CST 300 Third Week Journal

 CST 300 Third Week Journal

OLI Module #3

Internal/External Processors

    There are two types of people when it comes to processing information. One is an internal processor and the other is an external processor. The internal processor prefers thinking through thoughts first before voicing them. The external processor develops ideas by thinking out loud with others. Internal processors can be accommodated by using email for communication.

Get It Right, Get It Done, Get Along, Get Appreciation

    Four workstyles were introduced in this module of OLI. Get it right can be described as slow and methodical. The get it right workstyle can be helped by reminding them when their attention to detail is slowing the team down. Get it done can be described as fast and decisive. The get it done workstyle can be helped by reminding them to slow down and consider the team's input. Get along can be described as social and flexible. Get along can be helped by giving them a gently reminder that they are falling behind. Get appreciation can be described as positive and helpful. Get appreciation can be helped by letting them know when they have done something good or had a good idea.

Conflict Styles

    There are five conflict styles: avoiding, forcing, accommodating, compromising, and collaborating. The avoiding conflict style is characterized by the lack of engagement with conflict. It can be hard to even tell there is a conflict because the conflict won't be brought up. Instead the conflict will be avoided, hence the name. The forcing conflict style is focused completely on what they want or need with no regard for others. Every tactic in the book will be utilized in order to get their way. The accommodating conflict style will acknowledge the conflict and relinquish all of their wants or needs. The compromising conflict style tries to be fair to all parties and find a middle ground. The collaborating conflict style will involve those in the conflict to talk about all of the options and choosing the one that meets everybody's needs.

Lecture: Week 3 Learning Journal Post

Part 1: Tips for Effective Studying

    Last week I mentioned that I wanted to improve on asking questions while studying. I am choosing to write about the "Tips for Effective Studying" topic this week. First, memory is talked about. Memory starts with sensory information then moves to short-term memory, "if you're paying attention". The next step is from short-term memory to long-term memory if there is effort put into understanding the information. Long-term memory is relatively permanent as long as you come back to it every once in a while. Repetition is helpful for making sure that some information is stored permanently.
    It is important to know what type of learner you are. There are three types mentioned in this post: visual, auditory, and haptic. Visual learners learn best when they can see what they are learning. It would be best for them to draw the concepts they are learning. Auditory learners work best when they can hear what they are learning. Recording lectures and re-listening to it would be best for auditory learners. They may even find it helpful to speak to a friend about the material. Haptic learners are those that learn from feel or touch. Physical sensations are useful in maintaining a haptic learners attention. Some tips from the post include pacing, reading while on an exercise bike, and chewing gum.
    This post mentions the SQ3R method we learned about last week. The SQ3R method consists of: survey, question, read, recite, and review. To survey something means to get a general overview of the material before jumping in. The question part of the method asks us to create curiosity in the material by asking questions. The read part asks us to actively read the material and engage with it. Reciting means that we should try to recall parts of what we just read in order to further lodge the material in your mind. Finally, reviewing means going over our notes, highlights, underlines, and the material itself to help with absorption of the material.

Part 2: Ethics

    I am pleased to see how thorough the exposition is on ethics regarding technology. Some categories of issues involving technology are: ethical, legal, cultural, environmental, and privacy. Stakeholders are people or groups that are affected by one of these issues. A great example of the interactions between stakeholders and their interests is shown in this video. 12 Issues in Computer Science. The issue is the impact of technology on the environment. The stakeholders involved are manufacturers/inventors, general population, the government. Manufacturers and inventors want to create and innovate while respecting the impact they may have on the environment. The general population wants new technology to improve our lives but is worried about the harmful impact it may have on the environment. The government recognizes that the advancement of society relies on technology but also recognizes that technology can be harmful to our planet. Those are the three stakeholders and their views regarding the issue of technology's impact on the planet. The ACM (Association for Computing Machinery) has a code of ethics document where it clearly lays out their desire to act responsibly and support the greater good. ACM Code of Ethics 
    Some ethical theories we learn about are: deontology, utilitarianism, rights, and virtue. A deontological ethical framework regards following obligations or duties as the most moral action. A utilitarian framework defines the decision that leads to the greatest good as the most moral action. An ethical framework based on rights is most concerned with rights established by a society. A virtue ethical framework takes into consideration the character of the person committing the act rather than the act itself and its consequences.

Part 3: Reflection

    Ethical considerations are an important part of engaging with technology. It is easy to be swept away by the power of technology. The Spider-Man quote puts it best, "With great power comes great responsibility". It is important that we use technology to make people's lives better. This means following just laws and taking into consideration the impacts that technology has on the environment as well as people (e.g. privacy). 
    Our class had us read a website post thoroughly stating the topics that computer science majors should know. What Every Computer Science Major Should Know. The post states "A code portfolio allows employers to directly judge ability." Simply sending in a resume might not be good enough to get noticed. It is mentioned that communication skills are important as "Lone wolves in computer science are an endangered species". Having a solid background in mathematics (up to statistics and calculus) is important when working with engineers. It is important to be have confidence in "IDE-less software development". Computer scientists should understand how to navigate their operating system(s) effectively and efficiently. Programming languages come and go so it is important to be flexible and stay up-to-date with the latest technology. Understanding formal logic helps you reason in a way that will help you face tasks in programs. The theory of data structures and algorithms is important to understand so a program can be designed effectively and efficiently. Databases are something that every programmer will encounter so they should get thoroughly familiar with database systems. There is so much more on that website. It is a great resource to get an overview of what is generally expected in the field of computer science.

Part 4: Code of Integrity

    CSUMB has their own code of ethics in which they make it clear that integrity is expected from everyone. These rules and expectations are put in place to ensure that we have the best learning experience possible. It prepares us for a world where we are expected to credit others when we use their work. These expectations make certain that we learn the most from this program. The 1st rule states, "It is an act of plagiarism to submit work that is copied or derived from the work of others and submitted as your own without acknowledging the source" (CSUMB Code of Integrity). The 2nd rule states that sharing code with other students is not allowed. The 3rd rule states that if someone helped you arrive at a solution then you must include the source.

Comments

Popular posts from this blog

CST 300 Fourth Week Journal

CST 300 Second Week Journal

CST 300 First Week Journal