Monday, January 30, 2017

Design a Scene Response


Individual Written Responses
After completing your project, respond to each of the following reflection questions. Your response to any one prompt must not exceed 300 words.
a. Provide an overview of the purpose of your program and how your program code works. Describe the most important program features, rather than providing a line-by-line summary of the program code.

The purpose of my program was to set the background for the digital scene by group planned on creating. The digital scene is space. My program coded for the black color background with white specks to represent the stars. The most important program features of my code was using the loop to randomize the position of 1500 stars I wanted to create in order to fill the background but still be spaced out. This significantly reduced my line of code because I didn’t have to write the code for each individual code. This would have been tedious and not efficient.


b. Describe the most difficult programming problem you encountered while writing your individual code. What was the difficulty? Explain how you resolved it.

My code was simple. The most difficult programming problem I encountered while writing my individual code was figuring how to correctly depict what I wanted. I knew the lines of code needed but a missing line of code drew dots with connected lines. For example, in my first attempt of drawing my portion of the scene, the stars were connected by lines. To resolve this, I inserted a Pen up in the loop function so the Turtle would not draw a line as it moved to draw the individual stars.


c. Identify an abstraction used in your program and explain how it helped manage the complexity of your program.
An abstraction is pulling out specific difference to make one solution work for multiple
problems.  An example of an abstraction in my individual code is the loop. The loop helped manage the complexity because it allowed me to repeat the process of drawing the stars without me writing an individual code for each one. Without it, I would have to write long lines of code.

d. Explain in detail points in your development process where collaboration was used.
○ Describe the form of collaboration you used. Refer to Process section A-E in your description.
○ Explain how this collaboration affected your program development. Cite specific examples from the collaboration, such as how the group worked together to arrive at solutions, or feedback that you gave and received.
Collaboration was used to firstly brainstorm possible ideas and to decide on one scene to create. We then used the top-down design to break up the different parts that make up the scene. Each team member choose a part corresponding to the scene. My group’s digital scene was space. I coded the background and the stars. Another person programed the planets. Another did the meteor showers . While another coded a rocket. The form of collaboration we used was E. As stated earlier, we brainstormed ideas and worked on it independently. Once we were all done we combined each pieces of the program. The only collaboration not used was Pair Programming. Each member worked on their program themselves.

Tuesday, January 17, 2017

Data Innovation One-pager

Data Innovation

    My innovation research is on Fitbits. Fitbit is a physical activity tracker--a  portable electrocardiogram. It is important because it can inform a doctor on the health condition of their patients even when they are at home. It can help everyday people track their activities, food, exercise, sleep, stay fit and ultimately meet their fitness goal. It can sync with smart devices with the help of Bluetooth 4.0. Fitbit even has an open Application Program Interface (API) which allows the users to develop applications to access and modify the their data. The more advanced Fitbits includes features beyond fitness. It can function as a smart watch. It be used for music control, call and text notification, time tracking, and it is compatible with other apps. It is a 21st century pedometer included with features needed for today!

About the Data

Throughout the day, Fitbit logs information about activities the user partakes in. Fitbits has a built-in GPS. Fitbits uses GPS to produce the amount of steps taken, the speed travelled and Fitbit has a chip a built-in OLED (organic light-emitting diode). The chip has a three dimensional accelerometer system which allows it to track motion and its intensity. It uses PurePulse technology for an automatic, continuous heart rate. Similar to most technologies, Fitbit is powered by batteries. Every 15 minutes, the Fitbit will upload data to the user’s computer providing it is within the range of a base station, the computer is on, and connected to internet. The collected data is stored in the cloud. The Fitbit company collects the data in the form of algorithms and uses it to customize exercises for the users and also send it to the user’s online profile. Fitbit does not share personal data and allows its users to decide which of their information gets shared. Fitbits also promises to only collect data it needs to improve its products and services. This is important for those who are concerned about big data and privacy.

Example

The visual is depicting some of the tracking capabilities of the Fitbit. Included in the visual is an example of how Fitbit records the calorie burned, steps taken and it’s uses to track how far the user is before completing their goal. Along the way, achievement awards are giving to motivate the user to meet their fitness goal.  The source of the visual is the company’s online manual. https://www.fitbit.com/manual#section-start

Source

"Designer." Fitbit Official Site for Activity Trackers & More. N.p., n.d. Web. 13 Jan. 2017. http://www.fitbit.com/home
The majority of the information came from the company only website.
          "Gadgets Like Fitbit Are Remaking How Doctors Treat You." Wired. Conde Nast, n.d. Web. 12 Jan. 2017. <https://www.wired.com/2014/03/internet-things-health/>.


Friday, December 2, 2016

Practice PT (Data Stories)

Practice PT (Data Stories)


Data Visualization
image.png

Pivot Table (Summary Table)
Next Day Feelings
Average of hours slept last night
Bad
5
Good
6.1
Great
4.83
Meh
5.8979
Terrible
4.7

Written Response
  1. The data was originally collected by my teacher. He sent each student a link to a Google Forms survey to fill out every morning from November 9th 2016, through November 22nd 2016. There were six questions for the students to answer. One of them was, “how many hours did you sleep last night?”,  another was “how do you feel today?”.  After the survey ended, the class had access to the all the responses in the survey.
  2. To clean the data that was collected, I removed the words from the questions that only required numbers. When the response exceeded 24, the possible number of hours in a day, I deleted the value. After the data had been cleaned to my satisfaction, I made a pivot table (summary table) to find the average number of hour slept and the next day feelings. To create a visualization, I used a bar graph. The computing tools used for the artifact was Google Sheets.



    1. A pattern visible in my chart, is the lack of accurate correlation between the number of sleep and the next day feelings. In a normal circumstance, having the most hours of sleep recommended would result in a great feeling, however, in the data collected, the greatest average of numbers 6.1 and this was for those who felt good but not great. This trend is shown by comparing the average number of hours slept and the next day feelings on the bar graph.

    1. This unexpected result might be due to people spending more time relaxing rather than actually sleeping. This can predict how our essentials needs are changing. Many people are going sleep deprived,  their body becomes may become accustomed to it and it prefers the less hours instead of the recommended eight hours. Also, the question were open-ended which allows the student to interpret the question differently than their other peers. Perhaps, the students were not being honest with their responses. This is evident because, the data I deleted were quite erroneous.


    1. I am making the recommendation for the National Sleep Foundation. Instead of just studying the hours people spend sleeping,  they can conduct further research to find the correlation between the hours a person spends relaxing and their alertness and feelings the next day.
    1.  The recommendation can lead to discovering the benefits of relaxing more than sleeping. Scientist mainly associate alertness to the sleep a person gets the day before but perhaps the activity done while relaxing and the pleasure from it determines an individual’s feeling the next day.
    1. My recommendation is supported because the average number of hours slept by the students who felt great was only .17 greater than those who felt terrible.  In order to make a stronger recommendation I would need to make a bar graph comparing the feelings and the hours spent relaxing and possibly the activity done while relaxing in order to make a stronger recommendation.

Thursday, November 10, 2016

Encoding an Experience



ESTHER A.

04 November, 2016







Detailed encoding for Play Five Repertoire

COMPONENT
TYPE
NUMBER OF BITS/RANGE
Description /Comments
Emotion
ASCII
(0-50 characters)
400 bits
The emotion of the repertoire for example, can be “happy”, or “sad”. This can be expressed in a short one or two-word description. It will take about 10 characters to describe each repertoire and each character is 8bits.
Volume
Number
7 bits
(0-100dB)
Throughout the repertoire the band is performing at a range of ppp (whispering, very soft, 0dB) and at fff (extremely loud, 100dB)
Articulation
ASCII
(0-210 characters)
1680 bits
In a repertoire, there are various types of articulations including legato, staccato, accent, slur, sforzando, and phrase mark.  Each music can contain up to 6 articulations, each about 7 characters.
Tone
ASCII
(0-25 characters)
200 bits
The tone of the music can be described in a short one to two word such as “light” or “heavy”. The tone of each repertoire can be describe in a five characters. Each character takes 8bits.
Tempo
Number
              8 Bits
(0-200)
Depending on the music the tempo can range from grave (15), a slow speed to prestissimo (200).
It is best to represent the tempo in numbers.
Time
Number
 13 bits
(0-8191 secs)
(0-2 hours)
The time of the repertoire can be measured in seconds since the opening of the concert to the end of the concert. 2 bits provides (0-8191) seconds for a little over two hours. This is important for knowing the order of repertoire.





Reflection:

                                                   From doing this project, I realized that not every single component that goes into performing a band concert can be encoded. This is an example of abstraction-removing irrelevant detail to focus on the valuable characteristics. Not every component of performing a band concert is important. For example, the color of the seats in the auditorium is not as important as the tempo of each repertoire.  When only the important components are mentioned, the whole experience takes less bits to encode.  However, since many things will be left out, there are drawbacks. The exact experience cannot be replicated.  This means it is lossy. Also, the exact experience cannot be duplicated because the number of bits for each component is only a rough estimation, not precise and can be inaccurate.

Monday, October 31, 2016

Creating a Favicon



10
10
0C
0F0 0F0 0F0 0F0 0F0 FFF FFF FFF FFF FFF FFF 0F0 0F0 0F0 0F0 0F0
0F0 0F0 0F0 0F0 0F0 FFF FFF FFF FFF FFF FFF 0F0 0F0 0F0 0F0 0F0
0F0 0F0 0F0 0F0 000 000 000 FFF FFF FFF FFF 0F0 0F0 0F0 0F0 0F0
0F0 0F0 0F0 000 000 000 000 000 FFF FFF FFF 0F0 0F0 0F0 0F0 0F0
0F0 0F0 0F0 000 0F0 FFF FFF 000 000 FFF 000 000 0F0 0F0 0F0 0F0
0F0 0F0 0F0 000 000 FFF FFF 000 000 FFF 000 000 0F0 0F0 0F0 0F0
0F0 0F0 0F0 000 000 FFF FFF 000 000 FFF- FFF 0F0 0F0 0F0 0F0 0F0
0F0 0F0 0F0 0F0 0F0 FFF FFF 000 000 FFF 000 000 0F0 0F0 0F0 0F0
0F0 0F0 0F0 0F0 0F0 FFF FFF 000 000 FFF 000 000 0F0 0F0 0F0 0F0
0F0 0F0 0F0 0F0 0F0 FFF 000 000 FFF FFF FFF 0F0 0F0 0F0 0F0 0F0
0F0 0F0 0F0 0F0 0F0 FFF 000 FFF FFF FFF FFF 0F0 0F0 0F0 0F0 0F0
0F0 0F0 0F0 0F0 0F0 000 FFF FFF FFF FFF FFF 0F0 0F0 0F0 0F0 0F0
0F0 0F0 0F0 0F0 000 FFF FFF FFF FFF FFF FFF 0F0 0F0 0F0 0F0 0F0
0F0 0F0 0F0 000 0F0 FFF FFF FFF FFF FFF FFF 0F0 0F0 0F0 0F0 0F0
0F0 0F0 0F0 0F0 0F0 FFF FFF FFF FFF FFF FFF 0F0 0F0 0F0 0F0 0F0
0F0 0F0 0F0 0F0 0F0 FFF FFF FFF FFF FFF FFF 0F0 0F0 0F0 0F0 0F0


My favicon is a bass clef with the Nigerian flag in the background.. I chose this to express myself because I was born and raised in Ibadan, Nigeria. Although I live in the United States, my culture is something that I treasure and do not want to lose.  From an earlier age, I had a strong interest in music. I love singing and playing different instruments. I currently play the clarinet and piano but I have played other instruments in the past such as the recorder and guitar. I wanted to draw just a treble clef because that is more of my vocal range and the clef of the Bb clarinet. I choose the bass clef instead because of the limited amount of pixels I could use and because I love the bass line of music. 

Wednesday, October 19, 2016

Flash Talk Script

Internet censorship is a controversial topic in the world. Internet censorship is the control or suppression of what can be accessed, published, or viewed on the internet.  For my flash talk, I have narrowed my focus on internet censorship in schools.
There are many strong arguments for the disadvantages and advantages of having internet censorship in schools. Disadvantages include: student’s access to educational tools are limited, deprives students from learning. There are advantages. Helps the school manage what the student can access. It protects children from inappropriate content, parent cannot always monitor their children so having censorship in school puts them at ease, it will keep students from being victims of sex trafficking and pornography.  
A different approach to internet censorship includes IP address blocking, DNS filtering and redirection, termination of TCP packet transmissions, scanning URL for target keywords, network disconnection, portal censorship and search result remover.
Internet censorship has a positive impact on society, culture, and economy. Many organizations use censorship as a defense strategy for preventing malware, and the reputation of their companies, it prevents copyright piracy, it can control illegal and criminal activities, it protects children from illegal content, strengthens national security, parents can monitor their children, and it guards against spam.
Internet censorship has a negative impact. The government can use it to keep information secret from its citizens, more power to the government, added expense to the government, can harm businesses, and above all, it violates internet privacy.
My stance is, absolute internet privacy should not be permitted and certainly not in the schools. There is the need for both freedom and censorship. There has to be a regulation although it sometimes hinders students from accomplishing school work. In this case, the student can request access from the teacher if  school appropriate.



Monday, October 10, 2016


This year, I am opportune to be among the first students taking the Advanced Placement Computer Science Principles course at my high school using code.org. Thus far, we have completed chapter one which consists of stages one through seven. Throughout chapter one, I have learned topics varying from binary, number systems, encoding and sending formatted text.

One lesson from chapter one is stage three--sending binary messages with the internet simulator. I learned how information is transmitted on the internet by binary. My favorite part of this lesson was the information I learned. My least favorite part of the lesson was the internet simulator itself.  Although my partner and I created a protocol, having a one-way messenger made it difficult to get the message.

Another lesson in this chapter was stage six--sending and encoding formatted. My favorite part of this lesson was developing a protocol with my partner to draw shapes in the simulator. The other thing I liked was the two-way system in the message. We can send simultaneously and still be able to receive each other's messages. Everything was going well until the teacher gave my partner a cube to draw. We had planned out to use coordinates but we did not account for the lines that connected the points of the cube. This poked holes in our protocol. This mirrors what happen in reality. After an engineers built an application, profession hackers try to find its faults and things that could be improved in order for it to function more smoothly.