QUOTABLES
MARKETING
HW Assignment - About me - Week one - was Due Aug 31
Look back over the older posts to see the format and directions
Due by Friday (today) 4th block
Work the Big Six - Lap
1.04 Work the Big Six Quiz (20)
http://www.quia.com/quiz/6174719.html
http://www.quia.com/quiz/6174719.html
Analyze This - Lap
LAP - Analyze This! (10Q) - Strength Weakness, Opportunity, or Threat (Multiple Answer - Strength/Weakness/Opportunity/Threat)
LAP Analyze This! (10Q - open ended)
LAP Analyze This! (20Q - MC)
Writing Prompt,
1st 10 minutes of class, class assignment grade.
Choose two of the question below...and not the two your friend right next to you chose.
Answer (in long form). a and b are off the list. c-g are fair game.
Do in either Gogle Docs or onedrive
entitle it with lastname_first name_# Block_1.04 Writing prompt
email to murphyk2@gcsnc.com
1.04 Question to know
1st 10 minutes of class, class assignment grade.
Choose two of the question below...and not the two your friend right next to you chose.
Answer (in long form). a and b are off the list. c-g are fair game.
Do in either Gogle Docs or onedrive
entitle it with lastname_first name_# Block_1.04 Writing prompt
email to murphyk2@gcsnc.com
1.04 Question to know
c. Describe the importance of each of the components of the marketing mix.
d. Explain the relationship of goals, strategies, and tactics.
e. Describe the importance of marketing strategies.
f. Explain the factors that may cause marketing strategies to change.
g. Explain the importance of strategies in the marketing mix.
Segmentation exercise
Explain the importance of target markets to businesses.
Describe advantages and disadvantages of mass marketing.
Describe advantages and disadvantages of using market segments.
Explain why the use of market segments is increasing.
Describe demographic characteristics that are analyzed by marketers.
Explain the value of geographic segmentation.
Discuss the value of psychographic segmentation.
Describe types of behavioral segmentation.
AP COMPUTER SCIENCE PRINCIPLES
Vocab - unit 2 - Date not set for next Vocab
Unit 1 Assessment - Sept - See calendar (Sept 11)
Complete the reflections after both 1.6 and 1.7 lessons on Code.org
------
1.8 Internet is for Everyone
Objectives
Students will be able to:
- Connect a personal experience to one challenge related to the idea that "The Internet is for Everyone".
- Cite one example of how computing has a global affect -- both beneficial and harmful -- on people and society.
- Explain that the Internet is a distributed global system that works on shared and open protocols.
What is the Internet? - Video
KWL Chart - Handout
Vocabulary
- IETF - Internet Engineering Task Force - develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP).
- Internet - A group of computers and servers that are connected to each other.
- Net Neutrality - the principle that all Internet traffic should be treated equally by Internet Service Providers.
Agenda
- Thinking prompt: (2 mins) - KWL Handout
- “When you enter a web address in a browser and hit enter, what happens? At some point you see the web page in the browser, but what happens in between? What are all the steps?"
- "Write down the series of things that you think (or have heard) happen right after you hit Enter. What happens first, second, third and so on. "
- "Don’t worry if you don’t know all the pieces or how they all fit together. If you don't know a step, or you are fuzzy on some details, or there's a gap, that's okay. Just write down the parts that you know."
- Give students about 2 minutes to write.
- Generate a list on your KWL
- What are the gaps in what we know?
- What questions do you have at this point?
- Activity 1 - KWL The Internet (25 mins)
- KWL the Internet
- Activity - Vint Cerf: The Internet is for Everyone (20 mins)
- Video: Introducing Vint Cerf
- Vint Cerf: The Internet is for Everyone
- What is the Internet? - Video
In the video Vint Cerf says that nobody and everybody is in charge of making the internet work but the reason it all works together because everyone uses the same protocols.
So who develops these protocols? Who makes the final decisions? Who is in charge? The amazing thing is that no single person, government, or corporation is in charge.
Rather, it is a collection of citizens and volunteers interested in defining the standards who formed a volunteer organization called the Internet Engineering Task Force to develop and promote voluntary internet standards IETF.
- Net Neutrality is a raging legal debate about the principle that Internet service providers should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites.
- Internet Censorship is the attempt to control or suppress of what can be accessed, published, or viewed on the Internet by certain people. This can be used to protect people (i.e. to not allow access to child pornography) but can also be used to limit free speech.
Assessment
HW - Due ??????
Blown to Bits (www.bitsbook.com), Chapter 1, pp. 4-13. - Read about the following koans (or truths) of bits related to the Internet:
- Koan 1: It’s All Just Bits
- Koan 2: Perfection Is Normal
- Koan 3: There Is Want in the Midst of Plenty
- Koan 6: Nothing Goes Away
- Koan 7: Bits Move Faster Than Thought
- Pick one of these koans and address the following questions:
- Argue if you agree that it is a “truth” and if it will always be a “truth.”
- How does this koan intersect with your life as a student?
------
1.9 The Need for Addressing
Background
In this lesson we use the Internet Simulator to communicate with more than one person at a time. This introduces problems because without the right protocols it's hard to tell which message is meant for which person. In this lesson you will begin to investigate how a message is broadcast over a network and how we can ensure a message is delivered to the right person. It requires inventing some kind of addressing protocol, but careful, it's easy for messages to get clobbered!
Objectives
Students will be able to:
Explain why messages need to contain addressing information (sender/recipient identification).
Invent an informal addressing protocol for use in the Battleship game.
Recall that browsing the Internet entails computers sending each other requests and sending back data to satisfy those requests.
Vocabulary
- IP Address - A number assigned to any item that is connected to the Internet.
- Packets - Small chunks of information that have been carefully formed from larger chunks of information.
- Protocol - A set of rules governing the exchange or transmission of data between devices
- Getting Started (20 mins)
- Introduce "Broadcast Battleship"
- We will start by playing a game that simulates some issues that arise when constructing the internet.
- We will play a crazy game of Battleship where instead of playing against one other person you will play multiple games against multiple other people simultaneously -- We call this "Broadcast Battleship"
- In our version today, you will play in groups of 3 (4 is OK)
- To make it easier to track, we've also simplified the playing board to just a 3x3 grid (instead of the classic 10x10)
- And we'll just play with paper and pencil.
- Battleship Setup
- Broadcast Battleship Game Board - Activity Guide
- Broadcast Battleship Rules - Activity Guide
- Activity: Silent Broadcast Battleship (25 mins)
- Introduce new version of Internet Simulator (Broadcast)
- Code.org - Unit 1, Lesson 9
- You connect to a “Room” with other people, instead of an individual partner.
- Every message that is sent gets broadcast to everyone in the "room", including you!
- Refine and Reflect.
- What protocol have they been using? Did they have a protocol at all?
- How can they standardize their communication?
- How do they make their message as clear as possible?
- How do they make their message as efficient (short/easy to interpret) as possible?
- Play Game. Round 2.
- Have students return to the Internet Simulator, start a new game and test out their protocol.
- Remind them of the No Talking rule.
- If necessary, distribute a clean copy of Broadcast Battleship Game Board - Activity Guide for use in this round.
After 5 minutes or enough time to try out their new protocol, transition to the next activity.
- Activity 2: Invent a Binary Protocol for Battleship (20 mins)
- Overview
Overview
- Previously you came up with a method for exchanging messages on an open broadcast channel to play multiple games of Battleship at once. Now that you’ve played Battleship this way, with your group or with a partner, describe an efficient binary protocol for playing a 3-person game of Battleship that can be played accurately over the Internet Simulator.
- Let “efficient” mean that your protocol uses the smallest reasonable number of bits (0s and 1s) to make messages for Battleship that still contain all of the necessary information for playing the game.
- Discuss & Share
- "Did any other group do something similar? or something completely different?"
- "What pieces of information were common across all of the protocols? Sender, recipient, cell number, hit/miss info."
- "If we were to play a different game, what data would stay the same? What would change?"
- (Optional) Exemplar Solution
- .
- Wrap-up
- Real IP Addresses - Background and Video.
- It turns out computers on the Internet are addressed in a similar way to phones for many of the same reasons. The real addresses used on the Internet are called “Internet Protocol Addresses” or IP Addresses for short.
- stop the video at 4:10
- Discuss
You should review the material covered in the video.
The questions in the IP and DNS Video Worksheet (Optional) - Video Worksheet are a good place to start. The essential ideas and vocabulary students should know are:
- IP Address
- IP Packets
- IPv4 versus IPv6
- Assessment
- Code Studio: Assessment questions are available on the Code Studio
- Extended Learning
- Security and Privacy: If the messaging scheme your group designed was really used on the Internet, what could go wrong in terms of security and privacy? Think about what a malicious person could do. What if the messages sent weren't about a game but about something more personal like a conversation with a friend, or communicating with a bank? * There are two major security problems with the current version: * Anyone can fake a return address. Bob could send you a message and claim it’s “from Alice,” and you’d have no way to confirm who sent it. * Everyone can view everyone else’s messages! Because all messages are “broadcast” over Internet Simulator, messages have no expectation of privacy.
- Look Up Your IP Address: What's the IP address of the computer you're using right now?
- There are a number of ways to figure out your IP address. An exploratory way is to do a web search for: *"What's my IP address?"
- That will lead to finding something, but you should be cautioned that the answer isn't always simple.
- For example, if you are in a computer lab and use a site like What's my IP Address? it's likely that all of the computers in the classroom will report the same address. This is because the computers in a computer lab are probably using the same shared connection and might look to the outside world like they're all coming from the same place.
- You can also look at a computer's settings to see what it thinks it's IP address is.
No comments:
Post a Comment