74 research outputs found

    Teaching informatics to novices: big ideas and the necessity of optimal guidance

    Get PDF
    This thesis reports on the two main areas of our research: introductory programming as the traditional way of accessing informatics and cultural teaching informatics through unconventional pathways. The research on introductory programming aims to overcome challenges in traditional programming education, thus increasing participation in informatics. Improving access to informatics enables individuals to pursue more and better professional opportunities and contribute to informatics advancements. We aimed to balance active, student-centered activities and provide optimal support to novices at their level. Inspired by Productive Failure and exploring the concept of notional machine, our work focused on developing Necessity Learning Design, a design to help novices tackle new programming concepts. Using this design, we implemented a learning sequence to introduce arrays and evaluated it in a real high-school context. The subsequent chapters discuss our experiences teaching CS1 in a remote-only scenario during the COVID-19 pandemic and our collaborative effort with primary school teachers to develop a learning module for teaching iteration using a visual programming environment. The research on teaching informatics principles through unconventional pathways, such as cryptography, aims to introduce informatics to a broader audience, particularly younger individuals that are less technical and professional-oriented. It emphasizes the importance of understanding informatics's cultural and scientific aspects to focus on the informatics societal value and its principles for active citizenship. After reflecting on computational thinking and inspired by the big ideas of science and informatics, we describe our hands-on approach to teaching cryptography in high school, which leverages its key scientific elements to emphasize its social aspects. Additionally, we present an activity for teaching public-key cryptography using graphs to explore fundamental concepts and methods in informatics and mathematics and their interdisciplinarity. In broadening the understanding of informatics, these research initiatives also aim to foster motivation and prime for more professional learning of informatics

    Castle and Stairs to Learn Iteration: Co-Designing a UMC Learning Module with Teachers

    Get PDF
    This experience report presents a participatory process that involved primary school teachers and computer science education researchers. The objective of the process was to co-design a learning module to teach iteration to second graders using a visual programming environment and based on the Use-Modify-Create methodology. The co-designed learning module was piloted with three second-grade classes. We experienced that sharing and reconciling the different perspectives of researchers and teachers was doubly effective. On the one hand, it improved the quality of the resulting learning module; on the other hand, it constituted a very significant professional development opportunity for both teachers and researchers. We describe the co-designed learning module, discuss the most significant hinges in the process that led to such a product, and reflect on the lessons learned

    A necessity-driven ride on the abstraction rollercoaster of CS1 programming

    Get PDF
    International audienceIntroductory programming courses (CS1) are difficult for novices. Inspired by Problem solving followed by instruction and Productive Failure approaches, we define an original "necessity driven" learning design. Students are put in an apparently well-known situation, but this time they miss an essential ingredient (the target concept) to solve the problem. Then, struggling to solve it, they experience the necessity of that concept. A direct instruction phase follows. Finally, students return to the problem with the necessary knowledge to solve it. In a typical CS1 learning path, we recognise a challenging "rollercoaster of abstraction". We provide examples of learning sequences designed with our approach to support students when the abstraction changes (both upward and downward) inside the programming language, for example, when a new construct (and the related syntactical, conceptual, and strategic knowledge) is introduced. Also, we discuss the benefits of our design in light of Informatics education literature

    Programmare per imparare la crittografia al Liceo Matematico

    Get PDF
    Descriviamo un corso di introduzione alle “grandi idee” della crittografia, pensato per il secondo anno del Liceo Matematico. Sua caratteristica fondamentale è l’approccio “per scoperta”: viene proposta una successione di crittosistemi (dai classici ai più moderni), di ciascuno dei quali lo studente puó sperimentare caratteristiche, possibili attacchi e limi- ti, sentendo la necessità di scoprire il successivo. Abbiamo usato Snap! (un linguaggio di programmazione visuale a blocchi) sia per costruire dei playground (linguaggi di pro- grammazione task-specific, con una ridottissima selezione mirata di istruzioni) con cui spe- rimentare i diversi schemi, sia per guidare un’attività unplugged sul protocollo di Diffie- Hellman. Il lavoro presenta in dettaglio il percorso, le attività e il materiale, nonché una prima valutazione dell’intervento didattico, condotta dopo due edizioni (la prima online e la seconda in presenza)

    Apprendimento della programmazione guidato dalla necessità: il Necessity Learning Design

    Get PDF
    Descriviamo una metodologia didattica originale, il Necessity Learning Design, in cui gli studenti cercano di risolvere un problema per il quale serve un concetto di programmazione che ancora non co- noscono, sentendone quindi la necessita`. Le fasi di spiegazione e di soluzione seguono. Descriviamo i primi risultati di una sperimentazione di questa metodologia in un istituto tecnico informatico

    Cryptography in Grade 10: Core Ideas with Snap! and Unplugged

    Get PDF
    International audienceWe report our experience of an extracurricular online intervention on cryptography in Grade 10. Our first goal is to describe how we taught some fundamental cryptography ideas by making students encounter a progression of representative cryptosystems, from classical to modern, and discover their characteristics and limitations. We used Snap! (a visual programming language) to realize hands-on activities: block-programming playgrounds (a form of task-specific programming languages) to experiment with cryptosystems, and an interactive app to support an unplugged (albeit remote) Diffie-Hellman key agreement. After experimenting with each system, the students were involved in a Socratic discussion on how to overcome the discovered limitations, motivating the introduction of the following system in our path. Our second goal is to evaluate the students' perceptions and learning of cryptography core ideas. They appreciated the course and felt that, despite being remote, it was fun and engaging. According to the students, the course helped them understand the role of cryptography, CS, and Math in society and sparked their interest in cryptography and CS. The final assessment showed that the students well understood the cryptography ideas addressed. Our third goal is to discuss what worked and areas of improvement. The "remote-unplugged" Diffie-Hellman, where the meeting chat was a metaphor for the public channel, engaged the students in understanding this groundbreaking protocol. Overall, they praised the activities as engaging, even when challenging. However, a strong "instructor blindness" induced by remote teaching often prevented us from giving the students the right amount of guidance during the exploration activities

    Cryptography as a field to foster interactions between mathematics and informatics, and algorithms. Analysis of a didactical situation

    Get PDF
    We present the conception and analysis of a situation dealing with the principles of public-key cryptography and aiming at exploring informatics and mathematical concepts and methods. We rely on the Theory of Didactical Situations to design a situation (based on an unplugged activity) about public-key cryptography using graphs. After the preliminary analysis of the content, we conceived a didactical situation and developed its a priori analysis. The description of the associated solving strategies illustrates the interplay between mathematics and informatics, and the role of algorithms and algorithmic thinking

    The Good, The Bad, and The Ugly of a Synchronous Online CS1

    Get PDF
    International audienceThis poster illustrates how we redesigned the CS1 course for Math undergraduates to be held online but reflecting the face-to-face (F2F) experience as much as possible. We describe the course structure and the strategies we implemented to maintain the benefits of a synchronous experience. We present the positive and negative aspects that emerged from the students' opinion analysis. We highlight what worked, what did not, and what can be improved to strengthen the perception of a F2F experience and mitigate the "presence paradox" we found: although students are enthusiastic about the online format, most would still prefer a F2F course

    The Online Course Was Great: I Would Attend It Face-to-Face: The Good, The Bad, and the Ugly of IT in Emergency Remote Teaching of CS1

    Get PDF
    International audienceWe describe how we redesigned, because of the 2020 COVID-19 pandemic, the CS1 course for Math undergraduates to be held online yet reflecting the face-to-face (F2F) experience as much as possible. We present the course structure, the IT tools we used, and the strategies we implemented to preserve the benefits of a synchronous experience. We discuss the positive and negative aspects that emerged from the students' opinion qualitative analysis. We use the COI framework as a lens to explain what worked, what did not, and what can be improved to strengthen the perception of a F2F experience and mitigate the "presence paradox" we found: despite students being enthusiastic about the online format, most would still prefer a F2F course
    corecore