: Student Content Assessment Form1

1

Note: Your name will be used to create a Student ID code. Any identifying information will be kept strictly confidential.

BACKGROUND

Student first name*

Student middle name

Student last name*

Student birthdate (mm/dd/yyyy)*

2

High School*

ACORN Community High School

All City Leadership Secondary School

Benjamin Banneker Academy

Bronx Compass High School

Bronx Early College Academy for Teaching & Learning

Bronx Envision Academy

Bronx Leadership Academy HS

Brooklyn Community Arts and Media High School

Brooklyn Tech

Essex Street Academy

Herbert H. Lehman High School

Information Technology High School

John Bowne High School

Martin Van Buren High School

New Dorp High School

NYC Lab School for Collaborative Studies

Pablo Neruda Academy

Ralph R. McKee CTE High School

Robert F. Wagner, Jr. Secondary School for Arts and Technology

Science Skills Center High School for Science,Technology & the Creative Arts

Sunset Park High School

The High School for Global Citizenship

The HS for Innovation in Advertising and Media

The Renaissance Charter High School for Innovation

Tottenville High School

UA Gateway

Other (please specify)

3

Participation in this research study is voluntary and you can opt out at any time. All of your responses willremain anonymous and confidential; no one, including your teacher, will know which responses you haveprovided. Your Student ID will be used ONLY to match pre/post data. This identifying information will bekept strictly confidential.

Please indicate whether you agree to participate in this research study.

*

Yes

No

BJC4NYC 15-16: Student Content Assessment Form1

COMPUTER SCIENCE CONTENT ASSESSMENT

In this next section, you will be given 20 items that assess your knowledge of computer science. You are

not expected to know all of this content at the beginning of the year and can skip any problems you do not

know; we do ask that you try your best. Your responses will not impact your grade.

BJC4NYC 15-16: Student Content Assessment Form1

4

The following description applies to items 1-2.

BBC News9 February 2015 Last updated at 06:20 ET (excerpted)

Not in front of the telly: Warning over 'listening' TV

Samsung is warning customers about discussing personal information in front of their smart television set.

The warning applies to TV viewers who control their Samsung Smart TV using its voice activation feature.

When the feature is active, such TV sets "listen" to what is said and may share what they hear with Samsung or third parties, it said.

The warning came to light via a story in online news magazine the Daily Beast which published an excerpt of a section of Samsung'sprivacy policy for its net-connected Smart TV sets. These record what is said when a button on a remote control is pressed.

The policy explains that the TV set will be listening to people in the same room to try to spot when commands or queries are issued viathe remote. It goes on to say: "If your spoken words include personal or other sensitive information, that information will be among thedata captured and transmitted to a third party."…

[Samsung said] that it did not retain voice data or sell the audio being captured. Smart-TV owners would always know if voiceactivation was turned on because a microphone icon would be visible on the screen, it said.

The third party handling the translation from speech to text is a firm called Nuance, which specialises in voice recognition, Samsunghas confirmed to the BBC.

Copyright © 2015 BBC.

-----------------------------------------------------------------------------

Samsung privacy policy (excerpt)

You can control your SmartTV, and use many of its features, with voice commands.

If you enable Voice Recognition, you can interact with your Smart TV using your voice. To provide you the Voice Recognition feature,some voice commands may be transmitted (along with information about your device, including device identifiers) to a third-partyservice that converts speech to text or to the extent necessary to provide the Voice Recognition features to you. In addition, Samsungmay collect and your device may capture voice commands and associated texts so that we can provide you with Voice Recognitionfeatures and evaluate and improve the features. Please be aware that if your spoken words include personal or other sensitiveinformation, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.…

You may disable Voice Recognition data collection at any time by visiting the “settings” menu. However, this may prevent you fromusing all of the Voice Recognition features.

Copyright© 1995-2015 SAMSUNG All Rights Reserved.

5

1. Which of the following best describes Samsung's behavior based on the information provided?

Samsung violated its privacy policy.

Samsung is using users' conversations to sell advertising.

Samsung's policy should have included information about Nuance's privacy policy.

All of the above.

BJC4NYC 15-16: Student Content Assessment Form1

6

The following description applies to items 1-2.

BBC News9 February 2015 Last updated at 06:20 ET (excerpted)

Not in front of the telly: Warning over 'listening' TV

Samsung is warning customers about discussing personal information in front of their smart television set.

The warning applies to TV viewers who control their Samsung Smart TV using its voice activation feature.

When the feature is active, such TV sets "listen" to what is said and may share what they hear with Samsung or third parties, it said.

The warning came to light via a story in online news magazine the Daily Beast which published an excerpt of a section of Samsung'sprivacy policy for its net-connected Smart TV sets. These record what is said when a button on a remote control is pressed.

The policy explains that the TV set will be listening to people in the same room to try to spot when commands or queries are issued viathe remote. It goes on to say: "If your spoken words include personal or other sensitive information, that information will be among thedata captured and transmitted to a third party."…

[Samsung said] that it did not retain voice data or sell the audio being captured. Smart-TV owners would always know if voiceactivation was turned on because a microphone icon would be visible on the screen, it said.

The third party handling the translation from speech to text is a firm called Nuance, which specialises in voice recognition, Samsunghas confirmed to the BBC.

Copyright © 2015 BBC.

-----------------------------------------------------------------------------

Samsung privacy policy (excerpt)

You can control your SmartTV, and use many of its features, with voice commands.

If you enable Voice Recognition, you can interact with your Smart TV using your voice. To provide you the Voice Recognition feature,some voice commands may be transmitted (along with information about your device, including device identifiers) to a third-partyservice that converts speech to text or to the extent necessary to provide the Voice Recognition features to you. In addition, Samsungmay collect and your device may capture voice commands and associated texts so that we can provide you with Voice Recognitionfeatures and evaluate and improve the features. Please be aware that if your spoken words include personal or other sensitiveinformation, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.…

You may disable Voice Recognition data collection at any time by visiting the “settings” menu. However, this may prevent you fromusing all of the Voice Recognition features.

Copyright© 1995-2015 SAMSUNG All Rights Reserved.

7

2. What can you say about the security implications of Voice Recognition based on the informationprovided?

People could break into Samsung's servers and listen to users' conversations.

This article and policy say nothing about whether conversations are securely encrypted during transmission and on Samsung'sservers.

There is no security risk because no information is collected unless the microphone icon is on the screen.

There is no security risk because only voice commands to control the TV are recorded.

BJC4NYC 15-16: Student Content Assessment Form1

3. Which of the following is not a category of US intellectual property law?

Trademark

Moral right

Patents

Copyright

BJC4NYC 15-16: Student Content Assessment Form1

8

4. Using the decimal to character mapping above, what would be the binary representation for the letter“M”?

0110011

1011001

1001101

1001110

BJC4NYC 15-16: Student Content Assessment Form1

9

5. The question below uses a simple programming language, with the following instructions:

Consider the goal of simulating the results of flipping a fair coin 10 times, and displaying the number oftimes the coin came up tails. Which of the following code segments will NOT accomplish this goal?

BJC4NYC 15-16: Student Content Assessment Form1

10

6. Which of the following numbers is a response that this expression could give?

0

2

7

10

BJC4NYC 15-16: Student Content Assessment Form1

11

7. The question below uses a simple programming language with the following features:

Consider the goal of summing the values of the positive-valued integers in a list called numbers. Which ofthe following code segments would accomplish the goal?

BJC4NYC 15-16: Student Content Assessment Form1

12

8. Which of the following statements correctly explain how the Internet is able to facilitate communication ata large scale?

I. There is no central monitoring computer used to track and maintain the connections of the Internet,i.e., no single source of failure.

II. Once a route between a particular sender and receiver is determined to be reliable, all data isalways sent through that route to assure delivery, and after that, if any link on that route goes down, datacan no longer be transmitted.

III. The end-to-end architecture allows all the “smarts” (e.g., encryption and decryption) to be housed inthe source and destination computers/devices, and the computers/devices in the middle only need to worryabout moving packets around.

I and II only

I and III only

II and III only

I, II, and III

BJC4NYC 15-16: Student Content Assessment Form1

9. Which of the following are examples of how digital video tools (for creating effects, images, video andanimations) have transformed the movie industry?

I. Digital video tools have made it easier to edit professional-quality video on a home computer instead ofrequiring a dedicated video-editing studio.

II. Digital video tools have made it easier to create new videos by compositing existing video elementstogether.

III. Digital video tools have made it easier to synthesize new images that don’t exist in reality.

I only

I and II only

II and III only

I, II, and III

BJC4NYC 15-16: Student Content Assessment Form1

13

10. The most common method for representing color with computing applications is to control the amountsof red, green, and blue that are mixed together to create a desired color. A color can be represented by anRGB (Red, Green, Blue) triplet, which consists of three numbers between 0 and 255. The first number in atriplet represents the amount of red, the second number represents the amount of green, and the thirdnumber represents the amount of blue. For example, the RGB triplet (88, 50, 250) represents apredominantly blue color because there is more blue than there is red or green.

In many cases, the values in an RGB triplet are converted to a binary or hexadecimal representation.

Which of the following RGB triplets represents a predominantly green color?

The decimal RGB values (242, 200, 30)

The decimal RGB values (250, 250, 250)

The hexadecimal RGB values (1F, FA, 1E)

The binary RGB values (01101010, 01001111, 11011101)

BJC4NYC 15-16: Student Content Assessment Form1

14

11. The music director of a college radio station gathered data to analyze the songs that were played onthe station during the last year. A song was listed in the data every time it was played. The following datawas collected for each song:• The name of the artist • The song title • The genre

The music director wants to find the number of unique songs (i.e., same artist and title) played in the hip-hop genre. Consider the two proposed algorithms below.

Algorithm I: Filter the data by creating a list of songs only in the hip-hop genre. Sort the list of hip-hop songsby song title. If the first song is a hip-hop song, set a counter to 1. Otherwise, set a counter to 0. Iteratethrough the sorted list. If a song title is different from the previous song in the list, increment the counter by1.

Algorithm II: For each song, create a fourth data field called “artist+title” (in addition to “name of the artist”,“song title”, and “genre”), in which we concatenate the name of the artist and song title. (E.g., if the artistwere “Run DMC” and the song title were “My Adidas”, the concatenation would be “Run DMC My Adidas”)Sort the list of songs by this concatenated artist+title field. If the first song is a hip-hop song, set a counterto 1. Otherwise, set a counter to 0. Iterate through the sorted list, starting at the second song. Ifthe artist+title for a song is different from the previous song in the list AND if it’s a hip-hopsong, increment the counter by 1.

Which algorithm, if any, can the music director use to find the number of unique songs played in the hip-hopgenre?

I only

II only

Both I and II

Neither I nor II

BJC4NYC 15-16: Student Content Assessment Form1

15

12. Suppose that every personal video player will be modified so that whenever a video starts playing, thedevice will anonymously upload the following metadata to a shared centralized database:

· The name of the video

· The duration of the video

· The time of the upload of the viewing metadata

· The location of the device during the upload of viewing metadata

Which of the following pieces of information will be possible to determine if only the information in thedatabase is used?

Select TWO answers.

A list of individuals who watched a particular video

The longest-duration video played during a window in time

The highest-rated video that was watched

The state with the greatest number of uploads of viewing metadata

BJC4NYC 15-16: Student Content Assessment Form1

13. A protocol would most likely contain:

Rules for communication

Web pages

Compression

Encryption

Virus protection

BJC4NYC 15-16: Student Content Assessment Form1

16

14. Which of the following is true about the assignment statement (which sets a value of a variable) inprogramming languages?

The previous value in the variable is overwritten and lost

The previous value that is stored in a variable is available at all times

The assignment statement only works with numeric values

Assignment is only useful for programs that contain an outer loop

BJC4NYC 15-16: Student Content Assessment Form1

17

15. Which of the following is true of the programs above, supposing the starting value of SALARY is 10?

Clicking the green flag will give the same salary in Program A and Program B

Program A will always set the value of SALARY to 14

Program B will always set the value of SALARY to 14

Snap! will report an error

BJC4NYC 15-16: Student Content Assessment Form1

16. What distinguishes a higher order function from a non-higher order function?

It is always recursive

It accepts output from another function as input

It accepts another function as input

It can contain multiple inputs

BJC4NYC 15-16: Student Content Assessment Form1

17. How could the above block be used with a higher order function?

Its output can be used as input to another function

The entire function can be used as input to another function

It can be called recursively

It can be run and the list variable used in another function

BJC4NYC 15-16: Student Content Assessment Form1

18

18. Which of these is true about recursive procedures?

The input has to be a number, and becomes number-1 in the recursive call

The recursion must eventually reach a simple base case that can be solved without recursive calls

Recursion is just another way to express a loop

When the input is an empty list, the output has to be an empty list

BJC4NYC 15-16: Student Content Assessment Form1

19. Recursion is useful for programming for each of the following reasons EXCEPT:

It allows for code which is repeated many times to be written only once

A recursive function takes another function as input

It allows for some solutions which would be very complicated iteratively to be written out more cleanly

It is useful for navigating self-similar structures like fractals, which occur in many problems

BJC4NYC 15-16: Student Content Assessment Form1

20. The following image was created by calling this custom block.

19

Which of the following expressions must be in the empty input slot to create this image?

BJC4NYC 15-16: Student Content Assessment Form1

20

Thank you very much!

21