Information is not knowledge.Albert Einstein
Data logging is the systematic collection of data using a digital device,
usually over a period of time.
All data stored on or transmitted by a digital device is encoded as
binary zeros and ones.
Numbers, words, sounds, images, and video, can all be represented by binary codes.
F-2 data collection does not need to be done using computers.
3-8 students explore the various ways in which digital technologies can be used to record different types of data.
9-10 student should develop specific techniques to record data in a structured way for use in information systems.
Synchronization - digital data is stored and transmitted as ordered sequences of symbols - separated by syncwords.
Digital Languages such as ASCII and UNICODE assign meaning to particular symbol sequences.
Errors often occur in non-digital or analogue data but for digital data, unless the error is large enough that a symbol is misinterpreted as another symbol or the sequence of symbols is changed, data can usually be stored, copied and transmitted without error. Checksums validate that digital data has not changed when copied or transmitted.
Granularity refers to the number of symbols assigned to the value being recorded, determining the precision or resolution of the resulting data.
Compression algorithms take large sequences of data and reduce the number of binary digits needed to represent it - algorithms or CODECs such as ZIP, GIF JPEG mpeg and mp4 remove redundant data and trade quality or granularity against the size of the file required to store the data
Data representation is how computers represent something, not using the thing itself.
Representations can have characteristics or properties, where discrete categories or categorical data can be used to describe additional details about a representation.
In F-2 students explore patterns in data, and how things can be represented, using words, pictures, symbols and diagrams to represent real world things.
In 3-4 will explore how the same data can be represented in different ways - so a picture of the tree outside their class window provides one representation, while a story of the tree another, a map of the school yard showing the tree another, and a picture drawn by a student yet another - all of the same thing, but represented in different ways. This can be extended by time as well, how was the tree represented when it was young, how might it be represented if turned into furniture or paper.
In 5-6 we explore how different data can be represented by whole numbers - in particular how we use binary numbers to encode representations so that it can be understood and used by digital systems.
From 7-10 we use digital systems to structure data. This is achieved by storing data in a database, where we define how different types of data is stored.
Geospatial data collects, records and presents data based on its location.
Geospatial data can be represented on digital maps, and the relationship between data can be used for demographic analysis, travel time calculations, etc.
Mapping data can be combined with the ability of mobile devices to use GPS, digital compasses and Wi-Fi signals to display different data depending on the location of the device.
Beacons and RFID chips and cards can be used to trigger actions based on information stored, and to establish locations that can trigger actions on mobile devices.
It is the responsibility of Digital Technologies to teach the technical aspects of the ICT General Capabilities.
Students should learn how to protect themselves and produce ethical, socially acceptable, sustainable, and safe solutions to problems.
Cryptographic techniques enable students to understand the security provided by passwords, biometrics, data and communication encryption; and associated threats to privacy from unsecured data.
Students should understand the threats posed from a range of cyber-attacks and technologies including viruses, phishing, denial of service, identity theft and hacking.
Ethical hacking, carefully managed, can be used to develop understanding of threats.
Wearables represent a range of digital technology solutions that can be worn on the body
· Sports and Fitness Tracking;
· Health monitoring (through various worn sensors);
· Alertness and Energy levels (sensing micro movements and galvanic responses);
· Navigation systems (using Wi-Fi signals, GPS, and Digital Compasses);
· Play media (wrist projection, presentation devices);
· Communication (messaging, mobile phone);
· Fashion Statements (lights, sound and sensors integrated into clothing);
· Neurofeedback (EEG sensors responding to brainwave patterns);
· Human Machine interfaces (triggering digital devices with implanted or worn devices);
· Augmented reality (displaying information overlayed on the users view of the world);
· Virtual reality (displaying digital representations of spaces); and
· Life Recording (continuous recording of events with audio or video).
Codebugs and Ada Fruit kits provide wearable computers that can control lights and sensors and can be woven into clothing.
Attend the tutorial to further explore the concepts presented this week and practice teaching them.
Provide Feedback on Lesson Plans
In tutorial small groups you will provide feedback on the lesson plans shared this week.
Submit a brief summary of the feedback you received and provided during the tutorial by the next tutorial. You can use dot points. It counts 0.5% towards your Log of Learning Activities.
Digital Technologies Activity
Using the Queensland Datasets import, download a cvs file, and import this set of data into google sheets
Calculate your likely age by your first name
Explore the performance details of your school (where you studied, or went on practicum). Come up with a use for this data.
Find the catchment details of your school (where you studied, or went on practicum). Come up with a use for this data.
Create your own geodata map, showing places yo would like to travel to.
Create a map of places you like to get food by making an list and generating a map from this data.
Gold Coast City data collections.
Australian data collections
Check your password strength
Write your own message and encode it using Caesar Substitution.
Write your own encoded message using a Cipher Key.
See what data Facebook is collection about you and sharing with advertisers.
Make a prediction based on your Facebook or Twitter activity.
Other Psychometric tests
Pick another student and see what information you can find out about them from online searches. View this information as a prospective principal preparing to interview them for a job interview.
See what you can find out from Newspaper Archives
Try Trove to find out about your grandparents
Digital Technologies Activities
Preparation for Week 9
Create two lessons plans, one for Design & Technologies and one for Digital Technologies. You will share these in tutorial next week and conduct simulated teaching of your lessons. Together, these count 1% to your Log of Learning Activities if submitted before the start of next weeks tutorial.
Week 9 Digital Technologies Lesson Plan
In tutorial small groups you will share the Digital Technologies lesson plan you have developed for next week.
Submit your Digital Technologies lesson plan developed for the Week 9 tutorial by the start of next weeks tutorial. It counts 0.5% towards your Log of Learning Activities.
Week 9 Design and Technologies Lesson Plan
In tutorial small groups you will share the Design and Technologies lesson plan you have developed for next week.
Submit your Design and Technologies lesson plan developed for the Week 9 tutorial by the start of next weeks tutorial. It counts 0.5% towards your Log of Learning Activities.