Dans la masse des cyberattaques, les établissements de santé ont une place de choix. Les raisons sont multiples et forcent les centres de soin à s’adapter et à sécuriser leur système informatique du mieux qu’ils peuvent.
Les récentes cyberattaques contre la FFF, France Travail ou les mutuelles offrent une base de données « fraiches » que les cybercriminels pourraient exploiter en vue des Jeux Olympiques à Paris cet été.
Non, Toolong n’est pas ce qu’a dit votre correspondante américaine la première fois qu’elle vous a vu en maillot de bain. C’est plutôt (le chien) un outil vachement pratique qui s’utilise ne ligne de commande et qui permet d’afficher, suivre en temps réel, fusionner les fichiers de log et d’y rechercher tout ce que vous voulez.
L’outil est capable d’appliquer une petite coloration syntaxique sur les formats de journalisation classique comme ceux d’un serveur web par exemple. Il est également capable d’ouvrir très rapidement de gros fichiers même s’ils font plusieurs gigas.
Si vous travaillez avec des fichiers JSONL, Toolong les affichera également au format pretty print. Il prend également en charge l’ouverture des fichiers .bz
et .bz2
.
De quoi arriver à vos fins beaucoup plus facilement qu’en jouant avec tail, less, ou encore grep.
Toolong est compatible avec Linux, macOS et Windows et pour l’installer Toolong, la meilleure solution actuelle consiste à utiliser pipx :
pipx install toolong
Vous pouvez également l’installer avec Pip :
pip install toolong
Note : Si vous utilisez Pip, il est recommandé de créer un environnement virtuel pour éviter les conflits de dépendances potentiels.
Une fois Toolong installé, la commande tl
sera ajoutée à votre PATH. Pour ouvrir un fichier avec Toolong, ajoutez les noms de fichiers en arguments de la commande :
tl fichierdelog.log
Si vous ajoutez plusieurs noms de fichiers, ils s’ouvriront dans des onglets. Ajoutez l’option --merge
pour ouvrir plusieurs fichiers et les combiner en une seule vue :
tl access.log* --merge
Voilà, l’essayer, c’est l’adopter. Si vous manipulez de gros logs, Toolong pourra vous faire gagner un max de temps !
Merci à Lorenper
La cyberattaque contre la Fédération française de football (FFF) est la troisième fuite de données massive depuis le début de l'année avec potentiellement 1,5 million de Français concernés. Le directeur général de Cybermalveillance.gouv.fr recommande de porter plainte pour aider les enquêteurs.
Europol, l'agence européenne de police criminelle, a intensifié sa lutte contre les cybercriminels avec plusieurs opérations majeures depuis un an. Une manière de casser le mythe du « hacker inatteignable » pour le Général Lecouffe.
Le youtubeur Baptiste Mortier-Dumont, connu sous le pseudonyme Experimentboy, a été débouté de sa demande de retrait de l'enquête que Numerama avait menée et publiée en 2020. Il s'agit d'une reconnaissance importante de la qualité du travail d'enquête que mènent les journalistes de notre média et une victoire pour la liberté de la presse.
AI models for general-purpose programming, such as OpenAI Codex, which powers the AI pair programming tool GitHub Copilot, have the potential to significantly impact how we teach and learn programming.
The basis of these tools is a ‘natural language to code’ approach, also called natural language programming. This allows users to generate code using a simple text-based prompt, such as “Write a simple Python script for a number guessing game”. Programming-specific AI models are trained on vast quantities of text data, including GitHub repositories, to enable users to quickly solve coding problems using natural language.
As a computing educator, you might ask what the potential is for using these tools in your classroom. In our latest research seminar, Majeed Kazemitabaar (University of Toronto) shared his work in developing AI-assisted coding tools to support students during Python programming tasks.
Majeed argued that natural language programming can enable students to focus on the problem-solving aspects of computing, and support them in fixing and debugging their code. However, he cautioned that students might become overdependent on the use of ‘AI assistants’ and that they might not understand what code is being outputted. Nonetheless, Majeed and colleagues were interested in exploring the impact of these code generators on students who are starting to learn programming.
In one study, the team Majeed works in investigated whether students’ task and learning performance was affected by an AI code generator. They split 69 students (aged 10–17) into two groups: one group used a code generator in an environment, Coding Steps, that enabled log data to be captured, and the other group did not use the code generator.
Learners who used the code generator completed significantly more authoring tasks — where students manually write all of the code — and spent less time completing them, as well as generating significantly more correct solutions. In multiple choice questions and modifying tasks — where students were asked to modify a working program — students performed similarly whether they had access to the code generator or not.
A test was administered a week later to check the groups’ performance, and both groups did similarly well. However, the ‘code generator’ group made significantly more errors in authoring tasks where no starter code was given.
Majeed’s team concluded that using the code generator significantly increased the completion rate of tasks and student performance (i.e. correctness) when authoring code, and that using code generators did not lead to decreased performance when manually modifying code.
Finally, students in the code generator group reported feeling less stressed and more eager to continue programming at the end of the study.
In a related study, Majeed and his colleagues investigated how novice programmers used the code generator and whether this usage impacted their learning. Working with data from 33 learners (aged 11–17), they analysed 45 tasks completed by students to understand:
Their analysis found that students used the code generator for the majority of task attempts (74% of cases) with far fewer tasks attempted without the code generator (26%). Of the task attempts made using the code generator, 61% involved a single prompt while only 8% involved decomposition of the task into multiple prompts for the code generator to solve subgoals; 25% used a hybrid approach — that is, some subgoal solutions being AI-generated and others manually written.
In a comparison of students against their post-test evaluation scores, there were positive though not statistically significant trends for students who used a hybrid approach (see the image below). Conversely, negative though not statistically significant trends were found for students who used a single prompt approach.
Though not statistically significant, these results suggest that the students who actively engaged with tasks — i.e. generating some subgoal solutions, manually writing others, and debugging their own written code — performed better in coding tasks.
Majeed concluded that while the data showed evidence of self-regulation, such as students writing code manually or adding to AI-generated code, students frequently used the output from single prompts in their solutions, indicating an over-reliance on the output of AI code generators.
He suggested that teachers should support novice programmers to write better quality prompts to produce better code.
If you want to learn more, you can watch Majeed’s seminar:
You can read more about Majeed’s work on his personal website. You can also download and use the code generator Coding Steps yourself.
The focus of our ongoing seminar series is on teaching programming with or without AI.
For our next seminar on Tuesday 16 April at 17:00–18:30 GMT, we’re joined by Brett Becker (University College Dublin), who will discuss how generative AI may be effectively utilised in secondary school programming education and how it can be leveraged so that students can be best prepared for whatever lies ahead. To take part in the seminar, click the button below to sign up, and we will send you information about joining. We hope to see you there.
The schedule of our upcoming seminars is online. You can catch up on past seminars on our previous seminars and recordings page.
The post Using an AI code generator with school-age beginner programmers appeared first on Raspberry Pi Foundation.
Île-de-France Mobilités, le gestionnaire des transports d’Île-de-France, alerte sur des mails de phishing en lien avec la campagne de remboursement en cours.
Les serveurs proposant des contenus pédopornographiques et du revenge porn grouillent toujours sur Discord. La plateforme, qui assure lutter contre, semble néanmoins à la peine : de nouveaux espaces aux noms explicites sont créés chaque semaine.
Un hacker s'est amusé à prendre le contrôle du compte Pokémon Go d'un célèbre streamer. Au même moment, Nintendo alerte sur des compromissions de mot de passe.
Alors que de plus en plus de personnes, massivement des femmes, sont victimes de deepfakes à caractères sexuels, leur contrôle sur le web devient impossible tant les outils prolifèrent. Numerama a consulté ces chaînes « usines » à détournement de visage.
Des hackers ont compromis le compte de deux joueurs en pleine finale du jeu Apex Legends. Les pirates ont simplement cherché à ruiner la partie.
Un nouvelle version d'un logiciel malveillant dédié au vol de mot passe a fait son apparition. Les pirates ont amélioré leur outil pour cibler les ordinateurs Mac.
Le compte TikTok GetToThePointBro, inspiré par AbrègeFrère, vise de manière disproportionnée les femmes, par rapport aux autres créateurs de contenus. Une polémique semblable à celle survenue en France, qui ne semble pas déranger celui qui en est à l'origine, lui aussi français.
Une cyberattaque contre France Travail, anciennement Pôle emploi, aurait permis à des pirates de dérober les données personnelles de près de 43 millions de personnes. Des informations qui peuvent servir à des fins malveillantes.
Les cyberattaques par ransomware sont particulièrement redoutées compte tenu de leur effet destructeur dans une organisation. Une entreprise de cybersécurité nous raconte de l'intérieur l'attaque contre une collectivité territoriale.
Des hackers du groupe BlackCat ont reçu une rançon d'environ 20 millions d'euros provenant d'une société d'assurance, puis ont disparu avec l'argent pour ne pas avoir à partager les gains avec les autres malfrats.
Six different ground cinnamon products sold at retailers including Save A Lot, Dollar Tree, and Family Dollar contain elevated levels of lead and should be recalled and thrown away immediately, the US Food and Drug Administration announced Wednesday.
The brands are La Fiesta, Marcum, MK, Swad, Supreme Tradition, and El Chilar, and the products are sold in plastic spice bottles or in bags at various retailers. The FDA has contacted the manufacturers to urge them to issue voluntary recalls, though it has not been able to reach one of the firms, MTCI, which distributes the MK-branded cinnamon.
The announcement comes amid a nationwide outbreak of lead poisoning in young children linked to cinnamon applesauce pouches contaminated with lead and chromium. In that case, it's believed that a spice grinder in Ecuador intentionally added extreme levels of lead chromate to cinnamon imported from Sri Lanka, likely to improve its weight and/or appearance. Food manufacturer Austrofoods then added the heavily contaminated cinnamon, without any testing, to cinnamon applesauce pouches marketed to toddlers and young children across the US. In the latest update, the Centers for Disease Control and Prevention has identified 468 cases of lead poisoning that have been linked to the cinnamon applesauce pouches. The cases span 44 states and are mostly in very young children.
Je n’aime jamais trop quitter mon terminal. On y est tellement bien.
Et encore moins pour ouvrir un navigateur et aller chercher de l’info sur Wikipédia. Ouin !
Heureusement, il existe Wiki Tui, un client TUI (Text User Inteface si vous ne saviez pas encore), écrit en Rust (donc rapideeee) qui va vous permettre de faire des recherches et de parcourir Wikipédia directement depuis votre terminal.
Le bonheur ! Ça fonctionne avec les mêmes touches que Vim, ce qui vous évitera de trop bousculer vos petites habitudes, parce qu’arrivé à un certain âge… Bref, je m’égare. Vous aurez alors accès à la table des matières de la page Wikipédia pour vous rendre directement à la partie du sujet qui vous intéresse.$
Wiki TUI dispose également de différents thèmes pour faire plaisir à vos petits yeux.
Pour l’installer sous mac:
sudo port install wiki-tui
Ou avec Rust :
cargo install wiki-tui
Bref, c’est minimaliste et super pratique pour ne pas vous laisser distraire dans votre navigateur.
L'éditeur français Nacon lancera en fin d'année 2024 un nouveau jeu tiré de l'univers Terminator. Il s'agira d'une expérience de survie, située après les deux premiers films de la saga culte (les seuls qui comptent).
Quand j’étais plus jeune, on me répétait souvent : « Mais tu dois être tellement fort en maths vu ce que tu sais faire avec un ordinateur« .
Mais non, aucun rapport les anciens. Je suis mauvais en maths, c’est un fait ! Mais ça ne doit pas m’empêcher aujourd’hui de vous parler de Kalker, une calculatrice scientifique qui s’utilise dans le terminal, et qui supporte la syntaxe mathématique et la possibilité d’utiliser des variables et des fonctions de votre choix ainsi que la différentiation, l’intégration et les nombres complexes.
Avec Kalker, vous pourrez jongler avec les opérateurs les plus basiques +
, -
, *
, /
, aux opérateurs plus spécialisés comme !
pour les factorielles ou %
pour les pourcentages. Vous pouvez également manipuler des groupes avec des parenthèses ()
, des crochets []
, mais aussi utiliser des fonctions de plafond ⌈ceil⌉
et de plancher ⌊floor⌋
. Sans oublier les vecteurs (x, y, z, ...)
et des matrices [x, y, z; a, b, c; ...]
? La plupart de ces trucs sont du chinois pour moi, mais si vous kiffez ça, ça va vous permettre de manipuler ces structures avec la même facilité que si vous manipuliez de simples nombres sur votre calculatrice Windows.
Car oui, c’est dispo sous Windows, mais également sous Linux et macOS. Et bien sûr en ligne, car vous pouvez tester ça directement depuis votre navigateur en cliquant ici.
L’intérêt de Kalker c’est qu’il peut s’adapter à vos besoins spécifiques. Vous pouvez définir vos propres fonctions et variables, pour par exemple stocker une formule compliquée dans une fonction personnalisée et l’utiliser aussi simplement que f(x)
.
Maintenant je m’arrête là pour ne pas vous dire plus de bêtises, mais sachez que si vous voulez l’installer, c’est par ici que ça se passe.
Et dans le même style, mais avec le support des unités plus physiques (vitesse, monnaie, fréquence, voltage…etc. y’en a pour tous les goûts), il y a également Numbat que vous pouvez découvrir ici.
La presse israélienne avance que les Houthis, une milice soutenue par l'Iran, auraient endommagé des câbles sous-marins dans la mer Rouge, au large du Yémen. Depuis longtemps, la zone est considérée comme sensible pour la sécurité de ces infrastructures, qui transportent un pan important du trafic Internet.
Lockbit, le gang de hackers le plus redouté (responsable de la cyberattaque de l'hôpital de Corbeil-Essonnes), revient sur le devant de la scène et répond aux forces de police, après son opération marquante contre l'infrastructure des pirates.
2024 est l'année de la généralisation du dépôt de plainte par visio. Un décret a été publié dimanche 25 février pour préparer l'arrivée d'un nouveau service. C'est un dispositif facultatif, qui vient en option de la plainte classique. Certains faits très graves nécessitent toujours un rendez-vous en présentiel.
Un faux message de mise à jour vise les utilisateurs de la messagerie sécurisée Proton Mail. Prudence si vous recevez un tel mail dans votre boîte aux lettres.
Les forces de l'ordre n'ont pas révélé l'identité du leader de Lockbit. Cependant, le dernier message des autorités apparaît comme une manœuvre pour discréditer LockbitSupp. L'opération Cronos, qui a fait tomber ce gang de ransomware, devrait encore produire d'importantes répercussions.
Une opération internationale des forces de police, dont la Gendarmerie nationale, a permis de stopper le plus important groupe de hackers, Lockbit. Les visages de certains membres de ce gang sont connus publiquement.
La police nationale ukrainienne et la Gendarmerie Nationale ont déclaré avoir arrêté deux membres du gang de hackers Lockbit dans une ville à l'ouest de l'Ukraine. Ils étaient en charge, entre autres, du blanchiment d'argent.
Les inégalités de genre contaminent nos conversations : la parole des femmes est confisquée. Sur Internet, cela fait aussi le jeu de TikTok.
Les forces de police de 10 pays ont hacké le site des cybercriminels de Lockbit et ont affiché des noms, des mandats d'arrêts et des moqueries contre les membres du gang.
Le site des hackers russophones de Lockbit a été mis hors-ligne par les forces de l'ordre de plusieurs pays, dont la Gendarmerie nationale. Ces pirates sont responsables de plusieurs cyberattaques, dont celles contre l'hôpital de Corbeil-Essonnes, la Poste Mobile et le département du Loiret.
[Info Numerama] Le fournisseur d’électricité EDF confirme une vingtaine de connexions illicites sur des espaces clients (entreprises-collectivités.edf.fr). Les hackers derrière ces piratages cherchent d’abord à faire la promotion de leur groupe.
L'amour n'échappe pas à l'avènement des IA, mais la bidouille a-t-elle un genre ?
Des malfaiteurs enchaînent les cambriolages aux États-Unis, désactivant des caméras modernes avec un brouilleur Wi-Fi.
Un sondage lancé sur Wikipédia a créé la polémique au sein de l'encyclopédie en ligne : faut-il garder les deadnames des personnes trans dans leurs pages ? Entre les visées encyclopédiques, le manque de connaissance du sujet de la transidentité et l'absence de personnes trans dans le débat, la question divise.
Un millier d'utilisateurs francophones se sont échangés sur Discord, pendant plusieurs mois, des photos de leur sœur, de leur copine, ou de la pédopornographie en appelant les autres membres à se masturber. Alerté, Discord a laissé faire pendant plus d'un mois.
The use of generative AI tools (e.g. ChatGPT) in education is now common among young people (see data from the UK’s Ofcom regulator). As a computing educator or researcher, you might wonder what impact generative AI tools will have on how young people learn programming. In our latest research seminar, Barbara Ericson and Xinying Hou (University of Michigan) shared insights into this topic. They presented recent studies with university student participants on using generative AI tools based on large language models (LLMs) during programming tasks.
Barbara and Xinying started their seminar with an overview of their earlier research into using Parson’s Problems to scaffold university students as they learn to program. Parson’s Problems (PPs) are a type of code completion problem where learners are given all the correct code to solve the coding task, but the individual lines are broken up into blocks and shown in the wrong order (Parsons and Haden, 2006). Distractor blocks, which are incorrect versions of some or all of the lines of code (i.e. versions with syntax or semantic errors), can also be included. This means to solve a PP, learners need to select the correct blocks as well as place them in the correct order.
In one study, the research team asked whether PPs could support university students who are struggling to complete write-code tasks. In the tasks, the 11 study participants had the option to generate a PP when they encountered a challenge trying to write code from scratch, in order to help them arrive at the complete code solution. The PPs acted as scaffolding for participants who got stuck trying to write code. Solutions used in the generated PPs were derived from past student solutions collected during previous university courses. The study had promising results: participants said the PPs were helpful in completing the write-code problems, and 6 participants stated that the PPs lowered the difficulty of the problem and speeded up the problem-solving process, reducing their debugging time. Additionally, participants said that the PPs prompted them to think more deeply.
This study provided further evidence that PPs can be useful in supporting students and keeping them engaged when writing code. However, some participants still had difficulty arriving at the correct code solution, even when prompted with a PP as support. The research team thinks that a possible reason for this could be that only one solution was given to the PP, the same one for all participants. Therefore, participants with a different approach in mind would likely have experienced a higher cognitive demand and would not have found that particular PP useful.
To understand the impact of using PPs with different learners, the team then undertook a follow-up study asking whether PPs could specifically support students with lower computer science self-efficacy. The results show that study participants with low self-efficacy who were scaffolded with PPs support showed significantly higher practice performance and higher problem-solving efficiency compared to participants who had no scaffolding. These findings provide evidence that PPs can create a more supportive environment, particularly for students who have lower self-efficacy or difficulty solving code writing problems. Another finding was that participants with low self-efficacy were more likely to completely solve the PPs, whereas participants with higher self-efficacy only scanned or partly solved the PPs, indicating that scaffolding in the form of PPs may be redundant for some students.
These two studies highlighted instances where PPs are more or less relevant depending on a student’s level of expertise or self-efficacy. In addition, the best PP to solve may differ from one student to another, and so having the same PP for all students to solve may be a limitation. This prompted the team to conduct their most recent study to ask how large language models (LLMs) can be leveraged to support students in code-writing practice without hindering their learning.
This recent third study focused on the development of CodeTailor, a tool that uses LLMs to generate and evaluate code solutions before generating personalised PPs to scaffold students writing code. Students are encouraged to engage actively with solving problems as, unlike other AI-assisted coding tools that merely output a correct code correct solution, students must actively construct solutions using personalised PPs. The researchers were interested in whether CodeTailor could better support students to actively engage in code-writing.
In a study with 18 undergraduate students, they found that CodeTailor could generate correct solutions based on students’ incorrect code. The CodeTailor-generated solutions were more closely aligned with students’ incorrect code than common previous student solutions were. The researchers also found that most participants (88%) preferred CodeTailor to other AI-assisted coding tools when engaging with code-writing tasks. As the correct solution in CodeTailor is generated based on individual students’ existing strategy, this boosted students’ confidence in their current ideas and progress during their practice. However, some students still reported challenges around solution comprehension, potentially due to CodeTailor not providing sufficient explanation for the details in the individual code blocks of the solution to the PP. The researchers argue that text explanations could help students fully understand a program’s components, objectives, and structure.
In future studies, the team is keen to evaluate a design of CodeTailor that generates multiple levels of natural language explanations, i.e. provides personalised explanations accompanying the PPs. They also aim to investigate the use of LLM-based AI tools to generate a self-reflection question structure that students can fill in to extend their reasoning about the solution to the PP.
Barbara and Xinying’s seminar is available to watch here:
Find examples of PPs embedded in free interactive ebooks that Barbara and her team have developed over the years, including CSAwesome and Python for Everybody. You can also read more about the CodeTailor platform in Barbara and Xinying’s paper.
The focus of our ongoing seminar series is on teaching programming with or without AI.
For our next seminar on Tuesday 12 March at 17:00–18:30 GMT, we’re joined by Yash Tadimalla and Prof. Mary Lou Maher (University of North Carolina at Charlotte). The two of them will share further insights into the impact of AI tools on the student experience in programming courses. To take part in the seminar, click the button below to sign up, and we will send you information about joining. We hope to see you there.
The schedule of our upcoming seminars is online. You can catch up on past seminars on our previous seminars and recordings page.
The post Supporting learners with programming tasks through AI-generated Parson’s Problems appeared first on Raspberry Pi Foundation.
[Info Numerama] Un groupe de hackers a revendiqué le piratage de plusieurs comptes CAF. La Caisse d'Allocations familiales confirme une « violation de données » de quelques comptes, peu de temps après une cyberattaque massive contre les opérateurs de tiers payants Viamedis et Almerys.
Utiliser le domaine de premier niveau de l'Afghanistan pour un site dédié aux personnes queers était audacieux. Jusqu'à ce que les talibans reprennent le pouvoir.
Emballement des investisseurs, contrôle de ChatGPT et voix clonées : Mikko Hyppönen, expert en cyber reconnu mondialement, pose un regard pragmatique sur l'intelligence artificielle.
Le collectif de cybercriminels Lockbit a affiché un message sur le site de ses victimes pour créer la panique. Ces cybercriminels réutilisent une technique mobilisée depuis longtemps par les pirates.
Cable and satellite TV companies are defending their early termination fees (ETFs) in hopes of avoiding a ban proposed by the Federal Communications Commission.
The FCC voted to propose the ban in December, kicking off a public comment period that has drawn responses from those for and against the rules. The FCC plan would prohibit early termination fees charged by cable and satellite TV providers and require the TV companies to give prorated credits or rebates to customers who cancel before a billing period ends.
NCTA-The Internet & Television Association, the main lobby group representing cable companies like Comcast and Charter, opposed the rules in a filing submitted Monday and posted on the FCC website yesterday. DirecTV and Dish opposed the proposal, too.
Un hacker finlandais, arrêté en France, était suivi à la trace par Europol et la police de son pays. Une photo de sa main tenant une bouteille d'eau aurait permis de déceler son empreinte digitale.
Everyone who has taught children before will know the excited gleam in their eyes when the lessons include something to interact with physically. Whether it’s printed and painstakingly laminated flashcards, laser-cut models, or robots, learners’ motivation to engage with the topic will increase along with the noise levels in the classroom.
However, these hands-on activities are often seen as merely a technique to raise interest, or a nice extra project for children to do before the ‘actual learning’ can begin. But what if this is the wrong way to think about this type of activity?
In our 2023 online research seminar series, focused on computing education for primary-aged (K–5) learners, we delved into the most recent research aimed at enhancing learning experiences for students in the earliest stages of education. From a deep dive into teaching variables to exploring the integration of computational thinking, our series has looked at the most effective ways to engage young minds in the subject of computing.
It’s only fitting that in our final seminar in the series, Anaclara Gerosa from the University of Glasgow tackled one of the most fundamental questions in education: how do children actually learn? Beyond the conventional methods, emerging research has been shedding light on a fascinating approach — the concept of grounded cognition. This theory suggests that children don’t merely passively absorb knowledge; they physically interact with it, quite literally ‘grasping’ concepts in the process.
Grounded cognition, also known in variations as embodied and situated cognition, offers a new perspective on how we absorb and process information. At its core, this theory suggests that all cognitive processes, including language and thought, are rooted in the body’s dynamic interactions with the environment. This notion challenges the conventional view of learning as a purely cognitive activity and highlights the impact of action and simulation.
There is evidence from many studies in psychology and pedagogy that using hands-on activities can enhance comprehension and abstraction. For instance, finger counting has been found to be essential in understanding numerical systems and mathematical concepts. A recent study in this field has shown that children who are taught basic computing concepts with unplugged methods can grasp abstract ideas from as young as 3. There is therefore an urgent need to understand exactly how we could use grounded cognition methods to teach children computing — which is arguably one of the most abstract subjects in formal education.
A recent study in this field has shown that children who are taught basic computing concepts with unplugged methods can grasp abstract ideas from as young as 3.
Anaclara is part of a group of researchers at the University of Glasgow who are currently developing a new approach to structuring computing education. Their EIFFEL (Enacted Instrumented Formal Framework for Early Learning in Computing) model suggests a progression from enacted to formal activities.
Following this model, in the early years of computing education, learners would primarily engage with activities that allow them to work with tangible 3D objects or manipulate intangible objects, for instance in Scratch. Increasingly, students will be able to perform actions in an instrumented or virtual environment which will require the knowledge of abstract symbols but will not yet require the knowledge of programming languages. Eventually, students will have developed the knowledge and skills to engage in fully formal environments, such as writing advanced code.
In a recent literature review, Anaclara and her colleagues looked at existing research into using grounded cognition theory in computing education. Although several studies report the use of grounded approaches, for instance by using block-based programming, robots, toys, or construction kits, the focus is generally on looking at how concrete objects can be used in unplugged activities due to specific contexts, such as a limited availability of computing devices.
The next steps in this area are looking at how activities that specifically follow the EIFFEL framework can enhance children’s learning.
You can watch Anaclara’s seminar here:
You can also access the presentation slides here.
Research into grounded cognition activities in computer science is ongoing, but we encourage you to try incorporating more hands-on activities when teaching younger learners and observing the effects yourself. Here are a few ideas on how to get started:
In 2024, we are exploring different ways to teach and learn programming, with and without AI tools. In our next seminar, on 13 February at 17:00 GMT, Majeed Kazemi from the University of Toronto will be joining us to discuss whether AI-powered code generators can help K–12 students learn to program in Python. All of our online seminars are free and open to everyone. Sign up and we’ll send you the link to join on the day.
The post Grounded cognition: physical activities and learning computing appeared first on Raspberry Pi Foundation.
Cinq jours après Viamedis, un autre spécialiste du tiers payant, Almerys déclare être victime d'une cyberattaque, exposant des données d'assurés sociaux. Le numéro de sécurité sociale est une de vos données personnelles les plus précieuses, mais savez-exactement pourquoi ?
Le membre d'un forum de pirates prétendait avoir dérobé les infos de 48 millions de clients de la société EuropCar. Après analyse de la base de données, l'entreprise déclare que les noms et adresses mail auraient été inventés par un outil d'intelligence artificielle.
More than 65 Republican lawmakers this week introduced legislation to nullify rules that prohibit discrimination in access to broadband services.
The Federal Communications Commission approved the rules in November despite opposition from broadband providers. The FCC's two Republicans dissented in the 3-2 vote. While the FCC was required by Congress to issue anti-discrimination rules, Republicans argue that the agency's Democratic majority wrote rules that are too broad.
On Tuesday this week, US House Republications submitted a resolution of disapproval that would use Congressional Review Act authority to kill the anti-discrimination rules. "Under the guise of 'equity,' the Biden administration is attempting to radically expand the federal government's control of all Internet services and infrastructure," lead sponsor Rep. Andrew Clyde (R-Ga.) said.