Magnet Foundations Course Docs

Foundations Course Syllabus

Abstraction Notebook Directions

e-Portfolio Directions & Demo e-Portfolio

APCSP Concept Outline –for Learning Objectives

AP Computer Science Principles Course Overview


Important Due Dates:

 Performance Tasks Submitted  – Monday 4/30
AP Exam – Friday 5/10

AP Exam Resources:

Course and Exam Description from the College board (See p. 91 for several sample test questions)

Review Book for AP Exam – to buy

Computer Science Principles Online Text Book – This would be a good way to review material from class. It also contains self-check questions and quizzes

Relevant Video Lessons – Good review of concepts. Most are 5 – 10 minutes long

Vocabulary Review – Quizlet with terms that will likely come up on the AP Exam

Performance Task Links:

Enrollment Instructions
Performance Task Instructions, Rubrics, and Samples (see bottom of page)
Explore PT Template
Create PT Template

 

AP Bio Unit 9

Ecology Ch. 52-56

Important Dates:

Thurs. 12/6  – Ch 52; Sun 12/9 – Ch 53 & 54; Tue 12/11 – Ch. 55; Wed. 12/12 – Ch 56;  Fri 12/14 – TEST

Chapter Outlines:

Ch52    Ch53    Ch54     Ch55     Ch56

Ecology unit Notes Ch. 52-55

Presentations:

My Class Presentation

​Ecology in a ‘Nutshell’- Part 1
Ecology in a ‘Nutshell’- Part 2

Human Impact

Ch 52 
Ch 53
​Ch 54  Pt 1
Ch 54  Pt 2
Ch 55
Ch 56 


Gorongosa National Park Interactive


Plant Identification

Mock Explore PT

5 classes

Due Dates:

A  day – Tue. 12/18 (beginning of class) 

B  day –  Mon. 12/17 (beginning of class)

  1. You (and a partner) will be given an innovation that has been published on the AP site and can therefore not be used for the actual Performance Task (see below)
  2. You will research and complete the writing prompts according to the College Board rubric (see below) and create a digital artifact in Photoshop (although on the actual performance task you can use anything you like to create the artifact)

Explore PT Overview                    Explore PT Rubric

Your Photoshop artifact (this will also be a separate grade according to the  criteria below)

    • Must include at least 3 images (high resolution/no watermarks/etc)
    • Demonstrate 10 skills from the lessons
    • Demonstrate several Elements and Principles of Art
    • Must be neat and crerative
    • Must be saved as a .pdf and uploaded to the google classroom assignment

Photoshop for Mock Performance Task Write-up

3.  You will upload your work (anonymously) to Doc1 in the number that has been assigned to you  in the correct folder below. You and your partner will be assigned papers to peer review.

3a Folder      4a Folder       3b Folder      4b Folder

·       Virtual Reality ·       Autonomous Cars ·       EQ Radio
·       GPS ·       Android Auto ·       Near Field Communication
·       FitBit ·       Block Chain ·       Apple Pay
·       Microsoft HoloLens ·       BitCoin ·       Social Media
·       Electromyographic (EMG) prosthetic limbs ·       iPhone X ·       Apple Watch

INNOVATION –– The process of translating an idea or invention into a good or service that creates value or for which customers will pay.  To be called an innovation, an idea must be replicable at an economical cost and must satisfy a specific need.


2E – Sources

  • Minimum of 3 Sources
    • 2 must have been created on or after May 2018
    • 1 must be from a peer reviewed journal – see Galileo or Wheeler Library for Databases
  • All sources need to be Credible, Accurate, Reasonable, and provide Support. This is called the CARS checklist and an explanation can be found HERE
  •  In-text citations and reference page must be done in APA style
    • This site gives format for citing information found on the web
    • This site gives format for many other source types

FORMAT:

IN-Text Citation:

Article in Academic Journal:

Web Site Source:

Images:


2C

Features vs. Effects (beneficial & harmful )

Many students mistake features of an innovation for effects…

A feature is something that the innovation has or is. For software this is typically functionality offered by a software program that enables users to do something. Other examples of product features might include razors with five-blade heads, power drills with interchangeable bits, fridges that can make crushed ice etc.

Effects are the outcomes or results that users will experience by using the innovation. Negative effects have to be as a result of intended use of the innovation.

Example – Online Banking

Features – allows users to pay for items online, users can check their balance any time.(these are NOT beneficial effects – their just what online banking does)

Beneficial Effect – Users could manage their budget and spend more carefully by being able to continually check their balance

Harmful Effect – Some users could overspend due to the ease of online payment methods

Not a Harmful Effect – Users bank information could get stolen by “hackers”. (this is not a harmful effect of online banking because “hacking ” into an account is not the INTENDED use of the innovation)

*** To get the points for this part, you would need to connect the benefit and harmful effect to society, economy, or culture – in this case you could research how much debt the average person has and what impact that has on the economy or society ***

 

 

Explore PT

 8 hours of in-class time

Due Dates: (coming soon)

  • A-Day:
  • B-Day:

Explore PT Overview                    Explore PT Rubric

Student Samples   Scroll down the page the see student work samples, rubric, and commentary

Need some ideas? (keep in mind- not all of these are computing innovations)

100 Greatest Innovations from 2016

30 Innovations That Improved the World

 

While choosing an innovation keep several things in mind:
-You will need at least 2 sources no older than from May 2018
-You will need to find information about:
-Positive and negative effects on society, culture, or economy
-How it inputs, transforms, and outputs data

-Data security and/or privacy concerns

So, do some quick searching to make sure that there is enough information available to you

Turn in your Explore PT to Google Classroom:

Submit a video, audio, or PDF file. Use computing tools and techniques to create one original
computational artifact (a visualization, graphic, video, or audio recording). Acceptable multimedia file
types include .mp3, .mp4, .wmv, .avi, .mov, .wav, .aif, or .pdf format. PDFs must not exceed 3 pages
in length. Video or audio files must not exceed 1 minute in length and must not exceed 30MB in size.

 

Photoshop Performance Task

 1. Complete the Photoshop Lessons   

Lessons Due:

A-Day: Wed. 12/2

B-Day: Tue. 12/11

   (Most can be done with the free, online, Photopea or you can get a free 7 day trial of Photoshop here)

The link below should take you to all Photoshop lessons, pictures and rubrics

(Click refresh if your browser does not generate a preview to a file.)

https://www.dropbox.com/sh/alzn8ss8ba1jmox/HM7Vdlakoc/Photoshop 

** We are not doing #2 this year (2018) 
2. Create a digital image in Photoshop that represents the self driving car
(you will be assigned a particular focus topic)

You will need to demonstrate Photoshop and design skills discussed throughout this task.

See requirements in the handout below:

Photoshop Innovation Assignment

This information may be helpful:     Difference Between Culture & Society


TURN IN HERE

File should be a .jpg and have your name(s) in the file name

1st Block Shared Folder

1st block Padlet You must be signed in. Any Anonymous posts will be deleted. Password – Walstead523

Block 3A Shared Folder

Block 3B Shared Folder


WARM-UPS

Day 1————————

The fundamentals of the RGB system: VIDEO CLIP

Hexa – Color Examples  **Remember hexadecimal conversions**

RGB Challenge Show High Score >10 to Me (or screen shot it, or take a pic)

Day 2————————

Understand the advantages and disadvantages among the use of different image file formats

VIDEO CLIP

Complete this sheet, print it, and place in your abstraction notebook

Good Information Here: https://1stwebdesigner.com/image-file-types/

Day 3 ————————

Elements & Principles of Art & Design

In your Abstraction Notebook: Choose 3 images from these 12 Digital Art Examples. Describe them in the context of the elements and principles of art & design (see below)

Click on image to enlarge

 

AP Bio Unit 8

Animal Systems:
Ch. 40, 42, 43, 45, 46, 48, 51
Human Body Systems – Optional Project (See Below)

Important Dates:
Wed. 11/14 Ch. 40
Thurs. 11/15 Ch. 51
Mon. 11/26 Ch. 48
Tue. 11/27 Project Due (Start of Class)
Tue. 11/27 Ch. 43
Wed. 11/28 Ch. 42
Thurs. 11/29 Ch. 45
Sun. 12/2 Ch. 46
Tue. 12/4 – Test    Focus Topics Unit 8   

Quizlet Unit 8

My Class Presentation

Unit Presentations:
Animal Classification
Ch 40
Organism Regulation (Homeostasis)
Ch 42 A (Circulatory)
Ch 45 
Ch 48
Ch 43 
Ch 43  Pt 2
Ch 46
Ch 51 


Body Systems Video Project

**This project is OPTIONAL, however once you decide to participate (by Fri 11/16) you MUST follow through and the grade you earn will be entered into the grade book. Choosing not to participate (by Fri 11/16) will have no impact on your grade.**

Fine Art Standards

• Dance
• Dramatic Arts/Theatre
• Media Arts
• Music
• Visual Art

Data Art Examples

Data Art Examples II

Work for Wed. 11/7

3rd and 4th block:

See day 2 of the cipher warm-ups HERE – place this in your lab notebook in the same entry as day 1.

Complete your cyber-threat page of your e-portfolio. It should have the following:

  • Threat definitions and how to combat them (with hyperlink sources)
  • Your comic – Visible and readable on the site – NOT A LINK
  • Case Study summary and hyperlink to source

 

Encryption Warm-ups

Day 1

»Decrypt the following message using this Code.org Widget: https://studio.code.org/s/csp4/stage/5/puzzle/2

⇒ Wklv lv d vhfuhw phvvdjh. Fdq brx ghflskhu lw? Lw zdv pdgh xvlqj d Fdhvdu flskhu.

In your abstraction notebook answer the following WITHOUT LOOKING UP INFORMATION:

  1. What is a Caesar Cipher?
  2. How many possibilities are there for a Caesar Cipher?
  3. What do you think are the most common letters in English?
  4. What do you think are the least common letters in English?
  5. What do you think are the most common two letter words?
  6. What do you think are the most common repeated letters?
  7. What letters typically follow apostrophes?

We can now use these methods to crack Ciphers.


Day 2

»You are going to decrypt an encrypted message with your “table-mate”and answer the questions that follow

The number on your table is the message that you have been assigned. See messages here. Copy it.

You need to use this widget, https://studio.code.org/s/csp4/stage/5/puzzle/5, and what we talked about frequency analysis (#3-7 above) to decrypt your assigned message. Make sure you read the directions on how to use the widget.

»In your abstraction notebook answer the following:

  1. What are the first two sentences of your message? (include message #)
  2. How many possibilities are there for a random substitution?
  3. What are the weaknesses of a random substitution?
  4. Can these weaknesses be addressed with versions of Vigenère cipher? See the following: https://studio.code.org/s/csp4/stage/6/puzzle/2
  5. Explain how the Vigenère cipher works
  6. How many possibilities are there with a Vigenère cipher?
  7. What is the problem with using any of these methods to encrypt information being sent over the internet?
  8. What is the purpose of an SSL Certificate

Day 3 & 4

SSL and Public Key Class Notes

Related image

Modern Techniques: Alice and Bob and Public Key Encryption

Image result for diffie hellman

Image result for diffie hellman

AP Bio Unit 7

Unit 7

PROKARYOTES, PROTISTS, FUNGI

Chapters 27, 28, 31

PLANTS

Ch 29, 30, 36, 38, 39  [*Ch 35- only know leave structure; Ch 37- only section 37.3]

Important Dates

Ch 27, 28, 31 Note Sheet (see below)- Fri. 1/2;

TEST – Tues. 11/13

Focus Topics for Test: (Note Sheet version)

Taxonomy, prokaryotes, protists, fungi

Algae characteristics

Archaea vs Bacteria

Bacteria Reproduction

Bacteria structure

Bacterial metabolism

Conjugation

Ecological role of prokaryotes

Endosymbiosis

General Linnaean Taxonomy

Gram + vs. Gram –

Hyphae/Mycelium function

Mycorrhizae/Plant relationship

Nitrogen fixation

Protist Reproduction

Viroid & Prion

Plants

Adhehesion & Cohesion’s role in transpiration

Angiosperm characteristics

Bryophyte characteristics

Bryophyte life cycle

Bryophyte structure

Gymonsperms characteristics

Photosynthesis vs Transpiration

Plant Hormones

Pteridophytes characteristics

Sporophyte vs Gametophyte

Tracheophytes characteristics

Transformation lab information

Tropisims

Water Potential

 

PowerPoints and Prezis

Classification– use for Unit 7:
Ch 27
Ch 28– 2016- 2018 (shortened)
Ch 28 Pt 1 – Longer
Ch 28 Pt 2 – Longer
Ch 31– 2016-2018 (shortened)
Ch 31 – Longer
Transformation Lab PPt
Supplement PPt for Ch 30 Angiosperms– 2016 (some of Ch 30 & a little of Ch 38)
Ch 29, 30 (and little of 35– Focus on the leaf). 2016. Also, be sure and study cladogram on PPt: ex- algae evolved before charophyte)
*Note- we will not do Ch 37 (not on AP Exam)
Ch 36
Ch 38
Ch 39 ​


Transformation Pre-Lab


Microorganism Note Sheet – Due by the end of class Friday, 11/2

Sign up for google classroom – use wheeler or magnet  gmail account.

Class Code: gnuj5p4

Cybersecurity

Due Dates: (these may change – will be discussed in class)
(4 classes)
A-Day – Friday Nov 9
B Day – Thurs. Nov 8
  1. Record the definition of each of the following types of attack (see below) in your abstraction notebook (handwritten) also include how theses cyber attacks are combated – This should be in your own words and sources should be noted (copy url’s into a google doc)
  2. These definitions will also need to make it onto your digital portfolio under the Internet Big Idea – Create a new tab called cybersecurity. It should neatly include the information you collected above, the links to the sources (hyperlinked) and some relevant visuals
  3. For your assigned attack:

⇒Create a 6 panel storyboard/comic from StoryboardThat.com. It should include summary information about your attack and how to combat it in a fun/interesting/creative way. It can be a short story or informational.

This needs to be included on the page with the information from above. It has to be VISIBLE and READABLE on the page (not a link)

⇒Find a case study about your attack and summarize on your cybersecurity page Be prepared to share the details with the class. Include links to sources.

Grading:    Grading Rubric

Definitions – and how to combat them in your own words with visuals and hyperlinks (50 pts)

Comic – creative and clear representation of your topic (30 pts)

Case Study – summary and link provided (10 pts)

Web Site Layout – clear, visually appealing layout, on one page (10 pts)


Types of Cyber Attacks:

a.     Phishing 

b.     Viruses

c.      Malware

d.     Socially engineering Trojans 

e.     Network-traveling worms

f.       Unpatched software

g.      Password attacks

h.     Destributed Denial-of-Service (DDoS) Attacks

i.       Man in the Middle (MITM)

j.       Maladvertising (Malvertising)

k.      Botnet Attack

l.       Advanced Persistent Threat

m.     Ransomeware


WARM-UPS

Day 1

»Decrypt the following message using this Code.org Widget: https://studio.code.org/s/csp4/stage/5/puzzle/2

⇒ Wklv lv d vhfuhw phvvdjh. Fdq brx ghflskhu lw? Lw zdv pdgh xvlqj d Fdhvdu flskhu.

In your abstraction notebook answer the following WITHOUT LOOKING UP INFORMATION:

  1. What is a Caesar Cipher?
  2. How many possibilities are there for a Caesar Cipher?
  3. What do you think are the most common letters in English?
  4. What do you think are the least common letters in English?
  5. What do you think are the most common two letter words?
  6. What do you think are the most common repeated letters?
  7. What letters typically follow apostrophes?

We can now use these methods to crack Ciphers.


Day 2

»You are going to decrypt an encrypted message with your “table-mate”and answer the questions that follow

The number on your table is the message that you have been assigned. See messages here. Copy it.

You need to use this widget, https://studio.code.org/s/csp4/stage/5/puzzle/5, and what we talked about frequency analysis (#3-7 above) to decrypt your assigned message. Make sure you read the directions on how to use the widget.

»In your abstraction notebook answer the following:

  1. What are the first two sentences of your message? (include message #)
  2. How many possibilities are there for a random substitution?
  3. What are the weaknesses of a random substitution?
  4. Can these weaknesses be addressed with versions of Vigenère cipher? See the following: https://studio.code.org/s/csp4/stage/6/puzzle/2
  5. Explain how the Vigenère cipher works
  6. How many possibilities are there with a Vigenère cipher?
  7. What is the problem with using any of these methods to encrypt information being sent over the internet?
  8. What is the purpose of an SSL Certificate

Day 3 

SSL and Public Key Class Notes

Related image

Modern Techniques: Alice and Bob and Public Key Encryption

Image result for diffie hellman

Image result for diffie hellman