... | ... | @@ -69,17 +69,19 @@ If you don't remember how to flash code to your Micro::Bit, see the instructions |
|
|
|
|
|
2) Read the **running instructions** below to get an idea of how the final program should work.
|
|
|
|
|
|
3) Find a partner that programmed their Micro::Bit in the same language as you (so if you used JavaScript, find someone who also used JavaScript).
|
|
|
3) Follow the instructions in the Python or Javascript fitTrack_base file to complete the program
|
|
|
|
|
|
4) Begin by choosing who will be the tracker and who will be the hacker. The tracker will be the user of a fitness tracker. They will use their Micro::Bit to collect data about their movements. The other partner, the hacker, will obtain their data. See the **running instructions** for how to run the experiment.
|
|
|
4) Find a partner that programmed their Micro::Bit in the same language as you (so if you used JavaScript, find someone who also used JavaScript).
|
|
|
|
|
|
5) Follow the **running instructions** to run the program and analyze the data. These instructions will explain how to graph the data. From the graph, the hacker should make a guess about the activities that the tracker was doing (walking, running, jumping, and so on).
|
|
|
5) Begin by choosing who will be the tracker and who will be the hacker. The tracker will be the user of a fitness tracker. They will use their Micro::Bit to collect data about their movements. The other partner, the hacker, will obtain their data. See the **running instructions** for how to run the experiment.
|
|
|
|
|
|
6) Switch hacker and tracker roles and run again. After analyzing the data, have the new hacker make a guess about the activities of the new tracker.
|
|
|
6) Follow the **running instructions** to run the program and analyze the data. These instructions will explain how to graph the data. From the graph, the hacker should make a guess about the activities that the tracker was doing (walking, running, jumping, and so on).
|
|
|
|
|
|
7) Chat with your partner about the issues with wireless data transmission. What are some potential solutions to these problems? Can you think of a simple encryption solution that allows you to mask the data being sent? Can you reverse the encryption to use the data?
|
|
|
7) Switch hacker and tracker roles and run again. After analyzing the data, have the new hacker make a guess about the activities of the new tracker.
|
|
|
|
|
|
8) With your partner, employ a solution in your code. Run the experiment one last time and to see if your solution worked. What worked well in your solution? How could your solution be improved?
|
|
|
8) Chat with your partner about the issues with wireless data transmission. What are some potential solutions to these problems? Can you think of a simple encryption solution that allows you to mask the data being sent? Can you reverse the encryption to use the data?
|
|
|
|
|
|
9) With your partner, employ a solution in your code. Run the experiment one last time and to see if your solution worked. What worked well in your solution? How could your solution be improved?
|
|
|
|
|
|
### Running Instructions
|
|
|
1) Designate 1 Micro::Bit as the receiver and 1 as the fitness tracker, both will have the same program written to them. However, one must be plugged into the computer to receive the data.
|
... | ... | |