71
1 Digital Technology

2017 Digital Technology Merit Badge - Boy Scouts of America

Embed Size (px)

Citation preview

Slide 1

1Digital Technology

Pop quiz:1/22/17

1

Digital TechnologyMerit Badge CollegeDo you have completed Blue Cards?Are you in the right class?Do you have Workbooks?

2

Blue Card should be filled out, legible and signed by your scoutmaster.Blue Card is your admission ticketshould be filled out, including my information.You should have a workbook printed out and filled out to the best of your ability.1/22/17

2

Before We StartRead the Merit Badge PamphletPrint out the Worksheet

Show your current, up-to-date Cyber Chip.

3

Who read the pamphlet?The Workbook is NOT required, but highly recommended. When I checkoff requirements, I will need to look at what you have written.Cyber Chip Requirement #1 Should already be done! If it has not, make sure it is before February. 1/22/17

3

Cyber Chip4

Different Level depending on your grade. Must be recharged every year.BSA is embracing technology. Teaches internet safety. We wont be covering ityou should have already earned it.1/22/17

4

History of ComputersDo the following:

a. Give a brief history of the changes in digital technology over time. Discuss with your counselor how digital technology in your lifetime compares with that of your parents, grandparents, or other adults lifetime.

b. Describe the kinds of computers or devices you imagine might be available when you are an adult.

5

Emphasis is on Brief. Requirement says Discuss not listen so you need to engage. If you do not participate, you will not complete this requirement, or others that require similar actions.Much more fun to look to future advances.1/22/17

5

History of Computers6

1632 Slide Rule1100 BC Abacus 1642 Pascaline1617 Logarithms

Abacus, or counting frame, is a calculating tool that was in use centuries before the adoption of the written modern numeral system and is still widely used by merchants, traders and clerks in Asia and Africa.Logarithms were introduced by John Napier in the early 17th century as a means to simplify calculations. They were rapidly adopted by navigators, scientists, engineers, and others to perform computations more easily, using slide rules and logarithm tables. Tedious multi-digit multiplication steps can be replaced by table look-ups and simpler addition because of the factimportant in its own rightthat the logarithm of a product is the sum of the logarithms of the factors:log_b(xy) = log_b (x) + log_b (y), provided that b, x and y are all positive and b 1.Slide Rule: a mechanical analog computer. The slide rule is used primarily for multiplication and division, and also for functions such as roots, logarithms and trigonometry, but is not normally used for addition or subtraction.Pascaline, invented by Pascal, was primarily intended as an adding machine (The First Calculator) which could add and subtract two numbers directly, but its description could, with a bit of a stretch, be extended to a "mechanical calculator, in that at least in principle it was possible, admittedly rather laboriously, to multiply and divide by repetition.

1/22/17

6

History of Computers71804 Automatic Loom1840s Boolean Logic1830s Babbage Engine

The Jacquard loom is a mechanical loom, invented by Joseph Jacquard, that simplifies the process of manufacturing textiles with complex patterns. The loom was controlled by a "chain of cards", a number of punched cards, laced together into a continuous sequence.Charles Babbage designed the first automatic computing engines. He invented computers but failed to build them. The first complete Babbage Engine was completed in London in 2002, 153 years after it was designed. Difference Engine No. 2, built faithfully to the original drawings, consists of 8,000 parts, weighs five tons, and measures 11 feet long.George Boole developed logic that allows thoughts to be expressed in mathlike terms. AND, OR, NOT. Still used today in code.1/22/17

7

History of Computers8

Edisons Vacuum TubeIn 1883, a few years after Thomas Edison invented the electric light bulb, he noticed something peculiar about how electricity flowed inside it. To protect the brightly glowing filament, air had been removed from the bulb, creatinga vacuum tube. Surprisingly, if he placed a metal plate inside the bulb, electricity would flow across the vacuum from the filament to the plate. Edison patented the discovery of how electrons flowed across a vacuum, now known as the Edison Effect, though he made little use of it.

1/22/17

8

1890 Hollerith Machine9

Used electrical connections to trigger a counter, recording informationData could be encoded by the locations of holes in a cardHollerith determined that data punched on a card, could be counted or sorted mechanically

Census every 10 yearsby 1880 over 49 million peopletook 7 years to complete. Herman Hollerith developed a punch card machine; every person had a card with various data on it. 1/22/17

9

1944 Colossus Mark I101st programmable digital computer 5 tons, 500 miles of wire, 8 feet tall & 51 feet longRan non-stop for 15 years

general purpose electro-mechanical computer that was used in the war effort during the last part of World War II to break the German Enigma Code Machine.1/22/17

10

1945 ENIAC11

Electronic Numerical Integrator And Computer20 by 40 foot roomWeighed 30 tonsUsed more than 18,000 vacuum tubes

First electronic general-purpose computer. It was digital and capable of being reprogrammed to solve "a large class of numerical problemsRumors/ legend is that the Philly lights would dim when it was powered on. 5 million hand soldered joints. Used for hydrogen bomb research.1/22/17

11

1959 IBM Stretch12The IBM 7030, or Stretch, was IBM's first transistorized supercomputerFailed to meet aggressive performance estimates so price dropped from $13.5 million to only $7.78 millionIt was the fastest computer in the world until 1964

Transistors, much smaller than vacuum tubes and 1,000 times faster.1/22/17

12

1970s IBM Mainframes13Standard dual-processor capabilityMonolithic main memory" based on integrated circuitsFull virtual memory through a new microcode floppy disk128-bit (hexadecimal) floating point arithmetic

Next breakthroughIntegrated Circuits! AKA microchip.Which led to CPUs, all the integrated circuits onto one chipmade the personal computer possible.1/22/17

13

1975 Altair 880014Name comes from Star Trek!Mail order kit, assemble it yourselfNo video output, LEDs insteadNo keyboard, switches on the front

This computer was one of the first "home" computers ever made, it was sold as a kit, but for additional money, you could buy one fully assembled.

It had no keyboard, the "program" had to be entered with the switches located on the front panel of the "computer", and as it didn't have video output (yet), the result was displayed via LEDs. Bill Gates, Paul Allen, and Monte Davidoff created BASIC for the Altair, and formedMicrosoftSteve Jobs and Steve Wozniak formed Apple, and in 1977 released the Apple II, the first color computer.1/22/17

14

Microsoft & Apple15

Bill Gates, Paul Allen, and Monte Davidoff created BASIC for the Altair, and formedMicrosoft.Steve Jobs and Steve Wozniak formed Apple, and in 1977 released the Apple II, the first color computer.Original IBM Microsoft computer was $3,000, over $7,500 in todays dollars.First Apple II was around $1,300.In 1980 you have the IBM Personal Computer being released which combined with their licensing model that allows "clones" kick starts computers on user desks "decentralizing" IT outside of the datacenter. It also leads to computers at home.

Grandparents: Mechanical cash registers / mechanical adding machines. Then digital calculators limited functions (+/-*%). Data delivered to them via "greenbar reports" printed on impact or maybe dot matrix printers. Later some interaction with dumb terminals. IT was centralized in the computer room, only used at work.

Parents: Personal computers on desks at work. Personal computers at home were mostly used stand-alone. You carried data to-from work via 1.44MB floppy diskettes. If you wanted to go "on-line" you used dial-up modems to services like AOL or CompuServe. Later we get connected to the internet...1/22/17

15

Moores Law16

"Moore's law" is the observation that, over the history of computing hardware, the number of transistors in a dense integrated circuit doubles approximately every two years.1/22/17

16

Computer Speak17

A 65 (ASCII) 01000001 (Binary)

Zeros and Ones1/22/17

17

Storage18

Google only holds somewhere around 10-15exabytesof data

Memory - sometimes confused between RAM vs StorageSSD have replaced HDD

Numbers you cant even comprehend.1/22/17

18

Storage19

35 years64x more data, almost weightless, relatively cheap.1/22/17

19

Storage20

Digital Technology

The amount of computing power in things like ENIAC compared with a new computer, even something like a super cheap calculator. You're talking about numbers that are millions and trillions of times different, which we can't comprehend. As an example, IPv4 vs IPv6, there aren't even enough IP4 addresses to give out one to each Chinese person, let alone the rest of the world. But there are enough IP6 addresses to give a few million to each grain of sand on the entire planet.1/22/17

20

Memory, or RAM21

The amount of computing power in things like ENIAC compared with a new computer, even something like a super cheap calculator. You're talking about numbers that are millions and trillions of times different, which we can't comprehend. As an example, IPv4 vs IPv6, there aren't even enough IP4 addresses to give out one to each Chinese person, let alone the rest of the world. But there are enough IP6 addresses to give a few million to each grain of sand on the entire planet.1/22/17

21

Speed22

How high can you count in 10 seconds?

Get up, and walk for 10 secondsHow many steps did you take? How many steps to walk around Earth? Well lets do math here. The circumference of earth is 24,901.55 miles. In feet that is 131,480,184'. If a regular person takes a step of approx 2 feet, then it would take a person 65,740,092 steps. That means you could walk around the Earth over 304 times in 10 seconds!How fast for could a computer hike the Appalachian Trail. Its 2,168.1 miles long, which means 11,447,568 feet. 5,723,784 steps, means a computer could hike the AT 3,494 times in 10 secondsstill not really comprehendiblehow about in one second. A computer could hike the AT about 350 times in one second. It takes us 5-7 months to do it once! We could do it 350 times in somewhere around 175 years!It takes about the same amount of computing to answer one Google Search query as all the computing done -- in flight and on the ground -- for the entire Apollo program, all 11 years, 17 mission program!1/22/17

22

Speed23

An average computer chip can count (by ones) to over 20 billion (20,000,000,000) in this same time. It is this mind-boggling speed of computer chips that has been harnessed in digital devices to do the incredible things they do.

Get up, and walk for 10 secondsHow many steps did you take? How many steps to walk around Earth? Well lets do math here. The circumference of earth is 24,901.55 miles. In feet that is 131,480,184'. If a regular person takes a step of approx 2 feet, then it would take a person 65,740,092 steps. That means you could walk around the Earth over 304 times in 10 seconds!How fast for could a computer hike the Appalachian Trail. Its 2,168.1 miles long, which means 11,447,568 feet. 5,723,784 steps, means a computer could hike the AT 3,494 times in 10 secondsstill not really comprehendiblehow about in one second. A computer could hike the AT about 350 times in one second. It takes us 5-7 months to do it once! We could do it 350 times in somewhere around 175 years!It takes about the same amount of computing to answer one Google Search query as all the computing done -- in flight and on the ground -- for the entire Apollo program, all 11 years, 17 mission program!1/22/17

23

The Future24

What will the future be like?Chromebooks, Cloud computingalready here.1/22/17

24

The Future25

Can you imagine this? Kids born within the past 5-6 years will unlikely ever have to drive a car.1/22/17

25

The Future26

The Internet of Things

Smart Homes, Smart Watches, Smart Scales Smart EVERYTHING1/22/17

26

The Future27

1/22/17

27

Digital TechnologyDo the following:

Explain to your counselor how text, sound, pictures, and videos are digitized for storage.Describe the difference between lossy and lossless data compression, and give an example where each might be used.Describe two digital devices and how they are made more useful by their programming.Discuss the similarities and differences between computers, mobile devices, and gaming consoles.Explain what a computer network is and describe the networks purpose.

28

You either need to participate or write down your answers. You must actively engage to complete this merit badge. 1/22/17

28

File FormatsText (ASCII)txt, doc, docx, pdfSound (waves)mp3, wma, aiff, au, raw, wavPictures (pixels) jpg, gif, png, tiff, epsVideos (key frames + changes) avi, mpeg, flv, mov

29

Text is entered by humans or could be scanned using Optical Character Recognition. doc, docx, and PDF are not really text files. They're in a binary format.

Sound is sampled. A simple analog sine wave is sampled into digital form.

Pictures are divided into cells and each one represents a lightness and color value.

Videos are not necessarily a series of pictures; almost none are. They are a set of key frames (pictures) followed by a serious of change data to that picture. New pictures are provided when A) a significant change in the picture occurs (scene change) or B) periodically to ensure the change data hasn't drifted. You see this when a video is horribly out of sync in certain blocks of the data; the change data and the key frames have gotten out of sync.

1/22/17

29

Lossy vs. Lossless CompressionLossless allows the original to be recreatedLossy eliminates some data, cant get it back 30

The "restored" block for Lossy should be the same size as the original but speckled with 'holes'. A 3 minute song run through an MP3 encoder is still 3 minutes long but the fidelity of the sound is reduced to make it smaller. The higher the sampling rate the better the quality but the larger the file.1/22/17

30

Lossy vs. Lossless Compression31

Left is the original; Right is a lossy compressed version of same sound file.1/22/17

31

More Useful With Technology?32

1/22/17

32

Computers, Mobile Devices & Gaming ConsolesSimilaritiesDigital processingProgramsConnectivityDisplays

33DifferencesInput keyboard, screen, controllerFunctionalityVersatilitySingle PurposeProprietary softwarePortability

other similarities?other differences?1/22/17

33

Network34

Networking allows devices to communicate with each other or the outside network. Sharing data, sharing devices, monitoring (e.g. baby monitor), the router's NAT & firewall services protect the home devices from the outside net. Besides the ethernet, you can also have a bluetooth personal area network (PAN).1/22/17

34

Digital TechnologyDo the following:

Explain what a program or software application or app is and how it is created.Name four software programs or mobile apps you or your family use, and explain how each one helps you.Describe what malware is, and explain how to protect your digital devices and the information stored on them.

35

1/22/17

35

Programs or AppsSeries of commands or set of instructions for a processor to complete a taskWord ProcessingGamesUtilities (calendar, calculator)Photo/Video Editor

Coded or scripted with a special language36

An application can start out with a white-board or story board set of ideas or sketches. Details are added to the design until the "story" of what the software should do is complete. Then the diagrams or sketches would go to a software developer who writes the instructions for the application using "source code". Source code are instructions for the computer that are in a human-readable format. The source code is sent through a "compiler" which verifies that the source code followed the correct syntax (coding rules) and translates the source code into "object code" which the computer can use to execute the instructions.1/22/17

36

Word Processing37

Word, part of the Microsoft Office suite, professional version $400!LibreOffice Writer, open source, FREE!Google Docs, also FREE, and cloud-based. You will use that for Requirement 6.1/22/17

37

Games38

I grew up with Pong, Asteroids and Pac-Man. Today, the gaming industry is a multi-billion dollar industry. You certainly know much more about Games than I will ever know. What do you play? Why?1/22/17

38

Utilities39

What utilities do you use?1/22/17

39

Photos Editors40

Heres one of my favoritesbecause of Photoshop and other photo editors, we can no longer trust any photograph! Ever. Unless you took it, you cant trust it.1/22/17

40

Photos Editors41

Heres one of my favoritesbecause of Photoshop and other photo editors, we can no longer trust any photograph! Ever. Unless you took it, you cant trust it.1/22/17

41

Video Editors42

YouTube editor, Power Director, Final Cut.1/22/17

42

Video Editors43

iMovie for OSX

1/22/17

43

MalwareMalicious code in the form of viruses, worms, Trojan horses, spyware, adware, scareware, or ransomwareAny software used to disrupt computer operation, gather sensitive information, or gain access to private computer systemsDefined by its malicious intent, acting for the interests of the malware owner, rather than the user44

Often included in free software.1/22/17

44

Protect Against Malware45

First line of defense is using your own brain. Don't click on stuff. If you get a note from a friend, does it look like something he would send? Backup your data! Don't use IE. Use Firefox and turn off Java Script with "No Scripts" plug-in. Much more diligent in checking SSL certs than Chrome.1/22/17

45

Digital TechnologyDo the following:Describe how digital devices are connected to the Internet.Using an Internet search engine (with your parent's permission), find ideas about how to conduct a troop court of honor or campfire program. Print out a copy of the ideas from at least three different websites. Share what you found with your counselor, and explain how you used the search engine to find this information.Use a Web browser to connect to an HTTPS (secure) website (with your parent's permission). Explain to your counselor how to tell whether the site's security certificate can be trusted, and what it means to use this kind of connection.46

Well cover A. B & C need to be done at home.

1/22/17

46

Connect to the Internet47

Not sure how much detail they want here but you could include things like the router doing DHCP Client and Server functions, Network Address Transversal, and packet routing. Public vs. local IP addresses. WAN vs LAN. Another key concept is DNS name resolution.1/22/17

47

Connect to the Internet48

1/22/17

48

Connect to the Internet49The Incredible Optical FiberOptic and photonic devices help make todays Internet work. Lasers, fiber optics, photonic switches, and photonic displays allow digital devices anywhere in the world to connect to each other, exchange information, and visually display that information. All information, like movies, phone calls, and emails, are converted into binary data, or ones and zeros, similar to the dots and dashes of Morse code on a telegraph line.

1/22/17

49

HTTPS50

https://dev.ssllabs.com/ssltest/Great site for checking a security certificate. Run google.com through it and let me know what score Google gets? Think it is an A? Why not?1/22/17

50

HTTPS51

Hacker may have installed his certificate and is waiting for you to log in.1/22/17

51

Passwords52

Two Factor Authentication or Multi Factor AuthenticationGood digital citizenship, taking care of your data, your security1/22/17

52

Digital TechnologyDo THREE of the following. Provide me with a copy.

Food budget OR roster spreadsheet for campout.Letter to troops parents, inviting them to a troop event.Campsite plan for your troop OR create a flier for an upcoming troop event, incorporating text and photographs.Five slide presentation, with photographs.Photos of a troop activity. Record your voice and transfer the file to a different device.Blog 5 of your scouting activities.Create a web page for your troop, patrol, school, or church.53

You must do THREE and you must share your work with me. Please use Google Docs. If you cant for some reason, you can use a USB drive, but you might not get it back.1/22/17

53

Digital TechnologyDo the following:

Explain to your counselor each of these protections and why they exist: copyright, patents, trademarks, trade secrets.Explain when it is permissible to accept a free copy of a program from a friend.Discuss with your counselor an article or a news report about a recent legal case involving an intellectual property dispute.

54

1/22/17

54

CopyrightsLegal right created by the law of a country, that grants the creator of an original work exclusive rights to its use and distribution, usually for a limited time, with the intention of enabling the creator to receive compensation for their intellectual effort.55

1/22/17

55

TrademarksA recognizable sign, design or expression which identifies products or services of a particular source from those of others. The trademark owner can be an individual, business organization, or any legal entity. A trademark may be located on a package, a label, a voucher or on the product itself.56

1/22/17

56

PatentsA set of exclusive rights granted by a sovereign state to an inventor or assignee for a limited period of time in exchange for detailed public disclosure of an invention. An invention is a solution to a specific technological problem and is a product or a process.57

Would you want to include any of the parts from the anti-software patent movement? Touch on the topic of "patent trolls"? How about referencing a broken patent system that grants patents for obvious things like Amazon's one-click checkout or sliding screen contents using your finger?1/22/17

57

Trade SecretsAn invented formula, practice, process, design, instrument, pattern, commercial method, or compilation of information which is not generally known or reasonably ascertainable by others, and by which a business can obtain an economic advantage over competitors or customers.58

1/22/17

58

Piracy59

fines and penaltiesSoftware theft is a serious matter. If you or your company get caught copying software, you may be held liable under both civil and criminal law.If the copyright owner brings a civil action against you, the owner can seek to stop you from using its software immediately and can also request monetary damages. The copyright owner may then choose between actual damages, which include the amount it has lost because of your infringement as well as any profits attributable to the infringement, or statutory damages, which can be as much as $150,000 for each program copied.In addition, the government can criminally prosecute you for copyright infringement. If convicted, you can be fined up to $250,000, sentenced to jail for up to five years, or both.Appeals court approves $675,000 fine for student who illegally downloaded 30 songs

Read more:http://www.digitaltrends.com/music/appeals-court-denies-piracy-penalty-plea/#ixzz3O0L9KBV6Follow us:@digitaltrends on Twitter|digitaltrendsftw on Facebook

1/22/17

59

Give Software to Friend60

Do you want to include anything on "copyleft", GPL, or Creative Commons? It's possible to get compensation for your "intellectual effort" without using copyright protection. 1/22/17

60

Give Software to Friend61

1/22/17

61

Give Software to Friend62

1/22/17

62

Digital TechnologyDo TWO of the following:Why proper disposal of digital technology is important. List at least three dangerous chemicals that could be used to create digital devices or used inside a digital device.What is a certified recycler of digital technology hardware.Research an organization that collects discarded digital technology hardware for repurposing or recycling.Visit a recycling center that disposes of digital technology hardware.Find a battery recycling center near you and find out what it does to recycle batteries.63

1/22/17

63

Proper Disposal64

Electronic devices are a complex mixture of several hundred materials. A mobile phone, for example, contains 500 to 1,000 components. Many of these contain toxic heavy metals such as lead, mercury, cadmium and beryllium, as well as hazardous chemicals, such as brominated flame retardants. Polluting PVC plastic is also frequently used.

You might want to add something on cleansing the drives before disposing the computer equipment. Protect yourself by getting rid of your data with something like Darik's Boot and Nuke (DBAN) which wipes the entire drive.1/22/17

64

Health Hazards65Somebrominated flame retardants, used in circuit boards and plastic casings, do not break down easily. Long-term exposure can lead to impaired learning and memory functions. They can also interfere with thyroid and estrogen hormone systems.The cathode ray tubes (CRT) in monitors contain lead.Exposure to lead can cause intellectual impairment and damage the nervous, blood and reproductive systems.Cadmium,used in rechargeable computer batteries, contacts and switches and in older CRTs, is highly toxic, primarily affecting the kidneys and bones.Mercury,used in lighting devices for flat-screen displays, can damage the brain and central nervous system, particularly during early development.Compounds ofhexavalent chromium,used in the production of metal housings, are highly toxic and carcinogenic to people.Polyvinyl chloride (PVC)is a chlorinated plastic used in some electronics products and for insulation on wires and cables. Chlorinated dioxins and furans are released when PVC is burned. These chemicals are highly persistent in the environment and many are toxic even in very low concentrations.

1/22/17

65

Recyclers66Two Recognized by EPA

Responsible Recycling Practices (R2)sustainableelectronics.org

e-Stewardse-stewards.org

Zero Export Recyclers Mount Holly SpringsThe Computer Barn Carlisle

e-Stewards Every Staples1/22/17

66

Recyclers67

Zero Export Recyclers Mount Holly SpringsThe Computer Barn Carlisle

e-Stewards Every Staples1/22/17

67

Battery Recyclers68StaplesLowesHome DepotRadio ShackAutoZoneBest BuyBatteries +

Use rechargeable batteries1/22/17

68

Eagle Project?69

1/22/17

69

Digital TechnologyDo ONE of the following:Investigate three career opportunities that involve digital technology. Pick one and find out the education, training, and experience required for this profession. Discuss this with your counselor, and explain why this profession might interest you.

Visit a business or an industrial facility that uses digital technology. Describe four ways digital technology is being used there. Share what you learned with your counselor.

70

1/22/17

70

Digital TechnologyFor February:

Finish reading the merit badge pamphletComplete the worksheetBring your completed Blue CardDo the 3 Projects (Requirement 6)Requirement 8 (Recycling)Requirement 9 (Careers)

71

1/22/17

71