CPSC 110-08: Computing on Mobile Phones
Spring 2012

Reading: Blown to Bits, Chapter 2
Due: Wednesday, 3/14 (before class)

CS Principles

This activity addresses the idea that computing has global impacts. It focuses, in part, on the following learning objectives:

Reading Assignment

Read Chapter 2 of Blown to Bits (50 pages). This chapter describes the various ways in which or personal privacy is compromised by the digital explosion.

Reading Questions

Post answers to the following questions on a Portfolio page.

  1. What's an RFID tag and what does it do?

  2. What's an EDR and what does it do?

  3. Is it possible to identify, say, a patient, knowing just his or her gender, birth date, and zip code? Explain.

  4. What's the difference between "big brotherism" and "little brotherism"?

  5. In 1 or 2 paragraphs, address the question 'Why I am [am not] worried about my privacy?' We'll discuss this in class, where you will be asked to read your essay.

Portfolio

Your answers to the above questions should be recorded on a new portfolio page. Name it "Blown to Bits, Ch2" or something similar.