A Cultural Studies Analysis of Logo in Education
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Hal Abelson Education: Princeton AB (Summa Cum Laude)
Hal Abelson Education: Princeton A.B. (summa cum laude) 1969 MIT Ph.D. (Mathematics) 1973 Professional Appointments: 1994–present MIT Class of 1922 Professor MIT 1991–present Full Professor of Computer Sci. and Eng. MIT 1982–1991 Associate Professor of Electrical Eng. and Computer Sci. MIT 1979–1982 Associate Professor, Dept. of EECS and Division for Study and Res. in Education MIT 1977–1979 Assistant Professor, Dept. of EECS and DSRE MIT 1974–1979 Lecturer, Dept. of Mathematics and DSRE MIT 1974–1979 Instructor, Dept. of Mathematics and DSRE MIT Selected publications relevant to this proposal: 1. “Transparent Accountable Data Mining: New Strategies for Privacy Protection,” with T. Berners- Lee, C. Hanson, J, Hendler, L. Kagal, D. McGuinness, G.J. Sussman, K. Waterman, and D. Weitzner. MIT CSAIL Technical Report, 2006-007, January 2006. 2. “Information Accountability,” with Daniel J. Weitzner, Tim Berners-Lee, Joan Feigenbaum, James Hendler, and Gerald Jay Sussman, MIT CSAIL Technical Report, 2007-034, June 2007. Available at http://hdl.handle.net/1721.1/37600. 3. “The Creation of OpenCourseWare at MIT,” J. Science Education and Technology, May, 2007. 4. Structure and Interpretation of Computer Programs, Hal Abelson, Gerald Jay Sussman and Julie Sussman, MIT Press and McGraw-Hill, 1985, (published translations in French, Polish, Chinese, Japanese, Spanish, and German). Second Edition, 1996. 5. “The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption,” with Ross Ander- son, Steven Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter Neumann, Ronald Rivest, Jeffrey Schiller, and Bruce Schneier, in World Wide Web Journal, vol. 2, no. -
PDF (Author Accepted Manuscript)
5 weaPons of mass seduction Performing Pop Masculinity To all intents and purposes Harry Styles, unofficial frontman of internationally renowned boy band One Direction, could easily be mistaken for a young Mick Jagger (see Figure 5.1). The men’s good looks, broad smiles, matching windswept hair styles and shared fashion sensibilities bridge a 51-year age gap. Both are singers who have enjoyed the adoration of a passionate fan following, yet in terms of the version of masculinity each represents, the two could not be more different. While Jagger is openly admired by both sexes, few men admit to being fans of Harry Styles whose following is commonly depicted as restricted to teen and pre-teen females. Unlike the older man, Styles radiates a wholesome, good humoured exuberance, appears to genuinely like female company and is never happier than when exalting the women in his life. He also differs from the Rolling Stones leader in showing a marked preference for older female partners, whereas Jagger figure 5.1 Harry Styles. 84 Weapons of Mass Seduction is always seen in the company of much younger women.1 Jagger’s androgy- nous charm is tinged with danger and more than a hint of misogyny: he has a reputation for treating his partners callously, and from the outset, chauvinism themes of mistrust permeated the Rolling Stones’ songbook.2 The younger singer is also androgynous but his failure to comply with core characteristics of normative masculinity underscores much of the antipathy directed towards by critics, highlighting deeply entrenched prejudice against those who fail to comply with accepted expressions of gender. -
Boenig-Liptsin / Entrepreneurs of the Mind / 1 Citizen's Mind
Margo Boenig-Liptsin SIGCIS Workshop, November 9, 2014 Work in !rogress Session "orking draft – please do not cite (ear SIGCIS Workshop !articipants) *hank you $or reading this partial draft of one of my dissertation 'hapters) I-m submitting to your review a draft of a 'hapter $rom the mi##&e of my dissertation, therefore to contextualize the "riting that you "i&& be reading, I inc&ude be&ow an abstract of my "hole dissertation project and a chapter out&ine. 2s you "i&& see, this early draft of Chapter 2 is based primari&y on empirical research of my three national cases1 I haven't yet integrated into it any secondary &iterature. I "ould be very gratef,& $or your suggestions of re$erences that you $eel "ould be interesting $or me to incorporate/refect upon, especial&y $rom the &iterature on the history of computing, given the topi's that I am exploring in this chapter or in the dissertation as a "hole. *his early draft is also missing complete $ootnotes—they are current&y 0ust notes $or mysel$ and references that I need to tidy up. I-m gratef,& $or al& of your comments, "hich "i&& no doubt make the next #raft of this signifcant&y better) Best "ishes, Margo (issertation abstract Making the Citi/en of the Information 2ge7 2 comparative study of computer &iteracy programs $or 'hi&dren, 1960s-1990s My dissertation is a comparative history of the frst computer &iteracy programs $or chi&dren. *he project examines how programs to introduce 'hi&dren to computers in the 9nited States, :rance, and the Soviet 9nion $rom the 1960s to 1990s embodied political, epistemic, and moral debates about the kind of citi/en required $or &i$e in the 21st century. -
Agent-Based Modeling with Netlogo
Agent-Based Modeling with NetLogo Uri Wilensky Center for Connected Learning and Computer-Based Modeling Northwestern Institute on Complex Systems Departments of Computer Science & Learning Sciences Northwestern University Agent-Based Modeling in NetLogo SFI MOOC, Summer 2016 1 History: Roman to Hindu-Arabic Europe – at the turn of the first millenium • Before widespread adoption of Hindu-Arabic, very few could do multiplication/division • Scientists recognized superiority immediately • But widespread adoption took a very long time • Was in surreptitious use, but not official 2 Restructurations Structurations -- the encoding of the knowledge in a domain as a function of the representational infrastructure used to express the knowledge Restructurations -- A change from one structuration of a domain to another resulting from a change in representational infrastructure --- Wilensky & Papert 2006;2010 What is important and hard for people today? Similar to numeracy importance for science but difficulties in understanding, today we need to make sense of complex systems yet we find it difficult. What are Complex Systems? • Systems with a large number of interacting parts, evolving over time • Decentralized decisions vs. centralized control • Emergent global patterns from local interactions and decisions • Examples: ecosystems, economies, immune systems, molecular systems, minds, stock market, democratic government... Emergent Phenomena • Structure (Rules) at Micro- level leads to pattern at Macro- level • Order without Design • No leader or orchestrator -
Functional Thinking
Functional Thinking director / software architect NEAL FORD meme wrangler ® ThoughtWorks [email protected] 2002 Summit Boulevard, Atlanta, GA 30319 nealford.com thoughtworks.com memeagora.blogspot.com @neal4d 1 a metaphor an essay a history lesson 2 3 4 new language: easy new paradigm: hard 5 “functional” is more a way of thinking than a tool set 6 Execution in the Kingdom of Nouns Steve Yegge http://steve-yegge.blogspot.com/ 2006/03/execution-in-kingdom-of-nouns.html 7 v e r b s ! 8 ! 9 http://oreilly.com/news/languageposter_0504.html 1954 1957 1960 1965 1970 1975 1980 1985 1990 1995 2000 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 PostScript level 3 PostScript level 3 PostScript PostScript level 2 PostScript level 3 v 3016 v 3017 1982 1992 september 11, 1996 OO Forth 2003 september 11, 2005 1987 Forth FIG-Forth Forth-83 ANS Forth ISO Forth 1968 1978 1983 1986 1997 Logo Object Logo Tcl Tcl/Tk Tcl/Tk 8.1 Tcl/Tk 8.2.3 Tcl/Tk 8.3 Tcl/Tk 8.4 Tcl/Tk 8.4.1 Tcl/Tk 8.4.2 Tcl/Tk 8.4.3 Tcl/Tk 8.4.4 Tcl/Tk 8.4.5 Tcl/Tk 8.4.6 Tcl/Tk 8.4.7 Tcl/Tk 8.4.8 Tcl/Tk 8.4.9 Tcl/Tk 8.4.11 Tcl/Tk 8.4.12 Tcl/Tk 8.4.13 Tcl/Tk 8.4.14 Tcl/Tk 8.4.15 Tcl/Tk 8.5 Tcl/Tk 8.5.5 Tcl/Tk 8.5.6 Tcl/Tk 8.5.7 Tcl/Tk 8.5.9 1968 1986 mid 1988 end 1988 april 1999 dec. -
Fostering Learning in the Networked World: the Cyberlearning Opportunity and Challenge
Inquiries or comments on this report may be directed to the National Science Foundation by email to: [email protected] “Any opinions, findings, conclusions and recommendations expressed in this report are those of the Task Force and do not necessarily reflect or represent the views of the National Science Foundation.” Fostering Learning in the Networked World: The Cyberlearning Opportunity and Challenge A 21st Century Agenda for the National Science Foundation1 Report of the NSF Task Force on Cyberlearning June 24, 2008 Christine L. Borgman (Chair), Hal Abelson, Lee Dirks, Roberta Johnson, Kenneth R. Koedinger, Marcia C. Linn, Clifford A. Lynch, Diana G. Oblinger, Roy D. Pea, Katie Salen, Marshall S. Smith, Alex Szalay 1 We would like to acknowledge and give special thanks for the continued support and advice from National Science Foundation staff Daniel Atkins, Cora Marrett, Diana Rhoten, Barbara Olds, and Jim Colby. Andrew Lau of the University of California at Los Angeles provided exceptional help and great spirit in making the distributed work of our Task Force possible. Katherine Lawrence encapsulated the Task Force’s work in a carefully crafted Executive Summary. Fostering Learning in the Networked World: The Cyberlearning Opportunity and Challenge A 21st Century Agenda for the National Science Foundation Science Foundation the National for A 21st Century Agenda Report of the NSF Task Force on Cyberlearning Table of Contents Executive Summary...............................................................................................................................................................................................................................5 -
Scanned Document
OJ )> Vl () 0 ,0 ,m' I 1-V II&JS mm&Radio4 I nederlandse ornroep stichting I THE CHIP SHOP BASICODE2 mmmRadio4 - Broadcasting Support Services CONTENTS ©NOS nederlandse omroep stichting, Hilversum, Netherland 1. INTRODUCTION 5 ISBN 0-906965-14-4 2. HOW TO USE BASICODE-2 7 This edition first published by Broadcasting Support Services January 1984 3. BASICODE- THE SPECIFICATIONS 9 THE CHIP SHOP BBC Radio4 4. BASICODE-2 PROTOCOL 12 British Broadcasting Corporation Portland Place 5. APPLE II & lie 26 London W1A 1AA 6. BBC (A& B) 29 All rights reserved. This handbook and the accompanying computer programs are copyright. No part of this handbook or 7. COMMODORE COMPUTERS 31 the accompanying computer programs may be reproduced, 8. SHARP MZSOA 36 translated, copied or transmitted by any means whatsoever without the prior written permission of the copyright owners. 9. SINCLAIR ZX81 37 The publisher assumes no responsibility for errors, nor liability 10. TANDY TRS-80 & VIDEOGENIE 41 for loss or damage, however caused, arising from the use of the Basicode 2 kit. 11. THE FUTURE 47 The BASICODE-2 kit is available for £3.95 frorr:: Broadcasting Support Services P.O. Box? London W3 6XJ Please make cheques or postal orders payable to Broadcasting Support Services. Published for The Chip Shop, Radio 4, by Broadcasting Support Services- an independent educational charity providing follow up services for viewers and listeners. Introduction Chapter One BASICODE-2 INTRODUCTION BASICODE has been developed by the radio programme Hobbyscoop This book and the accompanying cassette contain the details of NOS which is broadcast weekly by Nederlanse Omroep Stichting (NOS), BASICODE. -
A Critique of Abelson and Sussman Why Calculating Is Better Than
A critique of Abelson and Sussman - or - Why calculating is better than scheming Philip Wadler Programming Research Group 11 Keble Road Oxford, OX1 3QD Abelson and Sussman is taught [Abelson and Sussman 1985a, b]. Instead of emphasizing a particular programming language, they emphasize standard engineering techniques as they apply to programming. Still, their textbook is intimately tied to the Scheme dialect of Lisp. I believe that the same approach used in their text, if applied to a language such as KRC or Miranda, would result in an even better introduction to programming as an engineering discipline. My belief has strengthened as my experience in teaching with Scheme and with KRC has increased. - This paper contrasts teaching in Scheme to teaching in KRC and Miranda, particularly with reference to Abelson and Sussman's text. Scheme is a "~dly-scoped dialect of Lisp [Steele and Sussman 19781; languages in a similar style are T [Rees and Adams 19821 and Common Lisp [Steele 19821. KRC is a functional language in an equational style [Turner 19811; its successor is Miranda [Turner 1985k languages in a similar style are SASL [Turner 1976, Richards 19841 LML [Augustsson 19841, and Orwell [Wadler 1984bl. (Only readers who know that KRC stands for "Kent Recursive Calculator" will have understood the title of this There are four language features absent in Scheme and present in KRC/Miranda that are important: 1. Pattern-matching. 2. A syntax close to traditional mathematical notation. 3. A static type discipline and user-defined types. 4. Lazy evaluation. KRC and SASL do not have a type discipline, so point 3 applies only to Miranda, Philip Wadhr Why Calculating is Better than Scheming 2 b LML,and Orwell. -
Cpp-Skript SS18.Pdf
Programmierung mit C++ für Computerlinguisten CIS, LMU München Max Hadersbeck Mitarbeiter Daniel Bruder, Ekaterina Peters, Jekaterina Siilivask, Kiran Wallner, Stefan Schweter, Susanne Peters, Nicola Greth — Version Sommersemester 2018 — Inhaltsverzeichnis 1 Einleitung1 1.1 Prozedurale und objektorientierte Programmiersprachen . .1 1.2 Encapsulation, Polymorphismus, Inheritance . .1 1.3 Statische und dynamische Bindung . .2 1.4 Die Geschichte von C++ . .2 1.5 Literaturhinweise . .3 2 Traditionelle und objektorientierte Programmierung4 2.1 Strukturiertes Programmieren . .4 2.2 Objektorientiertes Programmieren . .5 3 Grundlagen7 3.1 Installation von Eclipse und Übungsskript . .7 3.2 Starten eines C++ Programms . .7 3.3 Allgemeine Programmstruktur . .8 3.4 Kommentare in Programmen . 10 3.5 Variablen . 11 3.5.1 Was sind Variablen? . 11 3.5.2 Regeln für Variablen . 12 3.5.3 Grundtypen von Variablen . 12 3.5.4 Deklaration und Initialisierung von Variablen . 13 3.5.5 Lebensdauer von Variablen . 14 3.5.6 Gültigkeit von Variablen . 15 3.6 Namespace . 16 3.6.1 Defaultnamespace . 16 3.7 Zuweisen von Werten an eine Variable . 17 3.8 Einlesen und Ausgeben von Variablenwerten . 19 3.8.1 Einlesen von Daten . 19 3.8.2 Zeichenweises Lesen und Ausgeben von Daten . 21 3.8.3 Ausgeben von Daten . 22 3.8.4 Arbeit mit Dateien . 23 3.8.4.1 Textdateien unter Unix ................... 23 3.8.4.2 Textdateien unter Windows ................ 24 3.8.4.3 Lesen aus einer Datei . 25 3.8.4.4 Lesen aus einer WINDOWS Textdatei . 26 i ii Inhaltsverzeichnis 3.8.4.5 Schreiben in eine Datei . 26 3.9 Operatoren . -
BBN and Computer Technology Timeline 1948 • Establishment Of
BBN and Computer Technology Timeline 1948 • Establishment of Bolt Beranek and Newman Inc. (BBN) 1958 • Purchase of BBN's first computer, an LPG-30, manufactured by the Royal McBee Company 1959 • Purchase of PDP-1 from the Digital Equipment Corporation (DEC); Serial #0 [??] 1960 • Design of a priority-interrupt system for the PDP-1. • Development of Cyclops, an AI program for pattern recognition. 1962 • Public demonstration of computer time-sharing. 1963 • Demonstration of Data Dial, a modem to enable remote communication with computers by telephone. 1964 • Public demonstration of a computer-based communications system for the Massachusetts General Hospital. • Development of MENTOR and the SOCRATIC SYSTEM, systems for computer- based mixed-initiative tutoring. 1965 • Development of TELCOMP, an interactive computer language. • Development of the Grafacon, a tablet for scanning and digitizing graphic data. • Publication of Libraries of the Future, a consideration of the implications of computer technology for future libraries, based on a project for the Council of Library Resources. 1966 • Creation of LOGO, a computer programming language designed especially for use by children. 1967 • Formation of Time Share Ltd., a subsidiary offering computing services in the UK. 1968 • Development of packet-switching protocols for the ARPANET 1969 • Launching of the ARPANET; demonstration of four-node network. • Automation of odd-lot stock transactions for the Pacific Coast Stock Exchange. • Grammatical analysis of English text by augmented transition networks. 1970 • Development of TENEX, a virtual-memory operating system for DEC computers. • Demonstration of SCHOLAR, a computer-based system that modeled a Socratic tutor. • 1971 Transmission of person-to-person email message using the @ sign. -
A Simplified Introduction to Virus Propagation Using Maple's Turtle Graphics Package
E. Roanes-Lozano, C. Solano-Macías & E. Roanes-Macías.: A simplified introduction to virus propagation using Maple's Turtle Graphics package A simplified introduction to virus propagation using Maple's Turtle Graphics package Eugenio Roanes-Lozano Instituto de Matemática Interdisciplinar & Departamento de Didáctica de las Ciencias Experimentales, Sociales y Matemáticas Facultad de Educación, Universidad Complutense de Madrid, Spain Carmen Solano-Macías Departamento de Información y Comunicación Facultad de CC. de la Documentación y Comunicación, Universidad de Extremadura, Spain Eugenio Roanes-Macías Departamento de Álgebra, Universidad Complutense de Madrid, Spain [email protected] ; [email protected] ; [email protected] Partially funded by the research project PGC2018-096509-B-100 (Government of Spain) 1 E. Roanes-Lozano, C. Solano-Macías & E. Roanes-Macías.: A simplified introduction to virus propagation using Maple's Turtle Graphics package 1. INTRODUCTION: TURTLE GEOMETRY AND LOGO • Logo language: developed at the end of the ‘60s • Characterized by the use of Turtle Geometry (a.k.a. as Turtle Graphics). • Oriented to introduce kids to programming (Papert, 1980). • Basic movements of the turtle (graphic cursor): FD, BK RT, LT. • It is not based on a Cartesian Coordinate system. 2 E. Roanes-Lozano, C. Solano-Macías & E. Roanes-Macías.: A simplified introduction to virus propagation using Maple's Turtle Graphics package • Initially robots were used to plot the trail of the turtle. http://cyberneticzoo.com/cyberneticanimals/1969-the-logo-turtle-seymour-papert-marvin-minsky-et-al-american/ 3 E. Roanes-Lozano, C. Solano-Macías & E. Roanes-Macías.: A simplified introduction to virus propagation using Maple's Turtle Graphics package • IBM Logo / LCSI Logo (’80) 4 E. -
4. the BBC BASIC Assembler
ARM Assembly Language Programming - Chapter 4 - The BBC BASIC Assembler 4. The BBC BASIC Assembler There are two main ways of writing ARM assembly language programs. One is to use a dedicated assembler. Such a program takes a text file containing ARM assembly language instructions, assembles it, and produces another file containing the equivalent machine code. These two files are called the source files and object files respectively. An alternative approach is to use the assembler built-in to BBC BASIC. The ability to mix assembler with BASIC is a very useful feature of the language, and one that is relatively straightforward to use. For this reason, and because of the widespread availability of BBC BASIC, we describe how to use its built-in assembler. The examples of the next two chapters are also in the format expected by the BASIC assembler. 4.1 First principles Two special 'statements' are used to enter and exit from the assembler. The open square bracket character, [, marks the start of assembly language source. Whenever this character is encountered where BASIC expects to see a statement like PRINT or an assignment, BASIC stops executing the program and starts to assemble ARM instructions into machine code. The end of the source is marked by the close square bracket, ]. If this is read where BASIC is expecting to see an instruction to be assembled, it leaves assembler mode and starts executing the (BASIC) program again. To see the effect of entering and leaving the assembler, type in this short program: 10 PRINT "Outside the assembler" 20 [ ;In the assembler 30 ] 40 PRINT "Outside the assembler" If you RUN this, you should see something like the following: Outside the assembler 00000000 ;In the assembler Outside the assembler Between the two lines produced by the PRINT statements is one which the assembler printed.