Personal Advice on High School Computer Science
Ed Amoroso offers personal advice - and a recommended eBook - for improving high school computer science education.

Personal Advice on High School Computer Science

Yesterday, I spent two hours with my daughter – a junior in high school – trying to help her process string input in a reasonably complex Java program. Mind you, this is only week two in her computer science studies and while she eventually got the program to execute, I suspect that she understands maybe 25% of the subtle syntactic and semantic issues involved. The truth is that her class should be going much more slowly through the basics.

This rush to complex coding is concerning because it trains young programmers to partially understand what is going on – and to be delighted when the program seems to execute – sort of. One previous program I watched my daughter write, for example, involves the familiar decimal to binary – and it worked just fine. But the reverse program converting binary to decimal had a fatal (unnoticed) bug: It did not check whether the input was binary. This trains insecure coding.

I had a similar experience a few years ago when my son was in the same course – and the result was a book he and I wrote called “From Gates to Apps: An Introduction to Computer Science.” My daughter’s present experience has prompted me to revise that book into eBook form – and I hope you will consider buying one for your own child. You can easily download it for $9.99 on Amazon.com and it can make a substantive difference.

The philosophy in that book, which was developed over a lifetime of teaching computer science, is this: Computing is based on the power of abstraction. By building a solid foundation embedded in logic gates and hardware design, it becomes easy to explain simple coding and how translators then create the possibility for high level languages. Only then should you start programming. If you skip the early steps, you cripple young minds forever.

By the way, I fully recognize that advanced high school courses in computer science are designed to prepare students for the AP exam. It's been my experience that slowing down up front and focusing on the basics is the best way to do this. At minimum, teachers and parents should ensure that students are developing a more concrete understanding in parallel with all this crazy coding preparation for the exam.

One more thing: Parents love to say that their Liam or Ava (it was Mary or Billy when I was in school) is a super advanced programmer and needs to be challenged. Well to them, I would offer the following: Forward their last complex homework assignment to a truly professional programmer for analysis: Prepare for a response that shows dozens of errors in the code.

I wish I could say that this does not matter, but the reality is that studies in computer science at the high school and undergraduate level are as critical to the United States as perhaps any issue I can imagine. We seem to only address what’s urgent, at the risk of ignoring what’s important. My favorite cartoon is the one showing a man sitting on a rocking chair reading to his child under the caption: “The real seat of power.”

Please consider having your child download the eBook onto their mobile, and perhaps you might read it together. Go through one chapter a day, and you'll be done in thirty days. This might be the most important thing you can do today for your child - and for your country! And as a favor to all of us, please forward this short note to the computer science teacher in your school.

Kevin Manson

Lawyer, Trusted Introducer, Former US Senate Staff Counsel (early 80’s for Senator Bob Dole), Former State Assistant Attorney General, Judge and Retired Senior Legal Division Instructor at FLETC.GOV "IP On Everything"

7 年

“And as a favor to all of us, please forward this short note to the computer science teacher in your school.” Gladly, Ed ! I’ll also see to it that parents, sponsors and schools represented in our CyberSpace Camps are given the great benefit of your sage wisdom injected into their STEM/Computer Science curricula.

  • 该图片无替代文字
Kevin Manson

Lawyer, Trusted Introducer, Former US Senate Staff Counsel (early 80’s for Senator Bob Dole), Former State Assistant Attorney General, Judge and Retired Senior Legal Division Instructor at FLETC.GOV "IP On Everything"

7 年

After a presentation I gave several years ago to the INFRAGARD National Congress about CyberCamps which was followed up by four successful CyberCamps conducted by the Charlotte INFRAGARD Chapter, a group of my colleagues have been invited by the President/CEO of The Global Institute for Cybersecurity + Research Global Situational Awareness Center at the NASA/Kennedy Space Center for Space Education to conduct CyberSpace Camps at the Kennedy Center. One and two day CyberSpace Camps will be conducted at the Kennedy Space Center throughout the year, not just during the Summers. We’ll be focusing on STEM(+) topics such as online safety and good CyberCitizendhip as well as projects such as designing micro satellites :-) I’ll be pleased to discuss our plans with any interested organizations.

  • 该图片无替代文字
回复
Walter K.

Space Systems Security Engineer

7 年

I tell my kids, "Computers so exactly what you tell them to do, not what you want them to do". I also tell them it is important to slow down in the beginning when learning to code, so they learn how computers think and interpret those commands. I guess I have another book to add to my kids' reading list.

George Sconyers

Skilled cybersecurity / IT / organizational leader. I help firms protect and build the operating revenue streams required to achieve strategic objectives.

7 年

Interesting article Edward Amoroso. I am working with my elementary aged kids on Python before dropping to lower level languages and on to hardware. A core message has been "computers are stupid and do exactly what you (or someone else) tells them, so be sure you are asking what you think you are." Hadn't thought about starting with hardware to explain how the software is working though.

要查看或添加评论,请登录

Edward Amoroso的更多文章

  • Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    As you no doubt have heard, plans are in place to establish a Strategic Bitcoin Reserve and Digital Asset Stockpile…

    15 条评论
  • Parable of Network Observability

    Parable of Network Observability

    I’d like to discuss here a common problem we see in our work at TAG every day – namely, the deployment of “network…

    23 条评论
  • Parable of the Cyber Industrial Complex

    Parable of the Cyber Industrial Complex

    Preamble In 1961, Eisenhower gave a famous speech that warned of the dangers of the so-called military-industrial…

    34 条评论
  • The Challenges of CISOs Working for Cybersecurity Vendors

    The Challenges of CISOs Working for Cybersecurity Vendors

    (Note to Reader: Normally these reports are available only to TAG Research as a Service (RaaS) subscribers. But with…

    27 条评论
  • Have Uncle Joe Read This Before He Invests in Crypto

    Have Uncle Joe Read This Before He Invests in Crypto

    I’ve been lecturing to my graduate students on the foundations of cryptocurrency and blockchain for years. Starting…

    15 条评论
  • Why TAG is Now Rating Cybersecurity Vendors

    Why TAG is Now Rating Cybersecurity Vendors

    by Edward Amoroso The first time I ever paid attention to an analyst quadrant – fully two decades ago, I found myself…

    11 条评论
  • Predicting the Impact of Trump’s Election on Cyber

    Predicting the Impact of Trump’s Election on Cyber

    Below are seven predictions from our team at TAG for how the recent Trump election of 2024 will impact U.S.

    83 条评论
  • Five Tips for Working CISOs

    Five Tips for Working CISOs

    Our team at TAG has been coaching CISOs for years – and this includes private discussions just about every day of every…

    11 条评论
  • The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    Preface During May and June of 2024, draft versions of this article were shared with Chief Information Security…

    123 条评论
  • Sad Loss Today

    Sad Loss Today

    Several years ago, before the Pandemic, I received a friendly call from a law firm I’d done some business with – and…

    9 条评论

社区洞察

其他会员也浏览了