Registration for CSTA’s 2020 Virtual Conference is now open!
Set for July 13–14, from 10 a.m. to 4 p.m. CT, the online format will still deliver the high-quality education experience you’ve come to love from CSTA conferences in the comfort of your home!
Your virtual registration includes access to over 100 breakout sessions, networking opportunities, keynote addresses from Linda Liukas and Hadi Partovi, the exhibit hall, and more! You’ll also receive a special CSTA 2020 attendee swag box* if you register by June 15!
Secure your spot before registration closes on July 10!
- CSTA+ Members: $75
- Basic Members and Non-Members: $125
Register Today
By educators, for educators
The magazine, Hello World, published three times per year, is available entirely free as a Creative Commons PDF download. You can also buy the magazine in print, or subscribe for a year.
|
|
3A-DA-10 -- Evaluate the tradeoffs in how data elements are organized and where data is stored.
Grade band: 9 -10 Concept: Data & Analysis Sub-concept: Storage Practice: Recognizing and Defining Computational Problems: 3.3
Data can be composed of multiple data elements that relate to one another. For example, population data may contain information about age, gender, and height. People make choices about how data elements are organized and where data is stored. These choices affect cost, speed, reliability, accessibility, privacy, and integrity. Students should evaluate whether a chosen solution is most appropriate for a particular problem. Students might consider the cost, speed, reliability, accessibility, privacy, and integrity tradeoffs between storing photo data on a mobile device versus in the cloud.
A data model combines data elements and describes the relationships among the elements. Data models represent choices made about which data elements are available and feasible to collect. Storing data locally may increase security but decrease accessibility. Storing data on a cloud-based, redundant storage system may increase accessibility but reduce security, as it can be accessed online easily, even by unauthorized users. Data redundancies and backups are useful for restoring data when integrity is compromised.
After students have had some experience breaking problems down and identifying subproblems that can be solved computationally, they should begin to evaluate whether a computational solution is the most appropriate solution for a particular problem. For example, students might question whether using a computer to determine whether someone is telling the truth would be advantageous.
Iowa's CS Standards are the CSTA Standards
|
|
Cybersecurity is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information. It seems that everything relies on computers and the internet now—communication (e.g., email, smartphones, tablets), entertainment (e.g., interactive video games, social media, apps ), transportation (e.g., navigation systems), shopping (e.g., online shopping, credit cards), medicine (e.g., medical equipment, medical records), and the list goes on. How much of your daily life relies on technology? How much of your personal information is stored either on your own computer, smartphone, tablet or on someone else's system?
Defending yourself against cyberattacks starts with understanding the risks associated with cyber activity, what some of the basic cybersecurity terms mean, and what you can do to protect yourself. There are definitely risks of having poor cybersecurity, but there also quite a few things you can do to improve your cybersecurity. Source
It is also important to consider all the organizations that have your personal information and collect other data. From your electric company (they know if you are away from home because usage is down) and cell service provider (they know every place you travel because of the cell towers you use) to Facebook (all your ‘likes’ create a picture of who you are) and Google Maps (it knows your speed).
The Iowa Department of Education is collaborating with multiple agencies and organizations to provide access to educational enrichment options for students, parents and educators during the temporary disruption of classroom learning due to COVID-19. Resources are grouped into three categories: general, by subject, and by learner characteristic. Be sure to check out our computer science resources - you are sure to find something useful.
Learning Keeps Going - Guidance, best practices and strategies as well as webinars.
Humanizing Online Teaching - Pedagogical practices that promote care for the whole student and class collective.
Computer Science Web page - Check out the information and resources available.
Join the Conversation
CSTA Iowa Chapter
Facebook Group: Iowa CS Teachers
Iowa CS Teacher Email List
Twitter @wrenhoffman and hashtag #CSforIA
|