3.10. Impacts of CS Electronic Documents

This lesson focuses on some of the positive and negative implications of the fact that today "it's all bits" -- i.e., all digital information, including text, pictures, videos, and apps, are represented by binary digits. It focuses on the enduring understanding that variety of abstractions built on binary sequences can be used to represent all digital data. Students will read a section of the Blown to bits that focuses on digital documents. They'll learn about how meta data in a document can be used to identify who created or modified the document, and how the bits that make up an image can be used to hide secret messages, a technique known as steganography.

Professional Development

The Student Lesson: Complete the activities for Mobile CSP Unit 3 Lesson 3.10: Blown to Bits: Electronic Documents.

Materials

3.10.1. Learning Activities

Estimated Length: 135 minutes

Note that the timeline of this lesson is approximately three or four 45 minute class periods. If you want to shorten the lesson, you could ask students to do some of the reading and portfolio writing outside of class; however, we recommend keeping the discussion activities in class.

  • Hook/Motivation (5 minutes): For a pre-reading activity, ask students: How is a digital image a model? Can you give an example? Emphasize that a digital image is a model. Optional - review answers to portfolio questions from Lesson 3.3: Image Representation. Explain to students that Chapter 3 of Blown to Bits describes how digital documents, including images and sounds, are represented by sequences of bits.
  • Experiences and Explorations (10 minutes):
    • Think-Pair-Share: Why do you think this chapter is called "Ghost in the Machine"? Think about this on your own. Discuss it with a partner. Then share your ideas with the whole class.
    • Read Aloud: Read page 73 out loud to the class. Discuss the word "redacted." You may also need to discuss the setting of the chapter and provide background information about the Iraq war. Review the image on the top of page 74 to demonstrate "redact." What was the purpose in blocking out sections of the text? Read the rest of page 74 out loud.
  • During Reading Activity (In-Class, 20 minutes or Homework): Have the students read pp. 75-80. As students are reading, ask them to create "Conversation Questions" (template provided in the materials section) by doing the following:
    1. Highlight information that is important, surprising or thought provoking. Choose three or four pieces/ideas from the text.
    2. Once you have highlighted an idea, jot down a question about that idea that would be interesting to talk about with your classmates. Make your questions open-ended, that is questions that cannot be answered with simple one-word responses. Your open-ended questions may start with some of the following:
      • What did you think…
      • Why do you think…
      • How did you feel about…
      • How could…
    3. Now try to think about a time when something similar happened to you or share a time when you learned about something being shared on the Internet that was considered private.
  • Making Connections: Small Group Discussion (20 minutes): Break class up into groups of 2-4 students. Have students pose one of the discussion questions they created. Groups should then discuss each question. Once students have each asked a question, have students share an example of something that happened to them or that they read about that was similar in nature to what is presented in the chapter. Ask them to consider what advice they might give to the military and/or journalists to protect secret/protected information when posting on the Internet? Take a couple of minutes to check in with students about what they read.
  • During Reading Activity (In-Class, 25 minutes or Homework): Have the students read pp. 80-94, "Representation, Reality, and Illusion.” As students are reading, they should complete a "Now That’s Surprising" reading response sheet. (A template is provided in the materials section.) Each student should respond to four ideas from the text by completing the following:
    1. An idea that interests me or surprised me (include page #)
    2. What do I think about it?
    3. Why does it matter?
  • Making Connections: Small Group Discussion (20 minutes): In their groups, have students share one idea from the reading that was interesting or surprising to them and what they thought about it. Then have students share examples of photo and video editing that they may have heard about. Ask them to think about their school pictures and what kind of editing happens to them. Have them create a timeline of audio formats (i.e. albums to 8-tracks to tapes to CDs to MP3 files) and then predict what the next digital audio format might be like. Take a couple of minutes to check in with students about what they read.
  • During Reading Activity (In-Class, 25 minutes or Homework): Have the students complete the steganography survey question then read pp. 95-99, "Hiding Information in Images." After reading this section, students should complete the steganography activity where they use a bitmap editor to hide three letters in an image following an algorithm for changing the decimal values of the pixel colors. Make sure students decode their images so they can check their work. If they're struggling, it might help to write the numbers down on paper with the byte values below each one. Students who finish early can start work on their portfolio reflections.
  • Rethink, Reflect and/or Revise (15 minutes): Have the students complete their portfolio reflections. Share portfolio responses, especially the free response questions. If time, share the BBC article about steganography being used with color printers and how it has impacted detective work.

AP Classroom

The College Board's AP Classroom provides a question bank and Topic Questions. You may create a formative assessment quiz in AP Classroom, assign the quiz (a set of questions), and then review the results in class to identify and address any student misunderstandings.The following are suggested topic questions that you could assign once students have completed this lesson.

Suggested Topic Questions:


  • Topic 2.3 Extracting Data from Information

Assessment Opportunities

Solutions:

Assessment Opportunities

You can examine students’ work on the interactive exercise and their reflection portfolio entries to assess their progress on the following learning objectives. If students are able to do what is listed there, they are ready to move on to the next lesson.

  • Portfolio Reflections:
    LO X.X.X - Students should be able to ...

Differentiation: Enrichment

Have students bring in and share a summary of a recent news article related to one of the topics in the chapter, such as image retouching, steganography, etc.

Background Knowledge: ASCII

Computer Science Content: You might find it helpful to read this Wikipedia article on ASCII. There is a table listing the binary, octal, decimal, and hexadecimal variants for the ASCII codes.

3.10.2. Professional Development Reflection

Discuss the following questions with other teachers in your professional development program.

  • How well does this lesson build towards the enduring understanding that computing may have unintended consequences
    [EU IOC-1]
    ?

    I am confident I can teach this lesson to my students.
  • 1. Strongly Agree
  • 2. Agree
  • 3. Neutral
  • 4. Disagree
  • 5. Strongly Disagree

You have attempted of activities on this page