Do Now: Search for the definition for the Word of the Day and capture it in citelighter, then paraphrase it in your own words.
Word of the Day: Autonomous Cars
- Post a response to the Question of the Day in your own words.
- Use complete sentences, proper grammar, spelling and punctuation.
- Copy and paste the link to the specific Question of the Day?
- Include an Inline Link to Websites.
Your next car will be hacked. Will autonomous vehicles be worth it?
GM buys self-driving car kit startup Cruise, plans to use tech to make ...
Different paths could lead to autonomous cars
Question of the Day: After reading, 6 questions you should ask about driverless cars. Write a Blog post in which you answer one or all of the following questions.
- What problems do you think there will be with Autonomous cars?
- When do you think we will have self driving cars?
- How do these cars work?
- What are the different levels of vehicle automation?
- How will the laws of driving change?
- How will automation effect car insurance?
- What effect will all this have on the future?
- Research Autonomous Cars
- Write a 100 word or more Blog post.
- Include a link to 2 or more sources that you used.
- Add the links to your Delicious links.
Do Now: Search for the definition for the Word of the Day and capture it in citelighter, then paraphrase it in your own words.
Word of the Day:
- Post a response to the Question of the Day in your own words.
- Use complete sentences, proper grammar, spelling and punctuation.
- Copy and paste the link to the specific Question of the Day?
- Include an Inline Link to Websites.
Read: How to Use Apple’s Built-in Features to Encrypt Files and Folders
- Make a folder with your name.
- Use Disk Utility(128) to encrypt it.
- Change compressed to read/write.
- Print to PDF any document.
- Password protect the document.
- Require 2 passwords.
- Save this document in your encrypted folder.
1. Decrypt the following encrypted
quotation.
pbegu uymiq icuuf guuyi qguuy qcuiv fiqgu uyqcu qbeme vp
pbegu uymiq icuuf guuyi qguuy qcuiv fiqgu uyqcu qbeme vp
Substitution Key:
abcde fghij klmno pqrst uvwxy z
ihgfe dcbaz yxwvu tsrqp onmlk j
2. Decrypt the following encrypted quotation.
auqrq rkrzd dmhxk ageho kfalu hk mog rlagm hznhf fhglm hkrlh
mvzmr znvir klhgl vhodw krnra przgr
jozdl vzkra gmvrw almka
xomah gmvrf zbhka mtqho dwxre dzwmh
mzcro imvr a khqgz
gwwri zkm
Substitution Key:
abcde fghij klmno pqrst uvwxy z
zxnwr uevab cdfgh ijklm opqst y
3. Decrypt the following encrypted quotation.
mszkx ijddj nzatm lrkdj mlwmc qrktj tnwir zatnj bxdrj amlrs zxrzd
Substitution Key:
abcde fghij klmno pqrst uvwxy z
zxnwr uevab cdfgh ijklm opqst y
3. Decrypt the following encrypted quotation.
mszkx ijddj nzatm lrkdj mlwmc qrktj tnwir zatnj bxdrj amlrs zxrzd
dbjbk wsrir mlrxc icnic qrkza tmlrb
cbriz mlkco mnizx r
Substitution Key:
abcde fghij klmno pqrst uvwxy z
zxvtr pnljh fdbac egikm oqsuw y
4. Encrypt your own code of at least 25 words.
abcde fghij klmno pqrst uvwxy z
zxvtr pnljh fdbac egikm oqsuw y
4. Encrypt your own code of at least 25 words.
Daily Objectives: Students
will read, discuss and analyze information from articles, analyze, and
think critically about online context, using written (Blog post),
graphic, pictorial, or multi-media methods, with a student performance
at the basic level or above and 6 out of 12 on the project rubric.
2. If we were all to bring our misfortunes
into a common store so that each person
should receive an equal share in the distri
bution, the majority would be glad to take
up their own and depart.
3. ‘Twas brillig and the slithy toves did gyre an d gimble in the wabe; all mimsy were the Borogroves, and the momeraths outgrabe.
1. The cook was a good cook, as cooks go; and as cooks go she went.
3. ‘Twas brillig and the slithy toves did gyre an d gimble in the wabe; all mimsy were the Borogroves, and the momeraths outgrabe.
No comments:
Post a Comment