top of page
IMG_5550.JPG
IMG_1362.JPG

Hey! So Glad You're Here.

Reflection 1: 

Today in class we got to play with Pepper! Pepper is a semi-humanoid robot manufactured by SoftBank Robotics. She speaks Spanish and English but we only used the English setting. She has many commands like she can wave to you and say hello. My peers and I went through a list of commands to see if she can respond. At first she did not respond so then we tried to learn what the issue was. We concluded that she needed her eyes to focus on us so then she will interact. We also had to speak slower and maintain eye contact. Once we learned how to communicate with her it was really fun! I feel like our future will include many robots like Pepper. In the future I can see Pepper translate languages for students from different countries and making classrooms more interactive.

Screen-Shot-2021-06-30-at-5.23.33-PM.jpg

Reflection 2: 

Today in class we got to fly drones. These drones were parrot drones. We went outside and flew them in the open air. Outside the drones were able to get shots from a birds eye angle. The next class we were able to fly drones in the classroom. In the classroom we trained the drones to fly in squares. I really enjoyed flying drones because it was a new experience for me. I learned so much about them and how they are built.

parrot_mambo_fly_packshot_01.jpg

Reflection 3: 

The next day in class we worked on Garage Band. In Garage Band we learned how to use the different features. For example we learned how to play the different instruments. Also in Garage Band you can connect your instruments. I loved working with Garage Band because it taught me so much on how to make music on a digital platform.

download-1.png

Reflection 4: 

In class we are working hard to prepare for Hour of Code week . We chose responsibilities and projects we want to lead on. In class one of my favorite things we did were the drones and spheros. For Computer Science Week I hope to help Mr.Wong teach students at BHS more about drones and computer science! Additionally we did some work with Artificial intelligence. We used websites like teachable machines. I really enjoyed it because the computer could analyze us based off of a couple movements. It shows the stride of artificial intelligence in the future and how it can help us!

download.png

Reflection 5: 

In class we worked with spheros! Spheros are used to help kids learn fundamental STEM concepts. In class we drove and programmed our spheros. I used the R2D2 and programmed it to go in a square. Additionally, I programed it to go in a star. I learned how loops worked when programming the spheros. Also, I learned how rotations worked and how it correlated to the speed. Because, if you have a really high speed but low rotation it won't move as much. Overall, I really enjoyed the lesson and I liked coding the spheros.

Unknown.jpeg

Reflection 6: 

In class we worked with circuit playground. Circuit playgrounds are mini circuit boards with LED's that can be programmed. I programmed my circuit board to flash red and blue lights. Also, I had it make sounds. Then I used alligator clips to do more complex coding. I really enjoyed using the circuit playground to code new projects. I like how there were different level areas so I was able to do easy and hard projects. I hope to do this again in class!

Unknown-1.jpeg

Reflection 7: 

We discussed cyber security and different scams that are portrayed frequently. In class each student wrote a paper covering a certain cyber security scam. The scam I covered is phishing. Please see the attached document covering the research paper I wrote about phishing.

Cybersecurity and Crime One-Pager Template
Phishing Scams

 

 

Overview

Phishing scams originated in 1995. This was the period when there were not many restriction on the internet. So, there were more chances for online scams. Phishing scams mask themself as trustful sources. Then they proceed to ask for personal information. Personal information like credit cards, social security numbers, health records, bank statements, text messages, files, and emails can be taken. According to IC3’s report 241,342 victims are affected by phishing scams in the United States. Facebook and Google are two of the thousands of companies affected by phishing. They both lost an estimate sum of $100 million between 2013 and 2015. Phishing scams are incredibly dangerous and harmful. They can appear as text messages, emails, and phone calls. With one text message they can steal thousands of dollars from you. So it is important to be safe and practice cyber security methods. 

 

How and How to Prevent

Phishing is scary but there are ways to fight it. Protect your computer, iphone, ipad, android using a strong security warfare. This security warfare can help detect phishing scams for you before its too late. Also, you can set notifications to have your phone update automatically so you will face less bugs. A common one is to be in the know of new phishing techniques and to spread awareness on them. Last, think before you click! Phishing scams are everywhere but it is easy to avoid. By not clicking any links you can save yourself and your data.

 

Data Specifics

    Phishing scams prioritize themself in stealing your personal information. Some big examples are your credit card numbers, bank pins, and social security numbers. Others could be health statements, bank statements, social media information, etc. In the past many companies and organizations have lost millions of dollars through phishing scams so it is important to be safe and to know how to combat it.

 

Data Privacy / Security / Storage Concern

    Major companies ave had their bank statements, inventions, worker information stolen by hackers from phishing scams. These items can ruin a company and its reputation. Additionally it will result in massive losses in banks for the companies. But for people phishing scams can take personal information and use it for identity theft. Identity theft is a major problem and has lots of consequences. Phishing scams can take your personal information and use it against you. For example many phishing scams take the credit card information then spend lots of money on it but the bills go back to the owner.

 

Sources

 

Works Cited

“How To Recognize and Avoid Phishing Scams | FTC Consumer Information.” Consumer.FTC.GOV., https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams. Accessed 9 March 2022.

Jones, Caitlin. “50 Phishing Stats You Should Know In 2022.” Expert Insights, https://expertinsights.com/insights/50-phishing-stats-you-should-know/. Accessed 9 March 2022.

“10 Ways to Avoid Phishing Scams.” Phishing.org, https://www.phishing.org/10-ways-to-avoid-phishing-scams. Accessed 9 March 2022.

“The Top 5 Phishing Scams of all Time.” Check Point Software, https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-phishing/the-top-5-phishing-scams-of-all-times/. Accessed 9 March 2022.

“What is phishing | Attack techniques & scam examples.” Imperva, https://www.imperva.com/learn/application-security/phishing-attack-scam/. Accessed 9 March 2022.

bottom of page