Writing Problem: Simulate!

tl;dr

Explore a computer simulation’s functionality, uses, and impact.

Academic Honesty

This course’s philosophy on academic honesty is best stated as "be reasonable." The course recognizes that interactions with classmates and others can facilitate mastery of the course’s material. However, there remains a line between enlisting the help of another and submitting the work of another. This policy characterizes both sides of that line.

The essence of all work that you submit to this course must be your own. Collaboration on problems is not permitted (unless explicitly stated otherwise) except to the extent that you may ask classmates and others for help so long as that help does not reduce to another doing your work for you. Generally speaking, when asking for help, you may show your code or writing to others, but you may not view theirs, so long as you and they respect this policy’s other constraints. Collaboration on quizzes and tests is not permitted at all. Collaboration on the final project is permitted to the extent prescribed by its specification.

Below are rules of thumb that (inexhaustively) characterize acts that the course considers reasonable and not reasonable. If in doubt as to whether some act is reasonable, do not commit it until you solicit and receive approval in writing from your instructor. If a violation of this policy is suspected and confirmed, your instructor reserves the right to impose local sanctions on top of any disciplinary outcome that may include an unsatisfactory or failing grade for work submitted or for the course itself.

Reasonable

  • Communicating with classmates about problems in English (or some other spoken language).

  • Discussing the course’s material with others in order to understand it better.

  • Helping a classmate identify a bug in his or her code, such as by viewing, compiling, or running his or her code, even on your own computer.

  • Incorporating snippets of code that you find online or elsewhere into your own code, provided that those snippets are not themselves solutions to assigned problems and that you cite the snippets' origins.

  • Reviewing past years' quizzes, tests, and solutions thereto.

  • Sending or showing code that you’ve written to someone, possibly a classmate, so that he or she might help you identify and fix a bug.

  • Sharing snippets of your own solutions to problems online so that others might help you identify and fix a bug or other issue.

  • Turning to the web or elsewhere for instruction beyond the course’s own, for references, and for solutions to technical difficulties, but not for outright solutions to problems or your own final project.

  • Whiteboarding solutions to problems with others using diagrams or pseudocode but not actual code.

  • Working with (and even paying) a tutor to help you with the course, provided the tutor does not do your work for you.

Not Reasonable

  • Accessing a solution to some problem prior to (re-)submitting your own.

  • Asking a classmate to see his or her solution to a problem before (re-)submitting your own.

  • Decompiling, deobfuscating, or disassembling the staff’s solutions to problems.

  • Failing to cite (as with comments) the origins of code, writing, or techniques that you discover outside of the course’s own lessons and integrate into your own work, even while respecting this policy’s other constraints.

  • Giving or showing to a classmate a solution to a problem when it is he or she, and not you, who is struggling to solve it.

  • Looking at another individual’s work during a quiz or test.

  • Paying or offering to pay an individual for work that you may submit as (part of) your own.

  • Providing or making available solutions to problems to individuals who might take this course in the future.

  • Searching for, soliciting, or viewing a quiz’s questions or answers prior to taking the quiz.

  • Searching for or soliciting outright solutions to problems online or elsewhere.

  • Splitting a problem’s workload with another individual and combining your work (unless explicitly authorized by the problem itself).

  • Submitting (after possibly modifying) the work of another individual beyond allowed snippets.

  • Submitting the same or similar work to this course that you have submitted or will submit to another.

  • Using resources during a quiz beyond those explicitly allowed in the quiz’s instructions.

  • Viewing another’s solution to a problem and basing your own solution on it.

Pi in the Sky

What comes to mind when you think of the word "simulation"? Maybe you thought of a video game called The Sims, in which you create virtual people and control their moods and actions. Or maybe you thought of a scene in some action movie, where the characters have huge floating screens they use to control reality.

A simulation is defined by Webster’s Dictionary as "something that is made to look, feel, or behave like something else especially so that it can be studied or used to train people". So a bank might create a simulation in which someone pretends to be a robber, to train their tellers on proper procedure.

A computer simulation is simply a computer program that attempts to simulate something. For instance, that same bank might create a computer program that models how long it would take everyone in the bank to evacuate the building in an emergency. They could test the accuracy of the model by comparing the results of the program with actual evacuation times they’ve recorded.

A bank may seem like a pretty complicated thing to model, with a lot of factors to account for. So let’s start with a simpler simulation: Finding the value of pi(π).

You know that you need π to calculate the area of a circle (π r2). Let’s pretend that we don’t know what the value of π is. Can we find it? We know how to find the area of a square (which we do: just square the length of a side!), and how to define the boundaries of a circle (which we do: all points equidistant from a center point). What if we placed points randomly within the square, and then calculated whether they were in the square (by determining if the distance from the point to the center is less than the radius of the circle)? We could get a ratio of points within the circle to points outside the circle, and find the value of π that way. Play around with the graphical program below. What happens when you add the points yourself? What happens when you hit run?

How close could you get to the actual value of π? Did the simulation get more accurate the longer you ran it (or the more data points you had)?

Augmented Reality

In the above example, we found an approximate value of π. That’s a pretty cool thing for a program to find! But we already knew what the value of π was! Can we use simulations to find something that we don’t already know? Perhaps to visualize how something might look in a particular setting!

In the video below, a French developer explains the advantages of using simulation software to preview products before purchasing them, as well as other uses.

T-Shirt Designs

As you can see, models and simulations can be used in everyday situations. For instance, have you ever wanted to design a custom t-shirt, perhaps one that says "I took CS50 AP"? T-shirt companies like CustomInk use software to model what your design might look like. Head over to CustomInk’s Design Lab, and try your hand at designing a t-shirt.

How many times did you change the text, or font, or image size? Imagine if each time, you had to make and print an entire physical t-shirt, just to see what a small change might look like. Clearly, you can often benefit from the rapid prototyping that computer models and simulations allow.

Your Turn

Now that we’ve identified a couple of simulations and their uses, it’s your turn! In this writing problem, we’d like you to research a computer simulation of your choice. Feel free to choose any sort of program, from something esoteric (like flight simulators) to common (like t-shirt designing software). Just make sure that you can explain how the simulation is a computer program, and the benefits of using it. First open a text editor and create a file called ‘simulate’ (be sure that the file extension is either .doc, .docx, .pdf, or .txt)

Identify the users of the simulation, and the situations in which it is used.

Then, show your lower level understanding by finding what inputs the program takes, and what data it outputs (if any). Does the program account for all the features it is trying to model? Does the model rely on any assumptions? Are there downsides to using a program instead of testing in the real-world? What are those downsides?

You should aim to write about 300 to 400 words in this part of the problem.

Need some ideas? Check out:

More Thoughts

Once you’ve finished your writing problem, go ahead and watch the video below, in which Elon Musk (of SpaceX and Tesla) discusses a theory of his.

Ponder that. Was someone programming you to write this problem?


How to Submit

Step 1 of 3

Go to https://github.com/me50/USERNAME, substituting USERNAME in the URL with your own GitHub username. On the left side of the screen, click on "Branch: master". In the field that says "Find or create a branch…​", type cs50/problems/2019/ap/simulate and click "Create branch".

Step 2 of 3

Click the button that says "Upload files". Drag your simulate.(doc, docx, pdf, txt) file into the box that says "Drag files here".

Step 3 of 3

Click the green "Commit changes" button and you’re done!

If you run into any trouble, email sysadmins@cs50.harvard.edu!

You may resubmit any problem as many times as you’d like before the deadline.

Your submission should be graded for correctness within 2 minutes, at which point your score will appear at submit.cs50.io!

This was Simulate!