Monday, March 25, 2019

Create blog post 3/25/19

1) Today, I finalized my idea and began working on my first functions. I have decided to do an AES encryption program that uses two different keys to encrypt or decrypt a message, depending on what the user chooses.
2) Today I have began to write my encryption function. I have learned that I need to import a couple libraries that require files being imported into the program. I have began to write the encryption function, and have made progress in defining the key and getting input
3)  A problem I ran into was using files, I learned I needed to use import os in order to pull files
4) I would say I am at a 1 on a 1-10 scale. I have only just began writing the code itself, and I still have to write all of the parts about it.

Friday, March 8, 2019


private key : least secure on its own, uses same key (symmetric key)
public key : is more secure, uses different keys (one public, one private) also known as asymmetric
- digital signatures/certificates
- certificate authorities are companies entrusted with provided certificates, such as https
- authenticates traffic to make sure it is secure and legitimate (not spoofed)
- https is not completely secure, rest of traffic can still be caught elsewhere

Sunday, March 3, 2019

Video commentary

2a) In this video showing the program I independently created, the programming language used is python. The purpose of this program is to create a list of items, display which items are present in the list, and remove the desired items the user wishes to remove. The user also has the option to quit the program. The video shows how the user interacts with the program, and does a demonstration of the tasks it can perform, such as creating their own custom list, removing items, displaying the current list, etc.

2b) In this program which I have independently created, has multiple versions. The final version of the program was not the first one I created. I started out with a base program (shop1) which had no real functionality besides displaying the options menu to the user and collecting an input value. On the next iteration (shop2), we defined several new functions such as adding and displaying the contents of the list, and the option to quit the program. If statements were used to determine what operation to execute based on the user's input. In the third version, the option for removing items was added. In the fourth and final version of the program, I used files of data to store the values, and added aesthetic customization to make the program look more appealing. During the process, two problems I encountered were the

Wednesday, November 28, 2018

IP Blog Post

What is a protocol - A rule/set of rules governing the transmission of data between devices.
What is an internet protocol (IP) address - A unique set of numbers that identifies every computer using the internet protocol to communicate over a network.
How is it organized hierarchically - IP addresses are organized in such a way so that the first set of numbers identifies the region/network, and each subsequent set of numbers identifies a more specific characteristic of the device.
How many bits are in an IPv4 address - 32 bits
How many IPv4 addresses are there - 4,294,967,296
What is the difference between IPv4 and IPv6 - IPv6 utilizes 128 bits rather than 32, and are made of hexadecimal characters instead of numerical ones.
Why do we need IPv6 - Because the size of the internet has grown significantly more than what the founders of IPv4 anticipated in the 1980s, and we will soon run out of unique addresses using IPv4, with 128 bits, there are 3.4 x 10^38 or 340 Undecillion, which is much larger
What is an IP packet - Individual parts of a message being communicated, information that is sent that is broken from the main message, all have a small bit of metadata.
What is the difference between an IP address and an IP packet - IP packet is a piece of information being transmitted that has metadata, while an address is just a numerical value assigned to a computer
What is the purpose of a Domain Name System (DNS) - The DNS translates the text based websites (i.e into internet protocol addresses that the computer can connect to.

Wednesday, November 21, 2018

Blown to Bits

1. Argue if you agree that it is a “truth” and if it will always be a “truth.”
2. How does this koan intersect with your life as a student?
3. As a group, be prepared to summarize your koan for the rest of the class
- (just verbally - no formal presentation needed - will do this tomorrow) 

4. As an individual, create a blog post with a short koan summary & your thoughts on questions 1 & 2 
- this part should be done today or for homework

This koan was about how the amount of accessible information has grown exponentially, and how new technologies go from interesting ideas/conveniences to necessities for life, with the example of medical records being transferred to digital information, in which the past few years, much more medical data can be held on the records than before. The same applies to search engines, what was once just a convenience for people is now a necessity, if people don't find anything on the first few pages of results, then it can hurt businesses, academics, etc.

I agree that this is a truth, and I believe that in the future, as computing becomes more complex and powerful, it will remain to be the truth for many years. The amount of information accessible is reliant on computational power and storage space, which is increasing every day. It is important to my life as a student because it changes the way I learn. Instead of relying on textbooks, I now use the internet to conduct research and projects, and much more learning is done technology based.

Tuesday, November 6, 2018

Quiz blog post

Questions I got wrong
1) "When communicating with a network, a few things are important. Of the list below, which is most important?" The correct answer was timing, because when communicating through a network, it is important for nodes to stay synced so that information can pass.
2) "Which of the following only requires a single byte of storage" The correct answer was any number modulo 2. This is because if you mod a number by 2, it is only going to yield 2 results, either 0 or 1 as a remainder, which can be stored in 1 byte of data.
Ones I got right that were still quite tricky to solve
3) "When the number of bits is not large enough to hold the number - what happens?" The correct answer would be that the higher order bits will be lost, this is a process known as integer overflow
4) The correct form of not equal to is != this was a hard one as all of the answers were very similar looking, for example =! but the 'not' going before the equal sign is what gave it away
5) The question referring to ASCII for storing characters of the english language as bytes was difficult as we have not gone over ASCII yet.

Wednesday, October 31, 2018

Internet innovation post

I had not heard about any of these new innovations, the most impact innovations for society and the economy were the babel-fish earbuds by Google, the Sensing City, as well as the Net Power zero emission gas. Using the earbuds gives us the opportunity to have conversations with others in real time, which will bring about never before seen interaction between different countries, and international business will become much more important. Creating a fossil fuel that captures all of its CO2 emissions is also a major breakthrough. 22% of America's energy source is now from natural gas, and if we can cut carbon emissions from natural gas to zero, we have just reduced carbon output by 22%. The sensing city is important because it is the most practical way to modernize urban areas, as most projects and ideas presented are unattainable or extremely cost/time expensive.'
Personally, the earbuds are the most interesting to me, as I will be able to have a conversation with anyone on the planet.