Note: Students must acknowledge (i.e., through citation, through attribution, by reference, and/or through acknowledgment in bibliographic entry) the source or author of any and all information or evidence taken from the work of someone else. This includes any images, video, or music that might be incorporated into a computational artifact, and the use of program code written by another person. A student who fails to acknowledge the source or author of any and all information or evidence taken from the work of someone else will receive a score of 0 on that particular component of the performance assessment.
For information about the points this response earned, please see the Explore Medium Commentary (.pdf/73.8KB).
1. Computational Artifact
Your computational artifact must provide an illustration, representation, or explanation of the computing innovation's intended purpose, its function, or its effect. The computational artifact must not simply repeat the information supplied in the written responses and should be primarily nontextual.
Submit a video, audio, or PDF file. Use computing tools and techniques to create one original computational artifact (a visualization, a graphic, a video, a program, or an audio recording). Acceptable multimedia file types include .mp3, .mp4, .wmv, .avi, .mov, .wav, .aif, or .pdf format. PDFs must not exceed three pages. Video or audio files must not exceed 1 minute in length and must not exceed 30MB in size.
2. Written Responses
Submit one PDF file in which you respond directly to each of the prompts below. Clearly label your responses 2a–2e in order. Your responses must provide evidence of the extensive knowledge you have developed about your chosen computing innovation and its impact(s). Write your responses so they would be understandable to someone who is not familiar with the computing innovation. Include citations, as applicable, within your written responses. Your response to prompts 2a–2d combined must not exceed 700 words. The references required in 2e are not included in the final word count.
2a. Provide information on your computing innovation and computational artifact.
- Name the computing innovation that is represented by your computational artifact.
- Describe the computing innovation's intended purpose and function.
- Describe how your computational artifact illustrates, represents, or explains the computing innovation's intended purpose, its function, or its effect.
(Approximately 100 words)
Sample response to 2a:
My computational artifact shows the Daqri Smart Helmet. The purpose for the helmet is to make the work site an easier work environment, and, at the same time, a safer one. My computational artifact illustrates my innovation by showing what the helmet does, what it is made of, and what you would see if you had the helmet on.
2b. Describe your development process, explicitly identifying the computing tools and techniques you used to create your artifact. Your description must be detailed enough so that a person unfamiliar with those tools and techniques will understand your process.
(Approximately 100 words)
Sample response to 2b:
For my computational artifact I made a video. The video I had made was on Animoto. I got pictures and uploaded them to the movie. First I downloaded the pictures on to the computer and then I uploaded the pictures onto the website. Once on the website I was able to make a slide with the picture and add a caption to help describe the picture
2c. Explain at least one beneficial effect and at least one harmful effect the computing innovation has had, or has the potential to have, on society, economy, or culture.
(Approximately 250 words)
Sample response to 2c:
The smart helmet can be used in many ways for industrial purposes. It uses a heads up display allowing the worker using the helmet to work in an augmented reality. The helmet gives a realistic Heads Up Display showing checklists for the workers, and allows the workers to see their progress and what they still need to do. Also the 4d function of the helmet is able to see through walls. The helmet gives the workers xray like vision to see problems that a normal person would not see with the naked eye .For large work sites the helmet is perfect. Someone who is far away from their boss may not need to go back to the work site to talk to them, but thanks to the smart helmet offers an on screen application much like Skype. The helmet displays the face of the intended person for the talk and important information can be shared between two people. They both can see what each other can see, making the repairs or build much faster. There is also a thermal camera feature to the helmet. The thermal camera works passively showing the heat of nearby objects on the site. The user can switch between normal camera and thermal vision camera. The thermal camera can help a worker see if a machine is overheating or is too hot to touch. Lastly, the helmet has supreme audio output. The helmet offers a noise canceling comfortable feel, and allows the user to talk to other workers via cellphone or wifi applications.
2d. Using specific details, describe:
- the data your innovation uses;
- how the innovation consumes (as input), produces (as output), and/or transforms data; and
- at least one data storage concern, data privacy concern, or data security concern directly related to the computing innovation.
(Approximately 250 words)
Sample response to 2d:
The smart helmet takes in and sends out various amounts of data. With input the helmet is always scanning out the environment with its multiple cameras. The helmet is powered by the sixth gen Intel m7 processor. The helmet uses Intel’s RealSense technology to make the helmet aware of depth and the environment. The DAQRI INTELLITRACK is the technology used in the computer vision and navigation technology. The helmet is an augmented reality that fuses real world landscape with HUD that displays useful information for the worker on the real world landscape. The smart helmet uses all types of data input and output from video to audio. With the breakthrough that the helmet has made, there are potential legal concerns because the helmet is constantly recording everything. If the helmet were to see a person and the video goes public the person may not want to be in the video and can sue. Also, the helmet also comes with USB ports allowing for extra applications or data to be transferred into the helmet. Someone could potentially take important info about the work site if they got ahold of a helmet.
2e. Provide a list of at least three online or print sources used to create your computational artifact and/or support your responses to the prompts provided in this performance task.
- At least two of the sources must have been created after the end of the previous academic year.
- For each online source, include the permanent URL. Identify the author, title, source, the date you retrieved the source, and, if possible, the date the reference was written or posted.
- For each print source, include the author, title of excerpt/article and magazine or book, page number(s), publisher, and date of publication.
- If you include an interview source, include the name of the person you interviewed, the date on which the interview occurred, and the person's position in the field.
- Include citations for the sources you used, and number each source accordingly.
- Each source must be relevant, credible, and easily accessed.