Posts

Showing posts from August, 2018

Essential questions

Image
Why computer science is relevant? Computer science is relevant because almost all majors or careers have to do something with computing or the use of computers. The Future will always need computers and every year computers only keep on getting better. What does computer science involve and include? Computer science refers to the study of computer involving programming, computer knowledge and the functions of the computational parts. Computer science deals with the inner mechanism of a computer and the functionality of computers in daily life What is computing innovation? Computing innovation is making a computer more efficient and economically cheaper for the public use. An example are smart phones. Every year, companies like Samsung and apple produce more efficient phones. Then because of the new model, older generation phones become cheaper. How does CS impact my area of Interest? CS impacts my area of interest because almos...

Blown to Bits: Chapter 6

1. Why should all Internet users be aware of copyrighted material? Usually everything on the internet is copyrighted. People can sue others for using copyrighted items without permission, which can lead to huge fines and damages. 2. What is a GB? How many bytes are in GB? A GB is a gigabyte. 1 GB = 1000000000000 bytes 3. What is the NET Act and what is its significance in the history of copyright? The Theft (NET) Act was passed in 1997 and said that anyone making an unauthorized copy of copyrighted material was at fault and could face a year in prison. 4. What is a peer-to-peer architecture? Provide an example of at least one well-known peer-to-peer network. A peer-to-peer architecture is a system where computers communicate through a central directory to find files. Napsters use this networking. 5. What is the DMCA and why is it significant to copyright? 6. What are Open Access and Creative Commons? How have they impacted the sharing of digital information? ...

Blown to Bits: Chapter 5

1. What is encryption? Encryption is the process of encoding a message with a secret key so that it can not be deciphered by anyone else except the one receiving the message. 2. What is cryptography? Provide an example. Cryptography is when the sender and receiver are the only ones that can understand the message. An example of cryptography is morse code. Only those who knows morse code will be able to understand. 3. What is security through obscurity and why is it bad? Security through obscurity is the practice of creating encryption and keeping the code private. The idea is bad because if the encryption is found out, the secret information is not safe. 4. What is the key agreement protocol and why is it so important to Internet commerce? The key agreement protocol is a system in which two different parties can create a key together without an eavesdropper figuring out the key.  This is important because without being able to share your key with the other pe...

Blown to Bits: Chapter 4

1. Is Wikipedia considered Web 1.0 or Web 2.0? Explain. Wikipedia is considered Web 2.0 because users are able to contribute information and change information. 2. Should a researcher place absolute trust in a search engine? Why or why not? A researcher should not place absolute trust in a search engine because a search engine does not show its best information. Search engines display data that they want you to see. 3. "The architecture of human knowledge has changed as a result of search . " What does this claim mean? The structure of our knowledge depends on what we search up and what information is displayed after the search. As technology advances, the internet is increasingly more necessary to look up information. The information displayed affects our knowledge. 4. When you type a word or phrase into the Google search engine, what is the search algorithm that is being used? Does Google’s search engine search the web? Explain. Google uses an algor...

Blown to Bits: Chapter 3

1. What is metadata? Give an example. Metadata is a set of data that describes and gives information about other data. An example of metadata is the Exchangeable Image File Format, where it stores the camera settings. 2. What is a model? A model is a representation of a photograph in bits. 3. What's the difference between a raster image and an ASCII representation of a text document? Raster image is an image based on pixels and an ASCII is an 8-bit code used to represent a string of symbols 4. What are filename extensions? What are they used for? Filename extensions are the three letters after the dot at the end of a file name to indicate how the contents are to be interpreted. 5. What is lossless representation? What is lossy representation? What are the trade-offs in using each representation? Lossless representation is one that allows exactly the same image to be rendered. A lossy representation is the approximation to the same image to be rendered. Lo...

Blown to Bits: Chapter 2

1. What is an RFID tag and what does it do? Radio Frequency Identification (RFID) tag is a silicon chip that uses radio waves to transfer data. These tags are like barcodes, but does not need visible light nor does it need a sensor to read it. RFID are generally used to improve record-keeping. 2. What is an EDR and what does it do? An event data recorder (EDR) is a black box that records the cars data just before the crash of a car, to provide necessary information to reconstruct the accident. 3. Is it possible to identify someone, perhaps a patient, knowing just his or her gender, birth date, and zip code? Explain. No it is not possible to identify someone using this limited information. 4. What is the difference between "big brotherism" and "little brotherism"? Big brotherism is the idea that the government controls its citizen. Little brotherism refers to the growing use of cameras that allow people to observe one’s actions. Free Response:...

Blown to Bits: Chapter 1

1. What is a  bit  and what does it mean to say that "it's all just bits"? (Koan A bit is what data is made up of. What Koan means by “it’s all bits” is that everything that is data is made in bits. From pictures to applications, it uses bits to process the image or information 2. Describe, in your own words, Moore's Law. Moore’s Law is the observation of the growth rate of bit storage. Moors observed an exponential growth every few years. 3. Someone offers you a summer job and offers you two pay rates: (1) $10 per hour for 40 hours per week for 30 days or (2) One cent on day 1, two cents and day two, four cents on day three and on (doubling each day) for 30 days. If you were trying to make as much money as possible in 30 days, which pay rate would you choose? What does this illustrate? Offer 2 would generate me more money due to its exponential rate of doubling the previous day’s amount. This illustrates the exponential growth of information. 4. ...

Snap Projects All

Image
Unit 1 Lab 1 The first circle makes the “Catch me if you can!” disappear. The second circle allows the sprite to randomly spawn after being clicked. Unit 1 Lab 2 The first circle is list that stores all the player’s names. The second bubble is the following: If the name was already given, the sprite will great the player as if it has seen the player before. If not, the sprite will say its welcomes for meeting with the player. Unit 1 Lab 3 The first circle is the variables that can be used in this custom made block. The second circle is the movement of the custom made variable to move in the way of the users liking. Unit 1 Lab 5 The first circle allows the sprite to follow the mouse. The second circle is the aftermath when the sprite touches with the players mouse. Unit O ptional Project The first circle is the code that allows the sprite to move down. The second circle is the code t...