cs4hs workshop @ columbia university injecting cs into high school math and science classes adam...
TRANSCRIPT
CS4HS Workshop @ Columbia CS4HS Workshop @ Columbia UniversityUniversity
Injecting CS into High SchoolMath and Science Classes
Adam CannonDepartment of Computer Science
Columbia University
July 8, 2011
CS@CU
OutlineOutline
Binary numbers Information theory Hiding information Digital Signatures Error Detection and Correction
Binary NumbersBinary Numbers
We use binary numbers to represent information in computer systems
Why? It’s just more natural On/Off Positive/Negative Charges N-S/S-N Magnetic Fields
CS@CU
Information TheoryInformation Theory
How do we measure information? Example: Text message that
reads:
“See you at Starbucks later?”
or“cu @ *$ l8r?”
CS@CU
Information TheoryInformation Theory
Both convey the same information so measuring the length of the message is not really useful if we are trying to measure the amount of information conveyed.
CS@CU
Information TheoryInformation Theory
Both convey the same information so measuring the length of the message is not really useful if we are trying to measure the amount of information conveyed.
So how do we do it?
CS@CU
Information TheoryInformation Theory
Both convey the same information so measuring the length of the message is not really useful if we are trying to measure the amount of information conveyed.
So how do we do it?
We play 20 questions.
CS@CU
Information TheoryInformation Theory
The amount of information in a message can be quantified by how hard it is to “guess” what’s there.
CS@CU
Information TheoryInformation Theory
The amount of information in a message can be quantified by how hard it is to “guess” what’s there.
Example: Pick a number
CS@CU
Information TheoryInformation Theory
The amount of information in a message can be quantified by how hard it is to “guess” what’s there.
Example: Pick a number Between 1-10
CS@CU
Information TheoryInformation Theory
The amount of information in a message can be quantified by how hard it is to “guess” what’s there.
Example: Pick a number Between 1-10 Between 1-100
CS@CU
Information TheoryInformation Theory
CS@CU
Guessing a number between 0-7:
From csunplugged.org
Information TheoryInformation Theory
Understanding how much information is really contained in any kind of message is the cornerstone of compression technologies. These technologies are used for everything from email to digital voice communication to streaming video.
CS@CU
Hiding InformationHiding Information
Sharing information online is a common and increasingly necessary activity today.
CS@CU
Hiding InformationHiding Information
Sharing information online is a common and increasingly necessary activity today.
How can we share information and still maintain a reasonable level of privacy?
CS@CU
Hiding InformationHiding Information
Techniques like these may be used to guard information during online transactions. Ecommerce Medical Data Personal Data
CS@CU
Digital SignaturesDigital Signatures
How can we “trust” someone online?
CS@CU
Digital SignaturesDigital Signatures
How can we “trust” someone online?
When would we need to do this?
CS@CU
Digital SignaturesDigital Signatures
How can we “trust” someone online?
When would we need to do this? Online contracts
CS@CU
Digital SignaturesDigital Signatures
How can we “trust” someone online?
When would we need to do this? Online contracts Identity verification
CS@CU
Digital SignaturesDigital Signatures
How can we “trust” someone online?
When would we need to do this? Online contracts Identity verification Online gaming
CS@CU
Digital SignatureDigital Signature
Example:
How can we flip a coin over the phone?
CS@CU
Digital SignatureDigital Signature
Example:
How can we flip a coin over the phone?
The math behind this is simple. The key is to find a function that is easy to compute but whose inverse is tough!
CS@CU
Digital SignaturesDigital Signatures
Function / Inverse-Function pairs like this are a primary tool in modern public key cryptography.
CS@CU
Digital SignaturesDigital Signatures
Function / Inverse-Function pairs like this are a primary tool in modern public key cryptography.
Examples like these can be used to motivate the study of functions and inverses in high school algebra!
CS@CU
Error Detection and CorrectionError Detection and Correction
Often noise corrupts digital communication. This can be due to all kinds of natural or unnatural sources.
CS@CU
Error Detection and CorrectionError Detection and Correction
Often noise corrupts digital communication. This can be due to all kinds of natural or unnatural sources.
How can I know that the message I received is the message you sent?
CS@CU
Error Checking and CorrectionError Checking and Correction
Techniques like these are used on everything from internet message transmissions to credit card fraud detection.
CS@CU
Games and Puzzles That TeachGames and Puzzles That Teach
These activities can be challenging and a lot of fun
They stimulate curiosity They are relevant to everyday life
in today’s world. Will your students respond to
these?
CS@CU
CS@CU
Want to learn more?Want to learn more?
http://csunplugged.org
If you do choose to use any activities like these, I would love to hear your feedback.
Thanks!
Check out CS Unplugged at: