What is Computer Science?

Slides:



Advertisements
Similar presentations
20-minute Intro to Hacking
Advertisements

Wrap-Up Wednesday/Friday 10th Week. Goals of this course Give students a broader, more realistic view of the discipline of computer science as they decide.
Stop You From Moving On Reasons 9. The road may be long, but it’s wide open. As Lao Tzu once said, “The journey of a thousand miles begins with one step.”
How to solve Euler paths & circuits. by Mr. King.
Careers in CS & Engineering. CS & Engineering careers are not all this….
Hacker Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester By :wejad.n.mansour.
Eugénio Oliveira /2007 Methodologies for Scientific Research: An Introduction Responsible: Eugénio Oliveira Edition 2007/2008 Doctoral Programme in Telecommunications.
How the Internet Works Jon Crowcroft,
Mrs. Rivas International Studies Charter School..
Mrs. Rivas International Studies Charter School..
A quadratic equation is a second degree polynomial, usually written in general form: The a, b, and c terms are called the coefficients of the equation,
Learning Cycle Lesson Lesson : Systems of Equations Grade: 9th (Algebra 1) Concept: Be able to solve systems of equations by graphing Expected Prior Knowledge:
Welcome to Computing. How is Computing assessed? AS Unit 1 Practical Theory of computation. Fundamentals of programming, data structures and algorithms.
The Wizard’s Computer Club Training. Club Goals for Children Positive relationship with university student  Academic mentoring  Encouragement to set.
Conditional sentences If the bank (lend) …… us money, we’ll invest it in new machinery. When/if inflation goes up, there (be) usually pressure on.
Broadcasting News Trivia "LESSON PLANS." BBC News. BBC, 30 Jan Web. 19 Nov
G053 – Lecture 09 Domain Names Mr C Johnston ICT Teacher
Level 2 IT Users Qualification – Unit 1 Improving Productivity Chris.
CS 197 Computers in Society Professor John Peterson.
Midterm Essay Thoughts For the midterm paper there are a variety of options. You can write an essay related to a topic covered in class, or you can solve.
Enhanced Learning Through Web-Based Team and Individual Projects.
By Sarah Lilley. Your digital footprint is your online identity. It’s what people see online about you and what you leave behind. Have you ever googled.
You are a writer! You have an experience to share, a point to make, a story to tell.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Computers Are Smarter Than Humans Or Are They???
Time Complexity. Solving a computational program Describing the general steps of the solution –Algorithm’s course Use abstract data types and pseudo code.
 Hard work spotlights the character of people: some turn up their sleeves, some turn up their noses, and some don’t turn up at all. ~Sam Ewing.
CSCI1600: Embedded and Real Time Software Lecture 28: Verification I Steven Reiss, Fall 2015.
Habit 2 – Begin with the end in mind! Since you are the driver, what’s your destination? Get a map…
 steadfastness in doing something despite difficulty or delay in achieving success.  when you don't give up, you continue to strive until you accomplish.
“GOAL ORIENTATION” WRITING FOR TECHNICAL PURPOSE.
8 th Grade Course Selection For the School Year.
BULLYING  Bullying takes place when someone physically touches or hits them. Bullying is really big today, kids just think there really cool but they.
The problem that needs to be solved is if a computer career is for me.
This is Facebook and twitter that you can go on when you are at home but school monitor what you go on in school so they put a ban on it other people can.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
Preparing Seminar Questions. Level 1: Literal Literal questions are “fact questions” whose answers can be found right in the text. These questions are.
IT has had a big impact social in many different ways. Facebook is a social networking site that allows people to communicate and stay in touch with friends.
FAIRLIGHT PRIMARY AND NURSERY SCHOOL  Curiosity Risk  Creativity Independence  Perseverance.
Financial Aid Professionals’ Best Practices for Effective Communication: Real Life Solutions from Real Life People.
Cyber Info Gathering Techniques
Introduction to Privacy
Creating your online identity
Welcome to Computer Science
Cleveland SQL Saturday Catch-All or Sometimes Queries
CSC 321: Data Structures Fall 2016
Let’s Go Surfing: Internet Safety
UNIT 2 – LESSON 6 ENCODE AN EXPERIENCE.
Social Studies 2.0: Inquiry and LCE
GCE Applied ICT G053: Lesson 09 Domain Names
Artificial Intelligence and Society
Reminder: Please choose a “challenging” topic for your project. If it cannot be done by the end of this semester, please show us what you have done toward.
CS147: Assignment #1, Needfinding
Whether you decide to use hidden frames or XMLHttp, there are several things you'll need to consider when building an Ajax application. Expanding the role.
Discord Bot Senior Project
FCAT With LOL CATS Get your groans and moans out of your system now so you can pay attention! We need to go over a few things before you take the.
Developing Team Leadership
Why should you use simulators for training?
Welcome to Computer Science
Ann Marie’s E-Portfolio
Graduation…….
CSCE 314 Prof. Lupoli.
Chartboost Help Site Competitive Analysis and Proposal
Future of Artificial Intelligence
Bell Ringer Open your student workbook to page 79.
Developing Team Leadership
Relations And Functions.
Topic 6- Basic Computer Literacy
Artificial Intelligence Machine Learning
Presentation transcript:

What is Computer Science?

Hacker image

Computer Science community

Hacker attitude: The world is full of fascinating problems

Hacker attitude:No problem should ever have to be solved twice You could be solving so many of the other fascinating problems instead of doing something that has already been done. When you solve a problem, you create a path, stepping stone that others can follow. They can trace your steps instead of having to repeat the same process that you did. This is what we like to call redundancy in Computer Science. There are significant and real applications of this…

Hacker attitude: Boredom and drudgery are evil. Nobody who can think should ever be forced into a situation that bores them. “It had long since come to my attention that people of accomplishment rarely sat back and let things happen to them. They went out and happened to things.” – Leonardo Da Vinci

Hacker attitude: Freedom is good “Learning never exhausts the mind” – Leonardo Da Vinci

Hacker attitude: Attitude is no substitute for competence People’s lives depend on you. Literally. Billions of people will be affected by what you do. LITERALLY BILLIONS. Need to know your stuff very well because there is a lot at stake.

Societal impact: Air traffic control System If you don’t set your mathematical model up correctly to automate the process then there will be many crash landings.

Societal impact: Traffic light controller If you implement the incorrect logic there will be many accidents on roads.

Societal impact: Social media Social media networks have their foundation in graph theory.

Societal impact: Mapping software If google maps were not configured correctly then people would be lost in the middle of nowhere.

Societal impact: Queueing This functionality allows people to wait for only a matter of seconds before web pages load. This is how Google are able to handle billions of server requests without their servers going down. This is also how online shopping works.

Societal impact: Text-to-speech analysis You can give a voice to somebody who doesn’t have one.

Societal impact: Big data and bots Did you know that robots write the news?

Societal impact: Robots Car manufacturing is now an automated process.

Societal impact: Big data and sensors

Farewell Before you can help anyone else, you need to help yourself and you will be doing that by moving on to 3rd level. We move to 3rd level so that we can learn the fundamentals which help us make these large societal impacts. This is true regardless of which course you choose or university you go to. You are in transition year now and this is what it’s for. You have embraced the hacker attitude by coming to CS sparks .You are making good use of your time. We hope you enjoy the CS Sparks program we have prepared for you. We wish you the best of luck in any discipline you choose or university you go to. Be curious.

References http://www.catb.org/esr/faqs/hacker-howto.html This is the link to the article “How To Become A Hacker” written by Eric S. Raymond. The imitation Game Hidden Figures The Social network The Internship Mr. Robot https://www.youtube.com/watch?v=CMm_XL3Ipbo This is the link to Lee Ridley’s voice by choice.