meta data for this page
Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
courses:ct60a7000:spring2016:critical:nikitavlasov [2016/04/27 02:23] m7642 |
courses:ct60a7000:spring2016:critical:nikitavlasov [2016/04/27 02:41] m7642 [Exam questions] |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | =====Personal Homework===== | + | ======Personal Homework====== |
====Task #1==== | ====Task #1==== | ||
Line 72: | Line 72: | ||
====Task #3==== | ====Task #3==== | ||
- | ***Society vs. individual. Select one community/society/group where you belong and reflect the societal pressures from society and individual perspectives. Point here is to analyze you perception of these pressures to both directions.* | + | **Society vs. individual. Select one community/society/group where you belong and reflect the societal pressures from society and individual perspectives. Point here is to analyze you perception of these pressures to both directions.** |
__Group:__ project development group in product development course | __Group:__ project development group in product development course | ||
Line 95: | Line 95: | ||
====Seminar 3==== | ====Seminar 3==== | ||
- | {{:courses:ct60a7000:spring2016:critical:8_9chapters.pdf|}} | + | Presentation slides for chapters 8&9 {{:courses:ct60a7000:spring2016:critical:8_9chapters.pdf|}} |
=====Online course===== | =====Online course===== | ||
Line 111: | Line 111: | ||
The question checks the understanding of the book's contents and let answerer to use his or her own examples to describe situaton and argumentate own position. | The question checks the understanding of the book's contents and let answerer to use his or her own examples to describe situaton and argumentate own position. | ||
- | **2. Which tools or instruments culd you suggest to protect your personal data from tracking, mining, etc.?** | + | **2. Which tools or instruments could you suggest to protect your personal data from tracking, mining, etc.?** |
The question motivate the people who answer it to think about all possible threats to personal data they can meet in their daily life. | The question motivate the people who answer it to think about all possible threats to personal data they can meet in their daily life. | ||
Line 119: | Line 119: | ||
This question allows checking of the comprehension of the book by Bruce Schneier: Liars and Outliers and starting of the own refelection, attitude and personal experience evaluating of the the one who answers this question. | This question allows checking of the comprehension of the book by Bruce Schneier: Liars and Outliers and starting of the own refelection, attitude and personal experience evaluating of the the one who answers this question. | ||
- | **4. What improvements are possible to security systems that make people trust them?** | + | **4. What improvements are possible to be made for security systems that make people trust them?** |
Question can enable critical thinking to the issue of people trust to governmaental institutes like police and develop deeper understanding of the problems connected with that issue. | Question can enable critical thinking to the issue of people trust to governmaental institutes like police and develop deeper understanding of the problems connected with that issue. | ||