CSCI 103 - Survey (Principles) of Computing                    

Tobin Maginnis (ptm at olemiss dot edu)

 Second Summer Term 2013 

Dates

Days

Events

July 24 Wednesday Classes end.
July 25-26 Thurs-Fri Final examinations.

Syllabus

CSCI103 Pre/Post Survey

Learning Objectives

Class Calendar   Alternative Class Calendar

Grades

Quiz Answers
Mid-term Test Answers

Assignment Zero - Take the Survey
Assignment One - July 8th
Assignment Two - Jul 10th
Assignment Three - Jul 12th
Assignment Four - Jul 15th
Assignment Five - Jul 17th
Assignment Six - Jul 24th

Book
Web Site for Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Chapter 1 Digital Explosion Why Is It Happening, and What Is at Stake?
Define science and compare computer science versus computology versus computer engineering
Tool chains
Explain how bits are an abstraction
Compare and contrast a computer versus any other machine in terms of energy in/out and function
Explain how analog systems become imperfect or accumulate cruft
Explain how the operation of an analog transistor creates "perfect" bits
Describe the doubling interval
Demon • ocracy.info
Decimal to Binary Conversion Worksheet
Pizza Program

Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned
Internet Vigilantism
Webcam views of the some of the world's favorite places
Network of scenic webcams
Webcams found with search engines
Super Circuits Cameras
William Binney - Stellar Wind
Edward Snowden - Boundless Informant
Brandon Mayfield - FISA Search
Acxiom • ChoicePoint
NSA Digital Privacy Black Paper
The AOL Search Data - 460MBs compressed, 2.2GBs uncompressed
The Average Person Commits Three Felonies per Day
Privacy is the way society allows deviations from prevailing social norms, given that social progress requires social experimentation
Fair Information Practice Principles: Openness, Disclosure, Secondary use, Correction, Security
Government intrusion, ubiquitous cameras, GPS, RFID, EDRs, embedded Xerox & phots IDs, distributing personal data, digital crumbs, re-identification,

Chapter 3: Ghosts in the Machine: Secrets and Surprises of Electronic Documents
Describe bit-level graphic representations - DPI: CRT 26, LCD 96, phone 163, IPhone4 326
Contrast the terms mode, magic numbers, and strongly-typed data
Contrast the terms "lossless" versus "lossy" compression and explain where lossy compression is used
Contrast mark-up versus WYSIWYG documents
Explain and give examples of the statement that data representation determine usefulness
Contrast and give examples of steganography versus cryptography
Obama Birth Certificate Evidence
Obama Birth Certificate Affidavit
Obama Birth Certificate Inconsistencies

Chapter 4: Needles in the Haystack: Google and Other Brokers in the Bits Bazaar
Untangling the Web: A Guide to Internet Research
Search engine hacking with Google and Bing
Fair Use in Copyright
Time flies like an arrow; fruit flies like a banana
Natural language understanding
Google Bombing
Deep Web
Web Search Engines
Describe the steps to creating a search engine.
Explain how a search term is used to find a document.
Compare recall to ranking and provide two ranking mechanisms.
Contrast syntax versus semantic analysis and give an example using google versus wolfram.
Give the searching overlap among various search engines and its significance.

Chapter 5: Secret Bits: How Codes Became Unbreakable
The Universe
Steganography
Digital Watermarking
Dutch certificate authority
2011 breach incident
Transport Layer Security

Chapter 6: Balance Toppled: Who Owns the Bits?
Time Line of the GPL
Abbreviated GPL
Version Three GPL
Choosing an OSS license
Richard Stallman: Snowden leak a chance for privacy
GPLV2 versus GPLV3
Richard Stallman: We're heading for a total disaster
Groklaw
Describe the "toppled balance" as a result of DMCA.
Contrast the three things sold in the computer industry and explain how one is intangible.
Define EULA and explain how it works.
Describe the paradox of software patents.
Explain how the phrase "intellectual property" is an oxymoron used to intimidate the naive.
Define FOSS an explain why Richard Stallman does not use the phrase open source.
Contrast the MIT, Apache, and GPL software licenses.
Describe three ways GPLV3 differs from GPLV2.
Describe Linus Torvalds rationale for not using the GPLV3 license.

Chapter 7: You Can't Say That on the Internet: Guarding the Frontiers of Digital Expression
Describe the original Internet cloud and its new meaning of IAAS, PAAS, and SAAS.
Explain what is meant by the legal term "common carrier" and how that concept is applied to the Internet.
Deleting Online Predators Act (DOPA) Communications Decency Act (CDA) Child Online Protection Act (COPA)
Describe the historical problem/solution of someone who committed crimes in a foreign territory.

Chapter 8: Bits in the Air: Old Metaphors, New Technologies, and Free Speech
Whole Book in one PDF

Bitcoin
Contrast currency versus money and explain how the dollar is a debt instrument
Describe the disparity of national economic growth versus public debt versus hidden debt
Contrast type and relative amount of cash, vault cash, and digital cash
Describe the bitcoin mechanism and how it is or is not a debt instrument
Describe the mechanism of how a bitcoin could be worth thousands of dollars

LAMP
Define LAMP and the role of each of its components
Describe the mechanism of a database
Describe the mechanism of PHP
Describe the control flow a typical PHP-based Web page

News
Comedian Heather Anne Campbell Talks Fox Show ADHD, Comedy, and Libertarianism
Debt versus GDP
Bank Vault Cash
Lack of Physical Cash
Forces that Monetize Bitcoin
Bitcoin Will Catalyze Hyperinflation of the Dollar
Only Real Way to Buy Bitcoins is on the Streets
1.Trezor-like wallets and smartphone apps 2.Short confirmation time, 3.Low miners' fees 4.Hundred or so people in each city that exchange BTC for currency 5.A rising Bitcoin price.
Google Street View Climbs the Eiffel Tower
Sexism in Computer Science
How to Be a "Woman Programmer"
Uncontrolled Growth Rising Wage Inequality
Netcraft Internet surveys
How Technology is Destroying Jobs
Opt out of the NSA global data surveillance program
Larry Page Reminds Us Why Google Rules Technology
Google Maps Gets Massive Overhaul via OpenGL
The world's largest chip maker wants to see a new kind of economy bloom around personal data
WebP

References
Appinventor
Your life, money, and death is in Linux's hands
Reddit - Build a PC
Reddit - Battlestations
Snap! A visual drag-and-drop programming language
Snap! Manual
Snap Scripts
Snap XML Scripts
MIT App Inventor
Learn About App Inventor
Example App Inventor Projects
Peter J. Denning - Great Principles of Computing
Identify vulnerable systems and sensitive data in corporate networks
20 best Linux sites

The Doubling Interval
Albert Bartlett's Biography
Bartlett's hour long lecture
Video timestamps
Detailed explanation on the doubling interval
Growth rate
Growth rate
The cost of oil recovery and delivery
Finite Oil
A gray tsunami is sweeping the planet

Zope/Plone Articles
Introduction to Thunderbird
Introduction to Mozilla Firefox
Introduction to Open Office
Introduction to GIMP
Introduction to Gaim
Introduction to ZGDChart