Upload
lyliem
View
216
Download
0
Embed Size (px)
Citation preview
Dear Student,
We have developed the course “The Beauty and Joy of Computing” (BJC) to interest more highschool students in computer science. We are doing this research study to find out how well BJChelps students to enjoy and succeed at computer science. We will also use the information wecollect to improve the curriculum materials used in teaching BJC. This research is not a requiredpart of your coursework, and your responses will not affect your course grade.
If you agree to be in the study (and your parents give permission), we will ask you to provideinformation about your attitudes and interest in computer science and your reactions to the course,via three surveys (pre-course, mid-course, and post-course). You will be asked to provide yourname, birthdate, year in high school, gender, race/ethnicity, and disability status. You may also beasked to share copies of your coursework (e.g., projects and assessments).
If you and your parents agree to be part of this study, we may collect your exams, writingassignments, and computer projects, and your final grade, from your teacher. If you take theAdvanced Placement Computer Science Principles exam (starting spring 2017), we will collect yourscore on the exam from your school. The reason we need this information isn’t to evaluate you, butto see how well students, in general, learn in BJC classes.
We may also observe your classroom to see how teachers and students are using the course. Thepurpose of these observations is not to evaluate you, but to evaluate how well the activities arehelping all the students understand the ideas of the course.
Benefits and Risks. There is no benefit to you personally for taking part in this study, but the resultsof the research will be used to improve the BJC course which was designed to help high schoolstudents learn computer science ideas and skills. There is very little risk to participation in theresearch, in that you might find it uncomfortable to answer questions about your classwork, but youmay always withdraw from the study at any time. We ask for your honesty in completing this survey,and so we invite you to skip any questions that make you feel uncomfortable.
Thank you, Beauty and Joy of Computing Research and Evaluation Team
(This survey is based upon work supported by the National Science Foundation, grant DRL-1441075. This survey includes some questions developed by the College Board CS Principlesproject (CNS-1246951). Any opinions, findings, and conclusions or recommendations expressed inthis material are those of the authors and do not necessarily reflect the views of the NSF.)
BJC4NYC 15-16: Student Content Assessment Form1
BJC4NYC 15-16: Student Content Assessment Form1
1
Note: Your name will be used to create a Student ID code. Any identifying information will be kept strictly confidential.
BACKGROUND
Student first name*
Student middle name
Student last name*
Student birthdate (mm/dd/yyyy)*
2
High School*
ACORN Community High School
All City Leadership Secondary School
Benjamin Banneker Academy
Bronx Compass High School
Bronx Early College Academy for Teaching & Learning
Bronx Envision Academy
Bronx Leadership Academy HS
Brooklyn Community Arts and Media High School
Brooklyn Tech
Essex Street Academy
Herbert H. Lehman High School
Information Technology High School
John Bowne High School
Martin Van Buren High School
New Dorp High School
NYC Lab School for Collaborative Studies
Pablo Neruda Academy
Ralph R. McKee CTE High School
Robert F. Wagner, Jr. Secondary School for Arts and Technology
Science Skills Center High School for Science,Technology & the Creative Arts
Sunset Park High School
The High School for Global Citizenship
The HS for Innovation in Advertising and Media
The Renaissance Charter High School for Innovation
Tottenville High School
UA Gateway
Other (please specify)
3
Participation in this research study is voluntary and you can opt out at any time. All of your responses willremain anonymous and confidential; no one, including your teacher, will know which responses you haveprovided. Your Student ID will be used ONLY to match pre/post data. This identifying information will bekept strictly confidential.
Please indicate whether you agree to participate in this research study.
*
Yes
No
BJC4NYC 15-16: Student Content Assessment Form1
COMPUTER SCIENCE CONTENT ASSESSMENT
In this next section, you will be given 20 items that assess your knowledge of computer science. You are
not expected to know all of this content at the beginning of the year and can skip any problems you do not
know; we do ask that you try your best. Your responses will not impact your grade.
BJC4NYC 15-16: Student Content Assessment Form1
4
The following description applies to items 1-2.
BBC News9 February 2015 Last updated at 06:20 ET (excerpted)
Not in front of the telly: Warning over 'listening' TV
Samsung is warning customers about discussing personal information in front of their smart television set.
The warning applies to TV viewers who control their Samsung Smart TV using its voice activation feature.
When the feature is active, such TV sets "listen" to what is said and may share what they hear with Samsung or third parties, it said.
…
The warning came to light via a story in online news magazine the Daily Beast which published an excerpt of a section of Samsung'sprivacy policy for its net-connected Smart TV sets. These record what is said when a button on a remote control is pressed.
The policy explains that the TV set will be listening to people in the same room to try to spot when commands or queries are issued viathe remote. It goes on to say: "If your spoken words include personal or other sensitive information, that information will be among thedata captured and transmitted to a third party."…
[Samsung said] that it did not retain voice data or sell the audio being captured. Smart-TV owners would always know if voiceactivation was turned on because a microphone icon would be visible on the screen, it said.
The third party handling the translation from speech to text is a firm called Nuance, which specialises in voice recognition, Samsunghas confirmed to the BBC.
Copyright © 2015 BBC.
-----------------------------------------------------------------------------
Samsung privacy policy (excerpt)
You can control your SmartTV, and use many of its features, with voice commands.
If you enable Voice Recognition, you can interact with your Smart TV using your voice. To provide you the Voice Recognition feature,some voice commands may be transmitted (along with information about your device, including device identifiers) to a third-partyservice that converts speech to text or to the extent necessary to provide the Voice Recognition features to you. In addition, Samsungmay collect and your device may capture voice commands and associated texts so that we can provide you with Voice Recognitionfeatures and evaluate and improve the features. Please be aware that if your spoken words include personal or other sensitiveinformation, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.…
You may disable Voice Recognition data collection at any time by visiting the “settings” menu. However, this may prevent you fromusing all of the Voice Recognition features.
Copyright© 1995-2015 SAMSUNG All Rights Reserved.
5
1. Which of the following best describes Samsung's behavior based on the information provided?
Samsung violated its privacy policy.
Samsung is using users' conversations to sell advertising.
Samsung's policy should have included information about Nuance's privacy policy.
All of the above.
BJC4NYC 15-16: Student Content Assessment Form1
6
The following description applies to items 1-2.
BBC News9 February 2015 Last updated at 06:20 ET (excerpted)
Not in front of the telly: Warning over 'listening' TV
Samsung is warning customers about discussing personal information in front of their smart television set.
The warning applies to TV viewers who control their Samsung Smart TV using its voice activation feature.
When the feature is active, such TV sets "listen" to what is said and may share what they hear with Samsung or third parties, it said.
…
The warning came to light via a story in online news magazine the Daily Beast which published an excerpt of a section of Samsung'sprivacy policy for its net-connected Smart TV sets. These record what is said when a button on a remote control is pressed.
The policy explains that the TV set will be listening to people in the same room to try to spot when commands or queries are issued viathe remote. It goes on to say: "If your spoken words include personal or other sensitive information, that information will be among thedata captured and transmitted to a third party."…
[Samsung said] that it did not retain voice data or sell the audio being captured. Smart-TV owners would always know if voiceactivation was turned on because a microphone icon would be visible on the screen, it said.
The third party handling the translation from speech to text is a firm called Nuance, which specialises in voice recognition, Samsunghas confirmed to the BBC.
Copyright © 2015 BBC.
-----------------------------------------------------------------------------
Samsung privacy policy (excerpt)
You can control your SmartTV, and use many of its features, with voice commands.
If you enable Voice Recognition, you can interact with your Smart TV using your voice. To provide you the Voice Recognition feature,some voice commands may be transmitted (along with information about your device, including device identifiers) to a third-partyservice that converts speech to text or to the extent necessary to provide the Voice Recognition features to you. In addition, Samsungmay collect and your device may capture voice commands and associated texts so that we can provide you with Voice Recognitionfeatures and evaluate and improve the features. Please be aware that if your spoken words include personal or other sensitiveinformation, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.…
You may disable Voice Recognition data collection at any time by visiting the “settings” menu. However, this may prevent you fromusing all of the Voice Recognition features.
Copyright© 1995-2015 SAMSUNG All Rights Reserved.
7
2. What can you say about the security implications of Voice Recognition based on the informationprovided?
People could break into Samsung's servers and listen to users' conversations.
This article and policy say nothing about whether conversations are securely encrypted during transmission and on Samsung'sservers.
There is no security risk because no information is collected unless the microphone icon is on the screen.
There is no security risk because only voice commands to control the TV are recorded.
BJC4NYC 15-16: Student Content Assessment Form1
3. Which of the following is not a category of US intellectual property law?
Trademark
Moral right
Patents
Copyright
BJC4NYC 15-16: Student Content Assessment Form1
8
4. Using the decimal to character mapping above, what would be the binary representation for the letter“M”?
0110011
1011001
1001101
1001110
BJC4NYC 15-16: Student Content Assessment Form1
9
5. The question below uses a simple programming language, with the following instructions:
Consider the goal of simulating the results of flipping a fair coin 10 times, and displaying the number oftimes the coin came up tails. Which of the following code segments will NOT accomplish this goal?
BJC4NYC 15-16: Student Content Assessment Form1
10
6. Which of the following numbers is a response that this expression could give?
0
2
7
10
BJC4NYC 15-16: Student Content Assessment Form1
11
7. The question below uses a simple programming language with the following features:
Consider the goal of summing the values of the positive-valued integers in a list called numbers. Which ofthe following code segments would accomplish the goal?
BJC4NYC 15-16: Student Content Assessment Form1
12
8. Which of the following statements correctly explain how the Internet is able to facilitate communication ata large scale?
I. There is no central monitoring computer used to track and maintain the connections of the Internet,i.e., no single source of failure.
II. Once a route between a particular sender and receiver is determined to be reliable, all data isalways sent through that route to assure delivery, and after that, if any link on that route goes down, datacan no longer be transmitted.
III. The end-to-end architecture allows all the “smarts” (e.g., encryption and decryption) to be housed inthe source and destination computers/devices, and the computers/devices in the middle only need to worryabout moving packets around.
I and II only
I and III only
II and III only
I, II, and III
BJC4NYC 15-16: Student Content Assessment Form1
9. Which of the following are examples of how digital video tools (for creating effects, images, video andanimations) have transformed the movie industry?
I. Digital video tools have made it easier to edit professional-quality video on a home computer instead ofrequiring a dedicated video-editing studio.
II. Digital video tools have made it easier to create new videos by compositing existing video elementstogether.
III. Digital video tools have made it easier to synthesize new images that don’t exist in reality.
I only
I and II only
II and III only
I, II, and III
BJC4NYC 15-16: Student Content Assessment Form1
13
10. The most common method for representing color with computing applications is to control the amountsof red, green, and blue that are mixed together to create a desired color. A color can be represented by anRGB (Red, Green, Blue) triplet, which consists of three numbers between 0 and 255. The first number in atriplet represents the amount of red, the second number represents the amount of green, and the thirdnumber represents the amount of blue. For example, the RGB triplet (88, 50, 250) represents apredominantly blue color because there is more blue than there is red or green.
In many cases, the values in an RGB triplet are converted to a binary or hexadecimal representation.
Which of the following RGB triplets represents a predominantly green color?
The decimal RGB values (242, 200, 30)
The decimal RGB values (250, 250, 250)
The hexadecimal RGB values (1F, FA, 1E)
The binary RGB values (01101010, 01001111, 11011101)
BJC4NYC 15-16: Student Content Assessment Form1
14
11. The music director of a college radio station gathered data to analyze the songs that were played onthe station during the last year. A song was listed in the data every time it was played. The following datawas collected for each song:• The name of the artist • The song title • The genre
The music director wants to find the number of unique songs (i.e., same artist and title) played in the hip-hop genre. Consider the two proposed algorithms below.
Algorithm I: Filter the data by creating a list of songs only in the hip-hop genre. Sort the list of hip-hop songsby song title. If the first song is a hip-hop song, set a counter to 1. Otherwise, set a counter to 0. Iteratethrough the sorted list. If a song title is different from the previous song in the list, increment the counter by1.
Algorithm II: For each song, create a fourth data field called “artist+title” (in addition to “name of the artist”,“song title”, and “genre”), in which we concatenate the name of the artist and song title. (E.g., if the artistwere “Run DMC” and the song title were “My Adidas”, the concatenation would be “Run DMC My Adidas”)Sort the list of songs by this concatenated artist+title field. If the first song is a hip-hop song, set a counterto 1. Otherwise, set a counter to 0. Iterate through the sorted list, starting at the second song. Ifthe artist+title for a song is different from the previous song in the list AND if it’s a hip-hopsong, increment the counter by 1.
Which algorithm, if any, can the music director use to find the number of unique songs played in the hip-hopgenre?
I only
II only
Both I and II
Neither I nor II
BJC4NYC 15-16: Student Content Assessment Form1
15
12. Suppose that every personal video player will be modified so that whenever a video starts playing, thedevice will anonymously upload the following metadata to a shared centralized database:
· The name of the video
· The duration of the video
· The time of the upload of the viewing metadata
· The location of the device during the upload of viewing metadata
Which of the following pieces of information will be possible to determine if only the information in thedatabase is used?
Select TWO answers.
A list of individuals who watched a particular video
The longest-duration video played during a window in time
The highest-rated video that was watched
The state with the greatest number of uploads of viewing metadata
BJC4NYC 15-16: Student Content Assessment Form1
13. A protocol would most likely contain:
Rules for communication
Web pages
Compression
Encryption
Virus protection
BJC4NYC 15-16: Student Content Assessment Form1
16
14. Which of the following is true about the assignment statement (which sets a value of a variable) inprogramming languages?
The previous value in the variable is overwritten and lost
The previous value that is stored in a variable is available at all times
The assignment statement only works with numeric values
Assignment is only useful for programs that contain an outer loop
BJC4NYC 15-16: Student Content Assessment Form1
17
15. Which of the following is true of the programs above, supposing the starting value of SALARY is 10?
Clicking the green flag will give the same salary in Program A and Program B
Program A will always set the value of SALARY to 14
Program B will always set the value of SALARY to 14
Snap! will report an error
BJC4NYC 15-16: Student Content Assessment Form1
16. What distinguishes a higher order function from a non-higher order function?
It is always recursive
It accepts output from another function as input
It accepts another function as input
It can contain multiple inputs
BJC4NYC 15-16: Student Content Assessment Form1
17. How could the above block be used with a higher order function?
Its output can be used as input to another function
The entire function can be used as input to another function
It can be called recursively
It can be run and the list variable used in another function
BJC4NYC 15-16: Student Content Assessment Form1
18
18. Which of these is true about recursive procedures?
The input has to be a number, and becomes number-1 in the recursive call
The recursion must eventually reach a simple base case that can be solved without recursive calls
Recursion is just another way to express a loop
When the input is an empty list, the output has to be an empty list
BJC4NYC 15-16: Student Content Assessment Form1
19. Recursion is useful for programming for each of the following reasons EXCEPT:
It allows for code which is repeated many times to be written only once
A recursive function takes another function as input
It allows for some solutions which would be very complicated iteratively to be written out more cleanly
It is useful for navigating self-similar structures like fractals, which occur in many problems
BJC4NYC 15-16: Student Content Assessment Form1
20. The following image was created by calling this custom block.
19
Which of the following expressions must be in the empty input slot to create this image?
BJC4NYC 15-16: Student Content Assessment Form1
20