Monday, March 14, 2016

3/15 Artificial Intelligence


https://classflow.com/activfoundation/resource/downloadResourceFile?resourceId=a61cdf6fbb584d8c863515d24ab0745c&resourceFileType=CONVERTEDDo Now: Search for the definition for the Word of the Day and capture it in citelighter, then paraphrase it in your own words.  
Word of the Day: Artificial Intelligence

Watch: "How smart is today's artificial intelligence" on the Big Screen
Read and Follow: View my Flipboard Magazine.
FlipBoard Artificial Intelligence

Question of the Day: What is Artificial Intelligence? Should we be concerned about Artificial Intelligence?
  1. Research Artificial Intelligence.
  2. Write a 100 word or more Blog post. 
  3. Include a link to 2 or more sources that you used. 
  4. Add the links to your Delicious links.
Daily Objectives:  Students will read, discuss and analyze information from articles, analyze, and think critically about online context, using written (Blog post), graphic, pictorial, or multi-media methods, with a student performance at the basic level or above and 6 out of 12 on the project rubric.

    https://classflow.com/activfoundation/resource/downloadResourceFile?resourceId=ba7160ab334f47cea8dfcbfe4500cf68&resourceFileType=CONVERTEDDo Now: Search for the definition for the Word of the Day and capture it in citelighter, then paraphrase it in your own words.  
    Word of the Day: Encryption


    Read:

    Question of the Day: 
    Read: How to Use Apple’s Built-in Features to Encrypt Files and Folders
      1. Make a folder with your name. 
      2. Use Disk Utility(128) to encrypt it. 
      3. Change compressed to read/write.
      1. Print to PDF any document. 
      2. Password protect the document. 
      3. Require 2 passwords. 
      4. Save this document in your encrypted folder. 

    1. Decrypt the following encrypted quotation. 

    pbegu uymiq icuuf guuyi qguuy qcuiv fiqgu uyqcu qbeme vp  

    Substitution Key: 
     abcdefghijklmnopqrstuvwxyz 
     ihgfedcbazyxwvutsrqponmlkj



    2. Decrypt the following encrypted quotation. 

    auqrq rkrzd dmhxk ageho kfalu hk mog rlagm hznhf fhglm hkrlh mvzmr znvir klhgl vhodw krnra przgr jozdl vzkra gmvrw almka xomah gmvrf zbhka mtqho dwxre dzwmh mzcro imvr a khqgz gwwri zkm 

    Substitution Key: 
    abcdefghijklmnopqrstuvwxyz 
    zxnwruevabcdfghijklmopqsty



    3. Decrypt the following encrypted quotation.

    mszkx ijddj nzatm lrkdj mlwmc qrktj tnwir zatnj bxdrj amlrs zxrzd dbjbk wsrir mlrxc icnic qrkza tmlrb cbriz mlkco mnizx r 

    Substitution Key: 
    abcdefghijklmnopqrstuvwxyz 
    zxvtrpnljhfdbacegikmoqsuwy
      
    Daily Objectives:  Students will read, discuss and analyze information from articles, analyze, and think critically about online context, using written (Blog post), graphic, pictorial, or multi-media methods, with a student performance at the basic level or above and 6 out of 12 on the project rubric.
    1. The cook was a good cook, as cooks go; and as cooks go she went.
    2. If we were all to bring our misfortunes into a common store so that each person should receive an equal share in the distri bution, the majority would be glad to take up their own and depart.  

    3. ‘Twas brillig and the slithy toves did gyre an d gimble in the wabe; all mimsy were the Borogroves, and the momeraths outgrabe.

      No comments: