Skip to content

APCSPrinciples/ExplorePerformanceTask

Repository files navigation

Explore Performance Task

See the pages 4-6 of the College Board handout for details. You may also find the Explore Task slide presetation helpful. At the bottom of this page are a list some common mistakes to avoid.

You will be given 8 hrs of class time from Monday December 2nd until the end of class on Tuesday December 17th to complete this assignment. You will submit your computational artifact (e.g. infographic) and your answers to the four prompts and citations on the College Board template.

Your completed explore performance task is due by the end of class on Tuesday December 17th and should be submittied as final to digitalportfolio.collegeboard.org. Your submission will be graded on the 8 point scale used by the college board. For each of the 8 points there is no partial credit.

  1. Artifact (must identify innovation)
  2. Plausible Fact
  3. One effect
  4. Benefit AND harm
  5. How effect applies to society or culture (“so what?”)
  6. Identify data
  7. Data concern
  8. 3 Inline Citations

Make sure you cite at least 3 of your references in your written responses. Two of your sources need to be from June 2019 or later. To get sources that have been written since June 2019 limit your Google search results to recent web sites. Click on Tools and then choose Custom Range.
Google Custom Range
Then click enter 6/1/2017 in the From field. Click Go.
Google Custom Date Range
Notice that your search results will all have a date listed.
Google Range Results
If you are having trouble establishing a date for a web site, try Carbon Dating the Web.

Be sure to describe how you got any pictures for your artifact in your answer to 2b.

Avoid the word "hack" when describing your data concern in part 2d. Instead, be specific and describe how there might be a problem with the data of your computing innovation. Look at the high scoring examples for ideas. Stating a data privacy concern, such as hacking, without an analysis that connects the concern to the computing innovation and a description of how the obtained data might be used to violate privacy rights will not get a point for the data concern.

Also note that hacking is not a harmful effect of a computing innovation and should not be part of your answer to 2c.

Use the College Board template to write your answers to the four prompts. Save your finished template as a pdf (in Microsoft Word, choose File | Export and choose Create pdf/xps document) The College Board recommends that you do not put your name on your artifact or on the template. Submit your computational artifact and template by logging in at digitalportfolio.collegeboard.org. There is more information on how to use the digital portfolio website in the college board student guide.

Common Mistakes:

For full credit you will want to avoid these common mistakes:

  • 2a: Make sure to explain why your innovation is "computational" meaning that it uses computer code, computers or other computing devices (e.g. smartphones). Make sure you clearly name your innovation in your artifact.
  • 2b: Say where you got your images for your artifact (e.g. Google image search or Canva image bank)
  • 2c: Do NOT use hacking or cost as a harmful effect. A harmful effect should be a specific result of your innovation when it is used as intended.
  • 2d: Avoid the words hacking, hacked or hack. Be specific about your data concern and how the data in your innovation could be problematic or misused.
  • 2e: Make at least 3 inline references to 3 different citations. 2 sources need to be from June 2019 or later. See the instructions above on how to limit search results in google to June 2019 or later.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published