12. Hide or Seek

Standard: 2‐IC‐23: Describe tradeoffs between allowing information to be public and keeping information private and secure

Now your database is built and populated with collections data. You start thinking about how to provide the forest residents with library cards if they would like to borrow a stone from the collection, perhaps using a handy birch bark square. The library is almost open for business and the Guide is very happy.

Looking around as the water courses musically over the stones, you notice a particularly large greenish boulder that you hadn't seen before, next to the collection. Did you forget to catalog it? Suddenly, you are startled as it starts to move! Very slowly, legs, a tail, and finally a head with ancient, wise eyes emerge from the domed object. You realize that, instead of a boulder, a large tortoise is looking around at the stream, blinking sleepily.

The Guide quickly approaches the tortoise. “Venerable friend, welcome! We hope we didn't disturb you.” The tortoise shakes its head slowly, looking curiously at the piles of stones. “Would you be interested in acquiring the very first library card for our collection? I just need a little information from you and then I can register you in our system!” you chime in, excited about your first client. The tortoise smiles and reaches under its shell, pulling out a tattered note with its full address, Forest Security Number (FSN), contact information, snail mail address (actual snails deliver ...

Get Computer Science for Kids now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.