Posts

Unit 6 Essential Questions

Image
Unit 6 Essential Questions How is encryption accomplished to safeguard data exchange? Encryption is a safeguard for data exchange because the hacker is unable to read the message unless they have the key to decode it. Because of this, encryption is very safe unless the hacker/ eavesdropper finds the key to your encrypted message What methods are used to compress data? Data compression is the process of modifying, encoding or converting the bits structure of data in such a way that it consumes less space on disk. It enables reducing the storage size of one or more data instances or elements. There are two types of compression: lossy and lossless. Like the name implied, lossless does not lose any space, making the file size big. The tradeoff is that the image will have excellent results as in that the image, audio, the video will be much clearer. The lossy compression, on the other hand, will have a much smaller file size with the trade-off that the image, audio, the v...

Unit 4 Essential Questions

Image
Unit 4 Essential Question What is the origin and evolution of the Internet? The history of the Internet begins with the development of electronic computers in the 1950s. Initial concepts of wide area networking originated in several computer science laboratories in different nations.  The Internet started as a US government funding for researching network in 1969.  The working first prototype of the internet came with the creation of ARPANET. This was the start of the wireless information network as the ARPANET allowed multiple computers to communicate to each other through a single network. This ARPANET soon became the thing we now call "emails". The ARPANET adopted TCP/IP in 1983, and from there it more closely resembled the modern internet we know today. But in 1990, a man named Tim Berners-Lee invented the World Wide Web. What platforms and systems enable world-wide networking? The World Wide Web uses Hypertext Transfer Protocol (HTTP) - a language used to tr...

Unit 3 Essential Questions

Image
Unit 3 Essential Questions What is block-based programming? Block-based programming is coding in form of blocks.  Instead of traditional, text-based programming, block-based coding involves dragging “blocks” of instructions.   Some examples of block-based programming are scratch and BJC Snap.  Through Snap or scratch,  Block-based programming makes coding easier to introduce for smaller kids as it can get them into the coding realm. Through this, they can be introduced to text-based programming, which is Java, C++, and many other scripts with the same basis from snap or scratch. They can apply the same techniques used in block-based programming and use them in text-based programming How do abstractions and layers of abstraction enable smooth user interface creation in a game? Abstraction can help with the user interface created in a game because abstraction is essentially the idea of making a complex idea into a more efficient one in fewer lines ...

Encryption

Image
Government Perspective of Encryption The government with encrypted communications can provide a wide range of service providers to build new tools, run government-built software, or facilitate access to targeted devices. E ncryption is needed to keep the nation safe from outsiders. Through encryption, outside nations cannot access sensitive data, making our nation safer. I hold the position for having the government to have encryption to allow the citizen feel safe from outside cyber attacks.

Essential questions

Image
Why computer science is relevant? Computer science is relevant because almost all majors or careers have to do something with computing or the use of computers. The Future will always need computers and every year computers only keep on getting better. What does computer science involve and include? Computer science refers to the study of computer involving programming, computer knowledge and the functions of the computational parts. Computer science deals with the inner mechanism of a computer and the functionality of computers in daily life What is computing innovation? Computing innovation is making a computer more efficient and economically cheaper for the public use. An example are smart phones. Every year, companies like Samsung and apple produce more efficient phones. Then because of the new model, older generation phones become cheaper. How does CS impact my area of Interest? CS impacts my area of interest because almos...

Blown to Bits: Chapter 6

1. Why should all Internet users be aware of copyrighted material? Usually everything on the internet is copyrighted. People can sue others for using copyrighted items without permission, which can lead to huge fines and damages. 2. What is a GB? How many bytes are in GB? A GB is a gigabyte. 1 GB = 1000000000000 bytes 3. What is the NET Act and what is its significance in the history of copyright? The Theft (NET) Act was passed in 1997 and said that anyone making an unauthorized copy of copyrighted material was at fault and could face a year in prison. 4. What is a peer-to-peer architecture? Provide an example of at least one well-known peer-to-peer network. A peer-to-peer architecture is a system where computers communicate through a central directory to find files. Napsters use this networking. 5. What is the DMCA and why is it significant to copyright? 6. What are Open Access and Creative Commons? How have they impacted the sharing of digital information? ...

Blown to Bits: Chapter 5

1. What is encryption? Encryption is the process of encoding a message with a secret key so that it can not be deciphered by anyone else except the one receiving the message. 2. What is cryptography? Provide an example. Cryptography is when the sender and receiver are the only ones that can understand the message. An example of cryptography is morse code. Only those who knows morse code will be able to understand. 3. What is security through obscurity and why is it bad? Security through obscurity is the practice of creating encryption and keeping the code private. The idea is bad because if the encryption is found out, the secret information is not safe. 4. What is the key agreement protocol and why is it so important to Internet commerce? The key agreement protocol is a system in which two different parties can create a key together without an eavesdropper figuring out the key.  This is important because without being able to share your key with the other pe...