Comparison of Flow-Based Versus Block-Based Programming for Naive Programmers
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Digital Flowchart Maker
Bachelor thesis Computing Science Radboud University Digital flowchart maker How do we aid the learning of programming? Author: First supervisor/assessor: Frank Gerlings J.E.W. (Sjaak) Smetsers s4384873 [email protected] Second supervisor/assessor: MSc T.J. (Tim) Steenvoorden [email protected] December 12, 2018 Abstract Learning the basics of programming can be hard. Worldwide efforts try to teach people programming but there still is an ongoing shortage of pro- grammers. This thesis tries to make it easier to understand the basic concept of control flow. We will start by identifying a way to separate programming into al- gorithmic thinking and coding by using flowcharts and argue that making flowcharts can be made easier by constructing them digitally. We will ask ourselves what a flowchart creating tool should look like, delve into three different designs for such tools and finally choose one and work out a tool around it. To see how well our tool supports the process of learning how to program, we will test our tool by observing and interviewing students while they use it. In the results we will see that adding and deleting nodes and choosing specific node types goes fairly well. However, we will see that editing content of nodes is hindering the students. These problems seem to originate from technical limitations, rather than design flaws. Acknowledgements First off, I would like to thank Sjaak Smetsers and Tim Steenvoorden, my research supervisors, for their ceaseless help throughout the project. Even though the project took longer than expected, they never hesitated to show me how to do research and write a thesis. -
The Book of Apigee Edge Antipatterns V2.0
The Book of Apigee Edge Antipatterns Avoid common pitfalls, maximize the power of your APIs Version 2.0 Google Cloud Privileged and confidential. apigee 1 Contents Introduction to Antipatterns 3 What is this book about? 4 Why did we write it? 5 Antipattern Context 5 Target Audience 5 Authors 6 Acknowledgements 6 Edge Antipatterns 1. Policy Antipatterns 8 1.1. Use waitForComplete() in JavaScript code 8 1.2. Set Long Expiration time for OAuth Access and Refresh Token 13 1.3. Use Greedy Quantifiers in RegularExpressionProtection policy 16 1.4. Cache Error Responses 19 1.5. Store data greater than 512kb size in Cache 24 1.6. Log data to third party servers using JavaScript policy 27 1.7. Invoke the MessageLogging policy multiple times in an API proxy 29 1.8. Configure a Non Distributed Quota 36 1.9. Re-use a Quota policy 38 1.10. Use the RaiseFault policy under inappropriate conditions 44 1.11. Access multi-value HTTP Headers incorrectly in an API proxy 49 1.12. Use Service Callout policy to invoke a backend service in a No Target API proxy 54 Google Cloud Privileged and confidential. apigee 2 2. Performance Antipatterns 58 2.1. Leave unused NodeJS API Proxies deployed 58 3. Generic Antipatterns 60 3.1. Invoke Management API calls from an API proxy 60 3.2. Invoke a Proxy within Proxy using custom code or as a Target 65 3.3. Manage Edge Resources without using Source Control Management 69 3.4. Define multiple virtual hosts with same host alias and port number 73 3.5. -
An Affordable Modular Robotic Kit for Integrated Science, Technology, Engineering, and Math Education
An Affordable Modular Robotic Kit for Integrated Science, Technology, Engineering, and Math Education © PHOTOCREDIT By Ekawahyu Susilo, Jianing Liu, Yasmin Alvarado Rayo, Ashley Melissa Peck, Pietro Valdastri, Justin Montenegro, and Mark Gonyea he demand for graduates in science, technology, Fischertechnik [6], are composed of libraries of engineering, and math (STEM) has steadily prefabricated parts that are not interoperable among kits increased in recent decades. In the United from different vendors. As recently surveyed in Kee [7], States alone, jobs for biomedical engineers are alternatives to these popular kits are either highly modular expected to increase by 62% by 2020, and jobs but very expensive (e.g., Kondo [8], Bioloid [9], Cubelets Tin software development and medical science are [10], K-Junior V2, and Kephera [11]) and unaffordable for expected to increase by 32% and 36%, respectively [1]. the majority of schools, or single-configuration and low- Combined with an insufficient number of students cost robots (e.g., AERObot [12], iRobot [13], and Boe-Bot enrolled in STEM fields, this will result in about 2.4 [14]) with a restricted number of activities possible. An million STEM job vacancies by 2018 [2]. Therefore, affordable solution that provides a number of increasing the number of STEM graduates is currently a interchangeable modules is littleBits [15]. This platform national priority for many IEEEgovernments worldwide. An offersProof a variety of sensing and actuation modules that use effective way to engage young minds in STEM disciplines is magnets to connect, but it lacks programmability, thus to introduce robotic kits into primary and secondary limiting students’ ability to learn about coding. -
Google for Education National Parks VR Google Expeditions Google Arts & Culture Be Internet Awesome Made with Code CS First Google Science Fair
Google For Education National Parks VR Google Expeditions Google Arts & Culture Be Internet Awesome Made with Code CS First Google Science Fair Learn how tools built for teaching and learning, Discover the hidden worlds of our Take a field trip to virtually anywhere (even Explore works of art and stories from around Teach learners the fundamentals of digital Make the connection between coding and Learn the basics of Computer Science using the Create projects that show how Science, like Classroom, G Suite for Education, and National Parks on ranger-guided trips places school buses can’t go) using immersive the world with 360° tours of exhibits in over 70 safety and citizenship so they can be safe, creativity, empowering girls to engage with block-based programming language, Scratch. Technology, Engineering, and Math can be used Chromebooks, can increase engagement through virtual reality. AR and VR technology. different countries. confident explorers of the online world. technology and bring their ideas to life. to impact the world around us. and inspire curiosity. Google for National Google Google Arts Education Parks VR Expeditions & Culture Discover the hidden worlds of Explore works of art and stories Tools built for teaching and learning. Field trips to virtually anywhere. our National Parks. from around the world. Over 80 million teachers and students around the world Take a ranger-guided journey through the glaciers of What if you could journey to the surface of Mars or From The Metropolitan Museum of Art to Nairobi’s communicate and collaborate using Classroom and Alaska’s Kenai Fjords or get up close with active climb to the top of Machu Picchu without ever leaving Kenya National Archives, Google Arts & Culture offers G Suite for Education, while Chromebooks are the most volcanoes in Hawai’i. -
Flow2code - from Hand-Drawn Flowchart to Code Execution
FLOW2CODE - FROM HAND-DRAWN FLOWCHART TO CODE EXECUTION A Thesis by JORGE IVAN HERRERA CAMARA Submitted to the Office of Graduate and Professional Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Chair of Committee, Tracy Hammond Committee Members, Thomas Ioerger Zenon Medina-Cetina Head of Department, Dilma Da Silva May 2017 Major Subject: Computer Science Copyright 2017 Jorge Ivan Herrera Camara ABSTRACT Flowcharts play an important role when learning to program by conveying algorithms graphically and making them easy to read and understand. When learning how to code with flowcharts and transitioning between the two, people often use computer based soft- ware to design and execute the algorithm conveyed by the flowchart. This requires the users to learn how to use the computer-based software first, which often leads to a steep learning curve. We claim that the learning curve can be decremented by using off-line sketch recog- nition and computer vision algorithms on a mobile device. This can be done by drawing the flowchart on a piece of paper and using a mobile device with a camera to capture an image of the flowchart. Flow2Code is a code flowchart recognizer that allows the users to code simple scripts on a piece of paper by drawing flowcharts. This approach attempts to be more intuitive since the user does not need to learn how to use a system to design the flowchart. Only a pencil, a notebook with white pages, and a mobile device are needed to achieve the same result. -
Code Girl Tracey Acosta Santa Clara University
Santa Clara University Scholar Commons Computer Engineering Senior Theses Engineering Senior Theses 6-1-2015 Code girl Tracey Acosta Santa Clara University Amanda Holl Santa Clara University Paige Rogalski Santa Clara University Follow this and additional works at: https://scholarcommons.scu.edu/cseng_senior Part of the Computer Engineering Commons Recommended Citation Acosta, Tracey; Holl, Amanda; and Rogalski, Paige, "Code girl" (2015). Computer Engineering Senior Theses. 43. https://scholarcommons.scu.edu/cseng_senior/43 This Thesis is brought to you for free and open access by the Engineering Senior Theses at Scholar Commons. It has been accepted for inclusion in Computer Engineering Senior Theses by an authorized administrator of Scholar Commons. For more information, please contact [email protected]. Code Girl by Tracey Acosta Amanda Holl Paige Rogalski Submitted in partial fulfillment of the requirements for the degrees of Bachelor of Science Computer Science and Engineering Bachelor of Science in Web Design and Engineering School of Engineering Santa Clara University Santa Clara, California June 1, 2015 Code Girl Tracey Acosta Amanda Holl Paige Rogalski Computer Science and Engineering Web Design and Engineering Santa Clara University June 1, 2015 ABSTRACT Despite the growing importance of technology and computing, fewer than 1% of women in college today choose to major in computer science.[1] Educational programs and games created to interest girls in computing, such as Girls Who Code and Made With Code, have been successful in engaging girls with interactive and creative learning environments, but they are too advanced for young girls to benefit from. To address the lack of educational, computer science games designed specifically for young girls, we developed a web-based application called Code Girl for girls age five to eight to customize their own avatar using Blockly, an open-source visual coding editor developed by Google. -
Robot Block-Based Programming
Robot Block-Based Programming Teaching children how to program an interactive robot using a block-based programming language Robin van der Wal Jannelie de Vries Luka Miljak Marcel Kuipers Bachelor's Thesis Computer Science Delft University of Technology 1 This report is under embargo from July 2017 until February 2018 Delft University of Technology Bachelor end project Robot Block-based Programming Final Report Authors: Robin van der Wal Luka Miljak Jannelie de Vries Marcel Kuipers July 5, 2017 Bachelor Project Committee Coach name: Koen Hindriks Client name: Joost Broekens Cordinator name: Ir. O.W. Visser Abstract Robots play an increasingly large role in society and some material already exists that allows children to program robots in elementary school. However, this material often neglects the interactive capabilities of modern robots. The aim of this project is to teach children how to write interactive programs for a robot. For this purpose, a NAO robot is used, which is a humanoid robot with advanced features. Children can use a web interface to create programs in a Block-Based Programming Language, which is then sent and processed by the robot in an intelligent manner, using an agent-based sys- tem. Over the course of ten weeks, based on research done in the first two weeks, a web interface and an intelligent agent were developed. The BlocklyKids lan- guage implements many concepts you would expect from a programming lan- guage. Using these concepts, children can solve exercises that are presented to them in the web interface. Testing BlocklyKids in the classroom helped in the development of the product. -
Manuale Flowgorithm Versione 2.18
Manuale Flowgorithm Versione 2.18 Roberto Atzori « L'informatica non riguarda i computer più di quanto l'astronomia riguardi i telescopi. » (Edsger Wybe Dijkstra) Pag. 1 di 56 Sommario Flowgorithm ...................................................................................................................................................... 4 Caratteristiche e funzionalità ............................................................................................................................ 5 L’interfaccia ................................................................................................................................................... 5 Supporto Multilingua ..................................................................................................................................... 5 Barra del menù .............................................................................................................................................. 7 Voce di menù “File” ................................................................................................................................... 7 Stampa ................................................................................................................................................... 8 Voce di menù “Modifica” .......................................................................................................................... 9 Stile diagramma .................................................................................................................................... -
321444 1 En Bookbackmatter 533..564
Index 1 Abdominal aortic aneurysm, 123 10,000 Year Clock, 126 Abraham, 55, 92, 122 127.0.0.1, 100 Abrahamic religion, 53, 71, 73 Abundance, 483 2 Academy award, 80, 94 2001: A Space Odyssey, 154, 493 Academy of Philadelphia, 30 2004 Vital Progress Summit, 482 Accelerated Math, 385 2008 U.S. Presidential Election, 257 Access point, 306 2011 Egyptian revolution, 35 ACE. See artificial conversational entity 2011 State of the Union Address, 4 Acquired immune deficiency syndrome, 135, 2012 Black Hat security conference, 27 156 2012 U.S. Presidential Election, 257 Acxiom, 244 2014 Lok Sabha election, 256 Adam, 57, 121, 122 2016 Google I/O, 13, 155 Adams, Douglas, 95, 169 2016 State of the Union, 28 Adam Smith Institute, 493 2045 Initiative, 167 ADD. See Attention-Deficit Disorder 24 (TV Series), 66 Ad extension, 230 2M Companies, 118 Ad group, 219 Adiabatic quantum optimization, 170 3 Adichie, Chimamanda Ngozi, 21 3D bioprinting, 152 Adobe, 30 3M Cloud Library, 327 Adonis, 84 Adultery, 85, 89 4 Advanced Research Projects Agency Network, 401K, 57 38 42, 169 Advice to a Young Tradesman, 128 42-line Bible, 169 Adwaita, 131 AdWords campaign, 214 6 Affordable Care Act, 140 68th Street School, 358 Afghan Peace Volunteers, 22 Africa, 20 9 AGI. See Artificial General Intelligence 9/11 terrorist attacks, 69 Aging, 153 Aging disease, 118 A Aging process, 131 Aalborg University, 89 Agora (film), 65 Aaron Diamond AIDS Research Center, 135 Agriculture, 402 AbbVie, 118 Ahmad, Wasil, 66 ABC 20/20, 79 AI. See artificial intelligence © Springer Science+Business Media New York 2016 533 N. -
Ibtihaj Muhammad's
Featuring 484 Industry-First Reviews of Fiction, Nonfiction, Children'sand YA Books KIRKUSVOL. LXXXVI, NO. 15 | 1 AUGUST 2018 REVIEWS U.S. Olympic medalist Ibtihaj Muhammad’s memoir, Proud, released simultaneously in two versions—one for young readers, another for adults—is thoughtful and candid. It’s also a refreshingly diverse Cinderella story at a time when anti-black and anti-Muslim sentiments are high. p. 102 from the editor’s desk: Chairman Excellent August Books HERBERT SIMON President & Publisher BY CLAIBORNE SMITH MARC WINKELMAN # Chief Executive Officer MEG LABORDE KUEHN [email protected] Photo courtesy Michael Thad Carter courtesy Photo Editor-in-Chief Winners Take All: The Elite Charade of Changing the World by Anana CLAIBORNE SMITH Giridharadas (Aug. 28): “Give a hungry man a fish, and you get to pat [email protected] Vice President of Marketing yourself on the back—and take a tax deduction. It’s a matter of some SARAH KALINA [email protected] irony, John Steinbeck once observed of the robber barons of the Gilded Managing/Nonfiction Editor ERIC LIEBETRAU Age, that they spent the first two-thirds of their lives looting the public [email protected] Fiction Editor only to spend the last third giving the money away. Now, writes politi- LAURIE MUCHNICK cal analyst and journalist Giridharadas, the global financial elite has [email protected] Children’s Editor reinterpreted Andrew Carnegie’s view that it’s good for society for VICKY SMITH [email protected] capitalists to give something back to a new formula: It’s good for busi- Young Adult Editor Claiborne Smith LAURA SIMEON ness to do so when the time is right, but not otherwise….A provocative [email protected] Staff Writer critique of the kind of modern, feel-good giving that addresses symptoms and not causes.” MEGAN LABRISE [email protected] Sweet Little Lies by Caz Frear (Aug. -
Bittium Tough Mobile User Manual
Bittium Tough Mobile Quick Start Guide Device at a glance 1 Power key / status indicator LED / emer- gency key 2 Earpiece and auxiliary microphone 3 Headset and protective cover 4 Front camera 5 Back camera 6 Loudspeakers 7 Flash LED 8 Volume key 9 Programmable key 10 Battery cover 11 Battery charging connectors 12 USB 3.0 port and protective cover 13 Main microphones 14 Noise cancellation microphone 2 Bittium Tough Mobile Quick Start Guide 1 2 3 4 6 5 7 8 9 10 13 12 13 11 11 14 Bittium Tough Mobile Quick Start Guide 3 The ambient light sensor and proximity sensor are located next to the camera on the front of Tough Mobile. The micro USB 3.0 port is located on the bottom of Tough Mobile. Please read this quick guide carefully before using the device. Bittium Tough Mobile is water and dust resistant (IP67). In order to maintain the water and dust resistance the battery cover, the USB connector cover and the headset cover must be properly closed and un- damaged. Intentional dropping and underwater immersion of Bittium Tough Mobile should be avoided. Bittium Tough Mobile is not designed for underwater use or use for example in shower. Purposeful use of the device in these environments will result in a void of the warranty. For more info on Bittium Tough Mobile Ingress Protection see www.bittium.com/BittiumToughMobile. Box contents Bittium Tough Mobile sales package contains the following items: • Battery • Charger, with US, UK and EU adapters • Micro USB cable • 3.5 mm Headset • Quick Start Guide • Plastic wedge for opening battery cover Box contents and the appearance of the accessories may vary. -
Public Response to RFI on AI
White House Office of Science and Technology Policy Request for Information on the Future of Artificial Intelligence Public Responses September 1, 2016 Respondent 1 Chris Nicholson, Skymind Inc. This submission will address topics 1, 2, 4 and 10 in the OSTP’s RFI: • the legal and governance implications of AI • the use of AI for public good • the social and economic implications of AI • the role of “market-shaping” approaches Governance, anomaly detection and urban systems The fundamental task in the governance of urban systems is to keep them running; that is, to maintain the fluid movement of people, goods, vehicles and information throughout the system, without which it ceases to function. Breakdowns in the functioning of these systems and their constituent parts are therefore of great interest, whether it be their energy, transport, security or information infrastructures. Those breakdowns may result from deteriorations in the physical plant, sudden and unanticipated overloads, natural disasters or adversarial behavior. In many cases, municipal governments possess historical data about those breakdowns and the events that precede them, in the form of activity and sensor logs, video, and internal or public communications. Where they don’t possess such data already, it can be gathered. Such datasets are a tremendous help when applying learning algorithms to predict breakdowns and system failures. With enough lead time, those predictions make pre- emptive action possible, action that would cost cities much less than recovery efforts in the wake of a disaster. Our choice is between an ounce of prevention or a pound of cure. Even in cases where we don’t have data covering past breakdowns, algorithms exist to identify anomalies in the data we begin gathering now.