3.10. Impacts of CS Electronic Documents

Time Estimate: 135 minutes

3.10.1. Introduction and Goals

Computing has transformed our lives in so many ways. Mobile computing, where we are constantly connected to others and to the world via our devices, is challenging us to develop new norms about privacy, security, rights, and other issues.

Like any technology, mobile computing has both positive and negative impacts. We need to reflect on these impacts in general and on the impacts of the mobile apps we create.

Learning Objectives: I will learn to
  • describe digital models and their renderings as abstractions
  • differentiate between data and metadata
  • describe what information can be extracted from metadata
Language Objectives: I will be able to
  • discuss the beneficial and harmful effects of computing innovations
  • use target vocabulary, such as modeling, and render, while discussing digital models, with the support of concept definitions and vocabulary notes from this lesson

3.10.2. Learning Activities

Chapter Three: Ghosts in the Machine: Secrets and Surprises of Electronic Documents

Chapter Three of Blown to Bits describes how digital documents, including images and sounds, are represented by sequences of bits. Why do you think this chapter is called "Ghosts in the Machine"?

As you learned in the previous lesson and as shown in the this diagram, the first step in representing an image is to convert it into a sequence of bits. This is known as modeling. The model is an abstract representation of the original image.

Activity: Read Chapter Three (up to page 99) to discover what's hidden in electronic documents.

  • Part 1: What You See Is Not What the Computer Knows - Read pg. 73 and 74 out loud as a class and discuss the word "redacted." Continue reading this section (up to pg. 80), using the Conversation Questions Template to write down a question about 3-4 ideas that were important, surprising, or thought provoking. In small groups, discuss your questions.

    Metadata (data about data) is described and discussed on pg. 78-80. Here are a few additional things you should know about metadata:

    • Metadata are used for finding, organizing, and managing information.
    • Metadata can increase the effective use of data or data sets by providing additional information.
    • Metadata allow data to be structured and organized.
  • Part 2: Representation, Reality, and Illusion - Read pg. 80-94 and complete the Now That's Surprising Template. In small groups, discuss your notes.
  • Part 3: Hiding Information in Images (pg. 95-99) is called steganography. First, answer the question below, then read the chapter pages as needed to help you complete this activity—you'll have an opportunity to hide your initials, or some 3-letter word, in an image. Try it, it's fun!

3.10.3. Summary

In this lesson, you learned how to:

3.10.4. Still Curious?

Printers sometimes add secret dots to documents when they're printed, very similar to steganography. In fact, the secret dots on a leaked, classified document were able to help the FBI identify a potential suspect. Read more in this article from the BBC.

3.10.5. Self Check

Vocabulary

Here is a table of the technical terms introduced in this lesson. Hover over the terms to review the definitions.

algorithm
analog
ASCII
cloud computing
cryptography
digital
download
lossless compression
lossy compression
megabyte
megapixel
modeling
OCR
pixel
raster
render
spam
steganography
upload

Check Your Understanding

Complete the following self-check exercises.

3.10.6. Reflection: For Your Portfolio

Answer the following portfolio reflection questions as directed by your instructor. Questions are also available in this Google Doc where you may use File/Make a Copy to make your own editable copy.

You have attempted of activities on this page