CS4HS%20Workshop%20@%20Columbia%20University - PowerPoint PPT Presentation

About This Presentation
Title:

CS4HS%20Workshop%20@%20Columbia%20University

Description:

CS4HS Workshop _at_ Columbia University Injecting CS into High School Math and Science Classes Adam Cannon Department of Computer Science Columbia University – PowerPoint PPT presentation

Number of Views:143
Avg rating:3.0/5.0
Slides: 31
Provided by: colu140
Category:

less

Transcript and Presenter's Notes

Title: CS4HS%20Workshop%20@%20Columbia%20University


1
CS4HS Workshop _at_ Columbia University
  • Injecting CS into High School
  • Math and Science Classes
  • Adam Cannon
  • Department of Computer Science
  • Columbia University
  • July 8, 2011

2
Outline
  • Binary numbers
  • Information theory
  • Hiding information
  • Digital Signatures
  • Error Detection and Correction

3
Binary Numbers
  • We use binary numbers to represent information in
    computer systems
  • Why?
  • Its just more natural
  • On/Off
  • Positive/Negative Charges
  • N-S/S-N Magnetic Fields

4
Information Theory
  • How do we measure information?
  • Example Text message that reads
  • See you at Starbucks later?
  • or
  • cu _at_ l8r?

5
Information Theory
  • Both convey the same information so measuring the
    length of the message is not really useful if we
    are trying to measure the amount of information
    conveyed.

6
Information Theory
  • Both convey the same information so measuring the
    length of the message is not really useful if we
    are trying to measure the amount of information
    conveyed.
  • So how do we do it?

7
Information Theory
  • Both convey the same information so measuring the
    length of the message is not really useful if we
    are trying to measure the amount of information
    conveyed.
  • So how do we do it?
  • We play 20 questions.

8
Information Theory
  • The amount of information in a message can be
    quantified by how hard it is to guess whats
    there.

9
Information Theory
  • The amount of information in a message can be
    quantified by how hard it is to guess whats
    there.
  • Example Pick a number

10
Information Theory
  • The amount of information in a message can be
    quantified by how hard it is to guess whats
    there.
  • Example Pick a number
  • Between 1-10

11
Information Theory
  • The amount of information in a message can be
    quantified by how hard it is to guess whats
    there.
  • Example Pick a number
  • Between 1-10
  • Between 1-100

12
Information Theory
Guessing a number between 0-7
From csunplugged.org
13
Information Theory
  • Understanding how much information is really
    contained in any kind of message is the
    cornerstone of compression technologies. These
    technologies are used for everything from email
    to digital voice communication to streaming video.

14
Hiding Information
  • Sharing information online is a common and
    increasingly necessary activity today.

15
Hiding Information
  • Sharing information online is a common and
    increasingly necessary activity today.
  • How can we share information and still maintain a
    reasonable level of privacy?

16
Hiding Information
  • Techniques like these may be used to guard
    information during online transactions.
  • Ecommerce
  • Medical Data
  • Personal Data

17
Digital Signatures
  • How can we trust someone online?

18
Digital Signatures
  • How can we trust someone online?
  • When would we need to do this?

19
Digital Signatures
  • How can we trust someone online?
  • When would we need to do this?
  • Online contracts

20
Digital Signatures
  • How can we trust someone online?
  • When would we need to do this?
  • Online contracts
  • Identity verification

21
Digital Signatures
  • How can we trust someone online?
  • When would we need to do this?
  • Online contracts
  • Identity verification
  • Online gaming

22
Digital Signature
  • Example
  • How can we flip a coin over the phone?

23
Digital Signature
  • Example
  • How can we flip a coin over the phone?
  • The math behind this is simple. The key is to
    find a function that is easy to compute but whose
    inverse is tough!

24
Digital Signatures
  • Function / Inverse-Function pairs like this are a
    primary tool in modern public key cryptography.

25
Digital Signatures
  • Function / Inverse-Function pairs like this are a
    primary tool in modern public key cryptography.
  • Examples like these can be used to motivate the
    study of functions and inverses in high school
    algebra!

26
Error Detection and Correction
  • Often noise corrupts digital communication. This
    can be due to all kinds of natural or unnatural
    sources.

27
Error Detection and Correction
  • Often noise corrupts digital communication. This
    can be due to all kinds of natural or unnatural
    sources.
  • How can I know that the message I received is the
    message you sent?

28
Error Checking and Correction
  • Techniques like these are used on everything from
    internet message transmissions to credit card
    fraud detection.

29
Games and Puzzles That Teach
  • These activities can be challenging and a lot of
    fun
  • They stimulate curiosity
  • They are relevant to everyday life in todays
    world.
  • Will your students respond to these?

30
Want to learn more?
Check out CS Unplugged at
  • http//csunplugged.org
  • If you do choose to use any activities like
    these, I would love to hear your feedback.
  • cannon_at_cs.columbia.edu
  • Thanks!
Write a Comment
User Comments (0)
About PowerShow.com