CPSC 110-08: Computing on Mobile Phones
Spring 2012

Reading: Blown to Bits, Chapter 3
Due: Wednesday, 3/28 (before class)

CS Principles

This activity addresses the idea that computing has global impacts. It focuses, in part, on the following learning objective:

Reading Assignment

Read Chapter 3 of Blown to Bits (25 pages). This chapter talks about hidden information in and associated with documents and the various mishaps that can happen if one is unaware of such information.

Reading Questions

Post answers to the following questions on a Portfolio page. We will discuss these in class.

  1. What is metadata? Give an example.

  2. What is a model, as this term is used in how images and sound recordings are digitized?

  3. What's the difference between a raster image and an ASCII representation of a text document?

  4. What is steganography and what is it used for?

  5. What would you have to do to delete a document from your computer so that it could not possibly be read by anyone else?

Portfolio

Your answers to the above questions should be recorded on a new portfolio page. Name it "Blown to Bits, Ch3" or something similar.