SlideShare una empresa de Scribd logo
1 de 71
1
Digital Technology
Digital Technology
Merit Badge College
• Do you have completed Blue Cards?
• Are you in the right class?
• Do you have Workbooks?
2
Before We Start…
Read the Merit Badge Pamphlet
Print out the Worksheet
1. Show your current, up-to-date Cyber Chip.
3
Cyber Chip
4
History of Computers
2. Do the following:
a. Give a brief history of the changes in digital technology over
time. Discuss with your counselor how digital technology in your
lifetime compares with that of your parent’s, grandparent’s, or other
adult’s lifetime.
b. Describe the kinds of computers or devices you imagine might
be available when you are an adult.
5
History of Computers
6
1632 – Slide Rule
1100 BC – Abacus
1642 Pascaline
1617 – Logarithms
History of Computers
7
1804 Automatic Loom 1840s Boolean Logic
1830s – Babbage Engine
History of Computers
8
Edison’s Vacuum Tube
In 1883, a few years after Thomas Edison invented the electric light bulb, he noticed
something peculiar about how electricity flowed inside it. To protect the brightly glowing
filament, air had been removed from the bulb, creatinga vacuum tube. Surprisingly, if he
placed a metal plate inside the bulb, electricity would flow across the vacuum from the
filament to the plate. Edison patented the discovery of how electrons flowed across a
vacuum, now known as the Edison Effect, though he made little use of it.
1890 – Hollerith Machine
9
• Used electrical connections to trigger a counter, recording information
• Data could be encoded by the locations of holes in a card
• Hollerith determined that data punched on a card, could be counted or
sorted mechanically
1944 – Colossus Mark I
10
• 1st programmable digital computer
• 5 tons, 500 miles of wire, 8 feet tall & 51 feet long
• Ran non-stop for 15 years
1945 – ENIAC
11
• Electronic Numerical Integrator And Computer
• 20 by 40 foot room
• Weighed 30 tons
• Used more than 18,000 vacuum tubes
1959 – IBM Stretch
12
• The IBM 7030, or Stretch, was IBM's first transistorized
supercomputer
• Failed to meet aggressive performance estimates so price dropped
from $13.5 million to only $7.78 million
• It was the fastest computer in the world until 1964
1970s – IBM Mainframes
13
• Standard dual-processor capability
• “Monolithic main memory" based on integrated circuits
• Full virtual memory through a new microcode floppy disk
• 128-bit (hexadecimal) floating point arithmetic
1975 – Altair 8800
14
• Name comes from Star Trek!
• Mail order kit, assemble it yourself
• No video output, LEDs instead
• No keyboard, switches on the front
Microsoft & Apple
15
Moore’s Law
16
Computer Speak
17
“A” →
65 (ASCII) →
01000001 (Binary) →
Storage
18
Google only holds
somewhere around
10-15 exabytes of
data
Storage
19
Storage
20
Digital Technology
Memory, or RAM
21
Speed
22
How high can you count
in 10 seconds?
Speed
23
An average computer chip can count
(by ones) to over 20 billion
(20,000,000,000) in this same time. It is
this mind-boggling speed of computer
chips that has been harnessed in digital
devices to do the incredible things they
do.
The Future
24
The Future
25
The Future
26
The Internet of Things
The Future
27
Digital Technology
3. Do the following:
a. Explain to your counselor how text, sound, pictures, and videos
are digitized for storage.
b. Describe the difference between lossy and lossless data
compression, and give an example where each might be used.
c. Describe two digital devices and how they are made more
useful by their programming.
d. Discuss the similarities and differences between computers,
mobile devices, and gaming consoles.
e. Explain what a computer network is and describe the network’s
purpose.
28
File Formats
Text (ASCII)
txt, doc, docx, pdf
Sound (waves)
mp3, wma, aiff, au, raw, wav
Pictures (pixels)
jpg, gif, png, tiff, eps
Videos (key frames + changes)
avi, mpeg, flv, mov
29
Lossy vs. Lossless Compression
Lossless allows the original to be recreated
Lossy eliminates some data, can’t get it back
30
Lossy vs. Lossless Compression
31
More Useful With Technology?
32
Computers, Mobile Devices &
Gaming Consoles
Similarities
• Digital processing
• Programs
• Connectivity
• Displays
33
Differences
• Input – keyboard,
screen, controller
• Functionality
• Versatility
• Single Purpose
• Proprietary software
• Portability
Network
34
Digital Technology
4. Do the following:
a. Explain what a program or software application or “app” is and
how it is created.
b. Name four software programs or mobile apps you or your
family use, and explain how each one helps you.
c. Describe what malware is, and explain how to protect your
digital devices and the information stored on them.
35
Programs or “Apps”
Series of commands or set of instructions for a
processor to complete a task
– Word Processing
– Games
– Utilities (calendar, calculator)
– Photo/Video Editor
Coded or scripted with a special language
36
Word Processing
37
Games
38
Utilities
39
Photos Editors
40
Photos Editors
41
Video Editors
42
Video Editors
43
Malware
• Malicious code in the form of
viruses, worms, Trojan horses,
spyware, adware, scareware, or
ransomware
• Any software used to disrupt
computer operation, gather
sensitive information, or gain
access to private computer
systems
• Defined by its malicious intent,
acting for the interests of the
malware owner, rather than the
user
44
Protect Against Malware
45
Digital Technology
5. Do the following:
a. Describe how digital devices are connected to the Internet.
b. Using an Internet search engine (with your parent's
permission), find ideas about how to conduct a troop court of
honor or campfire program. Print out a copy of the ideas from
at least three different websites. Share what you found with
your counselor, and explain how you used the search engine to
find this information.
c. Use a Web browser to connect to an HTTPS (secure) website
(with your parent's permission). Explain to your counselor how
to tell whether the site's security certificate can be trusted, and
what it means to use this kind of connection.
46
Connect to the Internet
47
Connect to the Internet
48
Connect to the Internet
49
The Incredible Optical Fiber
Optic and photonic devices help make
today’s Internet work. Lasers, fiber
optics, photonic switches, and photonic
displays allow digital devices anywhere
in the world to connect to each other,
exchange information, and visually
display that information. All information,
like movies, phone calls, and emails, are
converted into binary data, or ones and
zeros, similar to the dots and dashes of
Morse code on a telegraph line.
HTTPS
50
HTTPS
51
Passwords
52
Digital Technology
6. Do THREE of the following. Provide me with a copy.
a. Food budget OR roster spreadsheet for campout.
b. Letter to troop’s parents, inviting them to a troop event.
c. Campsite plan for your troop OR create a flier for an upcoming
troop event, incorporating text and photographs.
d. Five slide presentation, with photographs.
e. Photos of a troop activity.
f. Record your voice and transfer the file to a different device.
g. Blog 5 of your scouting activities.
h. Create a web page for your troop, patrol, school, or church.
53
Digital Technology
7. Do the following:
a. Explain to your counselor each of these protections and why
they exist: copyright, patents, trademarks, trade secrets.
b. Explain when it is permissible to accept a free copy of a
program from a friend.
c. Discuss with your counselor an article or a news report about a
recent legal case involving an intellectual property dispute.
54
Copyrights
Legal right created by the law of a country, that grants the
creator of an original work exclusive rights to its use and
distribution, usually for a limited time, with the intention of
enabling the creator to receive compensation for their
intellectual effort.
55
Trademarks
A recognizable sign, design or expression which identifies
products or services of a particular source from those of
others.
The trademark owner can be an individual, business
organization, or any legal entity.
A trademark may be located on a package, a label, a
voucher or on the product itself.
56
Patents
A set of exclusive rights granted by a sovereign state to an
inventor or assignee for a limited period of time in
exchange for detailed public disclosure of an invention.
An invention is a solution to a specific technological
problem and is a product or a process.
57
Trade Secrets
An invented formula, practice, process, design, instrument,
pattern, commercial method, or compilation of information
which is not generally known or reasonably ascertainable
by others, and by which a business can obtain an
economic advantage over competitors or customers.
58
Piracy
59
Give Software to Friend
60
Give Software to Friend
61
Give Software to Friend
62
Digital Technology
8. Do TWO of the following:
a. Why proper disposal of digital technology is important. List at
least three dangerous chemicals that could be used to create
digital devices or used inside a digital device.
b. What is a certified recycler of digital technology hardware.
c. Research an organization that collects discarded digital
technology hardware for repurposing or recycling.
d. Visit a recycling center that disposes of digital technology
hardware.
e. Find a battery recycling center near you and find out what it
does to recycle batteries.
63
Proper Disposal
64
Electronic devices are a complex mixture of several hundred materials. A mobile
phone, for example, contains 500 to 1,000 components. Many of these contain toxic
heavy metals such as lead, mercury, cadmium and beryllium, as well as hazardous
chemicals, such as brominated flame retardants. Polluting PVC plastic is also
frequently used.
Health Hazards
65
• Some brominated flame retardants, used in circuit boards and plastic casings, do not break
down easily. Long-term exposure can lead to impaired learning and memory functions. They
can also interfere with thyroid and estrogen hormone systems.
• The cathode ray tubes (CRT) in monitors contain lead. Exposure to lead can cause
intellectual impairment and damage the nervous, blood and reproductive systems.
• Cadmium, used in rechargeable computer batteries, contacts and switches and in older
CRTs, is highly toxic, primarily affecting the kidneys and bones.
• Mercury, used in lighting devices for flat-screen displays, can damage the brain and central
nervous system, particularly during early development.
• Compounds of hexavalent chromium, used in the production of metal housings, are highly
toxic and carcinogenic to people.
• Polyvinyl chloride (PVC) is a chlorinated plastic used in some electronics products and for
insulation on wires and cables. Chlorinated dioxins and furans are released when PVC is
burned. These chemicals are highly persistent in the environment and many are toxic even in
very low concentrations.
Recyclers
66
Two Recognized by EPA
• Responsible Recycling Practices (R2)
sustainableelectronics.org
• e-Stewards®
e-stewards.org
Recyclers
67
Battery Recyclers
68
Staples
Lowes
Home Depot
Radio Shack
AutoZone
Best Buy
Batteries +
Eagle Project?
69
Digital Technology
9. Do ONE of the following:
a. Investigate three career opportunities that involve digital
technology. Pick one and find out the education, training, and
experience required for this profession. Discuss this with your
counselor, and explain why this profession might interest you.
b. Visit a business or an industrial facility that uses digital
technology. Describe four ways digital technology is being used
there. Share what you learned with your counselor.
70
Digital Technology
For February:
1. Finish reading the merit badge pamphlet
2. Complete the worksheet
3. Bring your completed Blue Card
4. Do the 3 Projects (Requirement 6)
5. Requirement 8 (Recycling)
6. Requirement 9 (Careers)
71

Más contenido relacionado

La actualidad más candente

HISTORY OF THE INTERNET
HISTORY OF THE INTERNETHISTORY OF THE INTERNET
HISTORY OF THE INTERNETRajan Pal
 
Short Timeline History of Internet
Short Timeline History of InternetShort Timeline History of Internet
Short Timeline History of InternetVeaCarino
 
Timeline to internet
Timeline to internetTimeline to internet
Timeline to internetRomanbelic911
 
LIVING IN THE IT ERA LESSON 2.pptx
LIVING IN THE IT ERA LESSON 2.pptxLIVING IN THE IT ERA LESSON 2.pptx
LIVING IN THE IT ERA LESSON 2.pptxRussel Carilla
 
Copyright disclaimer
Copyright disclaimerCopyright disclaimer
Copyright disclaimerVakilsearch
 
The Internet and World Wide Web
The Internet and World Wide Web The Internet and World Wide Web
The Internet and World Wide Web ASAD AHMED
 
History of the personal computer
History of the personal computerHistory of the personal computer
History of the personal computerDenys Haryachyy
 
Games Criminals Play Lesson Plan
Games Criminals Play Lesson PlanGames Criminals Play Lesson Plan
Games Criminals Play Lesson PlanJASON SAUNDERS
 
Information and Communications Technology
Information and Communications TechnologyInformation and Communications Technology
Information and Communications Technologydncngl
 
Exceptions to Copyright
Exceptions to CopyrightExceptions to Copyright
Exceptions to CopyrightCILIP
 
Exploitation of digital media rights
Exploitation of digital media rightsExploitation of digital media rights
Exploitation of digital media rightsRob Blamires
 
Living in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptxLiving in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptxFroilan Cantillo
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 

La actualidad más candente (20)

Patent law
Patent law Patent law
Patent law
 
HISTORY OF THE INTERNET
HISTORY OF THE INTERNETHISTORY OF THE INTERNET
HISTORY OF THE INTERNET
 
Short Timeline History of Internet
Short Timeline History of InternetShort Timeline History of Internet
Short Timeline History of Internet
 
Timeline to internet
Timeline to internetTimeline to internet
Timeline to internet
 
LIVING IN THE IT ERA LESSON 2.pptx
LIVING IN THE IT ERA LESSON 2.pptxLIVING IN THE IT ERA LESSON 2.pptx
LIVING IN THE IT ERA LESSON 2.pptx
 
DC16_Ch05.pptx
DC16_Ch05.pptxDC16_Ch05.pptx
DC16_Ch05.pptx
 
Copyright disclaimer
Copyright disclaimerCopyright disclaimer
Copyright disclaimer
 
History of the internet
History of the internetHistory of the internet
History of the internet
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
The Internet and World Wide Web
The Internet and World Wide Web The Internet and World Wide Web
The Internet and World Wide Web
 
History of the personal computer
History of the personal computerHistory of the personal computer
History of the personal computer
 
Games Criminals Play Lesson Plan
Games Criminals Play Lesson PlanGames Criminals Play Lesson Plan
Games Criminals Play Lesson Plan
 
Information and Communications Technology
Information and Communications TechnologyInformation and Communications Technology
Information and Communications Technology
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Exceptions to Copyright
Exceptions to CopyrightExceptions to Copyright
Exceptions to Copyright
 
Exploitation of digital media rights
Exploitation of digital media rightsExploitation of digital media rights
Exploitation of digital media rights
 
Chapter 2_dp-pertemuan 2&3
 Chapter 2_dp-pertemuan 2&3 Chapter 2_dp-pertemuan 2&3
Chapter 2_dp-pertemuan 2&3
 
What is the internet
What is  the internetWhat is  the internet
What is the internet
 
Living in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptxLiving in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptx
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 

Similar a 2017 Digital Technology Merit Badge - Boy Scouts of America

Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Fizaril Amzari Omar
 
IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...Tom Webster
 
A seminar report on Raspberry Pi
A seminar report on Raspberry PiA seminar report on Raspberry Pi
A seminar report on Raspberry Pinipunmaster
 
Classterms
ClasstermsClassterms
Classtermslindy23
 
What is Computer | Computer Full Form | Computer Definition
What is Computer | Computer Full Form | Computer DefinitionWhat is Computer | Computer Full Form | Computer Definition
What is Computer | Computer Full Form | Computer Definitiondmir3304
 
Computer Generation.pptx
Computer Generation.pptxComputer Generation.pptx
Computer Generation.pptxKoushikDutta66
 
Computer generation
Computer generationComputer generation
Computer generationsabillafh
 
ICT_PracticeWorks[1].pdf
ICT_PracticeWorks[1].pdfICT_PracticeWorks[1].pdf
ICT_PracticeWorks[1].pdfssuserade1a1
 
ACM, Real world everyday applications of computer science. History of Comp...
ACM,    Real world everyday applications of computer science. History of Comp...ACM,    Real world everyday applications of computer science. History of Comp...
ACM, Real world everyday applications of computer science. History of Comp...Faizan Tanoli
 
Classterms
ClasstermsClassterms
Classtermslindy23
 
Introduction and history of computers.
Introduction and history of computers.Introduction and history of computers.
Introduction and history of computers.Shahariar Rabby
 
Raspberry pi on seminar documentation
Raspberry pi on seminar documentationRaspberry pi on seminar documentation
Raspberry pi on seminar documentationGeorgekutty Francis
 
ECESLU Microprocessors lecture
ECESLU Microprocessors lecture ECESLU Microprocessors lecture
ECESLU Microprocessors lecture Jeffrey Des Binwag
 
World of IoT (Internet of Things).
World of IoT (Internet of Things).World of IoT (Internet of Things).
World of IoT (Internet of Things).BHAVIN GOSWAMI
 
The Future of the Internet
The Future of the Internet The Future of the Internet
The Future of the Internet PayamBarnaghi
 

Similar a 2017 Digital Technology Merit Badge - Boy Scouts of America (20)

Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...IT Innovation: Intellectual property issues in artifical intelligence and vir...
IT Innovation: Intellectual property issues in artifical intelligence and vir...
 
A seminar report on Raspberry Pi
A seminar report on Raspberry PiA seminar report on Raspberry Pi
A seminar report on Raspberry Pi
 
Raspberry-pi-report
Raspberry-pi-reportRaspberry-pi-report
Raspberry-pi-report
 
Ece raspberry-pi-report
Ece raspberry-pi-reportEce raspberry-pi-report
Ece raspberry-pi-report
 
Classterms
ClasstermsClassterms
Classterms
 
What is Computer | Computer Full Form | Computer Definition
What is Computer | Computer Full Form | Computer DefinitionWhat is Computer | Computer Full Form | Computer Definition
What is Computer | Computer Full Form | Computer Definition
 
ICT Module-2.ppt
ICT Module-2.pptICT Module-2.ppt
ICT Module-2.ppt
 
Computer Generation.pptx
Computer Generation.pptxComputer Generation.pptx
Computer Generation.pptx
 
Computer generation
Computer generationComputer generation
Computer generation
 
ICT_PracticeWorks[1].pdf
ICT_PracticeWorks[1].pdfICT_PracticeWorks[1].pdf
ICT_PracticeWorks[1].pdf
 
ACM, Real world everyday applications of computer science. History of Comp...
ACM,    Real world everyday applications of computer science. History of Comp...ACM,    Real world everyday applications of computer science. History of Comp...
ACM, Real world everyday applications of computer science. History of Comp...
 
Classterms
ClasstermsClassterms
Classterms
 
Introduction and history of computers.
Introduction and history of computers.Introduction and history of computers.
Introduction and history of computers.
 
Raspberry pi on seminar documentation
Raspberry pi on seminar documentationRaspberry pi on seminar documentation
Raspberry pi on seminar documentation
 
ECESLU Microprocessors lecture
ECESLU Microprocessors lecture ECESLU Microprocessors lecture
ECESLU Microprocessors lecture
 
World of IoT (Internet of Things).
World of IoT (Internet of Things).World of IoT (Internet of Things).
World of IoT (Internet of Things).
 
The Future of the Internet
The Future of the Internet The Future of the Internet
The Future of the Internet
 
Raspberry pi technology
Raspberry pi technologyRaspberry pi technology
Raspberry pi technology
 

Más de Kenny Eliason

ReadUp - The Mom Test
ReadUp - The Mom TestReadUp - The Mom Test
ReadUp - The Mom TestKenny Eliason
 
Protecting Kids in the Digital Age 2022
Protecting Kids in the Digital Age 2022Protecting Kids in the Digital Age 2022
Protecting Kids in the Digital Age 2022Kenny Eliason
 
Standards Night 2022 - Entertainment and Media
Standards Night 2022 - Entertainment and MediaStandards Night 2022 - Entertainment and Media
Standards Night 2022 - Entertainment and MediaKenny Eliason
 
BGES 202 - The END 2021-05-07
BGES 202 - The END 2021-05-07BGES 202 - The END 2021-05-07
BGES 202 - The END 2021-05-07Kenny Eliason
 
BGES 202 - The Collaborator 2021-03-05
BGES 202 - The Collaborator 2021-03-05BGES 202 - The Collaborator 2021-03-05
BGES 202 - The Collaborator 2021-03-05Kenny Eliason
 
BGES 202 - The Set Designer, The Storyteller, Innovation Tournament 2021-04-09
BGES 202 - The Set Designer, The Storyteller, Innovation Tournament 2021-04-09BGES 202 - The Set Designer, The Storyteller, Innovation Tournament 2021-04-09
BGES 202 - The Set Designer, The Storyteller, Innovation Tournament 2021-04-09Kenny Eliason
 
BGES 202 - Innovation Tournament Rubric, The Director, The Experience Archite...
BGES 202 - Innovation Tournament Rubric, The Director, The Experience Archite...BGES 202 - Innovation Tournament Rubric, The Director, The Experience Archite...
BGES 202 - Innovation Tournament Rubric, The Director, The Experience Archite...Kenny Eliason
 
BGES 202 - Team Project Presentations & Innovation Tournament 2021-03-26
BGES 202 - Team Project Presentations & Innovation Tournament 2021-03-26BGES 202 - Team Project Presentations & Innovation Tournament 2021-03-26
BGES 202 - Team Project Presentations & Innovation Tournament 2021-03-26Kenny Eliason
 
BGES 202 - Spring 2021 Introduction 2021-01-29
BGES 202 - Spring 2021 Introduction 2021-01-29BGES 202 - Spring 2021 Introduction 2021-01-29
BGES 202 - Spring 2021 Introduction 2021-01-29Kenny Eliason
 
BGES 202 - Working in Groups, The Personas, The Anthropologist 2021-02-05
BGES 202 - Working in Groups, The Personas, The Anthropologist 2021-02-05BGES 202 - Working in Groups, The Personas, The Anthropologist 2021-02-05
BGES 202 - Working in Groups, The Personas, The Anthropologist 2021-02-05Kenny Eliason
 
BGES 202 - The Experimenter, The Cross-pollinator 2021-02-19
BGES 202 - The Experimenter, The Cross-pollinator 2021-02-19BGES 202 - The Experimenter, The Cross-pollinator 2021-02-19
BGES 202 - The Experimenter, The Cross-pollinator 2021-02-19Kenny Eliason
 
THE END - BGES 20200508
THE END - BGES 20200508THE END - BGES 20200508
THE END - BGES 20200508Kenny Eliason
 
UNLV BGES 202 2020-04-10
UNLV BGES 202 2020-04-10UNLV BGES 202 2020-04-10
UNLV BGES 202 2020-04-10Kenny Eliason
 
UNLV BGES 202 2020-04-03
UNLV BGES 202 2020-04-03UNLV BGES 202 2020-04-03
UNLV BGES 202 2020-04-03Kenny Eliason
 
UNLV BGES 202 2020-03-06
UNLV BGES 202 2020-03-06UNLV BGES 202 2020-03-06
UNLV BGES 202 2020-03-06Kenny Eliason
 
UNLV BGES 202 2020-02-28
UNLV BGES 202 2020-02-28UNLV BGES 202 2020-02-28
UNLV BGES 202 2020-02-28Kenny Eliason
 
UNLV BGES 202 2020-02-21
UNLV BGES 202 2020-02-21UNLV BGES 202 2020-02-21
UNLV BGES 202 2020-02-21Kenny Eliason
 
UNLV BGES 202 2020-02-07
UNLV BGES 202 2020-02-07UNLV BGES 202 2020-02-07
UNLV BGES 202 2020-02-07Kenny Eliason
 

Más de Kenny Eliason (20)

ReadUp - The Mom Test
ReadUp - The Mom TestReadUp - The Mom Test
ReadUp - The Mom Test
 
ReadUp - Traction
ReadUp - TractionReadUp - Traction
ReadUp - Traction
 
Protecting Kids in the Digital Age 2022
Protecting Kids in the Digital Age 2022Protecting Kids in the Digital Age 2022
Protecting Kids in the Digital Age 2022
 
ReadUp - Hooked
ReadUp - HookedReadUp - Hooked
ReadUp - Hooked
 
Standards Night 2022 - Entertainment and Media
Standards Night 2022 - Entertainment and MediaStandards Night 2022 - Entertainment and Media
Standards Night 2022 - Entertainment and Media
 
BGES 202 - The END 2021-05-07
BGES 202 - The END 2021-05-07BGES 202 - The END 2021-05-07
BGES 202 - The END 2021-05-07
 
BGES 202 - The Collaborator 2021-03-05
BGES 202 - The Collaborator 2021-03-05BGES 202 - The Collaborator 2021-03-05
BGES 202 - The Collaborator 2021-03-05
 
BGES 202 - The Set Designer, The Storyteller, Innovation Tournament 2021-04-09
BGES 202 - The Set Designer, The Storyteller, Innovation Tournament 2021-04-09BGES 202 - The Set Designer, The Storyteller, Innovation Tournament 2021-04-09
BGES 202 - The Set Designer, The Storyteller, Innovation Tournament 2021-04-09
 
BGES 202 - Innovation Tournament Rubric, The Director, The Experience Archite...
BGES 202 - Innovation Tournament Rubric, The Director, The Experience Archite...BGES 202 - Innovation Tournament Rubric, The Director, The Experience Archite...
BGES 202 - Innovation Tournament Rubric, The Director, The Experience Archite...
 
BGES 202 - Team Project Presentations & Innovation Tournament 2021-03-26
BGES 202 - Team Project Presentations & Innovation Tournament 2021-03-26BGES 202 - Team Project Presentations & Innovation Tournament 2021-03-26
BGES 202 - Team Project Presentations & Innovation Tournament 2021-03-26
 
BGES 202 - Spring 2021 Introduction 2021-01-29
BGES 202 - Spring 2021 Introduction 2021-01-29BGES 202 - Spring 2021 Introduction 2021-01-29
BGES 202 - Spring 2021 Introduction 2021-01-29
 
BGES 202 - Working in Groups, The Personas, The Anthropologist 2021-02-05
BGES 202 - Working in Groups, The Personas, The Anthropologist 2021-02-05BGES 202 - Working in Groups, The Personas, The Anthropologist 2021-02-05
BGES 202 - Working in Groups, The Personas, The Anthropologist 2021-02-05
 
BGES 202 - The Experimenter, The Cross-pollinator 2021-02-19
BGES 202 - The Experimenter, The Cross-pollinator 2021-02-19BGES 202 - The Experimenter, The Cross-pollinator 2021-02-19
BGES 202 - The Experimenter, The Cross-pollinator 2021-02-19
 
THE END - BGES 20200508
THE END - BGES 20200508THE END - BGES 20200508
THE END - BGES 20200508
 
UNLV BGES 202 2020-04-10
UNLV BGES 202 2020-04-10UNLV BGES 202 2020-04-10
UNLV BGES 202 2020-04-10
 
UNLV BGES 202 2020-04-03
UNLV BGES 202 2020-04-03UNLV BGES 202 2020-04-03
UNLV BGES 202 2020-04-03
 
UNLV BGES 202 2020-03-06
UNLV BGES 202 2020-03-06UNLV BGES 202 2020-03-06
UNLV BGES 202 2020-03-06
 
UNLV BGES 202 2020-02-28
UNLV BGES 202 2020-02-28UNLV BGES 202 2020-02-28
UNLV BGES 202 2020-02-28
 
UNLV BGES 202 2020-02-21
UNLV BGES 202 2020-02-21UNLV BGES 202 2020-02-21
UNLV BGES 202 2020-02-21
 
UNLV BGES 202 2020-02-07
UNLV BGES 202 2020-02-07UNLV BGES 202 2020-02-07
UNLV BGES 202 2020-02-07
 

Último

CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Onlineanilsa9823
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 

Último (20)

CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 

2017 Digital Technology Merit Badge - Boy Scouts of America

  • 2. Digital Technology Merit Badge College • Do you have completed Blue Cards? • Are you in the right class? • Do you have Workbooks? 2
  • 3. Before We Start… Read the Merit Badge Pamphlet Print out the Worksheet 1. Show your current, up-to-date Cyber Chip. 3
  • 5. History of Computers 2. Do the following: a. Give a brief history of the changes in digital technology over time. Discuss with your counselor how digital technology in your lifetime compares with that of your parent’s, grandparent’s, or other adult’s lifetime. b. Describe the kinds of computers or devices you imagine might be available when you are an adult. 5
  • 6. History of Computers 6 1632 – Slide Rule 1100 BC – Abacus 1642 Pascaline 1617 – Logarithms
  • 7. History of Computers 7 1804 Automatic Loom 1840s Boolean Logic 1830s – Babbage Engine
  • 8. History of Computers 8 Edison’s Vacuum Tube In 1883, a few years after Thomas Edison invented the electric light bulb, he noticed something peculiar about how electricity flowed inside it. To protect the brightly glowing filament, air had been removed from the bulb, creatinga vacuum tube. Surprisingly, if he placed a metal plate inside the bulb, electricity would flow across the vacuum from the filament to the plate. Edison patented the discovery of how electrons flowed across a vacuum, now known as the Edison Effect, though he made little use of it.
  • 9. 1890 – Hollerith Machine 9 • Used electrical connections to trigger a counter, recording information • Data could be encoded by the locations of holes in a card • Hollerith determined that data punched on a card, could be counted or sorted mechanically
  • 10. 1944 – Colossus Mark I 10 • 1st programmable digital computer • 5 tons, 500 miles of wire, 8 feet tall & 51 feet long • Ran non-stop for 15 years
  • 11. 1945 – ENIAC 11 • Electronic Numerical Integrator And Computer • 20 by 40 foot room • Weighed 30 tons • Used more than 18,000 vacuum tubes
  • 12. 1959 – IBM Stretch 12 • The IBM 7030, or Stretch, was IBM's first transistorized supercomputer • Failed to meet aggressive performance estimates so price dropped from $13.5 million to only $7.78 million • It was the fastest computer in the world until 1964
  • 13. 1970s – IBM Mainframes 13 • Standard dual-processor capability • “Monolithic main memory" based on integrated circuits • Full virtual memory through a new microcode floppy disk • 128-bit (hexadecimal) floating point arithmetic
  • 14. 1975 – Altair 8800 14 • Name comes from Star Trek! • Mail order kit, assemble it yourself • No video output, LEDs instead • No keyboard, switches on the front
  • 17. Computer Speak 17 “A” → 65 (ASCII) → 01000001 (Binary) →
  • 18. Storage 18 Google only holds somewhere around 10-15 exabytes of data
  • 22. Speed 22 How high can you count in 10 seconds?
  • 23. Speed 23 An average computer chip can count (by ones) to over 20 billion (20,000,000,000) in this same time. It is this mind-boggling speed of computer chips that has been harnessed in digital devices to do the incredible things they do.
  • 28. Digital Technology 3. Do the following: a. Explain to your counselor how text, sound, pictures, and videos are digitized for storage. b. Describe the difference between lossy and lossless data compression, and give an example where each might be used. c. Describe two digital devices and how they are made more useful by their programming. d. Discuss the similarities and differences between computers, mobile devices, and gaming consoles. e. Explain what a computer network is and describe the network’s purpose. 28
  • 29. File Formats Text (ASCII) txt, doc, docx, pdf Sound (waves) mp3, wma, aiff, au, raw, wav Pictures (pixels) jpg, gif, png, tiff, eps Videos (key frames + changes) avi, mpeg, flv, mov 29
  • 30. Lossy vs. Lossless Compression Lossless allows the original to be recreated Lossy eliminates some data, can’t get it back 30
  • 31. Lossy vs. Lossless Compression 31
  • 32. More Useful With Technology? 32
  • 33. Computers, Mobile Devices & Gaming Consoles Similarities • Digital processing • Programs • Connectivity • Displays 33 Differences • Input – keyboard, screen, controller • Functionality • Versatility • Single Purpose • Proprietary software • Portability
  • 35. Digital Technology 4. Do the following: a. Explain what a program or software application or “app” is and how it is created. b. Name four software programs or mobile apps you or your family use, and explain how each one helps you. c. Describe what malware is, and explain how to protect your digital devices and the information stored on them. 35
  • 36. Programs or “Apps” Series of commands or set of instructions for a processor to complete a task – Word Processing – Games – Utilities (calendar, calculator) – Photo/Video Editor Coded or scripted with a special language 36
  • 44. Malware • Malicious code in the form of viruses, worms, Trojan horses, spyware, adware, scareware, or ransomware • Any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems • Defined by its malicious intent, acting for the interests of the malware owner, rather than the user 44
  • 46. Digital Technology 5. Do the following: a. Describe how digital devices are connected to the Internet. b. Using an Internet search engine (with your parent's permission), find ideas about how to conduct a troop court of honor or campfire program. Print out a copy of the ideas from at least three different websites. Share what you found with your counselor, and explain how you used the search engine to find this information. c. Use a Web browser to connect to an HTTPS (secure) website (with your parent's permission). Explain to your counselor how to tell whether the site's security certificate can be trusted, and what it means to use this kind of connection. 46
  • 47. Connect to the Internet 47
  • 48. Connect to the Internet 48
  • 49. Connect to the Internet 49 The Incredible Optical Fiber Optic and photonic devices help make today’s Internet work. Lasers, fiber optics, photonic switches, and photonic displays allow digital devices anywhere in the world to connect to each other, exchange information, and visually display that information. All information, like movies, phone calls, and emails, are converted into binary data, or ones and zeros, similar to the dots and dashes of Morse code on a telegraph line.
  • 53. Digital Technology 6. Do THREE of the following. Provide me with a copy. a. Food budget OR roster spreadsheet for campout. b. Letter to troop’s parents, inviting them to a troop event. c. Campsite plan for your troop OR create a flier for an upcoming troop event, incorporating text and photographs. d. Five slide presentation, with photographs. e. Photos of a troop activity. f. Record your voice and transfer the file to a different device. g. Blog 5 of your scouting activities. h. Create a web page for your troop, patrol, school, or church. 53
  • 54. Digital Technology 7. Do the following: a. Explain to your counselor each of these protections and why they exist: copyright, patents, trademarks, trade secrets. b. Explain when it is permissible to accept a free copy of a program from a friend. c. Discuss with your counselor an article or a news report about a recent legal case involving an intellectual property dispute. 54
  • 55. Copyrights Legal right created by the law of a country, that grants the creator of an original work exclusive rights to its use and distribution, usually for a limited time, with the intention of enabling the creator to receive compensation for their intellectual effort. 55
  • 56. Trademarks A recognizable sign, design or expression which identifies products or services of a particular source from those of others. The trademark owner can be an individual, business organization, or any legal entity. A trademark may be located on a package, a label, a voucher or on the product itself. 56
  • 57. Patents A set of exclusive rights granted by a sovereign state to an inventor or assignee for a limited period of time in exchange for detailed public disclosure of an invention. An invention is a solution to a specific technological problem and is a product or a process. 57
  • 58. Trade Secrets An invented formula, practice, process, design, instrument, pattern, commercial method, or compilation of information which is not generally known or reasonably ascertainable by others, and by which a business can obtain an economic advantage over competitors or customers. 58
  • 60. Give Software to Friend 60
  • 61. Give Software to Friend 61
  • 62. Give Software to Friend 62
  • 63. Digital Technology 8. Do TWO of the following: a. Why proper disposal of digital technology is important. List at least three dangerous chemicals that could be used to create digital devices or used inside a digital device. b. What is a certified recycler of digital technology hardware. c. Research an organization that collects discarded digital technology hardware for repurposing or recycling. d. Visit a recycling center that disposes of digital technology hardware. e. Find a battery recycling center near you and find out what it does to recycle batteries. 63
  • 64. Proper Disposal 64 Electronic devices are a complex mixture of several hundred materials. A mobile phone, for example, contains 500 to 1,000 components. Many of these contain toxic heavy metals such as lead, mercury, cadmium and beryllium, as well as hazardous chemicals, such as brominated flame retardants. Polluting PVC plastic is also frequently used.
  • 65. Health Hazards 65 • Some brominated flame retardants, used in circuit boards and plastic casings, do not break down easily. Long-term exposure can lead to impaired learning and memory functions. They can also interfere with thyroid and estrogen hormone systems. • The cathode ray tubes (CRT) in monitors contain lead. Exposure to lead can cause intellectual impairment and damage the nervous, blood and reproductive systems. • Cadmium, used in rechargeable computer batteries, contacts and switches and in older CRTs, is highly toxic, primarily affecting the kidneys and bones. • Mercury, used in lighting devices for flat-screen displays, can damage the brain and central nervous system, particularly during early development. • Compounds of hexavalent chromium, used in the production of metal housings, are highly toxic and carcinogenic to people. • Polyvinyl chloride (PVC) is a chlorinated plastic used in some electronics products and for insulation on wires and cables. Chlorinated dioxins and furans are released when PVC is burned. These chemicals are highly persistent in the environment and many are toxic even in very low concentrations.
  • 66. Recyclers 66 Two Recognized by EPA • Responsible Recycling Practices (R2) sustainableelectronics.org • e-Stewards® e-stewards.org
  • 68. Battery Recyclers 68 Staples Lowes Home Depot Radio Shack AutoZone Best Buy Batteries +
  • 70. Digital Technology 9. Do ONE of the following: a. Investigate three career opportunities that involve digital technology. Pick one and find out the education, training, and experience required for this profession. Discuss this with your counselor, and explain why this profession might interest you. b. Visit a business or an industrial facility that uses digital technology. Describe four ways digital technology is being used there. Share what you learned with your counselor. 70
  • 71. Digital Technology For February: 1. Finish reading the merit badge pamphlet 2. Complete the worksheet 3. Bring your completed Blue Card 4. Do the 3 Projects (Requirement 6) 5. Requirement 8 (Recycling) 6. Requirement 9 (Careers) 71

Notas del editor

  1. Pop quiz:
  2. Blue Card should be filled out, legible and signed by your scoutmaster. Blue Card is your admission ticket…should be filled out, including my information. You should have a workbook printed out and filled out to the best of your ability.
  3. Who read the pamphlet? The Workbook is NOT required, but highly recommended. When I checkoff requirements, I will need to look at what you have written. Cyber Chip – Requirement #1 Should already be done! If it has not, make sure it is before February.
  4. Different Level depending on your grade. Must be recharged every year. BSA is embracing technology. Teaches internet safety. We won’t be covering it…you should have already earned it.
  5. Emphasis is on Brief. Requirement says “Discuss” not “listen” so you need to engage. If you do not participate, you will not complete this requirement, or others that require similar actions. Much more fun to look to future advances….
  6. Abacus, or counting frame, is a calculating tool that was in use centuries before the adoption of the written modern numeral system and is still widely used by merchants, traders and clerks in Asia and Africa. Logarithms were introduced by John Napier in the early 17th century as a means to simplify calculations. They were rapidly adopted by navigators, scientists, engineers, and others to perform computations more easily, using slide rules and logarithm tables. Tedious multi-digit multiplication steps can be replaced by table look-ups and simpler addition because of the fact—important in its own right—that the logarithm of a product is the sum of the logarithms of the factors: log_b(xy) = log_b (x) + log_b (y), provided that b, x and y are all positive and b ≠ 1. Slide Rule: a mechanical analog computer. The slide rule is used primarily for multiplication and division, and also for functions such as roots, logarithms and trigonometry, but is not normally used for addition or subtraction. Pascaline, invented by Pascal, was primarily intended as an adding machine (The First Calculator) which could add and subtract two numbers directly, but its description could, with a bit of a stretch, be extended to a "mechanical calculator, in that at least in principle it was possible, admittedly rather laboriously, to multiply and divide by repetition.
  7. The Jacquard loom is a mechanical loom, invented by Joseph Jacquard, that simplifies the process of manufacturing textiles with complex patterns. The loom was controlled by a "chain of cards", a number of punched cards, laced together into a continuous sequence. Charles Babbage designed the first automatic computing engines. He invented computers but failed to build them. The first complete Babbage Engine was completed in London in 2002, 153 years after it was designed. Difference Engine No. 2, built faithfully to the original drawings, consists of 8,000 parts, weighs five tons, and measures 11 feet long. George Boole developed logic that allows thoughts to be expressed in mathlike terms. AND, OR, NOT. Still used today in code.
  8. Census every 10 years…by 1880 over 49 million people…took 7 years to complete. Herman Hollerith developed a punch card machine; every person had a card with various data on it.
  9. general purpose electro-mechanical computer that was used in the war effort during the last part of World War II to break the German Enigma Code Machine.
  10. First electronic general-purpose computer. It was digital and capable of being reprogrammed to solve "a large class of numerical problems“ Rumors/ legend is that the Philly lights would dim when it was powered on. 5 million hand soldered joints. Used for hydrogen bomb research.
  11. Transistors, much smaller than vacuum tubes and 1,000 times faster.
  12. Next breakthrough…Integrated Circuits! AKA microchip. Which led to CPUs, all the integrated circuits onto one chip…made the personal computer possible.
  13. This computer was one of the first "home" computers ever made, it was sold as a kit, but for additional money, you could buy one fully assembled. It had no keyboard, the "program" had to be entered with the switches located on the front panel of the "computer", and as it didn't have video output (yet), the result was displayed via LEDs. Bill Gates, Paul Allen, and Monte Davidoff created BASIC for the Altair, and formed…Microsoft Steve Jobs and Steve Wozniak formed Apple, and in 1977 released the Apple II, the first color computer.
  14. Bill Gates, Paul Allen, and Monte Davidoff created BASIC for the Altair, and formed…Microsoft. Steve Jobs and Steve Wozniak formed Apple, and in 1977 released the Apple II, the first color computer. Original IBM Microsoft computer was $3,000, over $7,500 in today’s dollars. First Apple II was around $1,300. In 1980 you have the IBM Personal Computer being released which combined with their licensing model that allows "clones" kick starts computers on user desks "decentralizing" IT outside of the datacenter. It also leads to computers at home. Grandparents: Mechanical cash registers / mechanical adding machines. Then digital calculators limited functions (+/-*%). Data delivered to them via "greenbar reports" printed on impact or maybe dot matrix printers. Later some interaction with dumb terminals. IT was centralized in the computer room, only used at work. Parents: Personal computers on desks at work. Personal computers at home were mostly used stand-alone. You carried data to-from work via 1.44MB floppy diskettes. If you wanted to go "on-line" you used dial-up modems to services like AOL or CompuServe. Later we get connected to the internet...
  15. "Moore's law" is the observation that, over the history of computing hardware, the number of transistors in a dense integrated circuit doubles approximately every two years.
  16. Zeros and Ones
  17. Memory - sometimes confused between RAM vs Storage SSD have replaced HDD Numbers you can’t even comprehend.
  18. 35 years…64x more data, almost weightless, relatively cheap.
  19. The amount of computing power in things like ENIAC compared with a new computer, even something like a super cheap calculator. You're talking about numbers that are millions and trillions of times different, which we can't comprehend. As an example, IPv4 vs IPv6, there aren't even enough IP4 addresses to give out one to each Chinese person, let alone the rest of the world. But there are enough IP6 addresses to give a few million to each grain of sand on the entire planet.
  20. The amount of computing power in things like ENIAC compared with a new computer, even something like a super cheap calculator. You're talking about numbers that are millions and trillions of times different, which we can't comprehend. As an example, IPv4 vs IPv6, there aren't even enough IP4 addresses to give out one to each Chinese person, let alone the rest of the world. But there are enough IP6 addresses to give a few million to each grain of sand on the entire planet.
  21. Get up, and walk for 10 seconds…How many steps did you take? How many steps to walk around Earth? Well lets do math here. The circumference of earth is 24,901.55 miles. In feet that is 131,480,184'. If a regular person takes a step of approx 2 feet, then it would take a person 65,740,092 steps. That means you could walk around the Earth over 304 times in 10 seconds!  How fast for could a computer hike the Appalachian Trail. It’s 2,168.1 miles long, which means 11,447,568 feet. 5,723,784 steps, means a computer could hike the AT 3,494 times in 10 seconds…still not really comprehendible…how about in one second. A computer could hike the AT about 350 times in one second. It takes us 5-7 months to do it once! We could do it 350 times in somewhere around 175 years! It takes about the same amount of computing to answer one Google Search query as all the computing done -- in flight and on the ground -- for the entire Apollo program, all 11 years, 17 mission program!
  22. Get up, and walk for 10 seconds…How many steps did you take? How many steps to walk around Earth? Well lets do math here. The circumference of earth is 24,901.55 miles. In feet that is 131,480,184'. If a regular person takes a step of approx 2 feet, then it would take a person 65,740,092 steps. That means you could walk around the Earth over 304 times in 10 seconds!  How fast for could a computer hike the Appalachian Trail. It’s 2,168.1 miles long, which means 11,447,568 feet. 5,723,784 steps, means a computer could hike the AT 3,494 times in 10 seconds…still not really comprehendible…how about in one second. A computer could hike the AT about 350 times in one second. It takes us 5-7 months to do it once! We could do it 350 times in somewhere around 175 years! It takes about the same amount of computing to answer one Google Search query as all the computing done -- in flight and on the ground -- for the entire Apollo program, all 11 years, 17 mission program!
  23. What will the future be like? Chromebooks, Cloud computing…already here.
  24. Can you imagine this? Kids born within the past 5-6 years will unlikely ever have to drive a car.
  25. Smart Homes, Smart Watches, Smart Scales… Smart EVERYTHING
  26. You either need to participate or write down your answers. You must actively engage to complete this merit badge.
  27. Text is entered by humans or could be scanned using Optical Character Recognition. doc, docx, and PDF are not really text files. They're in a binary format. Sound is sampled. A simple analog sine wave is sampled into digital form. Pictures are divided into cells and each one represents a lightness and color value. Videos are not necessarily a series of pictures; almost none are. They are a set of key frames (pictures) followed by a serious of change data to that picture. New pictures are provided when A) a significant change in the picture occurs (scene change) or B) periodically to ensure the change data hasn't drifted. You see this when a video is horribly out of sync in certain blocks of the data; the change data and the key frames have gotten out of sync.
  28. The "restored" block for Lossy should be the same size as the original but speckled with 'holes'. A 3 minute song run through an MP3 encoder is still 3 minutes long but the fidelity of the sound is reduced to make it smaller. The higher the sampling rate the better the quality but the larger the file.
  29. Left is the original; Right is a lossy compressed version of same sound file.
  30. other similarities? other differences?
  31. Networking allows devices to communicate with each other or the outside network. Sharing data, sharing devices, monitoring (e.g. baby monitor), the router's NAT & firewall services protect the home devices from the outside net. Besides the ethernet, you can also have a bluetooth personal area network (PAN).
  32. An application can start out with a white-board or story board set of ideas or sketches. Details are added to the design until the "story" of what the software should do is complete. Then the diagrams or sketches would go to a software developer who writes the instructions for the application using "source code". Source code are instructions for the computer that are in a human-readable format. The source code is sent through a "compiler" which verifies that the source code followed the correct syntax (coding rules) and translates the source code into "object code" which the computer can use to execute the instructions.
  33. Word, part of the Microsoft Office suite, professional version $400! LibreOffice Writer, open source, FREE! Google Docs, also FREE, and cloud-based. You will use that for Requirement 6.
  34. I grew up with Pong, Asteroids and Pac-Man. Today, the gaming industry is a multi-billion dollar industry. You certainly know much more about Games than I will ever know. What do you play? Why?
  35. What utilities do you use?
  36. Here’s one of my favorites…because of Photoshop and other photo editors, we can no longer trust any photograph! Ever. Unless you took it, you can’t trust it.
  37. Here’s one of my favorites…because of Photoshop and other photo editors, we can no longer trust any photograph! Ever. Unless you took it, you can’t trust it.
  38. YouTube editor, Power Director, Final Cut.
  39. iMovie for OSX
  40. Often included in “free” software.
  41. First line of defense is using your own brain. Don't click on stuff. If you get a note from a friend, does it look like something he would send? Backup your data! Don't use IE. Use Firefox and turn off Java Script with "No Scripts" plug-in. Much more diligent in checking SSL certs than Chrome.
  42. We’ll cover A. B & C need to be done at home.
  43. Not sure how much detail they want here but you could include things like the router doing DHCP Client and Server functions, Network Address Transversal, and packet routing. Public vs. local IP addresses. WAN vs LAN. Another key concept is DNS name resolution.
  44. https://dev.ssllabs.com/ssltest/ Great site for checking a security certificate. Run google.com through it and let me know what score Google gets? Think it is an A? Why not?
  45. Hacker may have installed his certificate and is waiting for you to log in.
  46. Two Factor Authentication or Multi Factor Authentication Good digital citizenship, taking care of your data, your security
  47. You must do THREE and you must share your work with me. Please use Google Docs. If you can’t for some reason, you can use a USB drive, but you might not get it back.
  48. Would you want to include any of the parts from the anti-software patent movement? Touch on the topic of "patent trolls"? How about referencing a broken patent system that grants patents for obvious things like Amazon's one-click checkout or sliding screen contents using your finger?
  49. fines and penalties Software theft is a serious matter. If you or your company get caught copying software, you may be held liable under both civil and criminal law. If the copyright owner brings a civil action against you, the owner can seek to stop you from using its software immediately and can also request monetary damages. The copyright owner may then choose between actual damages, which include the amount it has lost because of your infringement as well as any profits attributable to the infringement, or statutory damages, which can be as much as $150,000 for each program copied. In addition, the government can criminally prosecute you for copyright infringement. If convicted, you can be fined up to $250,000, sentenced to jail for up to five years, or both. Appeals court approves $675,000 fine for student who illegally downloaded 30 songs Read more: http://www.digitaltrends.com/music/appeals-court-denies-piracy-penalty-plea/#ixzz3O0L9KBV6  Follow us: @digitaltrends on Twitter | digitaltrendsftw on Facebook
  50. Do you want to include anything on "copyleft", GPL, or Creative Commons? It's possible to get compensation for your "intellectual effort" without using copyright protection.
  51. You might want to add something on cleansing the drives before disposing the computer equipment. Protect yourself by getting rid of your data with something like Darik's Boot and Nuke (DBAN) which wipes the entire drive.
  52. Zero Export Recycler’s Mount Holly Springs  The Computer Barn Carlisle e-Stewards – Every Staples
  53. Zero Export Recycler’s Mount Holly Springs  The Computer Barn Carlisle e-Stewards – Every Staples
  54. Use rechargeable batteries