Go to Table of Contents

Computing Innovation and its Data

Mary to edit page and integrate: 1.2.5 Analyze the correctness, usability, functionality, and suitability of computational artifacts. [P4]
1.2.5A The context in which an artifact is used determines the correctness, usability, functionality, and suitability of the artifact.
1.2.5B A computational artifact may have weaknesses, mistakes, or errors depending on the type of artifact.
1.2.5C The functionality of a computational artifact may be related to how it is used or perceived.
1.2.5D The suitability (or appropriateness) of a computational artifact may be related to how it is used or perceived.

AP CSP Explore Task instructions:

Identify the data that your chosen computing innovation uses. Explain how the innovation consumes, produces, or transforms that data. Identify one data storage, data privacy, or data security concern connected with the computing innovation.

You will NOT earn credit if your response

Below are three examples. Each is deliberately short to help you structure a good response. The examples use just one sentence to respond to the data questions; you will need to write more, using evidence as needed to support your claims.

Examples:

Innovation: GPS (Global Positioning System)
GPS (Creative Commons, Eduarda7) Data:


Innovation: Google’s self-driving cars
Google Self-Driving Car (Creative commons, Steve Jurvetson) Data:

Data storage/privacy/security concern: Data can be hacked and used to track a car, cause a crash, hijack the car, etc.


Innovation: Autopilot Agricultural Drones
Farm Autopilot Drone (Creative commons, A.Savin) Data:

Data storage/privacy/security concern: Farmer’s data can be stolen or altered by individuals or groups. That could be used to manipulate crop prices and commodity stock futures.

You can find more examples and information at: