The following videos are accessible in your AP Classroom. Please watch and take notes with the packets provided.
Monday
Circle Time - 10 minutes
CRD-1: University Faculty Lecture - 20:11
This lecture focuses on improving computing through collaboration.
CRD-2: University Faculty Lecture - 27:08
This lecture focuses on design - one of the most exciting concepts to study and practice in computer science, and in many other disciplines as well. It's the process of taking an idea and making it real.
DAT-1: University Faculty Lecture - 29:06
This lecture explains that the way a computer represents data internally is different from the way the data are displayed for the user. Programs translate the data to be more easily understood by the user.
Tuesday
Circle Time - 10 minutes
DAT-2: University Faculty Lecture - 59:06
This lecture shows how programs can be used to process data, which allows users to discover information and create new knowledge.
AAP-3: University Faculty Lecture - 32:49
This lecture explains how to use procedures to create abstractions by breaking programs into smaller, reusable program code.
Wednesday
Circle Time - 10 minutes
AAP-4: University Faculty Lecture - 23:30
This lecture focuses on the existence of problems that computers cannot solve, and how even when a computer can solve a problem, it may not be able to do so in a reasonable amount of time.
CSN-1: University Faculty Lecture - 31:01
This lecture discusses how computer systems and networks facilitate the transfer of data.
CSN-2: University Faculty Lecture - 20:13
This lecture discusses how parallel and distributed computing leverage multiple computers to solve complex problems or process large data sets more quickly.
Thursday
Circle Time - 10 minutes
IOC-1: University Faculty Lecture - 20:11
This lecture discusses the fact that although computing innovations are typically designed to achieve a specific purpose, they may have unintended consequences.
IOC-2: University Faculty Lecture - 23:24
This lecture focuses on how to keep your private messages secure by using encryption.
Finish any videos you haven't completed yet and review your notes.
Monday
Circle Time - 10 minutes
CRD-1: University Faculty Lecture - 20:11
This lecture focuses on improving computing through collaboration.
CRD-2: University Faculty Lecture - 27:08
This lecture focuses on design - one of the most exciting concepts to study and practice in computer science, and in many other disciplines as well. It's the process of taking an idea and making it real.
DAT-1: University Faculty Lecture - 29:06
This lecture explains that the way a computer represents data internally is different from the way the data are displayed for the user. Programs translate the data to be more easily understood by the user.
Tuesday
Circle Time - 10 minutes
DAT-2: University Faculty Lecture - 59:06
This lecture shows how programs can be used to process data, which allows users to discover information and create new knowledge.
AAP-3: University Faculty Lecture - 32:49
This lecture explains how to use procedures to create abstractions by breaking programs into smaller, reusable program code.
Wednesday
Circle Time - 10 minutes
AAP-4: University Faculty Lecture - 23:30
This lecture focuses on the existence of problems that computers cannot solve, and how even when a computer can solve a problem, it may not be able to do so in a reasonable amount of time.
CSN-1: University Faculty Lecture - 31:01
This lecture discusses how computer systems and networks facilitate the transfer of data.
CSN-2: University Faculty Lecture - 20:13
This lecture discusses how parallel and distributed computing leverage multiple computers to solve complex problems or process large data sets more quickly.
Thursday
Circle Time - 10 minutes
IOC-1: University Faculty Lecture - 20:11
This lecture discusses the fact that although computing innovations are typically designed to achieve a specific purpose, they may have unintended consequences.
IOC-2: University Faculty Lecture - 23:24
This lecture focuses on how to keep your private messages secure by using encryption.
Finish any videos you haven't completed yet and review your notes.