CSP Unit 4 - Big Data and Privacy


4.1 What is Big Data Use this thread to discuss your questions and comments about <strong>how to run the lesson.</strong> 4.10 Rapid Research - Cybercrime Use this thread to discuss your questions and comments about <strong>how to run the lesson.</strong> 4.2 Finding Trends with Visualizations 4.3 Check your Assumptions 4.5 Identifying People with Data Use this thread to discuss your questions and comments about <strong>how to run the lesson.</strong> 4.6 The Cost of "Free" Use this thread to discuss your questions and comments about <strong>how to run the lesson.</strong> 4.7 Simple Encryption Use this thread to discuss your questions and comments about <strong>how to run the lesson.</strong> 4.8 Encryption with Keys and Passwords Use this thread to discuss your questions and comments about <strong>how to run the lesson.</strong> 4.9 Public Key Cryptography Use this thread to discuss your questions and comments about <strong>how to run the lesson.</strong> <optional> Big Data and Cybersecurity Dilemmas Use this thread to discuss your questions and comments about <strong>how to run the lesson.</strong> <optional> Algorithms Detour-Traveling Salesperson Use this thread to discuss your questions and comments about <strong>how to run the lesson.</strong> <optional> One-way Functions- WiFi Hotspot Problem Use this thread to discuss your questions and comments about <strong>how to run the lesson.</strong> 4.4 Rapid Research Data Innovations Use this thread to discuss your questions and comments about <strong>how to run the lesson.</strong>
The Cost of Free is a LOT more expensive all of a sudden [4.6 The Cost of "Free"] (6)
Confusion with public and private key [4.9 Public Key Cryptography] (7)
Broken Link to Unit 4 All Lesson Plan PDF [CSP Unit 4 - Big Data and Privacy] (2)
Answer Key for "Make your Own Wireless Hotspot Problem" [<optional> One-way Functions- WiFi Hotspot Problem] (6)
U4 L9 Practice PT Big Data and Cybersecurity Dilemmas Template [<optional> Big Data and Cybersecurity Dilemmas] (2)
Article about smartphones collecting data to spy on users [4.6 The Cost of "Free"] (3)
Exam for Unit 4 [CSP Unit 4 - Big Data and Privacy] (3)
Link to howsecureismypassword.net broken [4.8 Encryption with Keys and Passwords] (5)
Recent, Authoritative Sources [4.4 Rapid Research Data Innovations] (3)
17-18 Discussion for Lesson 2.8 [4.2 Finding Trends with Visualizations] (10)
Using peer review with this PT [4.4 Rapid Research Data Innovations] (4)
How did this lesson go? [4.1 What is Big Data] (3)
'16-'17 General Discussion for Lesson 2.9 [4.3 Check your Assumptions] (5)
Missing Answer Key [4.10 Rapid Research - Cybercrime] (3)
Questions in Lesson Plan Not In Code Studio [4.10 Rapid Research - Cybercrime] (4)
Does anyone have an exemplar for this assignment? [<optional> Big Data and Cybersecurity Dilemmas] (2)
Exploring the Vigenere Cipher Answer Key [4.8 Encryption with Keys and Passwords] (5)
PT Explore Practice at the end of Unit 4 [CSP Unit 4 - Big Data and Privacy] (3)
'16-'17 General Discussion for Lesson 2.8 [4.2 Finding Trends with Visualizations] (6)
'15-'16 General Discussion for Lesson 4.5 [4.7 Simple Encryption] (5)
'15-'16 General Discussion for Lesson 4.7 [4.9 Public Key Cryptography] (8)
Rubric for Newest Explore PT [<optional> Big Data and Cybersecurity Dilemmas] (3)
Interesting Pro/Con Arguments on Privacy [4.6 The Cost of "Free"] (1)
WSJ Article - Paywall [4.6 The Cost of "Free"] (2)
Jelly Beans and Cups [4.9 Public Key Cryptography] (1)
'15 -'16 General Discussion for Optional 6.1 [<optional> Algorithms Detour-Traveling Salesperson] (4)
'15 -'16 General Discussion for Optional 6.2 [<optional> One-way Functions- WiFi Hotspot Problem] (18)
'15-'16 General Discussion for Lesson 4.3 [4.5 Identifying People with Data] (3)
'15-'16 Check your Assumptions [4.3 Check your Assumptions] (7)
'15-'16 General Discussion for Lesson 4.1 [4.1 What is Big Data] (3)