The Evolution of Computers in Society LC SC
The Evolution of Computers in Society LC SC
of computers
in society
Addressing learning outcomes
and building key skills
The resources and strategies provided are intended mainly for the teacher to use in the classroom. They can
be used in the context of an Applied learning task (ALT) or simply as classroom strategies to engage students in
wider ethical and cultural questions. They are not prescriptive and the concepts do not have to be taught in the
order they are presented. Teachers will discover many other ways of helping their students achieve the learning
outcomes. Much of the learning around computers and society and the direction of technological development
can be facilitated by teachers with classroom techniques, such as Power of Persuasion, Think-Pair-Share-Snowball
and Stimulate a Debate, which are described within this resource. There are also design and development
activities, plus ideas for other suitable activities. The resource itself, with guidance and differentiation from the
teacher, can be used as a learning platform by students.
Material that is suitable for Higher Level only is indicated by an orange bar to the side.
The evolution of computers in society is outlined below. Each development in the evolution is used as a platform
to study subsequent related developments. In this sense the learning outcomes can be achieved in an iterative
and non-linear fashion. The learning outcomes can be viewed at curriculum online.
2000–2020
Emerging trends in the 21st century
Cloud Computing
and the Smart Phone
Heterogenous members Avoid friendship groups. At the start, students may object to being separated
from their friends. Explain that the groups will change regularly. Groups could
be generated randomly. Keep groups small to begin with.
Social skills need to be Teachers must teach the skills needed for group work, such as listening skills,
taught leadership skills (shared and rotated), conflict resolution skills, how to give
feedback, how to encourage each other, etc. “Be Kind, specific, and helpful”
(Berger)
Ensure everyone feels Teachers can ensure that the group is accountable while at the same time
accountable for their own making sure that there is individual accountability. For example by randomly
work and for the work of selecting one student to explain the group’s answer or giving out role cards so
the group it is clear who is the designer, reporter, communicator, etc.
Create positive The teacher structures work in such a way that students need each other in
interdependence order to complete the task.
when the teacher sets a shared task or goal, and explains that all the group
members must be able explain how it was arrived at
when resources are shared (one worksheet between each pair/small group)
when the teacher requests one end product and there is a shared and
named input from each member
Both the task and Cooperative learning groups try to increase students’ learning and maintain
relationships are important good working relationships. Students need to be reminded to observe how they
are succeeding with both.
Make time for group The students need time to discuss how well they are achieving their goals and
reflection/evaluation how they are working together. Questions such as “What worked well in the
group today?” and “How can you work better next time?” are useful.
Two early 19th century pioneers of both the theory and mechanics of calculation were
Charles Babbage and Ada Lovelace. He devised a general purpose machine which he
called an Analytical Engine. Lovelace realised the potential of such a machine beyond
calculations and published the first algorithm intended for a computer.
The 19th century saw the invention of the telegraph and the telephone, Maxwell
predicted radio waves to exist and published his laws of electromagnetism culminating
in Marconi’s transmission of radio waves across the Atlantic in 1901. By the 1920s
automobiles had becomes affordable and the first modern electronic television was
invented. Communication and travel were being revolutionised. The information
revolution was about to begin.
Explore a timeline of the history of computers and computing technology from the
1930s to the present day.
Start-up companies no longer have to begin in offices. They can start in the homes
of friends, computer clubs or famously people’s garages. The Personal Computer
and the digital revolution have empowered people to become entrepreneurs and
programmers. People who have been disabled are being increasingly enabled by new
empowering technologies.
Ask yourself: How has this empowerment become possible over the last century and
will it last?
Ask yourself: What is the role of adaptive technology in the lives of all human beings?
The digital revolution, particularly in the 21st century, has been called a disrupter
of both business and of society. Major multinational hi-tech companies have
established new models for calling a taxi, booking a hotel, staying in Bed and
Breakfasts, booking a table in a restaurant and then distributing the food we don’t
eat.
Ask yourself:What are the positive and negative impacts of computing on culture and
society?
Ask yourself: How does the power of computing enable different solutions to difficult
problems?
1936
The Turing Machine
Learning Outcomes addressed in this section are listed below.
1.12 compare the positive and negative impacts of computing on culture and society
1.13 identify important computing developments that have taken place in the last
100 years and consider emerging trends that could shape future computing
technologies
1.14 explain when and what machine learning and AI algorithms might be used in
certain contexts
1.18 recognise the diverse roles and careers that use computing technologies
2.8 apply basic search and sorting algorithms and describe the limitations and
advantages of each algorithm
Charles Babbage
When other Learning Outcomes are addressed, for instance in classroom activities or
through related online resources, the LO is numbered.
The birth of Computer Science and Machine Learning can be traced back to many
ideas and early prototypes, such as Babbage’s calculating machine in the early 19th How to explain the
century or Hollerith’s punch card system from the end of the 19th century. There is importance of the Turing
however a strong case that Alan Turing’s machine laid the foundations for the Machine? Visit runestone
development of Computer Science and Machine Learning. academy
In 1936, Alan Turing invented a mathematical model of a universal machine, which Use the classroom
later became known as a Turing Machine. unplugged activity below
to perform the addition of
The operation of the machine is a simple concept. 1 + 2 on a Turing Machine.
Despite its apparent simplicity, a Turing Machine can be constructed to solve any given LO 1.3–1.8, 1.13
computer algorithm.1 It is in this sense, the first concept of a universal, all-purpose, LO 2.5
computing machine. It provides computer science with a firm scientific foundation, since
it offers a model of computation which can be tested against real world applications.
Classroom Activity
To demonstrate an algorithm on the Turing Machine with an unplugged version of
Learn how to assemble
the addition of two numbers.
another unplugged
A Turing Machine can, in theory, execute any algorithm a modern computer algorithm.
can execute. The Turing Machine, shown below, consists of an infinitely long
An unplugged punch
paper tape comprising an infinite number of cells. A read/write head points
card lesson, with video
to a particular cell at any given time. There are only 3 operations that can be
demonstration. From the
performed on the tape:
teachinglondoncomputing
1. Read the value website.
2. Write a new value (0,1, BLANK)
LO 1.7
3. Move the read/write head to the next cell. LO 2.8
The # symbol in the diagram below will be interpreted in this case as ADD. The
machine itself is oblivious to the symbol, as the algorithm is deciding that # in this
case means addition. An example of the steps of an algorithm to perform 2 + 3 are
outlined below. The values, 2 and 3, are bookended by blanks. We want to end our
execution of the algorithm with five 1’s in a row, bookended by BLANKs.
1 Sipser (2006) Introduction to the Theory of Computation Thomson Course Technology, USA.
Initial
State 1 1 # 1 1 1
Read/Write Head
Current
0 0 # 1 1 1
Current
0 # 1 1 1
Final
1 1 1 1 1
In particular:
The READER
The role is to read the value in the cell where the read/write head is pointing. The Computational
Reader must read out the value from the whiteboard as instructed, even if the Thinking LOs in Strand
algorithm is operating incorrectly. 1 (LO 1.1–1.10)
Computers and Society
The WRITER LOs in Strand 2
The role is to write a value into the cell where the read/write head is pointing. The (LO 1.13–1.14)
state of the Turing machine will be updated by the writer on the whiteboard. Algorithm LOs in
Strand 2 (LO 2.5–2.7)
The read/write HEAD
Watch a video showing
The role is to re-draw the position of the read/write head on the whiteboard, basic arithmetic on the
according to the instructions issued by the control unit. The head can be Turing machine. The
represented by the shape shown in the example, or any similar symbol that is algorithm for addition is in
appropriate. the first minute.
The challenge is to carry out the addition of any two natural numbers. For Explain how it is different
example, 2+1 or 2+5 or 3+3. to the algorithm in the
A further challenge, at an appropriate stage of the course, could be to program the classroom activity.
algorithm in Python or JS with a suitable UI, to carry the out the addition of any
two user-defined natural numbers.
2 https://en.wikipedia.org/wiki/History_of_artificial_intelligence
The following links give 3 examples of each of the 2 main categories of Machine
Learning.
Supervised Learning uses training (input) data and if certain outputs are incorrect,
the algorithm is notified not to output this in future. It relies on good data and some
feedback.
Unsupervised Learning allows the algorithm to spot patterns and decide itself which
outputs are most useful. It does not rely on feedback.
Within these categories there are five popular schools of machine learning
algorithms3:
1. SYMBOLISTS
This is closely related to mathematical thinking. They believe all intelligence can
Learning
be reduced to manipulating symbols. By combining pre-existing knowledge with
Opportunity: The
new data, and incorporating it into the machine, new learning will take place.
types and uses of
Machine Learning
2. CONNECTIONISTS
This is related to neuroscience. They believe that strengthening connections Watch an in-
between neurons/logic gates will improve the machine’s learning and similarly depth video on the
eliminating connections that cause errors in outputs. By looking at the output and categories and uses of
comparing it to the correct output, the connections that require modification can Machine Learning.
be identified. This is known as backpropagation.
Now examine and
3. EVOLUTIONARIES discuss when
machine learning
This is related to evolution by natural selection. The concept of genetic
and AI algorithms
programming is very strong where the best programs are merged together
might be used in
evolving into better programs. The less successful programs are disposed of
certain contexts.
creating a constantly evolving structure capable of new learning.
LO 1.14
4. BAYESIANS
This is related to a theorem in probability called Bayes Theorem. Bayesians,
using probability, combine new evidence with existing beliefs to infer new ideas.
Learning itself, they believe, is uncertain knowledge.
5. ANALOGISERS
By comparing two things which have similarities, perhaps other characteristics
are similar. For example if two patients share symptoms, perhaps they have the
same underlying illness. By remembering the correct situations, and combining
those things that are similar, new learning can be achieved.
Are there more quantities of useful data available to humans and computers? Facilitate a discussion
Is the rapid expansion going to continue? What are the emerging trends? around the rapid expansion
of AI technologies, and
Predicting future trends and technologies is extremely difficult. the reasons behind the
expansion.
LO 1.13, 1.14
How difficult would it have been back then, to predict the future technologies available Classical versus
40 years later in 2013? In 40 years time how will technology shape our world? What Quantum Computers...
trends will underpin that technology. a 10 minute explanation.
“The bits explosion is not over. We are in the middle of it. But we don’t know whether it LO 1.13, 1.14
will be destructive or enlightening. The time for deciding who will control the explosion
may soon be past. Bits are still a new phenomenon — a new natural resource whose
regulatory structures and corporate ownership are still up for grabs. The legal and
economic decisions being made today, not just about bits but about everything that
depends on bits, will determine how our descendants will lead their lives. The way the
bits illuminate or distort the world will shape the future of humanity.” 4
1942–1946
First Electronic Computers:
Colossus and ENIAC
Learning Outcomes addressed in this section are listed below.
1.11 discuss the complex relationship between computing technologies and society
including issues of ethics
1.12 compare the positive and negative impacts of computing on culture and society
1.13 identify important computing developments that have taken place in the last
100 years and consider emerging trends that could shape future computing
technologies
1.18 recognise the diverse roles and careers that use computing technologies
2.11 describe the different components within a computer and the function of those
components
When other Learning Outcomes are addressed, for instance in classroom activities or
through related online resources, the LO is numbered.
The Babbage analytical machine, as explained in the video on the evolution of The history and
computing devices, had 4 revolutionary features: Input, Storage, Processing and Output development of the
components. Sequential flow control and looping operations were fundamental to his ENIAC (0–7:44) and the
concept. Today, the inside of modern computers is not that different. path forward after WWII
(7:44–12:47)
LO 1.11
LO 2.11
The Arithmetic Logic Unit (ALU), where instructions are actually carried out, is
probably the only functional unit that is extra to the original concept, as shown in
the schematic block diagram below.
ABSTRACTED
MODEL OF
CPU COMPUTER
COMPONENTS
ARITHMETIC (Block Diagram)
INPUT LOGIC UNIT
CONTROL UNIT
OUTPUT
MEMORY
Would the first electronic computers have evolved so rapidly, almost independently of
each other, without the impetus of a world at war? Many military innovations become
mainstream technologies. For example, the US Defence Advanced Research Projects
Agency (DARPA) developed the Arpanet6 in the late 1960s. It connected 4 nodes in the
USA, developed IP addresses and invented TCP and UDP networking protocols. In the
1980s it evolved into the Internet.
However ethics and computing technology spreads into our everyday life. The coggle
mindmap below delves into all the areas where people, society and business must think
not just about “Can I do this?” but “Should I do this?”.
Lots of websites suitable for LCCS that explore computers and society can be filtered on
www.compsci.ie.
Can you name some military inventions that have shaped our world, both
LO 1.11
positively or negatively? (from nuclear technology to drones to GPS!)
How would the Internet be different if a commercial company invented it Students should be able
instead of the US Arpanet? to discuss the complex
Without the invention of the nuclear bomb, would we have nuclear power relationship between
stations? Would we have less or more understanding of our universe and the computing technologies
sub-atomic world? and society including
issues of ethics.
Do you think the first electronic computers (Colossus and ENIAC) would have
developed in different ways and at a different pace?
3. Divide into research groups to explore the topic from key standpoints.
The positive and negative impacts of military innovations on society and on technology.
1947
Solid State Transistors
Learning Outcomes addressed in this section are listed below.
1.16 compare two different user interfaces and identify different design decisions that
shape the user experience
2.3 implement modular design to develop hardware or software modules that perform
a specific function
2.11 describe the different components within a computer and the function of those
components
2.12 describe the different types of logic gates and explain how they can be arranged
into larger units to perform more complex tasks
2.13 describe the rationale for using the binary number system in digital computing
and how to convert between binary, hexadecimal and decimal
When other Learning Outcomes are addressed, for instance in classroom activities or
through related online resources, the LO is numbered.
The digital revolution, it can be argued, began in 1947 with the invention of the solid
state transistor. John Bardeen, Walter Brattain, and William Shockley, working for Bell Learn about basic
Labs in the USA, developed the revolutionary semiconductor device which can act as a electronic components
switch, turning tiny electric currents on or off, and also as an amplifier of electric (resistors, diodes,
current, boosting electric currents. transistors, &c) and an
electronics timeline.
The operation and function of modern solid state transistors (using n-type and p-type
semiconductors) are explained in this series of videos on basic electronic components. From
explainthatstuff.com.
LO 2.14
Why Binary?
When transistors work as switches they can act as a computer’s memory. When a
switch is turned ON it is effectively storing the number 1 (high voltage). When a switch Representing data using
is turned OFF it is effectively storing the number 0 (low voltage). Transistors therefore Braille Binary, Decimal
operate in 2 distinct states and since there are only 2 digits it is called a binary system. and Hexadecimal.
BInary digiTS are better known by their shortened name of BITS.
From the CS Field Guide
8 bits makes up 1 byte (Tim Bell)
8 bits can represent 256 (2^8) numbers and hence 256 characters on your keyboard.
Check out this interactive
The old system for representing text and numbers was ASCII but the Unicode
Stanford University site on
system is now the most widely used. Check out the Universal Transformation
measuring memory.
Format (UTF) codes for emojis.
1000 bytes is about 1 KiloByte What do you think of its
1 KB (kB also used) is exactly 1024 bytes. This is 2^10 bytes. The base of 2 represents User Interface? Can you
the fact that a bit is either ON or OFF. 1 KB is a couple of short paragraphs of text. locate a better one? Why is
it a better UI?
1000KB is about 1 MegaByte
1 MB is 1024KB or 1,048,576 bytes. This is 2^20 bytes. MP3 audio is roughly 1MB of LO 1.16
sound per minute. LO 2.13
1000MB is about 1 GigaByte
1 GB is 2^30 bytes or approximately 1 billion bytes. PC RAM is measured blocks of
GB
1000 GB is about 1 TeraByte.
1 TB is a million million bytes or to be exact 2^40 bytes. Terabyte hard drives and
the growth of cloud storage have made this unit of measurement part of common,
everyday language.
An animated and
comprehensive look
at how computers add
From simple logic gates described below, the components of all computers can be numbers.
constructed, such as flip-flops and memory components all the way up to ALUs
LO 2.12
and registers. In fact Arithmetic Logic Units (ALUs) comprise a vital part of the
Central Processing Unit (CPU) of a computer. Logical and mathematical operations
are performed here. The inputs to the ALU are controlled within the CPU by the
Watch the NCCA video
control unit.
on battery testing using a
microbit, then implement
Analog v Digital is both very simple to understand at an abstract level and extremely in class, to explore Digital
complicated at the micro and quantum level. Explore the differences between analog and Analog signals.
and digital with this 5 minute Techquickie video. Microprocessors such as the
Arduino and Microbit enable both digital and analog processing. The revolution in Visit ncca.ie (computer
semiconductors, which began in 1947 with the invention at Bell Labs of the solid state science) or compsci.ie to
transistor, was in many ways the birth of the digital era: of 1’s and 0’s. Before that, our view similar videos.
world was driven by analog technology. Now we live in both an analog and digital
LO 2.14
world.
LO 3.11–3.13
Design your own half-adder in some language you have learned, for example The activity addresses a
Python or Scratch. vast number of LOs. In
particular:
What is a half-adder? The basic building blocks of an ALU are simple logic gates
and one of the most fundamental elements of an ALU is the half-adder. The half Designing and
adder takes two inputs in the form of bits, and outputs the sum and the carry-over. Developing LOs in
The addition and the Truth Table are shown below. Strand 1
(LO 1.19–1.23)
Addition of 2 bits INPUTS OUTPUT Abstraction LOs in
A + B = CS A B Sum (S) Carry (C) Strand 2
0 + 0 = 00 0 0 0 0 (LO 2.1–2.4)
0 + 1 = 01 0 1 1 0 ALT3 Modelling and
1 + 0 = 01 1 0 1 0 Simulation LOs in
1 + 1 = 10 1 1 0 1 Strand 3
(LO 3.8–3.9)
The activity requires a minimum group of 3.
COMPONENT BUILDER
The role is to write functions in a programming language for the basic logic gates:
AND, OR, XOR, NAND and NOR gates. The function should take 2 inputs (A,B) and
output the result from the gate. The half-adder program will use these logic gate
functions to simulate a half-adder.
HALF-ADDER DESIGNER
The role is to research half adder designs on the internet. With one of these
designs, design an abstract model and algorithm to implement a half-adder design
in your chosen programming language. The logic gate functions will be used
within the overall model.
1953
Invention of High Level
Programming Languages
Learning Outcomes addressed in this section are listed below.
1.11 discuss the complex relationship between computing technologies and society
including issues of ethics
1.12 compare the positive and negative impacts of computing on culture and society
1.13 identify important computing developments that have taken place in the last
100 years and consider emerging trends that could shape future computing
technologies
1.18 recognise the diverse roles and careers that use computing technologies
2.17 use ASCII and Unicode character sets to encode/decode a message and consider the
importance of having such standards
When other Learning Outcomes are addressed, for instance in classroom activities or
through related online resources, the LO is numbered.
Watch a video on
getting Y2K ready –
BUG hysteria or good
preparation on NY eve
1999?
LO 1.11, 1.12
This example shows many similarities to the structure of most high level languages
and scripting languages such as Python and Javascript. One of the features of Grace
Hopper’s flowmatic programming language was a conditional called an IF statement.
The flow charts below illustrate decision-making algorithms now common place in high
level languages: conditionals and loops.
Flow chart
starts here
Yes No Yes
Execute this
block
Execute these lines Execute these lines
Continue Continue
Have all
items in sequence Is the condition true?
had their turn
No Yes Yes No
In 1964, BASIC (Beginners All purpose Symbolic Instruction Code) was invented by two Take the Crash
Maths professors, Kurtz and Kemeny. They designed their language specifically for Course on programming
learners. A decade or so later it was embedded on the earliest forms of personal languages
computers mainly due to its adoption by a then little-known start-up called Microsoft.
An example of the Hello World program in BASIC is below. (REM signifies a comment.) From the Crash Course
Series on YouTube (Carri
10 REM Hello World in BASIC Anne Philbin)
20 PRINT “Hello World!”
LO 1.18
The Hello World website demonstrates the introductory Hello World program in almost LO 2.4
600 programming languages.
Facilitate a Walking
Debate on the above
questions and/or TPSS
activity on this area.
LO 1.13, 1.18
7 computerhistory.org
http://www.computerhistory.org/timeline/computers/#169ebbe2ad45559efbc6eb35720ba5f3
The journey of the letter Q from the keyboard to processing is many ways the same
now as it was in 1956. But only at an abstract level. Follow the journey below from
the moment you press the letter Q on your keyboard to its apparently instantaneous
appearance on your screen. (Well most of the time!)
Join the Q!
1. YOU PRESS Q
The keyboard sends a signal (scancode) to the keyboard controller saying a button
has been pressed.
YOU PRESS
4. BUSY PROCESSOR
You can imagine the processor is quite busy. When it is ready to deal with a
keyboard interrupt, it alerts the Operating System (OS)
5. MULTI – TASKING OS
The OS locates the window you were working in when you pressed the letter Q.
7. 1 BYTE OF THE Q
Q takes up 1 byte of memory. (8 bits of Unicode or 7 (used) bits of ASCII)
Computer science has created careers, roles and employment for people that we could
never have imagined. A browse on the web of the most sought after skills in the digital The World Economic
hi-tech industry will most likely include: Software Engineer, Cloud Architect, CS Forum did a major report
Analyst, Data Scientist and Web Developer. Picture yourself in 1977, at the launch of on The Future of Jobs.
Apple II, arguably the first modern PC. Could even visionaries such as Steve Wozniak
Review their findings on
and Steve Jobs have foreseen that careers in the CS industry would include Web
employment trends and
Developers or Cloud Architects? With neither a spider nor a meteorologist in sight!
the disruptive effect of
However the first decades of the 21st century saw the rapid expansion of AI and cloud
new technologies.
computing. It prompted many thinkers and leaders such as US President Barrack Obama
to question whether the digital revolution will be the first industrial revolution in LO 1.18
history to be a net destructor of jobs as opposed to a net creator of jobs.
3. Divide into research groups to explore the topic from key standpoints.
If feasible, form at least 6 groups based on the 6 categories above. Each group
examines one of the prompts above, analysing the particular standpoints below or
researching the questions posed below. (The list of 6 prompts is suggestive and LO 1.12
ideally adapted in an appropriate manner for the students)
Students should be able
For example, for prompt number 4. Improving communication, research the to compare the positive
following: and negative impacts of
computing on culture and
Is CS a net creator or destroyer of jobs in this area?
society
(Give an overview of the type of jobs created or destroyed and justify your
conclusions)
How has CS helped to improve our world in this area?
How has CS helped to disimprove our world in this area?
1958
Integrated Circuits
Learning Outcomes addressed in this section are listed below.
1.2 explain how the power of computing enables different solutions to difficult
problems
1.13 identify important computing developments that have taken place in the last
100 years and consider emerging trends that could shape future computing
technologies
1.14 explain when and what machine learning and AI algorithms might be used in
certain contexts
1.18 recognise the diverse roles and careers that use computing technologies
2.3 implement modular design to develop hardware or software modules that perform
a specific function
2.11 describe the different components within a computer and the function of those
components
When other Learning Outcomes are addressed, for instance in classroom activities or
through related online resources, the LO is numbered.
The invention of the first programmable, electric computers (Z1, ENIAC and Colossus), it
could be argued, was the first time that high level human thought processes were “Thinking like a computer
offloaded to machines which could execute these processes both quicker and better. scientist means more than
These computing machines provided proof of concept that computers could being able to program
revolutionise the way humans think about solving problems. For the first time in a computer. It requires
human history, the question could now be posed – How do I go about solving a thinking at multiple levels
particular problem, knowing I have the additional processing power of a computer at of abstraction.” 9
my disposal?
The above quote is from
After World War II, the invention of the solid state transistor almost immediately Jeanette Wing’s highly
supplanted the unreliable vacuum tubes used in the first computers. In addition to influential paper on
predictable and reliable behaviour, they opened the floodgates of semiconductor Computational Thinking.
design. No longer would an entire room be required to house all the distinct, discrete Using TPSS, discuss the
components of a computer. Suddenly the possibility of a completely functioning circuit, origins of Computational
comprised of many electronic components on a single semiconducting platform, was a Thinking in the context
real possibility. of the evolution of
computers.
Integrated Circuits (IC) were invented in 1958 by electrical engineers Jack Kilby (Texas
Instruments) and Robert Noyce (Fairchild Semiconductor). Like many inventions and LO 1.2
ideas that have changed our world, their inventions were independently discovered.
The drive behind the development of IC was very simple: how can we squeeze more
components into a smaller space, at reduced cost and operating at faster speeds? The 1. A fast-talking
answer lay in the properties of semi-conducting elements such as Germanium and technical overview of the
Silicon. Normally they behave as insulators, in the sense they do not conduct electricity. development of IC and
However using a chemical process known as doping, these substrates can become both how Moore’s Law might be
conductors and insulators, depending on the conditions applied. There are only two re-imagined.
types of doping: n-type doping makes the substrate richer in electrons and p-type
2. An animated
doping makes the substrate depleted of electrons. When n-type and p-type are joined
overview of the limits
together, and a certain voltages applied across the junction where they are joined,
of IC technology and the
the basic ingredients of all micro-electronic semi-conducting devices can be
potential of Quantum
assembled into diodes, transistors, logic gates, memory and microprocessor systems.
Computing.
Kilby eventually received the Nobel Prize in 2000 for his work, where he acknowledged
In the section on the
the now deceased Noyce as his co-inventor. Noyce founded the Intel Corporation with
Turing Machine, the
Gordon Moore in 1968. They released the first microchip computer or microprocessor in
explosion in AI was
1974, paving the way for the first modern Personal Computers.
attributed to Data,
Algorithms and Processing
Power.
LO 1.13
Moore’s Law is one of the most famous laws in the world of computer science. The
graphic below is from www.explainthatstuff.com. Moore’s Law says that the number of Take the Crash Course
transistors on an IC will approximately double every 2 years. Thus the processing power Video on Integrated
of computers will also double approximately every two years. Moore’s Law is more of an Circuits (0.00–9.00) and
observation/prediction than a scientific law. As can be seen by the graphic below, it has Moore’s Law (9.00–12.30)
been extremely accurate.
From the Crash Course
Series on YouTube (Carri
Anne Philbin)
LO 2.3, 2.11
But can the size of transistors continue to decrease from microns (a millionth of a metre)
into the realm of nanometres (a billionth of a metre)? The state of current IC technology
is often called process. In the table below a 4 micron (µm) process refers to the length of
the transistor gate.
Pentium III 9.5 million 1999 250 nm Pollen, Viruses Approaching UV light
Exynos 8895 20 billion+ 2017 10nm 50 atoms of Silicon Soft X-rays are 1nm
The latest innovations are a 5nm process. This has often been considered the limit for
Moore’s Law because it is a mere 25 atoms in width and effects such as current leakage The Human Brain
and quantum tunnelling have to be overcome. It is not surprising therefore that IC Project is attempting to
technology as we know it is evolving given that humans are now engineering material understand what each
at similar widths to a DNA molecule. section of the human
brain does and how our
brains work.
Watch a BBC Click video (7:30 – end) that discusses a range of opinions on how
society should change its structures to adjust to the advances of AI. For example, if
the diversity of jobs decreases, should we consider universal income for all?
Is this a good time to check the growth of AI? When we call a hotel to make a
booking, are we entitled to know if we are speaking to a human or machine?
The service industry in the developed world accounts for about 80% of
employment. From waiters to doctors to accountants, they need to learn how to
work with AI in order to thrive. If the services industry does not embrace this
technology, will the technology consume the services industry?
The developing world can save billions in money and in lives by embracing
automated services. For example in the area of training doctors or solicitors.
Should the training be how to work with and supervise AI as much as learning
how to work with patients?
As the wealth generated by AI increases, and the wealth generated by humans
decreases, should we re-structure the relationship between the citizen and the
government? For example, should there be a universal income for all citizens?
Should health and well-being technology be mandatory for all humans to save
on health care and social welfare payments?
3. Divide into research groups to explore the topic from key standpoints.
Themes for different groups:
LO 1.12
The growth of AI and machine learning has an overall positive impact on
society and on technology. Students should be able
The growth of AI and machine learning has an overall negative impact on to compare the positive
society and on technology. and negative impacts of
computing on culture and
Societies, both developed and developing societies, must change their
society
structures to accommodate the disruptive effect of AI.
Societies, both developed and developing societies, must limit the impact of AI LO 1.18
to accommodate the needs of their societies.
Students should be able
4. Choose a teaching / facilitation methodology. to recognise the diverse
Adapt appropriately for your CS classroom. roles and careers that use
computing technologies
a. Students first research each topic in research groups of 3.
b. The teacher uses a Jigsaw Learning Technique to create groups of 3 comprising
one student from 3 different themes. Each person discusses their research
within their new group.
c. Reassemble into original groups.
1973
Mobile Phones and
Interconnected Computers
Learning Outcomes addressed in this section are listed below.
1.8 evaluate the costs and benefits of the use of computing technology in automating
processes
1.11 discuss the complex relationship between computing technologies and society
including issues of ethics
1.12 compare the positive and negative impacts of computing on culture and society
1.13 identify important computing developments that have taken place in the last
100 years and consider emerging trends that could shape future computing
technologies
1.15 consider the quality of the user experience when interacting with computers and
list the principles of universal design, including the role of a user interface and the
factors that contribute to its usability
1.16 compare two different user interfaces and identify different design decisions that
shape the user experience
1.17 describe the role that adaptive technology can play in the lives of people with
special needs
1.18 recognise the diverse roles and careers that use computing technologies
2.15 explain what is meant by the World Wide Web (WWW) and the Internet,
including the client server model, hardware components and communication
protocols
When other Learning Outcomes are addressed, for instance in classroom activities or
through related online resources, the LO is numbered.
At the launch of the iPhone in 2007, Steve Jobs, CEO of Apple, claimed to have re-
invented the phone. In many ways Apple did re-invent our idea of a phone by enabling The following quotes are
the phone to access all modes of communication, from voice to email to text to internet from Alexander Graham
connectivity. Bell, accredited with
inventing the telephone.
In 1973 Martin Cooper, a Motorola researcher, made the first
ever call on a mobile phone. As you can see in the picture, “The day will come when the
mobile phones were a lot larger in size than today’s handsets. man at the telephone will be
His first call was on a device weighing in excess of 1 kg. This able to see the distant person
event was every bit as momentous as Alexander Graham Bell’s to whom he is speaking.”
first patent for a telephone in 1876.
“I truly believe that one day,
Bell built upon advances in telegraphy, among them Samuel there will be a telephone in
Morse’s famous system of communication. For the following every town in America.”
100 years, a phone was essentially fixed to a landline. You,
Check out some
the user of the phone, had to be physically beside the location
predictions about mobile
of the phone. The concept of a phone being as mobile as the
phones beyond 2020.
user, with the only restriction being the strength of a signal,
Which ones do you think
revolutionised our idea of communication. In America the
will become standard?
mobile phone became known as a cell phone, because the local
networks were called cells. Watch a video of 10
examples of how hard it
is to predict technological
advances or measure
the impact of current
technology.
Brain Buster
The limitations on the size of early mobile phones were due to the technology.
It was not possible, at that time, to manufacture smaller handsets. Today the
limitation on the size is determined less by the technology and more by what is
practical for an average human. As the manufacturing process shrinks to the
atomic and cellular level, should our phones shrink to the same level so they can
be embedded within the person’s body? It might give new meaning to the word
cellphone!
LO 1.8, 1.17
10 Curzon P., McOwan P (2017) The Power of Computational Thinking World Scientific.
PLUGGED
There are more resources
Using a microprocessor, design a system to communicate remotely to another and exercises on ncca.ie
system. One system of communication could be Morse code or an adapted version of related to this area.
Braille. Check out some other systems, including ciphers such as the Caesar cipher.
Or communicate between 2 microprocessors using the serial ports. For example, the In the section on Lists
microbit serial communication mimics the 7 bit ASCII code referred to in a previous and Dictionaries there
section. is an advanced CT
challenge, which uses
Use Python or JS to create basic communication systems within your group or
standard ASCII/uft-8
perhaps an interactive webpage that uses html action forms or similar code, to allow
code to implement a basic
communication within your LCN. (Local Class Network). Your group decides on the
Caesar shift encryption in
channel of information transfer, whether it is using emails, IP addresses, sms texts (if
Python, using a Tkinter UI
allowed under school policy), or a combination of unplugged and plugged
and/or a simple txt file.
communication systems.
LO 1.22, 1.23
In the same year, 1973, that the first call was made on a mobile phone, another concept
LO 2.5–2.7, 2.19
that would eventually revolutionise the world became real and feasible: interconnected
computers. The story behind the Internet begins much earlier. In 1957 the Soviet Union
launched Sputnik, the first unmanned satellite in space. As part of the USA’s response to
In the 1960s ARPA
this technological breakthrough, the US government set up the Defense Advanced
developed a system called
Research Projects Agency (DARPA). Originally called ARPA, its aim was, and still is, to
NLS (oNLineSystem). Its
ensure the US stays at the cutting edge of technological advances.
pioneering HCI evangelist
“DARPA explicitly reaches for transformational change instead of incremental was Doug Engelbart. In a
advances. But it does not perform its engineering alchemy in isolation. It works within now legendary “Mother
an innovation ecosystem that includes academic, corporate and governmental partners, of all Demos” in San
with a constant focus on the Nation’s military Services, which work with DARPA Francisco in 1968, he
to create new strategic opportunities and novel tactical options. For decades, this stunned his audience
vibrant, interlocking ecosystem of diverse collaborators has proven to be a nurturing with:
environment for the intense creativity that DARPA is designed to cultivate.” 11
Word processing of
documents
Stimulate a Debate on the role of the military, Windows on your
and in particular DARPA, in shaping some working documents
In the late 1960s, DARPA decided to connect scientists and engineers in 4 separate
locations using a network of interconnected computers called the ARPANET. It was Watch a PICOL
successfully launched in 1969, and within a couple of years other networks sprung up animated video on the
all over the world (NPL (UK), ALOHANET (a wireless system in Hawaii), HLN (an airline History of the Internet,
network), CYCLADES (France)). Because these networks developed in isolation, their including DARPA’s role.
methods of communication and packet switching were incompatible. The (subtitled)
interconnection of networks became a key goal of industry and of military. The UK and
The SciShow have a
France were the first to experiment with internetworking. However it was ARPA’s
history of the Internet,
Transmission Control Protocol / IP, first sketched out in 1973 by Vint Cerf and Bob
followed by History of the
Kahn, which would come to dominate the landscape of information transfer. ARPA at
Web. (subtitled)
this stage had several networks and in 1977 demonstrated that it could connect them
all. This became known as the internet. Lynn Root and Vint Cerf explain the Some prompts for the
operation of packets and TCP in this code.org video. above video lessons:
1973 was also the year the ethernet was invented. At the time there were many The early form of the
standards for interconnecting computers such as IBM’s Token Ring. But the ethernet Internet was known as
is the one, looking back, that became the standard. The big question is often why some the ARPANET. Which
technologies endure and others simply fade away. In the age of wireless communication, colleges did it initially
and increasingly as devices do not have any method for direct ethernet connection, connect?
watch a tech experiment to connect an iPhone to the internet using an ethernet What is Packet
cable. Switching, and why
has it superceded
Circuit Switching?
code.org designed an internet simulator for the classroom.
Name other networks
The activity is fully described it the section on the world wide web.
that formed and outline
their contribution to
the development of the
internet.
LO 2.15
1977
First Modern PC – Apple II
Learning Outcomes addressed in this section are listed below.
1.11 discuss the complex relationship between computing technologies and society
including issues of ethics
1.13 identify important computing developments that have taken place in the last
100 years and consider emerging trends that could shape future computing
technologies
1.15 consider the quality of the user experience when interacting with computers and
list the principles of universal design, including the role of a user interface and the
factors that contribute to its usability
1.18 recognise the diverse roles and careers that use computing technologies
2.1 use abstraction to describe systems and to explain the relationship between wholes
and parts
2.11 describe the different components within a computer and the function of those
components
2.12 describe the different types of logic gates and explain how they can be arranged
into larger units to perform more complex tasks
When other Learning Outcomes are addressed, for instance in classroom activities or
through related online resources, the LO is numbered.
ABSTRACTED
MODEL OF
CPU COMPUTER
COMPONENTS
ARITHMETIC (Block Diagram)
INPUT LOGIC UNIT
CONTROL UNIT
OUTPUT
MEMORY
1. INPUT The keyboard and mouse quickly established themselves as the most
effective input devices. Increasingly voice and visual images are forming an
essential part of interaction with computing technology.
2. OUTPUT Computer screens have been the most enduring physical devices associated
with computers, with modern screens displaying at very high resolutions. The visual
and audio output elements are becoming increasingly important. 3D Games require
excellent graphics cards to function on PCs. It was once thought computers would bring
in a paperless world. However, printers remain essential for outputting hard copies.
LO 1.11, 1.15
12 Wang (2016) From Computing to Computational Thinking. CRC Press (p 69–77).
LO 2.11
LO 1.15
Hardware LO 2.1, 2.4, 2.11
1989
The World Wide Web
Learning Outcomes addressed in this section are listed below.
1.11 discuss the complex relationship between computing technologies and society
including issues of ethics
1.12 compare the positive and negative impacts of computing on culture and society
1.13 identify important computing developments that have taken place in the last
100 years and consider emerging trends that could shape future computing
technologies
1.18 recognise the diverse roles and careers that use computing technologies
2.15 explain what is meant by the World Wide Web (WWW) and the Internet,
including the client server model, hardware components and communication
protocols
When other Learning Outcomes are addressed, for instance in classroom activities or
through related online resources, the LO is numbered.
The Internet is a global network that connects computers and computer networks. The LO 1.13, 1.18
linking of computer networks is called internetworking, from which we get the name
internet. The communication system governing this global network is known as
Internet Protocol (IP). The Internet evolved from a US military project in the late 1960s An overview of a Lesson
known as ARPANET, from which IP and other protocols (TCP, UDP) evolved.14 Plan on the Internet using
code.org.
The World Wide Web is the information space that can be accessed by the Internet. You can sign up your class
Resources on the web are requested and retrieved by uniform resource locators or to view these lessons on
URLs. A URL is usually in the form: the Internet.
Follow the setup
scheme://serverhost:port/pathname?query_string instructions, including a
video on how it works,
The scheme indicates the protocol (http is the default scheme, https is the more secure to create an Internet
protocol) Simulator, as part of the
code.org lesson plan.
serverhost is the domain name or IP address (A DNS is a Domain Name Server or LO 2.15
System whose job is to convert human-friendly domain names into internet-friendly IP
addresses. It is in essence a database.)
Facilitate a walking debate
port and pathname are optional and seldom included in modern usage. on Tim Berners-Lee quotes.
For example:
HTML stands for HyperText Markup Language, and was invented by Tim Berners-Lee.
<start tag> A file written in html contains text and content (videos, images, etc..) “I think in general it’s clear
that most bad things come
interspersed with <begin tags> and </end tags> . The tags allow the content to be easily
from misunderstanding,
read and formatted by any Web Browser (explorer, firefox, chrome, etc..). </end tag>. and communication is
Each programming concept on the NCCA website contains a Computational Thinking generally the way to
Challenge written on a html platform, designed to be edited by teachers and students. resolve misunderstandings,
and the Web’s a form of
communications, so it
generally should be good.”
LO 1.13
Internet Protocol (IP) Addresses In the lower layer of the OSI model, every host Play the Packet Attack
will have its own network address that identifies the host (usually your computer) Game which goes through
for communication purposes. A typical IP address would look like 83.141.127.255. 7 levels of Transfer:
This is an IPv4 address. It is made up of 4 bytes. In binary it is 32 bits and would be A simulation of TCP
01010011 10001101 01111111 11111111. The rapid expansion of the Internet is now and why it is virtually
accommodated by IPv6, which supports 128 bit addresses. impossible to stop level 7
TCP.
Transmission Control Protocol (TCP) is the transport layer that ensures data
arrives reliably. The system of handshakes, ordering and acknowledgement From the CS Field Guide
that data has arrived, trades off speed for accuracy. Given the number of nodes (Tim Bell)
(computers, routers, etc..) that packets of data must go through, data inevitably gets
LO 2.15
delayed or corrupted by interference. Play the Packet Attack Game to see why TCP
is the most commonly used transfer protocol on the internet.
Classroom Experiment
It is quite straightforward to see how data is forwarded by routers through
the network. Simply go to your command prompt (or terminal or shell prompt
depending on your OS).
For example, the command “tracert www.compsci.ie” yielded the following path:
Hop 3 Round Trip Time Delays Some router info, including [IP address]
User Datagram Protocol (UDP) is also a transport layer, but it loses reliability for
speed. It is used when transmission of all the data is not so important, say for
example in video or music streaming.
Voice Over Internet Protocol (VOIP) uses access to the internet to transmit voice
messages, bypassing telephone lines. It is also called IP telephony and is one of the
most significant developments in telephony since the invention of the telephone
itself. Skype is the most well known example, so much so that often the word
skype has become synonymous with online video calls.
Our society has become normalised to putting our data on the web. One of the core
concepts of the LCCS specification is Data. Many ethical and privacy questions have
been raised in recent years around ownership of data. GDPR, a General Data Protection
Regulation act, became law across the entire EU on May 25th 2018.
“The key principle for doctors under Medical Council guidelines is that they must
not disclose information about your care or illness to any other person, without
your consent. A doctor who breaches confidentiality can be reported to the
Medical Council and may face a hearing into his or her conduct. Confidentiality
is the cornerstone of medical care. This rule does not apply however, when the
information is needed by a court of law.”15
3. Divide into research groups to explore the topic from key standpoints. LO 1.11
Personal online data is essential to allow governments protect and nurture its citizens Students should be able
and to allow multi-nationals to offer a better service to its consumers. to discuss the complex
relationship between
Themes for different groups:
computing technologies
Governments should be allowed unlimited access to citizens’ online data. and society including
Governments should be allowed no access to citizens’ online data. issues of ethics
2000–2020
Cloud Computing
and the Smart Phone
Learning Outcomes addressed in this section are listed below.
1.8 evaluate the costs and benefits of the use of computing technology in automating
processes
1.11 discuss the complex relationship between computing technologies and society
including issues of ethics
1.12 compare the positive and negative impacts of computing on culture and society
1.13 identify important computing developments that have taken place in the last
100 years and consider emerging trends that could shape future computing
technologies
1.14 explain when and what machine learning and AI algorithms might be used in
certain contexts
1.15 consider the quality of the user experience when interacting with computers and
list the principles of universal design, including the role of a user interface and the
factors that contribute to its usability
The term Cloud Computing is now generally used to mean the delivery of services
hosted on the internet. The concept of delivering computing as a service or a utility (like Watch a short
hooking up to the electric grid) is not a new concept. Mainframe computers have existed (mashable) video
since modern computing evolved, where end users hook up their terminal to a larger explaining the cloud and
system with greater speed and processing power. cloud storage.
In the 1970’s, and before the PC dominated the computing world in the early 1980s, What is the difference
the power of computers was very limited: less processing power than a standard 21st between storage in the
century smart phone. Limited bandwidth and connectivity meant companies could cloud and storage in a
not provide cloud computing on a commercial scale. That all changed in the 1990s as data centre? Is cloud
internet bandwidth developed. One of the first companies to capitalise was Amazon. computing different to
Their Amazon Web Service (AWS), grew out the realisation that their data centres cloud computing?
had more computing power than the company could use. So they began to rent their
“You don’t generate
computers as virtual servers to clients who wanted to avail of online storage and
your own electricity.
computing power. Also the web went from being quite static (web 1.0) to something
Why generate your own
much more collaborative, responsive, interactive and social (web 2.0). Amongst many
computing?”
innovations, Javascript, one of the prescribed programming languages of the 2017 LCCS
specification, has become more and more central to this phenomenon. Jeff Bezos, CEO Amazon.
What developments have enabled cloud computing and what are some of the key LO 1.8, 1.13
technologies and trends related to Cloud Computing?
1) In the video Steve Jobs claims that Apple have re-invented the phone, and shows a
chart as to why the iPhone was unique amongst smartphones. Discuss this chart.
2) Examine his claim that the iPhone represented a revolutionary UI and a
breakthrough in internet communication.
3) Make note of the quote he uses from Alan Kay (who coined the phrase Graphical
User Interface (GUI pronounced gooey)) regarding the relationship between software
and hardware. Give examples of other hi-tech companies who have followed this
trend. (LO 1.12, 1.15)
Why stop at making mobile phones smarter? Imagine if any system which made
decisions and had intelligence built into its operation (such as a home heating system)
availed of cloud computing and storage? Or if we could intervene early to safeguard a
person’s health and well-being in their daily lives through data analysers operating in
the cloud? The idea is known as the Internet of Things (IoT). It raises many possibilities
and scenarios of an entire world connected to the cloud.
Brain Buster
If the world of things is being rapidly connected, is it inevitable that the human
race itself will be permanently connected to the cloud? Or consider the following,
is it more desirable to be integrated into the cloud: “Like many transhumanists,
Nick (Bostrom) was fond of pointing out the vast disparity in processing power
between human tissue and computer hardware. Neurons, for instance, fire at
a rate of 200 hertz (or 200 times per second), whereas transistors operate at
the level of gigahertz. Signals travel through our central nervous systems at a
speed of about 100 metres per second, whereas computer signals travel at the
speed of light. The human brain is limited in size to the capacity of the human
cranium, where it is technically possible to build computer processors the size of
skyscrapers.” 17
Below are some of the pros and cons of cloud computing designed to act as a stimulus piece
for a class debate. The arguments are based on an article on the website explainthatstuff.
com. Future trends in cloud computing are also discussed on the same website. Design some
prompt questions or use the summary below to help divide the class into research groups to
explore the issue from as many standpoints as possible. Facilitation strategies are explained
in A Summary of Teaching & Facilitation Methodologies.
Higher ongoing operating costs. Could cloud systems work out more expensive?
Greater dependency on service providers. Can you get problems resolved quickly, even
with SLAs?
Risk of being locked into proprietary or vendor-recommended systems? How easily can
you migrate to another system or service provider if you need to?
What happens if your supplier suddenly decides to stop supporting a product or system
you’ve come to depend on?
Potential privacy and security risks of putting valuable data on someone else’s system
in an unknown location?
If lots of people migrate to the cloud, where they’re no longer free to develop neat and
whizzy new things, what does that imply for the future development of the Internet?
Dependency on a reliable Internet connection.
Emerging Trends
in the 21st Century
Learning Outcomes addressed in this section are listed below.
1.11 discuss the complex relationship between computing technologies and society
including issues of ethics
1.12 compare the positive and negative impacts of computing on culture and society
1.13 identify important computing developments that have taken place in the last
100 years and consider emerging trends that could shape future computing
technologies
Re-visit in 6th year to see if students would review their predictions or if any
predictions have already been realised.
Perhaps just as interesting is how emerging trends are influencing some important
ethical and behavioural issues. Using a suitable teaching or facilitation methodology
from A Summary of Teaching & Facilitation Methodologies, such as Stimulate a Debate,
Think-Pair-Share-Snowball, or just a simple Carousel Brainstorming exercise, examine
the following questions through the lens of emerging trends, ethics or the positive and
negative impacts on society. (LO 1.1–1.18)
Some stimulus material and prompt questions are also suggested, and in some cases the
teacher and students can brainstorm around their ideas on a question.
Originally motivated by natural science, what I did was to explore the general universe
of possible programs – starting with simple programs that one might set up at random,
or by enumeration. And what I found – first in the context of cellular automata – was
that even extremely simple underlying rules are capable of producing behaviour of in
effect arbitrary complexity.
At odds with Wolfram is leading neuroscientist Miguel Nicolelis. You can see one of his
TED talks or look again at his exoskeleton work that has helped people walk again. He is
of the view that “The brain is simply not computable. It cannot be simulated.”18
2. Obama – Could the information revolution be the first revolution where the
number of jobs destroyed is greater than number of jobs created?
Is there validity in this statement. What are the reasons behind the validity of this
statement? Or not! Reference examples. In 2017, all line judges were replaced with
hawkeye in some professional tennis tournaments, with the umpire being the only
human judge. Also SMART electricity meters are being installed in Ireland over the
coming years. Will a human meter reader be thing of the past? Interestingly, before
the invention of the electronic computer, the word computer originally referred to the
human who did the number crunching and mathematics.
4. Are computers and Computing Technology designed for humans and for
human interaction?
Explanations of HCI (Human Computer Interaction) When computing technology is
designed for profit or for government use, where is the human on the priority list?
Equally, to ensure HCI is about improvements for humans, there must be investment in
it or money to be mad in some from?
5. What are the implications for humans if the human mind can be uploaded?
Mark O’Connell’s 2017 book To Be a Machine raises some thoughts on this question… is
the mind then a machine … is it you uploaded?... what will be the substrate for carrying
the uploaded mind around? … can a human brain and its feeling and emotion be
reduced to code? The operation of transistors within a computer system share many
characteristics with the operation of neurons in the neural networks of our brains.
Watch a TED talk on the art of neural networks.
6. If a robot can carry out the same function as a human, is the robot showing
signs of intelligence?
If yes, then what is intelligence and what is consciousness…. If no then can robots/
machines/ AI ever get to stage where they show intelligence or demonstrate
consciousness? … “at least in principle, I see no reason why it would not lead to an artificial
consciousness” Consciousness and the Brain (Dehaene, 2014). Descartes believed in
dualism, that the body and mind were two separate things. How would this apply to AI:
is its “mind” separate to the processing power, the silicon or the algorithm?
7. What are the positive and negative impacts of military innovations on both
society and on technology?
A fully worked example of Stimulate a Debate on this question (in the Colossus and
ENIAC section of the main resource) allows for this question to be explored in depth.
The invention of electronic computers occurred during WWII in response to human
computers’ inability to decrypt messages with sufficient speed; drones for example can
now drop bombs while being remotely piloted and they can also drop emergency goods
and supplies in exactly the same way. Which technological innovations did not arise out
of military innovations?
8. How much data, and the kinds of data, governments and giant multi-
nationals should be allowed to keep on citizens and consumers?
A fully worked example of Stimulate a Debate on this question (in the World Wide Web
section of the main resource) allows for this question to be explored in depth. Certain
kinds of data are vital for governments to function in the interest of its citizens (PPSN,
Tax payments, criminal records, etc.). But how much data is too much? Should health
records be analysed by government AI to signal who is in danger of diabetes or obesity
or dementia in an effort to reduce health care costs and spend taxpayer money more
efficiently? Similar arguments apply to both giant hi-tech companies and smaller online
companies that need some of your data to operate profitably, and in the consumer’s
interest. What are the responsibilities and rights of the citizen and consumer in this
regard? Should there be a right to take back all of your data with no limitations?
Methodologies previously referenced in this resource are explained in further detail below. There is particular
reference to how key skills can be embedded within teaching and learning of Computer Science in general and
Computers and society in particular. Each key skill has associated elements and learning outcomes and these
are set out in the Key Skills Framework. This summary is not intended to be a comprehensive course in all the
elements and learning outcomes of each key skill. Please consult the Key Skills Framework for full details.
We cannot take for granted that students have the necessary skills to be able to engage in genuine dialogue and
debate and to work collaboratively and effectively with each other. Skills of listening, summarising, encouraging,
criticising ideas (and not people), negotiating differences of opinions, etc. all need to be taught. They also need to
be reflected upon through group processing.
Throughout the course students need to be given opportunities to develop the key skills in an integrated way.
The use of these types of facilitation methodologies will help to build key skills in senior cycle students.
INFORMATION
COMMUNICATING
PROCESSING
1. The class is arranged into small groups. Each group has a different colour marker.
2. The teacher poses a question on a flip chart, e.g. Will AI benefit humans in the long run?
3. The flipchart question is passed from group to group. (To speed up the process you may have a number of
pages going around)
4. Each group must add two original suggestions.
5. The flipchart page(s) are displayed for all to see.
6. You can see which group has suggested each idea (by colour) and ask them more about their idea.
THINK-PAIR-SHARE-SNOWBALL (TPSS)
This is an activity to encourage higher-order thinking that involves students thinking individually, then pairing
with a partner, then snowballing those ideas with the wider group. The sequence generally begins with the
teacher posing an open-ended question, to which there may be a range of responses. Think time or wait time is
followed by discussion with a partner. The pair may then pair up to form a square, or share it out to the wider
group, and build on each other’s ideas. TPSS is also suggested in the lesson resources on the NCCA website for
teaching and learning of Programming Concepts.
WALKING DEBATE
This is a well know methodology that can be used and adapted for the Computer Science classroom.
At one end of the room, place an ‘I agree’ sign on the wall, and on the other end an ‘I disagree’ sign. Place ‘I’m not
sure’ in the middle of the room and ask the students to stand in this space.
Call out statements and as the students consider each one they move to the position that reflects their opinion.
The closer they move towards each sign, the more they agree or disagree. Emphasise that is it okay to stay in the
middle and it is also okay to move position according as students hear different views.
In the CS class the teacher can show the complexity of an issue by airing as many different perspectives
as possible. Walking debates have been suggested in different sections of the evolution of CS. For example,
Can Machines Think? The teacher can also push students to explain and justify their position with evidence
by asking questions such as ‘Can you give an example of that?’ ‘What is the evidence to support that view?’
‘What have people like Alan Turing or Stephen Wolfram said about this?’ ‘What will it take for computers to
demonstrate they are thinking in such a way to convince humans?’ etc.
Count the votes for each answer. Ask the students to sit with their preferred answer groups. Now the job of each
group is to persuade others from different answer groups to come over to their group. Give them some time to
formulate their campaign strategy. The following questions may be useful to prompt debate:
Who is going to speak? What argument will they use? What evidence can they provide to support their argument?
Are they going to have a campaign slogan?
Which other group will they target?
Will they focus on the strengths of their own argument, or on the weakness of the opposition?
During the ‘campaign’ the teacher acts as chairperson, although this role may also be assigned, especially as
the class becomes familiar with the strategy. In the course of the lesson, learners may change sides, or revert to
original positions. Leave enough time at the end of the lesson to think about the campaign and the tactics used.
A good follow-up homework task for further learning is for students to generate a paragraph or a statement
beginning with I was persuaded because…. or, Answer A won because…..
In the section on the invention of the Web, there is a Stimulate a Debate exercise on access to personal data. It
suggests that as part of the teaching and facilitation methodology at the end of the exercise, that the HOT seat be
taken by the government, then by a major hi-tech multinational, then by a citizen or a consumer. All students can be
involved by preparing questions in advance, or by turning the spotlight and putting the whole class in the HOT seat.
The ALTs described in the specification, the task-based NCCA supports and the PDST manuals all support
opportunities for problem-based learning.
JIGSAW TECHNIQUE
Step 1: Step 2:
Place mat is a form of collaborative learning that combines writing and dialogue to ensure accountability and
involvement of all students. It involves groups of students working both alone and together around a single piece
of paper to simultaneously come up with lots of alternative ideas.
The paper is divided up into sections based on the number of member in the group with a central square or
circle.
Steps
1. Carefully construct the task or question.
2. Assign students into small groups (3–4
works best)
3. Hand out the task/question with the flip
chart page.
4. Students work alone first, using their
section of the place mat to record their
ideas.
5. Then students share their ideas with the
group
6. Then they prioritize the 2–3 big ideas that
have emerged from the group and these
go on the centre placemat.
7. Sharing then takes place between groups.
What will happen to employment – will the growth of computing technology and AI in particular, be a net
creator or destroyer of jobs?
Will our quality of life improve through cheaper, faster and higher quality health care and greater access to
knowledge?
Will the rich get richer, and corporations more powerful?
Will ordinary citizens be more active and better heard by their government or will government have access
to all the data it needs on its people, without consulting them?
Will our privacy be assured on this electronic network or will Big Brother end up knowing more about all of us?
Should we amend our laws to protect against this new computing technology?
How might war and peace be affected? How has the nature of warfare changed?
How will human relationships be affected by the accelerated progress of technology and new modes of
interpersonal communication?
(These are sample prompt questions based partially on the teachers institute at yale)
3. Divide students into research groups to explore the topic from key standpoints.
These will be typical opposing standpoints in the usual tradition of debating. Students must explore the topic
from the assigned standpoint. For example:
Military innovations, including wartime inventions, have an overall positive impact on society and on technology.
Military innovations, including wartime inventions, have an overall negative impact on society and on technology.
03 Formative
Feedback 04 StudentS reflecting
on their Learning
Giving students opportunities to support each Encouraging students to record their goals and review
other in their learning through reviewing their their progress, for example, through a journal/blog or
own work and their peers’ work and giving and the use of student reflection sheets. This helps them to
receiving feedback. understand their achievements, identify the areas they
need to improve upon and plan for future learning.
Developing key skills in the Politics and Society classroom has many strategies similar the ones described in this
resource, and many more that are applicable to exploring and discussing ideas in the classroom.