Lab for Weeks 6 thru 8 - CSE 1105
Presentations
The purpose of this 3-session series is to get some experience working in a team to create and deliver an oral presentation. In the process, you will have an opportunity to complete the remaining Computer Use Proficiency requirements, and to learn from and critique oral presentations by other teams. This lab should be complete by Oct 16.
Your
lab instructor will assign you to work in a group of 3, and will assign you a
topic.
The
tasks are summarized as follows:
#1 Meet with your team members and decide if
you want to keep the topic you are assigned or try to trade topics with another
team. Notify the lab instructor once
you have settled on a topic.
#2 Using an internet search engine,
individually gather information on the topic.
In the process, each team member should carefully record the URL at
least 6 web sites that provide useful information about the topic. Later, these will be used to do the
Internet/email requirement.
#3 Using the library databases (which will be
discussed in eng 1104 on 9/29 and 9/30), individually gather some information
on the topic. Later, this will be used
to complete the Library requirement.
#4 As a team, plan a 12-minute team
presentation following the guidelines given.
#5 Using Powerpoint, as a team, generate
slides to support the presentation.
#6 In the lab sessions on 10/15 and 10/16, as
a team, do the presentation in 315 NH to an audience consisting of the other
students in the lab, the lab instructors, a video camera and/or Dr.
Peterson.
Check with your lab
instructor to be assigned to a team with 2 other lab members. Your instructor will give each team a
topic. Find a place in the lab room to
meet with your team members and decide if you want to keep the topic you are
assigned or try to trade it with another team.
You will probably want to read thru the guidelines in Task #4 to see
what should be done with the topic.
At this time, it
would be a good idea to select a team leader who will be responsible for
organizing the team. Individual
information gathering will follow, but the team should plan to get back
together before the end of the Lab 6 to plan.
Try to divide the work so that everyone puts in equal effort.
Notify the lab instructor
once you have settled on your topic and your team leader.
ICheckpoint 1
Now
that you know the topic, you should begin to individually gather some
information about it.
Using
an internet search engine, locate information on the topic. Make a note of the “search string”, the word
or phrase you input to a search engine like Google, Yahoo, etc. If you are unfamiliar with the internet
search process, consult a team member or your lab instructor. Refine the search by modifying the search
string if necessary till you find what you need. When you find relevant and useful web pages, read the information
presented, and carefully record the URL of the site, either by writing the
address on paper or by copying it to a file which you will later work
with. Do that for at least 6 web sites
that provide useful information about the topic.
After the Library
presentation in eng 1104 on 9/29 and 9/30, you will be able to complete
the Internet/email requirement, on page 4 of this writeup. You may choose to do some of this task now
or defer it to next week. Once it is
complete, inform your lab instructor.
ICheckpoint 2
After the Library
presentation in eng 1104 on 9/29 and 9/30, complete the Library
requirement, which is found on pages 5-6 of this writeup. This will involve using your topic to select
a book and then a full text article related to your topic. Once this entire requirement is complete,
submit it to your lab instructor.
ICheckpoint 3
As
a team, plan a 12-minute team presentation using the following guidelines.
.
Before the presentation
During the presentation
clearly so that this could be
understood on the tape.
Class members viewing the presentation will be asked to
evaluate the presentation on:
·
Clarity of
presentation
(You can review the comments on your group’s presentation later if
you wish.)
Presentations
will be in room 315 NH, which is equipped with a PC running Powerpoint
connected to a PC projector. It will be
best to bring your presentation on a 3
½” floppy disk. There will be a video
camera to allow taping the presentation, so that you can view your presentation
later if you wish.
Check
with the lab instructor to be sure you have your questions about the
presentation answered.
ICheckpoint 4
Using
Powerpoint, as a team, generate slides to support the presentation. While it is likely that at least one member
of the team has used Powerpoint, if that is not the case, ask the lab
instructor for any help your team may need in getting started. Each member of the team should finish this
task being somewhat familiar with the use of the software, and certainly having
given plenty of input to the appearance and content of the slides. Refer to Dr. Goolsby’s talk on Oral Presentations
for pointers on doing your slides and your presentation. When the slides are complete, signal the lab
instructor and show the set of slides.
ICheckpoint 5
In
the lab sessions on 10/15 and 10/16, as a team, you will do the 12 minute
presentation in 315 NH to an audience consisting of the other students in the
lab, the lab instructors, a video camera and/or Dr. Peterson.
To
do this, go to 315 NH instead of 123/124 NH for your lab on those days. Your lab instructor will schedule the
sequence of presentations. When your
group’s turn comes, your lab instructor will help you begin your slide
presentation, and will monitor the time (Your presentation needs to be between
11 and 13 minutes in length.) There
will be a few minutes for questions at the end while the next group gets ready
to present.
As
the audience for the other presentations, you will be asked to complete a short
evaluation of each presentation. You
should plan to take some notes on each topic presented.
End of Lab for
Weeks 6-8
Internet/email
Computer
Use Proficiency Requirement
____________________________________________________________________________________
Create
a file in Word in which you:
(a)
describe your search process (your topic, the search engine
used, search criteria, revised criteria)
(b)
include a bibliography of at least 6 web pages (URLs), and “annotate” the bibliographic references,
that is, say a little about what information you found on that site. Use this
style:
http://www.eng-uta.edu/ - the UTA Engineering Home Page, which should be the start of any search for information about the CSE department.
(c)
evaluate on the quality of this site (using the criteria
provided in the eng 1104 Library presentation)
(d)
include several chunks of information which you pasted in
from one of the web pages, labeling each chunk with the phrase “copy and
paste”. Be sure it is clear from which
site the chunk comes.
(e)
then create an email message in which you briefly describe
the document you are sending, and identify yourself giving your name and UTA ID
number. Attach the Word file you just
created to the email message sent with subject: “Internet/Email – Your Name” and
send that email message to the account cse1111b@cse.uta.edu
with a “carbon copy” to yourself.
Library
Computer Use Proficiency Requirement
____________________________________________________________________________________
This assignment must be
completed by accessing the library’s homepage at: http://www.uta.edu/library/
· Print the record
· Circle the portion of the record that indicates where the item may be found
· Label the portion of the record that indicates if the item is currently in the library and available to be checked out (See example below)
http://www2.uta.edu/library/research/Engineering_ComputerScience.asp
3. Write a short (100-125 word) summary of the full text article. Include in the summary a quote taken from the article. Prepare this summary using Microsoft Word. (Don’t forget to use the spell checker). Cite the article, using the proper reference (see notes below on Citing Your Sources). Then print out the summary.
4. Staple the summary, the PULSe record and the FULL TEXT article
together and submit it in hard copy form.
(If this article is longer than 5 pages, just include the 1st
page.) Make sure your name is on
that submission.
------------------------------------------------------------------------------------------------
Suggested
topics:
Many of these ideas come
from web-based Instructors Manual for Sara Baase, A Gift of Fire: Social,
Legal and Ethical Issues in Computing.
1.
Privacy
on the Web.
What’s
happening now? Recent abuses and
improvements. Describe Web site
policies, arguments for and against government regulation, etc.
2.
Copyright
on the Net.
What’s
being done to protect intellectual property (music, etc.) and encourage sales
on the Net?
3.
Copyright
and software.
What’s
happening with “free” software? What is the impact of Linux, for example? What are the implications for
consumers? For big companies like
Microsoft?
4.
Children
on the Internet.
There are
several problem areas: availability of material not appropriate for children,
contact with people who seek to abuse children, and privacy risks from game
sites that ask children for extensive personal and family information (for
marketing purposes). How serious are
these problems? What is bring done
about them? Do benefits for children on
the Net outweigh the risks? Can we have
the benefits without the risks?
5.
Information warfare.
Will the
next wars be fought without bombs? Will
computer networks and computer-controlled infrastructure by the targets of
military hackers? What is happening
now? What kind of defenses are
possible?
6.
Violence
in video / computer games.
What is the
impact on children? There haven’t been
many serious studies yet. You could use
studies on the impact of violence on television for background. See if you can interview people who write or
publish computer games to find out their policies and views about violent
games.
7.
Use of
biometrics for identification.
What’s
happening now? Benefits, problems,
issues.
8.
Security
vs. privacy and civil liberties.
Massive
monitoring of major computer networks by the government is proposed / carried
out to protect the security of the nation’s information infrastructure. Is this a good idea? What are the pro and con arguments?
9.
Computer
crime.
What’s
happening now? Focus on credit card
fraud and identity theft.