Thursday, December 15, 2016

Computationally Hard

1) Describe what it means for a problem to be “computationally hard.”
A problem is computationally hard if there is no algorithm to solve it and it must be done with brute force.
2) What strategies do people use to solve large computationally hard problems?
They often look for the best starting point which ,makes the rest slightly easier.
3) Why are computationally hard problems important in encryption strategies?
They are important because they make things and messages more secure because they are harder for computers to automatically decrypt.

Monday, December 12, 2016

Ciphers and random ciphers


  • How much easier is it to crack a caesar cipher than a random substitution cipher? Can you put a number on it?
    • It is so much easier. Probably 3 times easier.
  • Was it difficult to crack a Random Substitution cipher? Did it take longer than you thought? shorter? Why?
    • Yes it took longer and was more difficult. It was harder because I could not just shift the alphabet over to find out I had to figure out each letter individually. 
  • Any encryption cipher is an algorithm for transforming plaintext into ciphertext. What about the other way around? Can you write out an algorithm for cracking a Caesar cipher? What about a random substitution cipher?
    • Yes, it is possible to make an algorithm that shifts the alphabet until there becomes a recognizable message from the encrypted message. Same with the random substitution.  
  • Recall that in RFC 3271, “The Internet is for Everyone” Vint Cerf wrote the following. What did he mean by “cryptographic technology?” What does it mean to you now?
    • I think that he meant that there is a type of technology central to creating passwords and cracking them. It is along the lines of cybersecurity. It means now ensuring that the internet is safe. 

Sunday, December 11, 2016

Blown to Bits Chapter 5 Reflection


  • What is encryption?
    • Encryption is the art of encoding messages so that they can’t be understood by eavesdroppers or adversaries into whose hands the messages might fall.
  • What is cryptography? Provide an example.
    • Cryptography is a form of “secret messages” that are encoded. A Caesar Cipher is a commonly known form of cryptography because it uses the rotation of the alphabet to encode messages.
  • What is security through obscurity? Why is it bad?
    • Security through obscurity is when companies create new “breakthrough” encryption methods, but refuse to open to the public. This is seem with high skepticism because most believe that if there was a new method then it should be open to the public to prove its security.
  • What is the key agreement protocol? Why is it important to Internet commerce?
    • The key agreement protocol is a one way computation which is a solution that can be found many different ways. For example 6*2=12 but 3*4=12 also. Same result but a different way of getting there. It is important because it allows for exchanges to happen with secret messages and public and private keys.
  • What is a certificate? What role does it play in Internet security?
    • A certificate is digitally authorized and signed key. This allows someone’s public key to be public and a message still accessed if someone has a certificate to access their private key.

Friday, December 9, 2016

Vigenere Cipher

From what you’ve seen what are the properties of the Vigenere Cipher that make it harder to crack? In other words, if you had to crack a vigenere cipher what would you do?

The main properties is that there is a key that is defined by the person who sent the message so the key can be very long and include a large variation of characters which mAkes it harder to crack the code. Not only that but the cipher does not just rotate the alphabet or assign a character per letter, it assigns letters based on the key. I would try to find the key or hack for the key.

Thursday, December 8, 2016

Encryption

In your daily life what things do you or other people rely on keeping a secret? 
Who are these secrets being kept from? How are these things kept secret? 

People rely on personal information like social security number, bank account information, location, phone number, address, zip code, family members information, medical records, and insurance information like policy numbers to be kept secret. These secrets are being kept from people with malicious intent but also from the general public because privacy is a valued thing. These are kept with encoded information and also with things like firewalls that prevent attacks on a server or hacks. 

serr cvmmn va gur pnsrgrevn = free pizza in the cafeteria 

My birthday is tomorrow and I am turning sixteen years old. I cannot wait for this day to be over so it can be my birthday already. = Zl oveguqnl vf gbzbeebj naq V nz gheavat fvkgrra lrnef byq. V pnaabg jnvg sbe guvf qnl gb or bire fb vg pna or zl oveguqnl nyernql.

Wednesday, December 7, 2016

The Cost of Free

  • This lesson is entitled The Cost of ‘Free.’ What does that mean to you now?
    • That means the implications and consequences that come with having a free application that you reveal data on. 
  • How would you explain The Cost of ‘Free’ to a family member, or person you just met, if you had only 60 seconds?
    • Many websites and companies offer services that are free, whether you can download them for free in the app store or you can access it for free online. However, these companies such as Google and Facebook have increasingly high gains and profits. How do they make so much money while you receive their services for free? They sell your information and the data collected on you from your use of the application. They sell to the government or to private advertising organizations. All of the data on you can be found by other people and manipulated by malicious people. Therefore, there might be a big cost to your free applications. 
  • Right now, which way are you leaning? Too little privacy? Right amount?
  • Are you willing to give up some privacy (and potentially some security) to have free access to modern innovative tools - do you trust companies to be good stewards of your data?
  • Are you concerned? Do you think too much of your data is out of your control? Do you think too much personally identifiable data is given over to someone else?
  • What other questions do you have?

Tuesday, December 6, 2016

Implications of information

The idea that all information even the de-identified information can be either traced back to identified information or contained within a database that has identificable information. Also the notion that from de-identified information someone can get another person's voter information or access their personal information through a database is significant of how things are all connected and there is no way to have a completely secure presence on the internet.

Monday, December 5, 2016

Research yourself

Information:

  • My blog for this class
    • my blog from last 
  • My profile picture from my google accounts
  • a picture of me from the Sagamore
  • My HackerEarth profile
  • My Girls Who Code bio for my TA position 
  • my prezis

Where you found it:

All of the information was from google search results either in images or in the first pages of all results.

The information above reveal what extracurriculares I participate in and when/where they are, what school I go to, what I look like.

All of this can be abused.

Wednesday, November 30, 2016

Day 2 Space Project

Just finished my comets and asteroid belt with its full detail. Changed the asteroids to being curvy with arcs instead of circles. Put comets in fixed places. Putting all of our code together and organizing it now.

penColor("black");
dot(2000);
penUp();
function drawComet(x, y, size, speed) {
  penRGB(238, 71, 29, 1);
  moveTo(x, y);
  penDown();
  dot(size);
  penUp();
  turnTo(45);
  moveForward(size);
  turnTo(135);
  penDown();
  moveForward(speed);
  penUp();
  moveTo(x, y);
  turnTo(180);
  moveForward(size);
  penDown();
  turnTo(135);
  moveForward(speed);
  penUp();
  moveTo(x, y);
  turnTo(130);
  moveForward(size);
  penDown();
  moveForward(speed);
  penUp();
}
drawComet(40, 383, randomNumber(5, 10), randomNumber(20, 40));
drawComet(240, 390, randomNumber(5, 10), randomNumber(20, 40));

function drawAsteroid(x, y) {
  penRGB(132, 72, 12, 1);
  penWidth(5);
  moveTo(x, y);
  penDown();
  arcRight(90, 2);
  arcRight(90, 2);
  arcLeft(90, 2);
  arcRight(90, 2);
  arcRight(90, 2);
  arcLeft(90, 2);
  arcRight(90, 2);
  arcRight(90, 2);
  arcLeft(90, 2);
  arcRight(90, 2);
  arcRight(90, 2);
  turnTo(270);
  moveForward(5);
  turnTo(180);
  moveForward(5);
  turnTo(90);
  moveForward(5);
  penUp();
}
for (var i = 0; i < 40; i++) {
  drawAsteroid(randomNumber(10, 300), randomNumber(15, 125));
}

Monday, November 28, 2016

Day 1 Space Project

It took me one class period to finish both of my project with medium depth. Next class I will work on adding more quality but now I am satisfied with a skeleton of my assignments, comets and asteroid belt.

penColor("black");
dot(2000);
penUp();
function drawComet(x, y, size, speed) {
  penRGB(238, 71, 29, 1);
  moveTo(x, y);
  penDown();
  dot(size);
  penUp();
  turnTo(45);
  moveForward(size);
  turnTo(135);
  penDown();
  moveForward(speed);
  penUp();
  moveTo(x, y);
  turnTo(180);
  moveForward(size);
  penDown();
  turnTo(135);
  moveForward(speed);
  penUp();
  moveTo(x, y);
  turnTo(130);
  moveForward(size);
  penDown();
  moveForward(speed);
  penUp();
}
for (var i = 0; i < 4; i++) {
  drawComet(randomNumber(10, 300), randomNumber(130, 440), randomNumber(5, 10), randomNumber(20, 40));
}
function drawasteroid(size) {
  penRGB(74, 52, 1, 1);
  dot(size);
}
function drawasteroidbelt(x, y) {
  moveTo(x, y);
  drawasteroid(randomNumber(4, 6));
}
for (var i = 0; i < 40; i++) {
  drawasteroidbelt(randomNumber(20, 300), randomNumber(100, 20));
}

Wednesday, November 23, 2016

Unit 3 Stage 7 Smiley Face and Extended

https://studio.code.org/projects/applab/xSrZ6VK5CK6kgh3xq5APgQ


https://studio.code.org/projects/applab/q18fgTyJnfaUVfhsewrJ9g


Monday, November 21, 2016

Functions with Parameters


  • Develop a rule for deciding when to create a function with a parameter rather than a normal function. Below your rule write a couple sentences justifying your rule.
    • If you are going to call the function back with a different value. 
  • When do you need a function with a parameter?
    • When you plan on calling back the function but with a different value for specific variables every time. 


What is Iteration

What is Iteration?

Iteration is repetition that is defined by specific actions and can be started and ended with specific commands. Otherwise known as loops. While, Do While, Conditional loops.

I have used loops to help sort things with node,js and I have used them many times before with visual basic. I have also used loops in other languages like python.

While x = 2
print "x = 2"
x + 1
Loop

Thursday, November 17, 2016

Unit 3 Stage 6

Imagine that you have two programs that drew the diamond-shaped figure. One program uses functions as we did in the previous lesson. The other doesn’t use functions; it’s just a long sequence of the turtle’s primitive commands. Which program is more efficient? Make an argument for why one is more efficient than the other.

The one with functions because it is more readable, therefore it takes less time for the programmer to read, understand, and code the program. 

Where else in your life have you seen layers of abstraction? Connect the idea of layers of abstraction to some other activity.” Provide at least 3 examples and describe the connection. Post on your blog.   Do the questions at the end of Unit 3 stage 6

Wednesday, November 16, 2016

Functions Unit 3 Stage 5

Prompt: List the benefits of being able to define and call functions in a program. Who specifically gets to enjoy those benefits?
The benefits of being able to call functions later save time, space, and a headache because the programmer does not have to re-make or copy lines from previous code over and over again. Therefore it specifically benefits the programmer.
Prompt: How is the use of a function an example of abstraction?
It makes things easier to read without writing every step out every time.

Prompt:  Explain more than one reason why programming languages have functions.
They make reading the code easier, they make creating the code faster, and they make big problems simpler.

Monday, November 14, 2016

Efficiency in Programming


  • What does it mean to be efficient in programming?
    • In programming to be efficient means to write a code that takes up less resources than a previous code did. Recourses can be time, battery power, or storage. Most often having less lines of code is an indicator of more efficient code. 
  • What are some resources that might be concerning in programming and why do they matter?
    • Some resources as I mentioned before include time, battery power, storage, bandwidth, servers, or any other form of measurable things of value basically. They matter because we do not want to waste valuable resources if we do not have to.  

Unit 3 Stage 4 efficiency

  • What surprised you about programming with such a small set of basic commands?
    • That I could still finish that assignment with time  to spare in class.
  • Were you able to be creative with such a limited set of tools?
    • No, not really especially since I was limited to one color and only straight lines. 
  • What was most frustrating about this activity? If you could add one additional simple command, what would it be, and why?
    • The fact that there was no right turn made the code a lot longer and more tedious than it should have been so I would have wanted to have a right turn command. 
  • Draw (on paper) the simplest image you can that we would be unable to create with our “building block” commands, and explain why it would be impossible to create.
    • A circle, a curvy line. 
  • Draw a second image we would be unable to create with the given simple commands, but for a different limiting reason than you cited in the first drawing
  • A rainbow because it needs colors. 

Wednesday, November 9, 2016

Minimum Card Algorithm

  • How do you know when to stop?
    • We have an end statement where if you get the lowest card possible or have gone through the entire set you stop.
  • Do your instructions state where and how to start?
    • Yes, it says to put down cards and start with two new cards. 
  • Is it clear where to put cards back down after you’ve picked them up?
    • Yes, put them back in the same position and take a new card. 
  • As we look at these algorithms you came up with, we can see they are not all the same. However, there are common things that you are all making the human machine do and commonalities in some of your instructions. Can we define a language of common Human Machine commands for moving cards around? What are the commands or actions most of these instructions have in common?
    • Yes, most of them say to start in a certain place after putting the cards in a line. All of them should define the face cards and the Ace. Pick up, put down, move left, move right, move up, move down, flip over. 

Monday, November 7, 2016

Unit 3 Day 1

    • “Were you always able to create the intended arrangement? Were your instructions as clear as you thought?”
      • No, some people (Alex) got confused by what I thought were pretty clear steps. I thought that certain points like if the wheels were inside or outside were self-explanatory from the instructions.
    • “Why do you think we are running into these miscommunications? Is it really the fault of your classmates or is something else going on?”
      • We ran into these miscommunications because I had the product in mind already and thought that my instructions were clear but for people who had never seen the product it was not as clear.
    • If we were going to change human language to improve our odds of succeeding at this activity, what types of changes would we need to make?
      • Add images with color to provide a visual, add a last step that shows or describes the product.


Friday, November 4, 2016

Data Visualization

Do you have to use a computer to create a data visualization? What are some reasons that you need to use a computer to manipulate data?

  • I think that you do not need to use a computer to represent data seeing as people have been representing information in written format for hundreds of years. However, computers make the job of representing and manipulating data simple and more efficient than it has ever been. To change things like add lines or take away data points or transfer the visual format can be done easily with computers, and was otherwise hard and time consuming. 

Unti 2 Lesson 13

In order to analyze data with a computer, we need to clean the data first. Based on your experience today, would you say that data analysis is a perfectly objective process? Why or why not?

No it is not objective because the results of the data analysis can still be manipulated by the analyzer and all people are subjective and have biases. 

Wednesday, November 2, 2016

Information, Knowledge, Data

  • What is the relationship between data, information, and knowledge? 
    • Data is proven facts based on real world occurrences. Knowledge is the thoughts and understandings of people, everyone has different level and variety of knowledge. Information is the in between, it is the commonalities of facts that all or most people share. So, information and data and knowledge are all based on facts, but they range in accuracy and commonality. 
  • What are the best ways to find, see, and extract meaningful trends and patterns from raw data?

  • Where and how does human bias affect the collection, processing, and interpretation of data?
    • Often times people say that statisticians create the results that they want to see. This is because there are so many ways to manipulate and interpret data. Human bias in this way dictates the results of data. 

Present your Data


  1. I chose to visualize the college ranking data that shows top public and private colleges. The list portrays 300 school of all different locations, tuition costs, and acceptance rates.
  2. There is a positive correlation found in the amount of need based aid school give and their retention rate. This shows how certain school have the ability to give more need based aid and therefor students attend the college for longer periods of time. This makes sense because the more expensive a school is the more certain people might have to graduate early or drop out.
  3. As I began to explain before school that offer more aid especially for students that have needs for aid have a tendency for students to stay in their college for longer. This makes sense because if students economic pressures to drop school or attend less school years of school they do not have enough aid, but with more aid comes less worries regarding finances. This leads to an overall greater attendance for longer periods of time.
     

Monday, October 24, 2016

Left Brain v Right Brain

I got 100% left brain on the quiz we took. I think that for a 13 question quiz the questions were acceptable, but like others in the class mentioned it was clear which answers lined up to which ratio of brain sides. This made it hard to take the test without having a predetermined result in mind and therefore a bias to certain answers. I think that Myers-Briggs test are more accurate because they ask a wider range of questions and have more solutions than just left or right brained. I am actually an ENTJ (extroverted, intuition, thinking, judgment) which offers more description and therefore a better assessment of my overall personality.

Data Collection

What is data? How is data collected? What can be learned from the data that can be collected?

  • Data is any piece of information that can be represented in bits. Data can range form a number to a set of characters. Collecting data can come from a survey or a sampling of people, it can be collected through calculations. Many social findings or economic theories have been derived from data and other things like advertising markets use data to provide their services.

  • Develop a hypothesis about student behavior over time, based on a small sample of data.
  • Describe sources of data appropriate for performing computations.
“People say there is data all around us. What do you think that means? Brainstorm as many examples of data as you can think of.                                                                                                                                      
  • Who is generating the data?
  • Where is the data being stored or saved? Who owns it?

Friday, October 21, 2016

Blown to Bits ch. 3 reflection (hw oct 14 and oct 17)

  • Do you think the need for file compression will always be needed, considering the advances in data storage, the speed of computers, and speed of the Internet?
    • Yes, because while there is an every growing improvement in technology there is also going to be a large increase in users on the internet. The challenge is going to be maintaining enough servers and connectivity to be able to keep internet fast and reliable for everyone. I think that a part of that is compressing files to keep them small and traffic fast.
  • Data formats are constantly changing. What challenges does this present for historians? For a given document, movie, or audio file, what are all the component pieces that need to be preserved along with it?
    • VCR is not even in the distant past yet it is nearly impossible to find a VCR player. Not to mention if a song is on a cassette tape, forget about finding a player. This old technology and the progression of modern technology make it hard for historians to uncover old artifacts since they might lack the supporting components to view the artifacts. They basically need to preserve one of everything to ensure that there is something to view old technology on. 
  • There is concern about Microsoft’s de-facto “.doc” format. Do similar concerns exist for cloud services such as Cloud Data formats and Cloud APIs? What are some such APIs and what will the dangers be if those de-facto standards are adopted?
    • No I do not think that Cloud Data formats will be a big deal or share the same concerns mainly because data formats often automatically adjust or offer other methods to access documents, so for an average person it doesn't effect their lives. More than that though it is hard to transfer government files to cloud data formats and that might be a concern for the future. 

Monday, October 17, 2016

Lossy Compression Reflection

  • What is happening in the app?
    • It is compressing the data without a dictionary, it is just dropping vowels. 
  • Should this “count” as text compression? Why or why not?
    • Yes, they make the files smaller and still result in the same or a similar result when you receive them. The one difference is in lossy compression where the resulting image or file is compressed but unable to recover to the original state. However, if it is useless information that doesnt make a difference then I think it still counts as compression. 
  • What do you think “lossy” refers to?
    • Lossy refers to a compression method where parts of the file is lost hence loss(y) compression. 

Friday, October 14, 2016

Oct 14 reflection

  • How many bits (or bytes) are required to encode an image that is 25 pixels wide and 50 pixels tall, if you encode it with 24 bits per pixel?
    • 3753 Bytes or 30,024 bits
  • Imagine that you have an image that is too dark or too bright. Describe how you would alter the RGB settings to brighten or darken it. Give an example.
    • Change the RGB code from something like (200, 188, 210) to the same ratio but half the numbers to make it darker (100, 144, 110).
  • If you had to send your favicon using the sending bits widget, it would probably take a long time. Could you compress your image? How? Describe in broad strokes the kinds of things you could do.
  • Yes I could make a character represent each color pixel and send all the blue pixels as one character and such. Then send the dictionary also. This works better if you use one color multiple times.

Thursday, October 13, 2016

Oct 13 Reflection

  • In the previous lesson we came up with a simple encoding scheme for B&W images. What if we wanted to have color?
    • In the previous activity we could use binary to create images because it was a collection of 1/0s or black/whites. In this way we could create images in black and white by making the shape of the image in black and white squares. To make color I think that you would have to define the height and width first then define color of the next x pixels then give the 1/0 code of it and then change over to another color by indicating the next color. Not exactly sure about it though.
  • Devise an encoding scheme for color in an image file. How would you represent color for each pixel?
    • For example 1111 might be Blue and so give the height and width then type 1111 for the next set of pixels to be blue. 
  • How many different colors could you represent? Do you have a particular order to the colors?
    • no particular order of colors but technically by assigning a number to a color you can represent any color. 
  • What are some of the difficulties of representing color?
    • The color could be confused for the actually picture code and or vice versa leaving certain parts out or shifting the rest of the code down changing the entire picture. 

Friday, October 7, 2016

Text Compression Reflection

What made compressing text hard to do?

Choosing phrases or words that are ideal to compress, basically finding the most effective compression dictionary. Also, decompressing the text was slightly a headache if there were many characters and not man words in the compressed text.

Describe the thinking process you used in solving this challenge - what was your strategy for compressing the test.

Take common words or phrases that appear often in a text file and replace them with one character like a sun or an umbrella. There is a corresponding dictionary or key that has the character and what words or phrases they replaced. To decompress the text just use the dictionary to replace the characters with the phrases stated in the dictionary to get the original text. Could be related in texting, typing u when meaning you.

Do you think it's possible to describe or write a specific set of instructions that a person could follow that would always result in better text compression than your heuristic?

No, my heuristic gives the most reasonable and realistic compression for a given text. I cannot give a better answer once for a given text let alone always.

Is there a way to know that a compressed piece of text is compressed the most possible?

No, I think that there are too many ways to compress a document to determine it by hand or without a computer, however, there might be a program that could test all dictionary possibilities to find the best compression rates.

If you send the compressed poem would your friend be able to read it? Why is the dictionary important?

My friend would only be able to determine the original poem if I sent the dictionary as well because it functions as a key that is used to decode the compressed document to its original form.

Thursday, September 29, 2016

Abstraction and HTTP Reflection

Abstraction - Reducing information and detail to focus on essential characteristics
Server - A computer that awaits and responds for data
Client - A computer that requests data stored on a server
HTTP - HyperText Transfer Protocol 
Purpose of headers - Additional information to help the server interpret requests
Purpose of bodies - 

Bytes and File Sizes Reflection

The salesperson in a cell phone store is telling me that the phone I'm considering has 8GB of memory, which means I can save 10,000 photos taken with the phone's camera!
Is the salesperson telling me the truth? Why or why not?
No, the average picture on a phone is about 3 megabytes. One gigabyte is the same as 1,000 megabytes. So, 8,000 MB divided by 3 is about 2,666 pictures. 
When does byte size matter?  Reflect on the many considerations one has related to coding, data transfer, RAM storage, word size, flash and hard drive storage and Web Pages.
Byte size matters when you want to stream videos over wifi or download a song. Depending on how big the file size is and how much storage you have and how fast your wifi is you can stream or download things faster or slower. Not only that, but depending on the files they can take up more or less space which is important for people to determine what they should and should not save directly to the hard drive. 

Tuesday, September 27, 2016

DNS and Security Reflection

DNS
  • Why does the Internet use IP addresses?
    • The Internet uses IP addresses because they are a simple and vast. There are so many possible IP addresses using IPv4 and there will be many more once we shift to IPv6. Not only that but the hierarchy of the IP addresses make them easy to understand. Finally, IP addresses do not need any of the users personal information or a devices to create an address, so the user is protected in a sense by that. 
  • Why don't we need to know IP addresses?
    • IP addresses are dynamic which means that the are constantly changing. To memorize or know one's IP address at all times would take a lot of memorization and a lot of time to check in with what your router assigns you to see if it changed. Not only that but IP addresses are already associated to domain names which is what we most commonly search for. Since the computer associates the two the user does not have to know IP addresses. 
  • Why do we need a Domain Name System?
    • Domain Name System allows users to have the same url or consistent domain name while IP addresses change frequently. We need DNS because without it users would need to keep on checking the IP addresses of others and of themselves to send messages or view sites. 
  • Why don't we all maintain our own DNS?
    • Many people own multiple sites and trust their ISP services to maintain the DNS for them. Not only that but ISP services maintain a reliable and stable DNS connection because they have geographic diversity in their server locations which would be hard for average people to implicate if they live or are centered in one place. 
  • Is there one big DNS for the entire Internet?
    • No. There are many DNS servers that individually connect to form the internet. That way if one server goes down there are many others that maintain the stability of the internet. 
  • How do you think all of these DNS servers are maintained?
    • There are so many websites on the internet and IP addresses are constantly changing. With that there are also some rules that sites follow. All domains have sub domains which are used to help DNS servers locate sites even if the IP address changed. www or .com are sub domains that do not change. Servers also rely on each other for gaps in information and when they receive new information they store it for future reference or for other servers. 
Security
  • What is one vulnerability of DNS and how is that vulnerability attacked?
    • DNS is vulnerable due to the ability to change domain name registration, which is also known as domain hijacking. The attack redirects servers to incorrect sites based on the changed domain name. 
  • What are the implications of an attack on a DNS server(or servers)?
    • This could lead to users being redirected to a site that gives the device a virus or malware. This could lead to personal information to be revealed or files to be deleted. 
  • How does this affect your life?
    • As a person who frequently uses the internet it is important to understand the ways in which it functions and how to protect myself from attacks or more accurately identify an attack. 

Thursday, September 22, 2016

Routers and Redundancy Reflection


Routers and Redundancy Reflection
  1. When you broadcast as a style of communication then you can see where your message is going and everyone can see it, making it more secure in my opinion because when something goes wrong people can see it. Routing traffic is more private which allows people to send personal and sometimes harmful messages to others while hiding behind a fake identity.
  2. No because there are so many dynamic parts of the internet and of sending messages that suddenly your message can take a different route to get to the same place or take a different route than two minutes ago. Everything is changing so it is hard to predetermine the path.
  3. The ISP can monitor, drop, and redirect messages if they own all of the routers. As long as my messages get through safely I think I would be okay with the arrangement.

Wednesday, September 21, 2016

Poster Project - Cell Phone

Damini Gopal
The Cell Phone

  1. What is the bit-sending technology used by your device? Why do you think this technology is used to perform its function as opposed to others that do the same?
    1. Cell phones can use radio or wifi transmissions. This technology is useful because allows the devices to be wireless and still be able to send bits.
  2. What is the average bit rate of the device?
    1. The average bit rate for a call in the US is 8,000 bits per second.
  3. When was the device first used? Is it still in use?
    1. April 3, 1973 was when the first mobile call was made from a cell phone. The cell phone is still very much in use, but more for texting than calling.
  4. How might data be corrupted or lost on this device?
    1. Corruption can occur during the transmission of information. If the transmission is interrupted there can be data loss and environmental conditions can often play a factor in the loss of data through cellular devices that rely on radio transmissions.

Some interesting facts:
  1. There is around 3 billion phone calls made a day in the US alone.
  2. The average cell phone has more computing power than the computers that were used for the Apollo 11 moon landing.
  3. Mobile phone throwing is an official sport in Finland.

cell_phone_throwing_contest_in_finland_46_pics_2.jpgmartincooper1_wideweb__470x3620.jpg

Mobile Phone Throwing in Finland         The first mobile phone and its inventor Martin Cooper

Real Life Examples of the Internet

  • The people who propose the laws, or judge them often don’t really know how the Internet works, what makes sense and what doesn’t. (See: The Internet is a series of tubes).
    • Ex: Congress members that attempt to make laws against cyber crimes, but do not understand the elements of the Internet.
  • Citizens don’t know how to protect themselves from cybercrime, or often live in a cloud of fear and uncertainty not only about the law, but their rights, and about what’s actually technically possible.
    • Ex: People do not understand what firewalls are or how to use them. Many do not even have two step identification on their most private websites like their bank accounts or email.
  • Hackers take advantage of unknowing, unsuspecting people.
    • Ex: When the hackers gained access to Serena William’s health information and made it public.
  • Corporations who provide Internet service need to balance profitability with providing access to everyone.
    • Ex: Google selling customer’s data to advertising companies so that they can target ads at consumers. Maybe Google should not be selling our data.
  • Countries restrict access to the internet or monitors activity - how is that technically possible? What is it they are actually doing?
    • Ex: China blocking certain websites like Google, Facebook, and YouTube. Since other countries do not have the same laws guaranteeing the same freedoms as in America they can block websites.

Thursday, September 15, 2016

Sending Numbers Reflection

1. What problems arose in your efforts to create a working protocol? How did you think about the problems in order to solve them?

We didn't have any issues, the communication was pretty good. We defined the procedure and protocol first that was very clear and detailed, so everything went smoothly.

2. How did collaboration play a role in the creation of you protocol?

We made a more in depth protocol and more efficient protocol than is I were thinking about it independently.

3. a

Monday, September 12, 2016

Creating Number Systems Refletion


A number system is a visual representation that shows values. If there were no rules in a number system people could interpret the number 3 millions of different ways. So, having the number 3 being a set value equal to three is an important rule that makes number systems common and usable for everyone.  

Thursday, September 8, 2016

Binary Message Devices Reflection and Picture

1) C
2) What are the ingredients of the soup you made today? This is a question that could have 1 to infinity answers. A Binary message has two possible answers 0/1 or yes/no. By asking a question that could require more than two answers that are all different it requires more than a binary message.
3) Does the soup contain carrots? This question could be answered with a simple yes or no which is two different states, which can be answered with a binary message.

Blown to bits ch. 4 reflection

Discuss the positive and negative results of Overture's three search engine innovations. How did those innovations turn out today?

Overture, a company that owns the domain GoTo.com, made three major innovations to their advertising policies that changed the way that online advertising was bought and sold. Their first innovation was to charge advertisers for the ability to be searchable and charged the companies more to be higher up in the search results. The second innovation was to charge advertisers fees only when a viewer clicked on their add, this was call PPC or pay by click. Lastly, Overture fluctuated the cost per click depending on how many advertisers were competing for the same keyword(s).

Those innovations began a new way of advertising. Out were the days of huge banners and garish adds, now advertisers pay to be a side bar on Google's search results or as a side video on Youtube. The innovations allow the advertising industry pay more fairly for their spots on a page, but they also allow the viewers to stare at adds for hours on end without becoming annoyed or visually overwhelmed. These innovations are seeing in many websites that offer advertising space which shows that these innovations truly are successful.