
3.10. Impacts of CS Electronic Documents¶
This lesson focuses on some of the positive and negative implications of the fact that today "it's all bits" -- i.e., all digital information, including text, pictures, videos, and apps, are represented by binary digits. It focuses on the enduring understanding that variety of abstractions built on binary sequences can be used to represent all digital data. Students will read a section of the Blown to bits that focuses on digital documents. They'll learn about how meta data in a document can be used to identify who created or modified the document, and how the bits that make up an image can be used to hide secret messages, a technique known as steganography.
CSP Framework | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
![]() | |||||||||||||||||||||||||||||||||||||||||
Enduring Understanding DAT-1: The way a computer represents data internally is different from the way the data is interpreted and displayed for the user. Programs are used to translate data into a representation more easily understood by people. | |||||||||||||||||||||||||||||||||||||||||
Learning Objective DAT-1.D: Compare data compression algorithms to determine which is best in a particular context. | |||||||||||||||||||||||||||||||||||||||||
Enduring Understanding DAT-2: Programs can be used to process data, which allows users to discover information and create new knowledge. | |||||||||||||||||||||||||||||||||||||||||
Learning Objective DAT-2.B: Describe what information can be extracted from metadata. | |||||||||||||||||||||||||||||||||||||||||
Professional Development
The Student Lesson: Complete the activities for Mobile CSP Unit 3 Lesson 3.10: Blown to Bits: Electronic Documents.
Materials
3.10.1. Learning Activities¶
Estimated Length: 135 minutes
Note that the timeline of this lesson is approximately three or four 45 minute class periods. If you want to shorten the lesson, you could ask students to do some of the reading and portfolio writing outside of class; however, we recommend keeping the discussion activities in class.
- Hook/Motivation (5 minutes): For a pre-reading activity, ask students: How is a digital image a model? Can you give an example? Emphasize that a digital image is a model. Optional - review answers to portfolio questions from Lesson 3.3: Image Representation. Explain to students that Chapter 3 of Blown to Bits describes how digital documents, including images and sounds, are represented by sequences of bits.
- Experiences and Explorations (10 minutes):
- Think-Pair-Share: Why do you think this chapter is called "Ghost in the Machine"? Think about this on your own. Discuss it with a partner. Then share your ideas with the whole class.
- Read Aloud: Read page 73 out loud to the class. Discuss the word "redacted." You may also need to discuss the setting of the chapter and provide background information about the Iraq war. Review the image on the top of page 74 to demonstrate "redact." What was the purpose in blocking out sections of the text? Read the rest of page 74 out loud.
- During Reading Activity (In-Class, 20 minutes or Homework): Have the students read pp. 75-80. As students are reading, ask them to create "Conversation Questions" (template provided in the materials section) by doing the following:
- Highlight information that is important, surprising or thought provoking. Choose three or four pieces/ideas from the text.
- Once you have highlighted an idea, jot down a question about that idea that would be interesting to talk about with your classmates. Make your questions open-ended, that is questions that cannot be answered with simple one-word responses. Your open-ended questions may start with some of the following:
- What did you think…
- Why do you think…
- How did you feel about…
- How could…
- Now try to think about a time when something similar happened to you or share a time when you learned about something being shared on the Internet that was considered private.
- Making Connections: Small Group Discussion (20 minutes): Break class up into groups of 2-4 students. Have students pose one of the discussion questions they created. Groups should then discuss each question. Once students have each asked a question, have students share an example of something that happened to them or that they read about that was similar in nature to what is presented in the chapter. Ask them to consider what advice they might give to the military and/or journalists to protect secret/protected information when posting on the Internet? Take a couple of minutes to check in with students about what they read.
- During Reading Activity (In-Class, 25 minutes or Homework): Have the students read pp. 80-94, "Representation, Reality, and Illusion.” As students are reading, they should complete a "Now That’s Surprising" reading response sheet. (A template is provided in the materials section.) Each student should respond to four ideas from the text by completing the following:
- An idea that interests me or surprised me (include page #)
- What do I think about it?
- Why does it matter?
- Making Connections: Small Group Discussion (20 minutes): In their groups, have students share one idea from the reading that was interesting or surprising to them and what they thought about it. Then have students share examples of photo and video editing that they may have heard about. Ask them to think about their school pictures and what kind of editing happens to them. Have them create a timeline of audio formats (i.e. albums to 8-tracks to tapes to CDs to MP3 files) and then predict what the next digital audio format might be like. Take a couple of minutes to check in with students about what they read.
- During Reading Activity (In-Class, 25 minutes or Homework): Have the students complete the steganography survey question then read pp. 95-99, "Hiding Information in Images." After reading this section, students should complete the steganography activity where they use a bitmap editor to hide three letters in an image following an algorithm for changing the decimal values of the pixel colors. Make sure students decode their images so they can check their work. If they're struggling, it might help to write the numbers down on paper with the byte values below each one. Students who finish early can start work on their portfolio reflections.
- Rethink, Reflect and/or Revise (15 minutes): Have the students complete their portfolio reflections. Share portfolio responses, especially the free response questions. If time, share the BBC article about steganography being used with color printers and how it has impacted detective work.
3.10.2. Professional Development Reflection¶
Discuss the following questions with other teachers in your professional development program.
- How well does this lesson build towards the enduring understanding that computing may have unintended consequences [EU IOC-1]?
-
I am confident I can teach this lesson to my students.
- 1. Strongly Agree
- 2. Agree
- 3. Neutral
- 4. Disagree
- 5. Strongly Disagree