University of Waterloo Logo and CEMC Banner

2023 Beaver Computing Challenge
(Grade 7 & 8)

Questions, Answers, Explanations, and Connections


Part A

Lakes

Story

Six lakes are connected by rivers. Water always flows from a lake with a greater height above sea level to a lake with a lesser height above sea level.

An online search provides the following information about these lakes:

Lake pH Level Height Above Sea Level (m) Estimated Fish Population
Atlyn 6.5 320 32000
Clare 7.1 740 1500
Doffin 6.8 490 65000
Kazba 7.2 673 4200
Mus 6.5 973 22100
Soul 6.2 382 43000

Question

In what order does water flow between these six lakes?

  1. Atlyn, Clare, Doffin, Kazba, Mus, Soul
  2. Mus, Clare, Soul, Atlyn, Doffin, Kazba
  3. Kazba, Clare, Doffin, Mus, Atlyn, Soul
  4. Mus, Clare, Kazba, Doffin, Soul, Atlyn

Answer

(D) Mus, Clare, Kazba, Doffin, Soul, Atlyn

Explanation of Answer

If we sort the table by the third column in descending order, we will have:

Name pH Level Height Above Sea Level (m) Estimated Fish Population
Mus 6.5 973 22100
Clare 7.1 740 1500
Kazba 7.2 673 4200
Doffin 6.8 490 65000
Soul 6.2 382 43000
Atlyn 6.5 320 32000

Reading the names from the top row to the bottom row gives the order in which water flows between the lakes. Note that the other columns do not have any information that is necessary to solve the problem.

Connections to Computer Science

There is a tremendous amount of data that is stored in a structured way, whether that is in a database or in a spreadsheet. Quite often, the data has some key field, which distinguishes between different data elements: in this task, the name is the key field. Attached to each key field are other associated values: in this task, the pH level, fish population, and height above sea level are values associated with each key.

One benefit of structured data is that it can be manipulated in various ways. In particular, it may be useful to sort data in a particular way based on a particular values, as was done in this task. In other situations, it may be important to filter certain data to consider the data which falls between certain values, such as finding only those lakes with a pH level in a certain range.

Country of Original Author

Canada

Ogham Code

Story

Ogham is a medieval alphabet used to write words vertically along a pillar.

Each letter is represented by a group of lines that always touches or crosses the pillar in the same way. Groups (letters) are separated by big gaps and arranged upwards from the bottom of the pillar to the top of the pillar.

Eabha writes four words using the Ogham alphabet as shown. The words are BANANAS, BERRIES, LETTUCE, and ORANGES, but we do not know which word corresponds to which image.

A description of the diagram follows.

Question

From left to right, what is the order in which Eabha has written these words?

  1. LETTUCE, ORANGES, BANANAS, BERRIES
  2. ORANGES, LETTUCE, BANANAS, BERRIES
  3. BERRIES, BANANAS, LETTUCE, ORANGES
  4. LETTUCE, ORANGES, BERRIES, BANANAS

Answer

(A) LETTUCE, ORANGES, BANANAS, BERRIES

Explanation of Answer

We will number the words in the image 1 to 4 from left to right.

Word 3 and Word 4 begin with the same letter, so Word 3 and Word 4 must be BANANAS and BERRIES in some order. The 2nd, 4th, and 6th letters of Word 3 are all the same, so this makes Word 3 BANANAS and Word 4 BERRIES.

This teaches us the code for the letters in those two words, which we can use to fill in some of the letters from Word 1 and Word 2 as well:

A description of the diagram follows.

Now it becomes clear that Word 2 must be ORANGES and Word 1 must be LETTUCE:

Therefore, from left to right, Eabha wrote the words in the order LETTUCE, ORANGES, BANANAS, BERRIES.

Connections to Computer Science

This task focusses on the idea of encoding information in a way to keep the information secret. One method of keeping data secret so that unauthorized persons cannot access it is encryption, which is the key area of study in cryptography. Cryptography began as early as 3500 years ago, with simple methods of encryption such as replacing each letter in the message with a different letter, which is known as a substitution cipher. Simple substitution ciphers can be easily decrypted by using frequency analysis: some letters, such as "E" and "T" appear much more frequently than other letters, such as "Q" or "Z" in English text. Therefore, someone reading a long encrypted message can try to guess that the most frequently occurring encrypted letters are probably "E" or "T" and begin to decrypt the message. The decryption in this task is based on the common occurring letters between words.

An alternative method to a direct substitution cipher is to use rotation-based ciphers, which typically were mechanical devices with various rotors that had sequences of letters, and with each letter, the rotor would move some amount. The most well-known of these sorts of devices is the Enigma machine used to transmit messages during World War II. Similar to this machine in this task, each letter rotates a different amount, such that the sequence of letters "PA" and "SA" (51-31 and 61-21) have the letter "A" encoded with two different values. This type of encryption method is much more difficult to decrypt without knowing the original starting point of the arrow, and is much less vulnerable to frequency analysis.

Many computer systems, such as databases and web browsers, rely on strong encryption methods to prevent unauthorized access to information.

Country of Original Author

Ireland