Ap Computer Science Principles Explore Performance Task Curricular Requirement
Ap Computer Science Principles Explore Performance Task Curricular Requirement
Science
Principles
EXPLORE CURRICULAR REQUIREMENT
TEACHER RESOURCES
About the College Board
The College Board is a mission-driven not-for-profit organization that connects
students to college success and opportunity. Founded in 1900, the College Board was
created to expand access to higher education. Today, the membership association is
made up of over 6,000 of the world’s leading educational institutions and is dedicated
to promoting excellence and equity in education. Each year, the College Board helps
more than seven million students prepare for a successful transition to college
through programs and services in college readiness and college success—including
the SAT® and the Advanced Placement Program®. The organization also serves
the education community through research and advocacy on behalf of students,
educators, and schools.
© 2019 The College Board. College Board, Advanced Placement, AP, SAT, and the acorn logo are registered
trademarks of the College Board. AP Computer Science Principles is a trademark owned by the College Board.
All other products and services may be trademarks of their respective owners. Visit the College Board on the
web: www.collegeboard.com
Carnegie Learning
We would also like to thank the following providers who assisted in the planning of
this resource: Beauty and Joy of Computing (BJC), CodeCombat, CodeHS, Code.org,
Computer Science (CS) Matters, UTeach
Focus Areas
Focus Area Activity
Students are able to select technology innovations, but often have 1
difficulty discerning whether these innovations are computing
innovations.
Students are able to identify the devices that are used to collect and 2
transmit data, but often have difficulty differentiating between these
devices and the actual data being input and output.
Students are able to identify general data concerns, but often have 2
difficulty connecting data privacy, security, or storage concerns to a
computing innovation.
Students are able to identify beneficial effects of a computing 3
innovation, but often have difficulty identifying harmful effects of
computing innovations.
Students are able to identify effects of a computing innovation, but often 3
have difficulty explaining why an effect might be considered beneficial or
harmful depending on the perspective of the affected group.
Students often are able to identify the vulnerabilities that result 3
from a computing innovation being hacked, but may have difficulty
differentiating hacking from other influences that result in altering the
direct effect of a computing innovation.
The classification of an effect as beneficial or harmful is contextual and 3
interpretive. A single effect can be beneficial in some cases and harmful
in others. Classification of an effect needs to include this justification.
Materials
§ List of computing and non-computing innovations and references
§ Online collaboration tools
§ Presentation software
Below is a provided list of computing and non-computing innovations that may assist
in the classroom discussion in determining what is or is not a computing innovation.
Model
Using the class-generated list and/or the provided examples, lead a classroom
discussion on whether or not an innovation is a computing innovation. Examine the
features of the innovations, particularly its use of data and information, to establish
the definition of a computing innovation and pare down the list. At the conclusion
of the discussion, students should have developed a common definition that a
computing innovation includes a program as an integral part of its function. It can be
physical, like a self-driving car, non-physical computing software, like a video game or
picture-editing software, or a non-physical computing concept, like eCommerce.
Practice
Present students with the Evaluating A Computing Innovation student sheet which
includes a new list of innovations—some that are computing innovations and some
that are non-computing innovations.
Have students work with a partner to determine which innovations in this list are
computing and non-computing innovations.
Have students share their list and discuss any innovations where the group disagrees.
Focus Alert
A computing innovation includes a program as an integral part of its
function.
Assign
Apply
Have students select a computing innovation that is most interesting to them.
Students should address the following prompts as they relate to their selected
computing innovation by creating an infographic, video, podcast or any other medium
acceptable to the teacher:
§ Provide a description of the purpose (what it is used for or why it is used) of the
computing innovation.
§ Describe how a program is an integral part of the computing innovation.
§ A formal presentation is not necessary, however, you may choose to have students
showcase their work via a gallery walk if time allows.
Teacher Talk
Encourage students to select a computing innovation that is established
rather than one that is made up or a concept that is still in development.
Existing computing innovations have more research to draw from making
it easier to answer questions related to the data the computing innovation
uses, the data concerns related to this data, and the effect this computing
innovation has on society, economy, or culture.
Date:
Evaluating a Computing
Innovation
What is a Computing Innovation?
A computing innovation can be physical (e.g., self-driving car), non-physical computing
software (e.g., picture-editing software), or non-physical computing concepts (e.g.,
eCommerce). A computing innovation includes a program as an integral part of its
function. A program is a collection of program statements that performs a specific
task when run by a computer. A program is often referred to as software.
Evaluating Innovations
Before doing any investigating, use the following reflection questions to evaluate
whether a given innovation is also a computing innovation. Record your answers in the
table below.
§ Does it include a program as an integral part of its function?
§ Is it easy to describe what the program of the innovation does? If you have a hard
time identifying if the innovation has a program in it or can’t easily describe what the
program is doing, it might not be a computing innovation.
§ Is it easy to classify the computing innovation as “physical,” “non-physical computing
software,” or “non-physical computing concept?” If it does not fall into one of these
three categories, it might be not be a computing innovation.
§ Is the computing innovation a reality or is it still theoretical? Computing innovations
that exist and are currently being used by the public can be easier to understand
and describe.
Once you have your initial answers, select three computing innovations to investigate
and confirm your answers. Spend about 5 minutes on each computing innovation.
Concept
§ Non-Computing
Innovation
Smart phone
Existing or Theoretical?
Classify:
Program Included?
Description
(continued)
Innovation
Augmented
3D printer
reality
Microwave oven
Computer mouse
Evaluating Innovations
Before doing any investigating, use the following reflection questions to evaluate
whether a given innovation is also a computing innovation. Record your answers in the
table below.
§ Does it include a program as an integral part of its function?
§ Is it easy to describe what that program of the innovation does? If you have a hard time
identifying if the innovation has a program in it or can’t easily describe what it is doing,
it might not be a computing innovation.
§ Is it easy to classify the computing innovation as “physical,” “non-physical computing
software,” or “non-physical computing concepts?” If it does not
fall into one of these three categories, it might be not be a computing innovation.
§ Is the computing innovation a reality or is it still theoretical? Computing innovations
that exist and are currently being used by the public can be easier to understand
and describe.
Once you have your initial answers, select three computing innovations to investigate
and confirm your answers. Spend about 5 minutes on each computing innovation.
Smart phone Handheld computer Yes. Data Example: Analog Physical Exists
that can be used to audio is translated to Computing
communicate (calls, texts) digital representation Innovation
as well as connect to the and transmitted via
Internet. packets; the reverse
is done taking a digital
signal and translating it to
analog audio through the
Materials
§ Internet access
§ Whiteboard and markers
Distinguish between what is data and what is not data. Provide examples of data and
non-data, such as data-collection devices. Promote the understanding that data is
different from the input device as well as the difference between input and output.
Focus Alert
Data types include: integers, numbers, Booleans, text, image, video,
audio, and signals. Data can also infer these types, such as fingerprints,
temperature, music, length, pictures, etc. Data collection devices (e.g.,
sensors, cameras, etc.) are not data.
Model
Provide students with the Data Collection Devices and Data Types Reference student
sheet. As a large group, brainstorm examples and collection devices for each data type.
Explain how data can be used by a computing innovation, including the difference
between input and output using an Input, Process, Output, Storage (IPOS) Structure
Chart. An IPOS Structure Chart helps to classify data that is being used as input,
processed by a program, output to the user, and stored. For example: Draw, label, and
explain the scenario of having to type a paper for a class (e.g. keyboard is the input
device, printer is the output device).
Practice
Provide each student with the Classifying Data student sheet and ask them to identify
the data used by the computing innovation and classify the data as input or output.
Think-Pair-Share: Give the students 10 minutes on their own to identify the data used
in each of the computing innovations listed. Classify the data as input or output. After
10 minutes, compare answers with a partner for 5 minutes. Finally, share and discuss
answers as a class.
Focus
Distinguish between privacy and security. Promote the understanding of the privacy
risks that are involved in collecting and storing personal data on a computing system.
Demonstrate how unauthorized access to computing resources is gained.
Model
Identify data privacy, data security, and data storage concerns that come with
computing innovations. Provide participants with the following definitions:
§ Privacy—assures that personal information (and sometimes corporate confidential
information as well) are collected, processed (used), protected, and destroyed legally
and fairly.
§ Security—controls access to personal information and protects against its
unauthorized use and acquisition.
§ Storage—how data is archived. The two types of storage are hard data (e.g., RAM,
Hard Drive, flash drives, solid state) and remote data (e.g., cloud computing).
Focus Alert
When making a claim about data and a privacy, security, or storage concern,
a description of how the data might be obtained and used needs to be
included.
Practice
The About My Info website asks for personal data (e.g., birthdate, gender, and zip code)
to determine how easily identifiable someone is from their data. Data such as this is
often used by doctors and schools. Give students 20 minutes to explore the About My
Info website and answer the questions on the Collecting Data student sheet.
Assign
Apply
Have students select a computing innovation and ask them to independently
complete the following:
3. Write a paragraph that explains any data privacy, security, or storage concerns
related to the computing innovation.
Date:
For each data type, provide an example of specific data and a data collection device
for this data.
Numbers
Booleans
Text
Image
Video
Audio
Signals
Date/Time
For each data type, provide an example of specific data and a data collection device
for this data.
Storage
stored in the cloud
Date:
Classifying Data
Brainstorm at least one example of the data used in each of the computing innovations
listed below. Be sure to indicate the data type and whether it is input or output.
2. Smart Glasses
3. Social Media
4. Facial-Recognition Software
5. Virtual Reality
6. Video Conference Software
7. 3D Printing
8. Crowdfunding
9. Self-Driving Cars
10. Phone Monitoring Apps
Date:
Collecting Data
What Data is Collected?
Visit the website aboutmyinfo.org. Examine the section “How unique are you?”
3. Why might a person be easily identifiable by this information? (HINT: Estimate the
number of people in your zip code and the number of unique combinations of birth
date and gender. See the About page of the website for more information.)
4. What concerns do you have about sharing your data on this website? Are your
concerns about privacy or security?
Examine the Privacy Policy of your favorite social media site. Name of social media
site:
6. What data does your selected social media site collect from you? Is this a privacy or
security concern?
7. What data is required and what data can you opt out of? Is this a privacy or security
concern?
8. How does your selected social media site use the data it collects? Is this a privacy
or security concern?
9. Is your data stored permanently or can it be deleted from your selected social
media site? Is this a privacy or security concern?
4. What concerns do you have about sharing your data on this website? Are your
concerns about privacy or security?
Answers will vary, but may include: Is the connection secure? Could
someone be trying to steal my identity and get access to my birthdate
once it is entered into the form? Will my information be shared
outside of this website? Will my data be saved somewhere?
5. Record your output.
Answers will vary. Example: Inputting January 1, 2004, female, and zip
code 55811 produces the output of 55811 (pop. 26246)
Female
Birthdate 1/1/2004 Easily identifiable by birthdate (about 1)
Birth Year 2004 Lots with your birth year (about 132)
Range 2004 to 2008 Lots in the same age range as you
(about 664)
Examine the Privacy Policy of your favorite social media site. Name of social media site:
Answers will vary. For example, Instagram.
6. What data does your selected social media site collect from you? Is this a privacy or
security concern?
Answers will vary. For example, Instagram collects data that is entered
directly by the user. This includes:
§ username, password, and email address when you register for an
Instagram account (privacy concern)
§ profile information that you provide for your user profile such as
first and last name, picture, and phone number (privacy concern)
§ user content such as photos, comments, and other materials that you
post (privacy concern)
§ communications between you and Instagram (security concern)
7. What data is required and what data can you opt out of? Is this a privacy or security
concern?
Answers will vary. For example, with Instagram you may opt out
of service-related emails and posting content altogether. All other
Instragram profile information is required. You can choose when to
make posts and also change the settings to make posts private.
8. How does your selected social media site use the data it collects? Is this a privacy
or security concern?
The Answers will vary. For example, the Instagram privacy policy
includes a list of ways that Instagram uses the data it collects from
users. For example, to remember information so you will not have
to re-enter it during your visit or the next time you visit (security
concern). It also uses the data to provide personalized content and
information to you and others (e.g., ads) (privacy concern).
9. Is your data stored permanently or can it be deleted from your selected social
media site? Is this a privacy or security concern?
Answers will vary. For example, the data you provide to Instagram
is stored and processed in the United States or any other country in
which Instagram, its Affiliates or Service Providers maintain facilities.
The data is stored and kept unless the account is terminated or
deactivated. In which case the data is still kept for an additional
commercially reasonable time for backup, archival, and/or audit purpose.
This is a security concern in which Instagram admits they “cannot
ensure the security of any information you transmit to Instagram
or guarantee that information on the Service may not be accessed,
disclosed, altered, or destroyed.” This is also a privacy concern in which
Instagram says users are responsible for maintaining the secrecy
of their unique password and account information, and for controlling
access to emails between the user and Instagram, at all times.
IOC-1.B: Explain how a computing innovation can have an impact beyond its
intended purpose. [5C]
Materials
§ Internet Access
Focus Alert
An effect (impact, result or consequence, outcome) is something that
happens as a result of the intended use of the innovation.
Model
Have each small group lead a class discussion on the difference between beneficial
and harmful effects of the type of biometric authentication discussed in their group.
Focus Alert
An effect of the computing innovation must be a result of the intended use
of the computing innovation. Its vulnerability to be hacked is coming from
the outside. The harmful effects of hacking are connected to whatever or
whoever is doing the hacking. The classification of an effect as beneficial
or harmful is contextual and interpretive. A single effect can be beneficial
in some cases and harmful in others. Classification of an effect needs to
include this justification.
Practice
Have students complete the questions on the Biometric Authentication student sheet
based on the text of the assigned article.
Have students work with a partner to compare and contrast their answers.
Teacher Talk
Students should assume that at some point they are going to get hacked!
While this is often harmful to an individual, it is not a direct effect of using
a computing innovation. Students have difficulty differentiating between a
direct effect and an outside influence.
Teacher Talk
Sometimes students select effects that are not related to the computing
innovation they have selected, but instead focus on a separate or secondary
innovation. Clearly label whether an effect of the computing innovation
described is related to the primary computing innovation.
Understanding that a single effect can be viewed as both beneficial and
harmful based on an individual’s perspective is essential knowledge for
AP CSP students. It is necessary that they can identify ways computing
innovations are used that were not originally intended, including potential
harmful impacts on society, the economy, and on culture.
Assign
Apply
Have students select a computing innovation that is most interesting to them. Students
should address the beneficial and harmful effect of a computing innovation by creating
an infographic, video, podcast or any other medium acceptable to the teacher.
Date:
Biometric Authentication
Computing innovations can have both beneficial and harmful effects. An effect
(impact, result or consequence, outcome) is something that happens as a result of
the intended use of the innovation. The effects may apply to individuals, our broader
cultures, and may even dramatically affect the economies of nations. The goal of
many computing innovations is to thwart malicious activity targeting individuals,
businesses, social media, and government. Among the ever-growing list of computing
innovations is biometric authentication.
Access the following link to learn more about the advantages and disadvantages of
biometric authentication. Use what you learn to answer the following questions.
https://heimdalsecurity.com/blog/biometric-authentication/#Advantages
3. What vulnerabilities might biometric authentication have that could cause the
computing innovation to not function as intended?
4. What caused the need for biometric authentication? What effect has it had on
consumers?
Access the following link to learn more about the advantages and disadvantages of
biometric authentication. Use what you learn to answer the following questions.
https://heimdalsecurity.com/blog/biometric-authentication/#Advantages