CS4HS Columbia University Injecting CS into High School Math and Science Classes Adam Cannon Department of Computer Science Columbia University.

Slides:



Advertisements
Similar presentations
Practically, Internet can be described as a multifunctional tool since we can use it for several purposes, such as: Seeking useful information Contacting.
Advertisements

Part I: Making Good Online Choices
TECHNICOOL A Technology Safety Program © 2011 PCAV.
EE465: Introduction to Digital Image Processing 1 One-Minute Survey Result  Thank you for your responses Kristen, Anusha, Ian, Christofer, Bernard, Greg,
1 fairCASH: Concepts and Framework Yen Choon Ching Institute of Computer Science, University of Kiel, Germany Ver Sept 2008.
Netprog: Cryptgraphy1 Cryptography Reference: Network Security PRIVATE Communication in a PUBLIC World. by Kaufman, Perlman & Speciner.
Going Places Safely Essential Question:
Communicating Your Emotions By: Karen Greenberg William Noell Matthew Visconti.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
The key aim for the week is: To ensure children are able to recognise and challenge bullying behaviour wherever it happens - whether face to face or in.
Windows Core Security1© 2006 Microsoft Corp Cryptography: Helping Number Theorists Bring Home the Bacon Since 1977 Dan Shumow SDE Windows Core Security.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
CS Unplugged Techniques for Teaching Computer Science Concepts.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
1 Design, Implementation and Deployment of the iKP Secure Electronic Payment System Mihir Bellare, Juan A. Garay et al. “ … At this day and age it is hardly.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Unit 1 - The Internet CSC CSC The Origin of the Internet  ARPANET  Advanced Research Projects Agency Network  Funded by the U.S. government.
Mrs. LaRita Wiggins and Mrs. Karen Lewis Henry County Technology Conference July 22, 2015.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Digital Communications Math class.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Issues in Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology.
State of Social Media: 2011 Mary Madden, Senior Research Specialist Presented to: U.S. State Department's Bureau of Educational and Cultural Affairs National.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Math By Kaylee D. What have you found challenging about math this year? This Year I think something challenging was the pace of the math class. I think.
Lecture 12 E-Commerce and Digital Cash. As communication technologies, such as the Internet and wireless networks, have advanced, new avenues of commerce.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
Web 2.0. what is it, and what can it do?. Interactive Multimedia (IMM)  Interactive Multimedia are things like programs or websites that allow you to.
ICT in Primary Language Learning Presentation English Didactics Course Janne Lumme 13th Oct 2004.
Pamela Wetzel ITC Summer 2. Types of Technology How to be Safe Online Research Tools Review Game Standards Credits.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
1 DCS 835 – Computer Networking and the Internet Digital Certificate and SSL (rev ) Team 1 Rasal Mowla (project leader) Alvaro Restrepo, Carlos.
1 Cryptography NOTES. 2 Secret Key Cryptography Single key used to encrypt and decrypt. Key must be known by both parties. Assuming we live in a hostile.
 NEED  Food  Water  Clothes/shoes  Homes  Phones  Gas for cars  WANT  Accessories  Junk food we don’t need (eating out)  Online shopping.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
WHAT IS THE FIRST THING YOU THINK OF WHEN YOU SEE…….
Technology has been evolving since the Past, and there’s where we’re going to start.
Today we are teaching the Millennial Generation!!!!
Electronic Payment Systems Presented by Rufus Knight Veronica Ogle Chris Sullivan As eCommerce grows, so does our need to understand current methods of.
Do not give out personal information. Never meet someone face - to - face (FTF) that you have met on the Internet or have them visit you.
The Best Subject in School By Gooberelly. What is the best subject in school? This my story about what is the best subject in school Math is the best.
EYFS and Key Stage 1 Parents Workshop for Numeracy Tuesday 17 th September 2013 St. Michael and St. Martin Catholic Primary School.
Single Digit Addition Flash cards.  The program starts with introduction.  Today, we’re going to play single digit numbers addition and flash cards.
Lecture 20 CSE 331 July 30, Longest path problem Given G, does there exist a simple path of length n-1 ?
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
By Sanjar Hekmati. Standard: Students will understand algebraic concepts and applications 9-12 Benchmark.A.1: Represent and analyze mathematical situations.
INCS 741: Cryptography Overview and Basic Concepts.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Christian Citizenship in a Digital World Lesson 4:Digital Etiquette.
Online Documents – File Compression File size can be a big deal Like when you want more music on your phone Or work on your USB stick Or when you.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Fun with Letters for Parents and Children. Reading is essential to school success. Start now to help your child get ready to read. Learning to read begins.
COMPUTERSCIENCE High School Teacher's Workshop The University of Virginia July 9, 2008 And kinesthetic computer science activities Lynn Lambert Christopher.
Internet Safety How to stay safe online.
8 Coding Theory Discrete Mathematics: A Concept-based Approach.
Tapestry Workshop The University of Virginia July 15, 2009
Uses Uses of cryptography Lab today on RSA
Dhanushiya. R I YEAR BSc COMPUTER TECHNOLOGY.  Error is a condition when the output information does not match with the input information. During transmission,
CS Introduction to Operating Systems
Google Account Recovery Process
Presentation transcript:

CS4HS Columbia University Injecting CS into High School Math and Science Classes Adam Cannon Department of Computer Science Columbia University July 8, 2011

Outline Binary numbers Information theory Hiding information Digital Signatures Error Detection and Correction

Binary Numbers We use binary numbers to represent information in computer systems Why? It’s just more natural On/Off Positive/Negative Charges N-S/S-N Magnetic Fields

Information Theory How do we measure information? Example: Text message that reads: “See you at Starbucks later?” or *$ l8r?”

Information Theory Both convey the same information so measuring the length of the message is not really useful if we are trying to measure the amount of information conveyed.

Information Theory Both convey the same information so measuring the length of the message is not really useful if we are trying to measure the amount of information conveyed. So how do we do it?

Information Theory Both convey the same information so measuring the length of the message is not really useful if we are trying to measure the amount of information conveyed. So how do we do it? We play 20 questions.

Information Theory The amount of information in a message can be quantified by how hard it is to “guess” what’s there.

Information Theory The amount of information in a message can be quantified by how hard it is to “guess” what’s there. Example: Pick a number

Information Theory The amount of information in a message can be quantified by how hard it is to “guess” what’s there. Example: Pick a number Between 1-10

Information Theory The amount of information in a message can be quantified by how hard it is to “guess” what’s there. Example: Pick a number Between 1-10 Between

Information Theory Guessing a number between 0-7: From csunplugged.org

Information Theory Understanding how much information is really contained in any kind of message is the cornerstone of compression technologies. These technologies are used for everything from to digital voice communication to streaming video.

Hiding Information Sharing information online is a common and increasingly necessary activity today.

Hiding Information Sharing information online is a common and increasingly necessary activity today. How can we share information and still maintain a reasonable level of privacy?

Hiding Information Techniques like these may be used to guard information during online transactions. Ecommerce Medical Data Personal Data

Digital Signatures How can we “trust” someone online?

Digital Signatures How can we “trust” someone online? When would we need to do this?

Digital Signatures How can we “trust” someone online? When would we need to do this? Online contracts

Digital Signatures How can we “trust” someone online? When would we need to do this? Online contracts Identity verification

Digital Signatures How can we “trust” someone online? When would we need to do this? Online contracts Identity verification Online gaming

Digital Signature Example: How can we flip a coin over the phone?

Digital Signature Example: How can we flip a coin over the phone? The math behind this is simple. The key is to find a function that is easy to compute but whose inverse is tough!

Digital Signatures Function / Inverse-Function pairs like this are a primary tool in modern public key cryptography.

Digital Signatures Function / Inverse-Function pairs like this are a primary tool in modern public key cryptography. Examples like these can be used to motivate the study of functions and inverses in high school algebra!

Error Detection and Correction Often noise corrupts digital communication. This can be due to all kinds of natural or unnatural sources.

Error Detection and Correction Often noise corrupts digital communication. This can be due to all kinds of natural or unnatural sources. How can I know that the message I received is the message you sent?

Error Checking and Correction Techniques like these are used on everything from internet message transmissions to credit card fraud detection.

Games and Puzzles That Teach These activities can be challenging and a lot of fun They stimulate curiosity They are relevant to everyday life in today’s world. Will your students respond to these?

Want to learn more? If you do choose to use any activities like these, I would love to hear your feedback. Thanks! Check out CS Unplugged at: