Information Solutions

Technologies Education

Information is not knowledge.

Albert Einstein


Information Solutions

Lecture

Attend the lecture to explore the concepts for this week.

Information Solutions
Lecture

Lecture Notes

Read and view video clips further about the concepts explored this week.



Notes

Data Collection

Data logging is the systematic collection of data using a digital device,

usually over a period of time.

All data stored on or transmitted by a digital device is encoded as

binary zeros and ones.

Numbers, words, sounds, images, and video, can all be represented by binary codes.

F-2 data collection does not need to be done using computers.

3-8 students explore the various ways in which digital technologies can be used to record different types of data.

9-10 student should develop specific techniques to record data in a structured way for use in information systems.

Synchronization - digital data is stored and transmitted as ordered sequences of symbols - separated by syncwords.

Digital Languages such as ASCII and UNICODE assign meaning to particular symbol sequences.

Errors often occur in non-digital or analogue data but for digital data, unless the error is large enough that a symbol is misinterpreted as another symbol or the sequence of symbols is changed, data can usually be stored, copied and transmitted without error. Checksums validate that digital data has not changed when copied or transmitted.

Granularity refers to the number of symbols assigned to the value being recorded, determining the precision or resolution of the resulting data.

Compression algorithms take large sequences of data and reduce the number of binary digits needed to represent it - algorithms or CODECs such as ZIP, GIF JPEG mpeg and mp4 remove redundant data and trade quality or granularity against the size of the file required to store the data

Data Collection

Data Representation

Data representation is how computers represent something, not using the thing itself.

Representations can have characteristics or properties, where discrete categories or categorical data can be used to describe additional details about a representation.

In F-2 students explore patterns in data, and how things can be represented, using words, pictures, symbols and diagrams to represent real world things.

In 3-4 will explore how the same data can be represented in different ways - so a picture of the tree outside their class window provides one representation, while a story of the tree another, a map of the school yard showing the tree another, and a picture drawn by a student yet another - all of the same thing, but represented in different ways. This can be extended by time as well, how was the tree represented when it was young, how might it be represented if turned into furniture or paper.

In 5-6 we explore how different data can be represented by whole numbers - in particular how we use binary numbers to encode representations so that it can be understood and used by digital systems.

From 7-10 we use digital systems to structure data. This is achieved by storing data in a database, where we define how different types of data is stored.

Data Representation

Geospatial Data

Geospatial data collects, records and presents data based on its location.

Geospatial data can be represented on digital maps, and the relationship between data can be used for demographic analysis, travel time calculations, etc.

Mapping data can be combined with the ability of mobile devices to use GPS, digital compasses and Wi-Fi signals to display different data depending on the location of the device.

Beacons and RFID chips and cards can be used to trigger actions based on information stored, and to establish locations that can trigger actions on mobile devices.

Geospatial Data

Data Security

It is the responsibility of Digital Technologies to teach the technical aspects of the ICT General Capabilities.

Students should learn how to protect themselves and produce ethical, socially acceptable, sustainable, and safe solutions to problems.

Cryptographic techniques enable students to understand the security provided by passwords, biometrics, data and communication encryption; and associated threats to privacy from unsecured data.

Students should understand the threats posed from a range of cyber-attacks and technologies including viruses, phishing, denial of service, identity theft and hacking.

Ethical hacking, carefully managed, can be used to develop understanding of threats.

Data Security

Wearables

Wearables represent a range of digital technology solutions that can be worn on the body

· Sports and Fitness Tracking;

· Health monitoring (through various worn sensors);

· Alertness and Energy levels (sensing micro movements and galvanic responses);

· Navigation systems (using Wi-Fi signals, GPS, and Digital Compasses);

· Play media (wrist projection, presentation devices);

· Communication (messaging, mobile phone);

· Fashion Statements (lights, sound and sensors integrated into clothing);

· Neurofeedback (EEG sensors responding to brainwave patterns);

· Human Machine interfaces (triggering digital devices with implanted or worn devices);

· Augmented reality (displaying information overlayed on the users view of the world);

· Virtual reality (displaying digital representations of spaces); and

· Life Recording (continuous recording of events with audio or video).

Codebugs and Ada Fruit kits provide wearable computers that can control lights and sensors and can be woven into clothing.

Wearables

Lecture Synthesis

Complete a summary and synthesis of what you have learnt in the lecture and course notes this week by the next lecture. It counts 1% towards your Log of Learning Activities.

Synthesis

Information Solutions Quiz

Complete the quiz before the next lecture. It counts 1% towards your Log of Learning Activities.

Quiz

Tutorial

Attend the tutorial to further explore the concepts presented this week and practice teaching them.


Tutorial

Provide Feedback on Lesson Plans

In tutorial small groups you will provide feedback on the lesson plans shared this week.

Submit a brief summary of the feedback you received and provided during the tutorial by the next tutorial. You can use dot points. It counts 0.5% towards your Log of Learning Activities.

Peer Feedback

Digital Technologies Activity

Create an online spreadsheet list of your favourite foods and their cost. This tool works in EQ schools, but is very basic. Now do the same in Google Sheets, and graph your list in various ways.

Using the Queensland Datasets import, download a cvs file, and import this set of data into google sheets

Choose Baby names by region for 2017

Calculate your likely age by your first name


Explore the performance details of your school (where you studied, or went on practicum). Come up with a use for this data.

Find the catchment details of your school (where you studied, or went on practicum). Come up with a use for this data.


Create your own geodata map, showing places yo would like to travel to.

Create a map of places you like to get food by making an list and generating a map from this data.


Gold Coast City data collections.

Australian data collections

Google Dataset Search


Check your password strength


Write your own message and encode it using Caesar Substitution.

Write your own encoded message using a Cipher Key.


See what data Facebook is collection about you and sharing with advertisers.

Make a prediction based on your Facebook or Twitter activity.

Other Psychometric tests

Pick another student and see what information you can find out about them from online searches. View this information as a prospective principal preparing to interview them for a job interview.

Try Pipl

See what you can find out from Newspaper Archives

Try Trove to find out about your grandparents


Digital Technologies Activities

Google 5-6 Workshop

This Saturday there is a workshop on the use of Drones.

PD Workshops

Tutorial Reflection

After the tutorial, you should complete a reflection on what you learnt in this weeks tutorial by the next tutorial. It counts 1% towards your Log of Learning Activities.

Reflection

Preparation for Week 9

Create two lessons plans, one for Design & Technologies and one for Digital Technologies. You will share these in tutorial next week and conduct simulated teaching of your lessons. Together, these count 1% to your Log of Learning Activities if submitted before the start of next weeks tutorial.

Lesson Plans

Week 9 Digital Technologies Lesson Plan

In tutorial small groups you will share the Digital Technologies lesson plan you have developed for next week.

Submit your Digital Technologies lesson plan developed for the Week 9 tutorial by the start of next weeks tutorial. It counts 0.5% towards your Log of Learning Activities.

Share Lesson Plans

Week 9 Design and Technologies Lesson Plan

In tutorial small groups you will share the Design and Technologies lesson plan you have developed for next week.

Submit your Design and Technologies lesson plan developed for the Week 9 tutorial by the start of next weeks tutorial. It counts 0.5% towards your Log of Learning Activities.

Share Lesson Plans

Progressive Feedback

Your views on how the course is going is appreciated.

Progressive Feedback