Before you keep reading...
Runestone Academy can only continue if we get support from individuals like you. As a student you are well aware of the high cost of textbooks. Our mission is to provide great books to you for free, but we ask that you consider a $10 donation, more if you can or less if $10 is a burden.
Before you keep reading...
Making great stuff takes time and $$. If you appreciate the book you are reading now and want to keep quality materials free for other students please consider a donation to Runestone Academy. We ask that you consider a $10 donation, but if you can give more thats great, if $10 is too much for your budget we would be happy with whatever you can afford as a show of support.
Impacts of CS Electronic Documents¶
Time Estimate: 135 minutes
Introduction and Goals¶
Computing has transformed our lives in so many ways. Mobile computing, where we are constantly connected to others and to the world via our devices, is challenging us to develop new norms about privacy, security, rights, and other issues.
Like any technology, mobile computing has both positive and negative impacts. We need to reflect on these impacts in general and on the impacts of the mobile apps we create.
Learning Objectives: I will learn to
Language Objectives: I will be able to
- Blown to Bits Chapter 3
- Conversation Questions Template
- Now That's Surprising! Template
- Steganography Activity
Chapter Three: Ghosts in the Machine: Secrets and Surprises of Electronic Documents
Chapter Three of Blown to Bits describes how digital documents, including images and sounds, are represented by sequences of bits. Why do you think this chapter is called "Ghosts in the Machine"?
As you learned in the previous lesson and as shown in the this diagram, the first step in representing an image is to convert it into a sequence of bits. This is known as modeling. The model is an abstract representation of the original image.
Activity: Read Chapter Three (up to page 99) to discover what's hidden in electronic documents.
- Part 1: What You See Is Not What the Computer Knows - Read pg. 73 and 74 out loud as a class and discuss the word "redacted." Continue reading this section (up to pg. 80), using the Conversation Questions Template to write down a question about 3-4 ideas that were important, surprising, or thought provoking. In small groups, discuss your questions.
Metadata (data about data) is described and discussed on pg. 78-80. Here are a few additional things you should know about metadata:
- Metadata are used for finding, organizing, and managing information.
- Metadata can increase the effective use of data or data sets by providing additional information.
- Metadata allow data to be structured and organized.
- Part 2: Representation, Reality, and Illusion - Read pg. 80-94 and complete the Now That's Surprising Template. In small groups, discuss your notes.
- Part 3: Hiding Information in Images (pg. 95-99) is called steganography. First, answer the question below, then read the chapter pages as needed to help you complete this activity—you'll have an opportunity to hide your initials, or some 3-letter word, in an image. Try it, it's fun!
In this lesson, you learned how to:
Printers sometimes add secret dots to documents when they're printed, very similar to steganography. In fact, the secret dots on a leaked, classified document were able to help the FBI identify a potential suspect. Read more in this article from the BBC.
Here is a table of the technical terms introduced in this lesson. Hover over the terms to review the definitions.
Check Your Understanding
Complete the following self-check exercises.
Reflection: For Your Portfolio¶
Answer the following portfolio reflection questions as directed by your instructor. Questions are also available in this Google Doc where you may use File/Make a Copy to make your own editable copy.