CSCE 190: Computing in the Modern World (Spring 2010)
Corequisites: CSCE 145, 204, 206, or equivalent
Meeting time and venue: T 1530-1620 in 300M B213
Instructor: Marco Valtorta
Office: Swearingen 3A55, 777-4641
E-mail:
mgv@cse.sc.edu
Office Hours:
MWF 11-noon, or by previous appointment.
Reference Materials:
- There is no required textbook for this course.
- This course will be taught with multiple materials provided to you during
the semester. In addition, there are a number of books and papers that are
worth reading about computing, its past, and its future. You may find the
web sites of the previous CSCE 190 class web sites of
Dr. Buell interesting.
Objectives
This course is intended to provide you with the bigger picture of how computing
fits into the modern world and why there is more to "computing" than just
"programming." Unlike nearly everything else taught in the department, this
will not be a highly technical course. We encourage you to participate in the
discussions and ask questions. The course will involve several other faculty
members at the department and external professionals working in the fields of
computer science, computer engineering, and computer information systems.
Outcomes
- An understanding of the big picture of computing. {tests}
- Knowledge of milestone events in the history of computing and what the
future of computing may look like {tests and the proposal}
- Knowledge of some advanced directions in computing research {tests and the
proposal}
- A familiarity with career trends in computing {tests}
Questionnaires
Beginning of course questionnaire, with answers to the
factual questions.
Notes
-
Computing Curricula at USC
-
Computer Security and Information
Assurance, lecture by Dr. Csilla Farkas, given on 2010-01-26
-
Artificial Intelligence
-
The CEC Satellite Office of the USC
Career Center
-
Trends in the Infrastructure of
Computing: Processing, Storage, Bandwidth, lecture by Dr. Jason Bakos,
given on 2010-02-16
-
Computing Challenges in Robotics
by Dr. Jason O'Kane,
given on 2010-02-23
-
Research Methodologies in Computing, lecture given
on 2010-03-01
-
Some Pattern
of Reasoning and Bayesian Networks, lecture given on 2010-03-16
-
Notes from lecture of 2010-03-16
-
Two Examples of Uncertain Reasoning
with Bayesian Networks (Icy Roads and Wet Lawn), used in the lecture given
on 2010-03-16
-
Introduction to Logic
Programming, used in the lecture given on 2010-03-23
-
Introduction to Functional
Programming, used in the lecture given on 2010-03-30
-
Key Traits of a Good Software Developer,
lecture by David Dunn, Founder and CEO of VC3, 2010-04-20
Quizzes and In-class Exercises
Homework and Projects
Points per assignment.
- (HW1, due Tuesday, January 19, 2010)
Write an essay about definitions of Computer Science.
Search for several of them. Choose at least three of them.
Write
a 3-page essay, double-spaced, in 12-point font, in which you describe the
definitions you chose, compare them, and conclude with an argument for one of
the three definitions and, if you like, your own improvements to that
definition.
References must be listed after the conclusion and cited in the main text.
Quote appropriately. Do not plagiarize!
- (HW2, due Tuesday, February 2, 2010)
-
Argue against internet censorship at the national level.
Write a 1-page essay, double-spaced, in 12-point font.
-
Argue in favor of internet censorship at the national level.
Imagine that you are a government official in a foreign country and need to
justify your country's policy of internet censorship for the general population.
Write a 1-page essay, double-spaced, in 12-point font.
You may like to search for information on the censorship policies of countries
that actually do it and see what justifications they give.
(You may feel that internet censorship is bad,
but please do this assignment as requested.)
-
Turn in your work, containing both essays, as a single stapled document.
- (HW3, due Tuesday, February 9, 2010)
Write a 2-page essay, double-spaced, in 12-point font, as follows.
Read Turing's original paper on AI: Alan Turing. Computational
Machinery and Intelligence. Mind, 59, 433-460, 1950. List the arguments
against artificial intelligence written in section 6 of Turing's paper. (The
paper is linked to the course web site.)
Choose three of the arguments and describe them in detail.
Do you agree with Turing's conclusion? Argue for or against.
- (HW4, due Tuesday, February 16, 2010)
Choose a company where you would like to apply for a position. Write:
- A one-page overview of the company
- A one-page overview of the position that you would apply for
- A one-page resume geared towards that position
- A half-page essay on what you need to learn or do to be competitive for the
position
- Attend the SET Career Fair on Monday, February 15 and write a half-page
essay describing your experience
- Register on Jobmate at the USC Career Center. Write a statement that you
registered on the first page of your homework submission document.
- (HW5, due Tuesday, April 20, 2010) Choose three topics of professional interest
from ACM TechNews archives.
Each should include a
non-trivial ethical issue and a non-trivial technical issue.
For wach topic, write a
1-page, single-spaced paper in
which (1) you summarize the topic (with appropriate
references), (2) you describe the main technical issue(s) that was solved,
(3) you describe at least one ethical issue raised by the topic, (4) you
identify one issue that makes practical (commercial or otherwise)
application difficult, (5) you identify one technical issue that you would like
to contribute to solve and would advance the state of the art in the area of
the topic you chose.
-
Make sure that you have grades for all homework assignments: (1) check
blackboard; (2) submit late; (3) resubmit for better grade, although I do not
guarantee that I will change previous grades!
Lecture Log
The USC Blackboard
has a site for this course.
Some Useful Links
-
Norman Matloff's Introduction to the vi Text editor
-
Norman Matloff's Unix Tutorial Center
- New USC and
CEC Student E-Mail System!
- ACM Citation
Style and Reference Format. (Note that this does not specify how to refer
to web documents.)
-
IEEE Citation Style Guide
-
Another IEEE Citation Style Guide
- Two papers related to the presentation on cybersecurity and information
assurance by Dr. Csilla Farkas:
-
Bruce Schneier, "U.S. enables Chinese hacking of Google,"
CNN Opinion, Jan. 2010.
-
Monica Chew Dirk Balfanz Ben Laurie, "(Under)mining Privacy in Social Networks,"
in Proceedings of Web 2.0 Security and Privacy 2009.
- Information Systems Security Association
-
Alan Turing's
``Computing Machinery and Intelligence,''
Mind, 49 (1950), pp.433-460
, in HTML format.
- A panel discussion
about Artificial Intelligence, from the Charlie Rose show
- Career-related links
- Career Center at CEC
- Career Center at USC (main site)
- ACM Career and
Job Center
- ACM CareerNews
- ACM Computing Degrees and
Careers Guide
- Links concerning professional codes of ethics
- The ACM Code of Ethics
and Professional Conduct
- The Software Engineering Code of
Ethics and Professional Practice
- The Ten Commandments of
Computer Ethics (from the site of Computer Professional for Social
Responsibility)
- Gotterbarn, D. and
Miller, K. W. 2004. Computer ethics in the undergraduate curriculum: case
studies and the joint software engineer's code. J. Comput. Small Coll. 20, 2
(Dec. 2004), 156-167.
- Local copy of the above.