Posts

Showing posts from December, 2018

Unit 6 Essential Questions

Image
Unit 6 Essential Questions How is encryption accomplished to safeguard data exchange? Encryption is a safeguard for data exchange because the hacker is unable to read the message unless they have the key to decode it. Because of this, encryption is very safe unless the hacker/ eavesdropper finds the key to your encrypted message What methods are used to compress data? Data compression is the process of modifying, encoding or converting the bits structure of data in such a way that it consumes less space on disk. It enables reducing the storage size of one or more data instances or elements. There are two types of compression: lossy and lossless. Like the name implied, lossless does not lose any space, making the file size big. The tradeoff is that the image will have excellent results as in that the image, audio, the video will be much clearer. The lossy compression, on the other hand, will have a much smaller file size with the trade-off that the image, audio, the v...

Unit 4 Essential Questions

Image
Unit 4 Essential Question What is the origin and evolution of the Internet? The history of the Internet begins with the development of electronic computers in the 1950s. Initial concepts of wide area networking originated in several computer science laboratories in different nations.  The Internet started as a US government funding for researching network in 1969.  The working first prototype of the internet came with the creation of ARPANET. This was the start of the wireless information network as the ARPANET allowed multiple computers to communicate to each other through a single network. This ARPANET soon became the thing we now call "emails". The ARPANET adopted TCP/IP in 1983, and from there it more closely resembled the modern internet we know today. But in 1990, a man named Tim Berners-Lee invented the World Wide Web. What platforms and systems enable world-wide networking? The World Wide Web uses Hypertext Transfer Protocol (HTTP) - a language used to tr...

Unit 3 Essential Questions

Image
Unit 3 Essential Questions What is block-based programming? Block-based programming is coding in form of blocks.  Instead of traditional, text-based programming, block-based coding involves dragging “blocks” of instructions.   Some examples of block-based programming are scratch and BJC Snap.  Through Snap or scratch,  Block-based programming makes coding easier to introduce for smaller kids as it can get them into the coding realm. Through this, they can be introduced to text-based programming, which is Java, C++, and many other scripts with the same basis from snap or scratch. They can apply the same techniques used in block-based programming and use them in text-based programming How do abstractions and layers of abstraction enable smooth user interface creation in a game? Abstraction can help with the user interface created in a game because abstraction is essentially the idea of making a complex idea into a more efficient one in fewer lines ...

Encryption

Image
Government Perspective of Encryption The government with encrypted communications can provide a wide range of service providers to build new tools, run government-built software, or facilitate access to targeted devices. E ncryption is needed to keep the nation safe from outsiders. Through encryption, outside nations cannot access sensitive data, making our nation safer. I hold the position for having the government to have encryption to allow the citizen feel safe from outside cyber attacks.