When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 5 modules in this course
In this course you’ll focus on how constant data collection and big data analysis have impacted us, exploring the interplay between using your data and protecting it, as well as thinking about what it could do for you in the future. This will be done through a series of paired teaching sections, exploring a specific “Impact of Computing” in your typical day and the “Technologies and Computing Concepts” that enable that impact, all at a K12-appropriate level.
This course is part of a larger Specialization through which you’ll learn impacts of computing concepts you need to know, organized into 5 distinct digital “worlds”, as well as learn pedagogical techniques and evaluate lesson plans and resources to utilize in your classroom. By the end, you’ll be prepared to teach pre-college learners to be both savvy and effective participants in their digital world.
In this particular digital world (personal data), you’ll explore the following Impacts & Technology pairs --
Impacts (Show me what I want to see!): Internet Privacy, Custom Ads, Personalization of web pages
Technologies and Computing Concepts: Cookies, Web vs Internet, https, Web Servers
Impacts (Use my data…. But protect it!): Common Cybersecurity knowledge levels, ISP data collection, Internet design, finding out what is known about you online, software terms and services
Technology and Computing Concepts: DNS, Cryptography (ciphers, hashing, encryption, SSL), Deep and Dark Web
Impacts (What could my data do for me in the future?): What is Big Data, Machine Learning finds new music, Wearable technologies.
Technology and Computing Concepts: AI vs ML, Supervised vs Unsupervised learning, Neural Networks, Recommender systems, Speech recognition
In the pedagogy section for this course, in which best practices for teaching computing concepts are explored, you’ll learn how to apply Bloom’s taxonomy to create meaningful CS learning objectives, the importance of retrieval-based learning, to build learning activities with online simulators, and how to use “fun” books to teach computing.
In terms of CSTA K-12 computer science standards, we’ll primarily cover learning objectives within the “impacts of computing” concept, while also including some within the “networks and the Internet” concepts and the “data and analysis” concept. Practices we cover include “fostering and inclusive computing culture”, “recognizing and defining computational problems”, and “communicating about computing”.
Welcome! Are you interested in teaching about the impacts of your personal data in the digital world? To learn more about the computation and computing concepts that underlie the technologies using that data? We'll be using a problem-based approach to explore interesting ways to teach concepts of networks and the internet, data and analysis, and even algorithms and data representation. Finally, we'll read a chapter from a children's fiction book -- "The Secret Code Menace" and identify some computer science learning outcomes for that chapter.
What's included
2 videos3 readings1 assignment1 discussion prompt
Show info about module content
2 videos•Total 12 minutes
Welcome to the course!•6 minutes
This is part of a specialization•6 minutes
3 readings•Total 15 minutes
Are You Wanting UC, San Diego transcript credit?•5 minutes
Engagement and Assessment Goals•5 minutes
Using Googledoc Templates in this Class•5 minutes
1 assignment•Total 7 minutes
Orientation Quiz - Make Sure you Know the Score•7 minutes
1 discussion prompt•Total 10 minutes
Who are you and What are you looking for?•10 minutes
Data Collection
Module 2•4 hours to complete
Module details
Why is it that when you are shopping for an item on one website, you start seeing ads for it other in other places? How do websites know (and quite well) what products and services to recommend their customers and users? We'll look at how the internet has evolved to personalize people's experiences while online. Then to finish up this week, we will learn about how cookies and web servers work, as well as how HTTPS keeps connections secure.
Hey Internet, Show Me What I Want to See•5 minutes
Your First Interactive Reading•12 minutes
Check Your Knowledge•0 minutes
In Your Experience: HTTPS•0 minutes
Check Your Knowledge•0 minutes
What is Teacher Powerup?•2 minutes
Check Your Knowledge•0 minutes
5 readings•Total 76 minutes
Internet Privacy Test Tool Activity•10 minutes
Where's my interactive reading grade?•3 minutes
Cookies: What You Need To Know•40 minutes
The Web vs The Internet•8 minutes
Secure Web Browsing: HTTPS•15 minutes
2 assignments•Total 60 minutes
Mastery Quiz Part 1•30 minutes
Mastery Quiz Part 2•30 minutes
6 app items•Total 87 minutes
How do Advertisers Show me Custom Ads?•20 minutes
How Your Personal Data is Used in Personalization and Advertising•9 minutes
The Internet of Me: Creating a Personalized Web Experience•8 minutes
What is Facebook Doing with My Data•15 minutes
How Web Servers Work•15 minutes
How Internet Cookies Work•20 minutes
2 discussion prompts•Total 20 minutes
Internet Privacy Test Tool Reflection•10 minutes
Your Thoughts On Personalization•10 minutes
Data Privacy
Module 3•3 hours to complete
Module details
This week we'll look at aspects of our personal data such as -- when we we do not want it used, how we can keep it safe, and what control we have. In this Technology Exploration, we'll learn about ciphers, hashing, cryptography, and encryption. Also, do you know the difference between the "deep" web and the "dark" web? (You will know by the end of this week!)
What does your ISP (Internet Service Provider) know about you?•8 minutes
Why Not Redesign The Internet to Be Secure?•6 minutes
How Bad Should You Feel About Not Reading "Terms and Conditions"?•11 minutes
Domain Name Systems•12 minutes
Cryptography Keeps Information Safe•10 minutes
Keeping Information Secure on the Internet: Hashing and Encryption•14 minutes
SSL Certificates•2 minutes
Secrets of the Deep Dark Web•15 minutes
2 assignments•Total 60 minutes
Mastery Quiz Part 1•30 minutes
Mastery Quiz Part 2•30 minutes
1 app item•Total 30 minutes
How Encryption Works•30 minutes
2 discussion prompts•Total 20 minutes
Cybersecurity Knowledge Quiz•10 minutes
Your Thoughts: Responsible Innovation•10 minutes
Data Use
Module 4•3 hours to complete
Module details
So far we have learned about data collection and privacy. Now we will spend the week covering some ways that data is used, so we must introduce big data. Along with our exploration of this progressive concept, we will help you connect the use of big data to machine learning though an activity designed to guide your understanding in a fun way!
What's included
4 videos3 readings2 assignments4 app items
Show info about module content
4 videos•Total 2 minutes
Can't My Data do More For Me?•2 minutes
Check Your Knowledge•0 minutes
Check Your Knowledge•0 minutes
Check Your Knowledge•0 minutes
3 readings•Total 33 minutes
Machine Learning Methods: Supervised vs. Unsupervised•13 minutes
Activity: Train a Neural Network•20 minutes
Optional: How Siri Works•0 minutes
2 assignments•Total 40 minutes
Mastery Quiz Part 1•10 minutes
Mastery Quiz Part 2•30 minutes
4 app items•Total 95 minutes
A Beginner's Guide to Big Data•20 minutes
The Difference Between Artificial Intelligence And Machine Learning•15 minutes
How Data Centers Work•30 minutes
How Speech Recognition Works•30 minutes
Impacts of Computing and Pedagogy
Module 5•2 hours to complete
Module details
Next we'll let you choose what you want to explore around "impacts of computing" for the technologies we've explored in this world. Along with that, we'll introduce another "Formative Classroom Assessment Technique" (FACT) and have you practice how you would use this in the classroom. For our pedagogical focus, we'll look at how retrieval practice helps you learn far more effectively than "re-studying" and how to define the learning objectives for a given learning activity using Bloom's taxonomy. Finally, you'll get to read a short chapter from a children's fiction book "The Secret Code Menace" and identify for yourself what kids can learn from reading it!
UC San Diego is an academic powerhouse and economic engine, recognized as one of the top 10 public universities by U.S. News and World Report. Innovation is central to who we are and what we do. Here, students learn that knowledge isn't just acquired in the classroom—life is their laboratory.
What will I be able to do upon completing this course?
How does Amazon know what to suggest you buy? In this course you’ll explore how collection and analysis of our personal data impacts our technology use -- including concerns about our data privacy. You’ll explore underlying technical concepts around cybersecurity and machine learning that contribute to both the pros and cons of our personal data use. After successfully completing this course you will be able to:
[1] Discuss current ways in which personalized data impacts how we “see” things on the internet and ways in which companies are using our data.
[2] Explain key aspects of web technology responsible for collecting, managing and analyzing our data, including internet design issues (cookies, secure web transfer protocols, DNS, deep and dark web), cryptography (ciphers, hashing, encryption), and machine learning and AI (neural networks, recommender systems, speech recognition).
[3] Enact pedagogical knowledge in computer science-specific contexts, including retrieval-based learning, learning with simulators, and creating learning objectives. You’ll explore how one might use a “fun” children’s fiction book for teaching computing concepts.
Can this course help me get the California Supplementary Authorization to teach Computer Science?
Yes! This course is designed as component of a Specialization that is 1 of a set of 4 Specializations (all will be offered on Coursera) that will support the requirements of the California Supplementary Authorization. Additionally, the Specialization may support credentialing or authorization in other states. However, most states require a transcript from an accredited institution of higher education. See the FAQ question on “Will I earn university credit” to find out how to get such a transcript.
Will I earn university credit for completing this course?
Yes, you can earn UCSD credit for completing this course, but only by completing the full Teaching Impacts of Technology in K-12 Education Specialization. In addition, you will need to (1) Enroll in an additional UCSD Extension course before completing the capstone ($500) and (2), complete part of the capstone project via an online proctoring service. After this is done, your Specialization course grades will be accumulated and a transcript with your final grade (both letter grade or pass-only supported) will be issued from UCSD with 4 graduate-level units. These are eligible to count towards the California Supplementary Authorization.
What background knowledge is necessary to succeed in this course?
There is no background knowledge, neither in education nor in Computer Science, required to take this course - just an interest in learning computational concepts about the technology that surrounds us and how to best teach those concepts to others.
Basic proficiency in the use of Googledocs will be needed to complete assignments within the course. Google help documentation will be provided, and with some extra attention, first time use of Googledocs should not be a barrier to successful completion of the course.
What is the value of taking this course online?
By providing this course online, our goal is to enable you to master all the material in the course at a pace that is appropriate for you, rather than the typical processes of picking a specific date and measuring how much you can learn by that date of in-person courses. Instead of the relatively bigger chunks of learning work found in traditional courses (e.g. go to class, read the book, do homework, study for the test) this course has a lot of smaller and more diverse activities that guide your learning experience. We use a lot of online features to:
Break learning into smaller chunks
Engage you more in thinking and discussing content with others
Better integrate and more frequently test your knowledge (with a focus on mastery, allowing you to go back and learn what you missed then come test again)
Give you practice in teaching-specific skills you will need as an educator (finding and evaluating online teaching resources, critiquing and modifying lesson plans)
We hope you enjoy and learn a lot!
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.