Podcast
Questions and Answers
Which of the following best describes the computational thinking competency of decomposition?
Which of the following best describes the computational thinking competency of decomposition?
- Breaking down a complex problem into smaller, manageable parts. (correct)
- Simplifying a problem by focusing on essential information.
- Identifying trends or similarities within a complex problem.
- Developing step-by-step instructions for solving a problem.
Pattern recognition in computational thinking primarily involves simplifying complex information to its most basic elements.
Pattern recognition in computational thinking primarily involves simplifying complex information to its most basic elements.
False (B)
Explain how abstraction, as a computational thinking competency, can be applied in the context of designing a user interface for a mobile application.
Explain how abstraction, as a computational thinking competency, can be applied in the context of designing a user interface for a mobile application.
Abstraction involves hiding complex implementation details and presenting only essential information to the user, simplifying the user experience.
In computational thinking, an _______ is a step-by-step procedure for solving a problem that can be applied to other similar problems.
In computational thinking, an _______ is a step-by-step procedure for solving a problem that can be applied to other similar problems.
Match the following computational thinking competencies with their application in biology:
Match the following computational thinking competencies with their application in biology:
Which of the following is the first step in quantitative reasoning?
Which of the following is the first step in quantitative reasoning?
A histogram is best suited for comparing categorical data rather than continuous data.
A histogram is best suited for comparing categorical data rather than continuous data.
Briefly explain the role of standard deviation in comparing data distributions.
Briefly explain the role of standard deviation in comparing data distributions.
In hypothesis testing, a _______ test is used to compare the sample mean to a hypothesized mean when the population standard deviation is known.
In hypothesis testing, a _______ test is used to compare the sample mean to a hypothesized mean when the population standard deviation is known.
Match the following visualization techniques with their best use case:
Match the following visualization techniques with their best use case:
Which of the following is NOT a key practice to maintain confidentiality in cybersecurity?
Which of the following is NOT a key practice to maintain confidentiality in cybersecurity?
Phishing emails can always be easily identified by their poor grammar and spelling errors.
Phishing emails can always be easily identified by their poor grammar and spelling errors.
Explain the significance of 'integrity' in the context of website security.
Explain the significance of 'integrity' in the context of website security.
To protect data from being stolen, it is crucial to always _______ computer terminals when they are not in use.
To protect data from being stolen, it is crucial to always _______ computer terminals when they are not in use.
Match each data security classification with its appropriate description:
Match each data security classification with its appropriate description:
Which of the following describes disinformation?
Which of the following describes disinformation?
Fake news is primarily motivated by a desire to inform the public accurately.
Fake news is primarily motivated by a desire to inform the public accurately.
Describe how 'confirmation bias' can make individuals more vulnerable to believing fake news.
Describe how 'confirmation bias' can make individuals more vulnerable to believing fake news.
The Protection from Online Falsehoods and Manipulation Act (POFMA) allows a minister to issue directions regarding online false statements of fact if it is within the _______ _______.
The Protection from Online Falsehoods and Manipulation Act (POFMA) allows a minister to issue directions regarding online false statements of fact if it is within the _______ _______.
Match the following actions with the entity primarily responsible for implementing them to combat fake news:
Match the following actions with the entity primarily responsible for implementing them to combat fake news:
According to utilitarianism, when is an action considered morally right?
According to utilitarianism, when is an action considered morally right?
Virtue ethics primarily focuses on rules and duties rather than the character of the moral agent.
Virtue ethics primarily focuses on rules and duties rather than the character of the moral agent.
Briefly explain Kant's deontological ethics.
Briefly explain Kant's deontological ethics.
The Singapore Computer Society (SCS) addresses ethical issues in computing to promote responsible and beneficial use of digital technologies, and to prevent __________.
The Singapore Computer Society (SCS) addresses ethical issues in computing to promote responsible and beneficial use of digital technologies, and to prevent __________.
Match the moral theories with their perspective on cyberbullying:
Match the moral theories with their perspective on cyberbullying:
Which of the following aspects is NOT directly affected by technology in the context of informational privacy?
Which of the following aspects is NOT directly affected by technology in the context of informational privacy?
Whistleblowing is considered morally obligatory only when internal reporting procedures have been exhausted and there is documented evidence to support the claim.
Whistleblowing is considered morally obligatory only when internal reporting procedures have been exhausted and there is documented evidence to support the claim.
Explain why it is important to protect intellectual property.
Explain why it is important to protect intellectual property.
The unauthorized copying of a tangible form in which someone has expressed their ideas is a violation of __________.
The unauthorized copying of a tangible form in which someone has expressed their ideas is a violation of __________.
Match the following types of intellectual property with their examples:
Match the following types of intellectual property with their examples:
Which of the following is NOT protected by copyright?
Which of the following is NOT protected by copyright?
Copyright protection lasts indefinitely as long as the creator maintains ownership of the work.
Copyright protection lasts indefinitely as long as the creator maintains ownership of the work.
What is the purpose of watermarking an image in the context of copyright?
What is the purpose of watermarking an image in the context of copyright?
According to copyright law, protection arises automatically as long as the work is fixed in a _______ form and is original.
According to copyright law, protection arises automatically as long as the work is fixed in a _______ form and is original.
Match the following types of works with their respective exclusive rights under copyright:
Match the following types of works with their respective exclusive rights under copyright:
Which of the following is NOT an essential element for the formation of a contract?
Which of the following is NOT an essential element for the formation of a contract?
In contract law, 'consideration' refers to the emotional satisfaction derived from the agreement by each party.
In contract law, 'consideration' refers to the emotional satisfaction derived from the agreement by each party.
Explain the difference between a license and an assignment in the context of intellectual property.
Explain the difference between a license and an assignment in the context of intellectual property.
A contract is breached when one party does not fulfill a term of the agreement, entitling the wronged party to demand a _______ for the breach.
A contract is breached when one party does not fulfill a term of the agreement, entitling the wronged party to demand a _______ for the breach.
Match the following contractual terms with their descriptions:
Match the following contractual terms with their descriptions:
Flashcards
Computational Thinking
Computational Thinking
Thought process for problem-solving in a way computers can execute.
Decomposition
Decomposition
Breaking down complex problems into smaller, manageable parts.
Pattern Recognition
Pattern Recognition
Identifying patterns or trends within a problem.
Abstraction
Abstraction
Signup and view all the flashcards
Algorithm
Algorithm
Signup and view all the flashcards
Quantitative Reasoning
Quantitative Reasoning
Signup and view all the flashcards
Line Plot
Line Plot
Signup and view all the flashcards
Histogram
Histogram
Signup and view all the flashcards
Mean
Mean
Signup and view all the flashcards
Standard Deviation
Standard Deviation
Signup and view all the flashcards
Cybersecurity
Cybersecurity
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Integrity (of website)
Integrity (of website)
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
CSA
CSA
Signup and view all the flashcards
Misinformation
Misinformation
Signup and view all the flashcards
Disinformation
Disinformation
Signup and view all the flashcards
Fake News
Fake News
Signup and view all the flashcards
Authenticating Information
Authenticating Information
Signup and view all the flashcards
Ethics
Ethics
Signup and view all the flashcards
Normative Ethics
Normative Ethics
Signup and view all the flashcards
Utilitarianism
Utilitarianism
Signup and view all the flashcards
Virtue Ethics
Virtue Ethics
Signup and view all the flashcards
Kant’s Deontological Ethics
Kant’s Deontological Ethics
Signup and view all the flashcards
Cyberbullying
Cyberbullying
Signup and view all the flashcards
Informational Privacy
Informational Privacy
Signup and view all the flashcards
Whistleblowing
Whistleblowing
Signup and view all the flashcards
Intellectual Property
Intellectual Property
Signup and view all the flashcards
Intellectual Property Rights
Intellectual Property Rights
Signup and view all the flashcards
Copyright
Copyright
Signup and view all the flashcards
Contract
Contract
Signup and view all the flashcards
License
License
Signup and view all the flashcards
Assignment
Assignment
Signup and view all the flashcards
Blockchain
Blockchain
Signup and view all the flashcards
Hash
Hash
Signup and view all the flashcards
Artificial Intelligence
Artificial Intelligence
Signup and view all the flashcards
Machine Learning
Machine Learning
Signup and view all the flashcards
Deep Learning
Deep Learning
Signup and view all the flashcards
Neural Network
Neural Network
Signup and view all the flashcards
Study Notes
- Explores navigating the digital world through computational thinking, quantitative reasoning, cybersecurity, digital misinformation, ethics, intellectual property, blockchain, and artificial intelligence
Computational Thinking
- Thought processes for problem-solving in a way that computers/humans/machines can execute.
- Involves decomposition, pattern recognition, abstraction, and algorithms.
Decomposition
- Breaking down complex problems/data/processes into smaller, manageable parts.
- Biology example: Decomposition of organic material into fragmentation for fungi and bacteria.
- Computer science examples: Functions and factorials.
- Real-world example: Moving houses which breaks down the moving process into a list of smaller tasks.
- Organisational example: Companies break down responsibilities by departments
Pattern Recognition
- Involves identifying patterns or trends within a problem.
- Biology example: Protein synthesis, where proteins are coded by mRNA.
- Computer science examples: Machine learning and AI.
- Real-world examples: Games (Uno, tic-tac-toe etc.)
Abstraction
- Identifying similarities/differences among similar problems to simplify solutions or identifying the structure of concepts and ideas to simplify.
- Biology example: DNA double helix simplified to assigning ATCG names.
- Real-world examples: MRT maps showing only essential information
Algorithm
- Developing step-by-step instructions for solving a problem applicable to similar problems.
- Biology example: Transcription and translation where DNA sequences transcribe mRNA into amino acids.
- Real-world examples: Recipes, instruction manuals, and legislation.
Quantitative Reasoning
- Applying mathematical skills to analyse real-world information within a discipline.
- Involves framing numerical questions, identifying tools/data, building models, and analysing results.
Drug Data Distribution & Comparisons
- Line plots connect data points.
- Histograms count frequency across specific bins for continuous data.
- Comparing distributions involves idealising them with mean and standard deviation.
- Mean represents the average behaviour.
- Standard Deviation (SD) represents data point deviation from the average.
- Hypothesis testing compares actual vs hypothesised means using a Z-test.
House Data Distribution & Comparisons
- Inaccurate price estimates result from naive (generic) estimation.
- Feature-dependent estimation relies on joint plots to check distribution strength via linear proportionality.
- Wider scatter plots indicate larger standard error.
- Correlation (1 to -1) indicates the linear relationship between two variables; values closer to 1 or -1 have smaller margins of error.
- Linear models estimate one variable using another (y = mx + c).
- Assuming a normal distribution, 68% of data points fall within one standard deviation from the mean.
Cybersecurity
- Technologies, processes, and practices protecting devices, programs, and networks from damage, attacks, and unauthorized access.
- Phishing prevention: check sender/hyperlinks, use HTTPS, and delete suspicious emails.
- Protect personal information
- Protect website integrity with good cyber hygiene.
- Prevent device lockouts.
Strong Passwords
- At least 8 characters.
- Use a codified phrase with mixed upper/lowercase and symbols.
- Avoid personal information.
- Enable two-factor authentication (OTP via phone/email).
- Use different passwords across accounts.
Data Security
- Data exists in digital and physical forms belonging to individuals or corporations.
- Prevention: lock terminals, avoid leaving files on desks, do not use personal accounts for organizational data, and secure data storage devices.
- CSA is the Cyber Security Agency.
- Classifications: Open (publicly distributable), Restricted (accessible to organization members), Confidential (contractually defined or sensitive), and Classified (under Official Secrets Act).
- Unauthorized disclosure of confidential/classified data may result in penalties/damage to national security.
Digital Misinformation
- Types of falsehood: misinformation (inadvertent), disinformation (intentional), and fake news (deceptive news-like content).
Motivation for Creating Fake News
- Financial gain through clicks and advertising revenue.
- Pushing a personal agenda or ideology.
- Fake news can be a weapon of mass information.
Consequences of Fake News
- Short term: Affects political decisions, business, and peace and order.
- Long term: Devalues information, erodes trust, and increases social divisions.
Vulnerabilities to Fake News
- Sender/source credibility based on trust with original, invisible, trusted, or disregarded sources.
- Message plausibility, expert references, conversational tone, emotional appeal, and calls to action.
- Channel factors: popularity cues, reliance, lack of gatekeeping, and information overload.
- Receiver characteristics: information behaviour, confirmation biases, and motivations for sharing sensational news.
- Higher social media news use increases belief in fake news; those avoiding news are also susceptible.
- Informational apathy can lead to further spread.
Fighting Fake News
Individual Authentication of Information
- Internal: Self-gut feeling, source evaluation, message analysis.
- External: Interpersonal (family/friends), Institutional (official websites, mainstream news).
- Authentication is a social process driven by self-image and group cohesion.
Actions Individuals Can Take
- Reflect on information behaviour (sources, reliability, and motivations for sharing).
- Engage with content critically.
- Strive to understand others' perspectives.
- Support reliable information sources.
- Maximise available resources.
- Equip ourselves with knowledge
Government Prevention of Fake News
- Legislation like POFMA allows ministers to issue directions regarding online falsehoods within the public interest (even posts outside Singapore).
Tech Companies Helping Prevent Fake News
- Gamifying interventions.
- Supporting third-party fact-checkers and journalists.
- Promoting media literacy.
- Reducing financial incentives for content producers.
- Implementing features to flag content.
- Deleting posts and content.
Journalists & Fact Checkers
- Verification (pre-publication) vs Fact-checking (post-publication).
- Types of fact-checkers: affiliated with news orgs, government-owned, independent, volunteer groups, or individuals.
- Using fact-checking tools to monitor trends and verify images and sites.
- Video and other interesting mediums
- Truth sandwich is effective.
Ethics
- Study of morality, vital for developing and using digital/online technologies.
- Aim to avoid harms while maximizing benefits.
Normative Ethics
- Moral theories that explain right and wrong actions while offering practical guidance.
- Utilitarianism: Actions are morally right when they produce the most welfare.
- Virtue ethics: Actions are morally right when a virtuous person would do them.
- Kant’s deontological ethics: Actions are morally right when treating individuals as ends, not merely as means.
- Moral theories aim to provide general explanations and guidance.
- SCS is the Singapore Computer Society.
Cyberbullying
- Using the internet/digital devices to inflict psychological harm.
- Examples: hurtful messages, spreading lies, revealing personal information, posting embarrassing photos, impersonation, threats.
- Effects: Depression, anxiety, low self-esteem, sleep/eating disorders, suicidal thoughts.
Cyberbullying Through Moral Theories
- Utilitarianism: Morally wrong as it makes society worse off.
- Virtue Ethics: Cruel, and a contrast to virtue thus morally wrong actions.
- Kant’s Ethics: Lacks respect for victims and treats them like objects.
Informational Privacy
- Digital/online technologies impact confidentiality, anonymity, data protection, and secrecy of facts.
- A right to privacy is recognised in international human rights instruments.
Whistle Blowing
- Unauthorized disclosure of harmful information after internal attempts fail.
- Morally permissible when the firm will do serious harm, employees report concerns, and internal procedures are exhausted.
- Morally obligatory when documented evidence exists and public disclosure is likely to bring necessary changes.
- Objections: Criteria can be too stringent or not demanding enough.
Intellectual Property (IP)
- Creations from human intellect protected by legal rights.
- Motivates creators, encourages innovation, allows commercial exploitation, and defends against infringement.
Different Types of IP
- Patents, Copyright, Trademarks, Confidential Information
- Copyright protects the expression of an idea, not the idea itself.
- Copyright arises automatically if creator is Singapore citizen or PR
- Artistic merit don't matter, Independent creation does matter
- Copyright NOT for discoveries, procedures, tangible forms
Exclusive Rights in Copyright
- Literary, dramatic, musical, sound, film, artistic, broadcasts, and cable programmes.
- Purchasing a product does not grant underlying copyright.
- The author initially owns copyright except in cases of employment (employer owns) or by agreement.
Joint Ownership
- Where more than one author creates inseparable or interdependent parts.
Contract
- Agreement creating legally enforceable obligations.
- Identifies rights and obligations, allocates risk, and sets performance standards.
Elements of Contract
- Offer, Acceptance, Consideration, Intention to create legal relations, and Capacity.
Contractual Terms and Performance
- Terms set out rights and obligations regarding performance and risk allocation.
- Common terms: purpose, payment, rights, duration, warranties, and dispute resolution.
Breach
- Breach occurs when a term is not performed, entitling the wronged party to demand cure/compensation.
- IP can be bought, sold, given away, licensed, or assigned.
License
- License grants permission to perform an act that would otherwise infringe upon IP, commonly requires a fee.
- Non-exclusive license which is granted to more than one person. Exclusive license is granted to one person only. Used on social media, SaaS, media aggregation platforms.
Assignment
- Transfers all ownership rights to the assignee.
- Grants someone else the right to use the IP Transfers the entire title and interest in someone’s IP to another
Blockchain
- Public database using technologies for data exchange, processing, and storage.
- Tamper proof
- Types: Public (permissionless), Consortium (different access rights), and Private (permissioned for closed networks).
- Bitcoin blockchain records Merkle tree root, nonce, timestamp, and hash value of previous block.
- Opportunities: Improving transparency, lowering costs, and adding security.
- Challenges: Technology risk, scalability issues, and regulatory concerns.
Artificial Intelligence (AI)
- Machines performing tasks requiring human intelligence.
- Renaissance due to powerful computers, big data, and software algorithms.
AI Implementations
- Rule-based expert systems/fuzzy logic.
- Machine learning: Supervised, unsupervised, and reinforcement learning.
- Deep learning: Artificial Neural, Convolution Neural, Recurrent Neural, Deep Reinforcement, Transfer Networks
- Deep learning is based on artificial neurons which needs data to develop its algorithm.
Neural Network
- Neural Network mimics the human brain and recognises patterns (ability to learn) and includes
- Input layer
- Hidden layer consists of learnable parameters, the 'algorithm' that can learn and improve by itself
- Output layer
- Deep Neural Network has multiple hidden layers for sophisticated algorithms
Applications of AI
- Robots, Automotive, Social Media, Consumer Electronics, Business & E-commerce, Banking & Finance, Healthcare, Farming & Precision Agriculture, and Education.
AI Concerns
- Job Loss, Misuse, Explainability, Bias, and Ethics in Decision-Making.
- Current AI is considered Artificial Narrow Intelligence; the goal is Artificial General Intelligence.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.