Skip to the content.
Home College Board TPT Notes Create Task Project Data Structures Project College Board Preparations Proctored MCQ Test Scores and Corrections

College Board TPT Notes

Week 0 TPT Notes Week 1 TPT Notes Week 2 TPT Notes


Week 2 TPT Notes

Video #1:

Learning Objective:

Essential Knowledge:

Legal and Ethical Concerns:

GitHub Pages Actions:

  1. When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in your GitHub pages.
    • GitHub offers many licenses when you create a GitHub repository. Some examples include: Academic Free License, Apache License, Creative Commons License Family, MIT License, ETC. All of these licenses have to do with computing and all fall under the topic of Legal and Ethical Concerns.
  2. Make a license for your personal and Team project. Document the license you picked and why.
    • I chose to use the MIT license for my personal project, and my team decided to also use the MIT license for our Team project. I chose the MIT license because I am interested in MIT university. I know that MIT is a prestigious university that focuses primarily on modern science and technology, and so their computing license should be updated, modern, and effective.
    • Personal GitHub MIT License
    • Team GitHub MIT License

College Board Topic 5.6 Safe Computing:

Video #1:

Learning Objective:

Essential Knowledge:

Safe Computing:

Video #2:

Learning Objective:

Essential Knowledge:

Safe Computing:

Video #3:

Learning Objective:

Essential Knowledge:

Safe Computing:

GitHub Pages Actions:

  1. Describe PII you have seen on a project in CompSci Principles.
    • In Trimester 2, my team worked on the CRUD Project. In the project, we used CRUD and databases to store Personally Identifiable Information (PII) such as names, ages, usernames, emails, phone numbers, passwords, ETC.
  2. What are your feelings about PII and your exposure?
    • I feel like Personally Identifiable Information (PII) has both harmful and beneficial effects, as there are some types of information that should remain private, but there are also some types of information that can enhance users' online experiences. For example, my PII allow the Internet to know what types of advertisements and what types of products appeal to me.
  3. Describe good and bad passwords? What is another step that is used to assist in authentication?
    • Good passwords contain 10 or more characters, a symbol, a number, and both lowercase and uppercase letters. Bad passwords lack these aspects and are usually not complex.
      • Bad Password Example: Dylanistall.
      • Good Password Example: Dyl@n1sTAll.
    • Another step to aid in authentication is Multifactor Authentication. Multifactor Authentication is a type of computer access control where a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, usually in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are).
  4. Try to describe Symmetric and Asymmetric encryption.
    • Symmetric Encryption involves one key for both encryption and decryption, while Asymmetric Encryption, also known as Public Key Encryption, pairs a public key for encryption and a private key for decryption. For this type of encryption, the sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message.
  5. Provide an example of encryption we used in deployment.
    • During deployment, we used SSL encryption.
  6. Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.
    • I have personally not fallen for a phishing scheme. An example of a phishing technique: A user receives an email from a seemingly trustworthy online shopping website. The email asks the user to click on the link within it, which will allow them to receive a giveaway of luxurious goods. The link, however, is malicious, and upon clicking on the link, a secret keylogger is installed on the user's computer. This malicious keylogger then collects the user's Personally Identifiable Information (PII).