Posts

Showing posts from October, 2017

WBL Workshop #2

In the second WBL workshop of the school year we were introduced by two guest speaker who came to talk about the GreenThumb Youth Leadership Council , which is a program where students volunteer in different boroughs in different neighborhoods to help create gardens, and they were letting us know the benefits of the program including how it could count for CTE students under the community service hours, and how its a plus to put this on college and job applications, and will provide positive feedback to help you. Then after the guest speakers left, we were all handed a packet with a career party game, and it would try to help us indicate what kind of future career paths we would be the most interested in, There were six different career groups, and you had to choose which three seemed the most interesting to you. My three choices were realistic group, conventional group, and investigate group. Then after that we did a career DNA checklist to see if the career groups we choose were accu...

WBL Workshop #1

In the first Work-Based Learning (WBL) Workshop of the school year we were introduced with the three "W's "of WBL. The why, what, and where. Then after the introduction for the Workshop, we discussed "Why do CTE students need WBL?" And the talked about the CTE diploma requirements as well as the WBL requirements needed to be completed by CTE students. Those included talking about WBL application, discipline policy, and confidentiality agreement. After we finished talking  about those requirements, we were each handed a paper where we could check off our requirements, and another paper where we could record our hours of participating in a Career Fair, or volunteering or doing an internship. Then after we received those papers, we talked about a different topic including, "Where will the WBL experiences take place?" We discussed how former and current students have completed internships, and participated in Career Fairs, as well as students in the future...

Blown to Bits: Chapter 2, 5, 7, 8 Summary

Chapter 2 The second chapter of Blown to Bits, entitled  Naked in the Sunlight  brings forth the alarming fact that in a world of bits, none of one’s information can be protected.    The author opens up the chapter with a comparison to George Orwell’s novel  1984 , where the characters are always being watched by a government force called Big Brother.    In the novel, the ruling party has complete surveillance over all the people, and the author compares this to modern day London.    The author cites the Subway bombers of 2005 to prove his point.    During the time of the bombings, London was under heightened security, and by using the footage from surveillance cameras, they had no problem getting images of the bombers and their trip before detonating the bombs.    Finally the author draws the conclusion that “1984 is here, and we like it”. Chapter 5 In chapter five of Blown to Bits, the author explores the complex wor...

Lab #6: Reflection Journal

Lab 6 In this lab we, were given the following topics: Internet Censorship, Net Neutrality, and Protocol Vulnerabilities and/or Hacks. What we did with these topics was, we had to choose any topic, and do research about it. First we had to find some of the pros as well as the cons for the topic we chose. Then we created a quick flash talk video of us talking about the topic. The requirements for the video was that it had to be at least 1 minute long, but less than 2 minutes. What we talk about in the video was first we introduced the issue, what is it, and how it affects people in this world. Then after that we stated a few pros and cons about the topic. Then we ended the video by stating whether we were for or against the topic, and explain why. After we finished the video we saved the clip as an .mp4 file, and inserted it into and html document, and included hyperlinks for our resources of where we got our information from. And then after we finished the lab we printed out our flash...

Lab #5: Reflection Journal

Lab 5 In this lab we, did a similar thing in what we did in lab 4. We created a table but instead of it having three columns, it had 5 columns. And instead on each column containing information about colors, it contained information about favorite things. In order from left to right, the first column contained my favorite foods, the next column had my favorite movies, then the next column had my favorite subjects in school, then the next column had my favorite artists and music created by that particular artist, and the last column, had a grocery list of what I would usually get from three different foods, followed by three different items in each food category. The program that I used to do this lab was called "Dreamweaver". Completing this lab took roughly around 4 days because it was just a lot of repeating typing for most of the lab. and also each column would have a different order. The favorite food column would be organized in an unordered list. The favorite movie col...

Lab #4: Reflection Journal

Lab 4  For this lab we did something different from what we did in the previous labs. In this we were allowed to use any program for doing this lab. For this lab I used an application called "Sublime Text", and in this lab we created a table with three columns where each column had different information. The table was created and focused mainly and different colors. But we didn't do ordinary colors such as red, blue, or green. We used colors that some people might not know of such as lime or floral white, colors that people might not use or even heard of. So in the table the three columns had different information for each color. The left column showed the name of each color. The middle name showed the hexadecimal code for each color. It's very important for this lab, because if it's not included in the table, the program you're using won't be able to know what it's used for. And finally the last column showed a sample of the color itself, and how it ...

Lab #1-3 Reflection Journal

Lab 1 For our first lab of the school year we did a paragraph summary of ourselves, including what we learned last year ad what we did. And we also included what we look forward to doing throughout this year. So how we began this lab was we used an application called "TextEdit" and we started to write our needed information and our paragraph for the lab. Lab 2 For our second lab, it was similar to what we did in the first lab. We basically kept the same paragraph we wrote about ourselves in lab 1, edited them so there were no grammar errors. And then we include an image of our face that we took during class on to the lab. Inserting an image on the lab was tricky at first, but then, when you find out how to put certain codes before inserting the image, it got easier. Lab 3 For our third lab, it was basically a combination of what we learned and did in labs 1 and 2. We kept the same information and paragraph we had in lab 1. And we also kept the same image of our selves ...

Current Events #4

                                   Let your car tell you what it needs Have you ever drove you car, and suddenly your tire runs out of air? Have you ever noticed your car's air filter needing to be replaced? Or if the engine needs new spark plugs? It would be cool if you could know what you're car needs in advance, right? Well it's a software idea, developed by the MIT research team.   In the Following article titled, " Let your car tell you what it needs ", states the following " Within the next year or two, people may be able to get that kind of diagnostic information in just a few minutes, in their own cars or any car they happen to be in. They wouldn’t need to know anything about the car’s history or to connect to it in any way; the information would be derived from analyzing the car’s  sounds and vibrations, as measured by the phone’s microphone and ...

Current Events #3

For $1000, anyone can purchase online ads to track your location and app use In the article, "For $1000, anyone can purchase online ads to track your location and app use" stated the following: " Privacy concerns have long swirled around how much information online advertising networks collect about people’s browsing, buying and social media habits, typically to sell you something.  But could someone use mobile advertising to learn where you go for coffee? Could a burglar establish a sham company and send ads to your phone to learn when you leave the house? Could a suspicious employer see if you’re using shopping apps on work time? The answer to this question they believed was to be yes. They did research at the University of Washington research. They also found out that for  roughly $1000 someone can purchase and target online advertising in ways that allow them to track the location of other individuals and learn what apps they are using.  " T...

Current Events #2

The Secret History of the Female Code Breakers Who Helped Defeat the Nazis In the article, "The secret history of the female code breakers who helped defeat the nazis stated, "In November 1941, not long before the attack on Pearl Harbor, a handful of letters began materializing in student mailboxes at America’s top women’s colleges. The messages were cryptic and brief, inviting their mystified recipients to private interviews in which the students might be asked only a couple of similarly cryptic questions: Did they like crossword puzzles, and were they engaged to be married? The correct answer to the first question was yes; the desired answer to the second was no.  For more than a year, the U.S. Navy had been quietly recruiting male intelligence officers: specifically, code breakers, or “cryptanalysts"  from elite colleges and universities, and now it was embarking on the same experiment with women. Educated women were wanted for the war effort, and with all possible ...

Blown To Bits: Chapter 3-Ghosts in the Machine

In chapter 3 of "Blown to Bits",  pages 91-92 discuss how certain objects were used before, and differentiates on how it's used and changed in today's society. One example that the chapter mentions is how music used to be stored on a compact disk known as a CD, but it's changed now in the present.In the chapter it says, " At the time the CD format was adopted as a standard, decompression circuitry for CD players would have been too costly for use in homes and automobiles, so music could not be recorded in compressed form. The magic of Apple’s iPod is not just the huge capacity and tiny physical size of its disk, it is the power of the processing chip that renders the stored model as music.  The birth of new technologies presage the death of old technologies. Digital cameras killed the silver halide film industry; analog television sets will soon be gone; phonograph records gave way to cassette tapes, which in turn gave way to compact disks, which are themselv...

Current Events #1

Scottish researchers make optical computer breakthrough Researchers at Heriot-Watt University in Scotland say they have come a step closer to manufacturing novel photonic computing components by demonstrating that a compound employed in touchscreen  called aluminum zinc oxide reacts to light when simultaneously struck with ultra-fast laser pulses of different hues. "Each color can induce strong and ultra-fast alteration on both the transparency of the material and the speed at which light propagates into it," notes Heriot-Watt professor Marcello Ferrera. He also observed behavior that could have ramifications for the design and fabrication of optical computing and telecommunication devices. "The induced alterations, which are typically opposite in sign, can be algebraically summed up one to another," Ferrera says. "If the material becomes more transparent with one color and more absorptive with the other, it will not show any appreciable alteration when the ...

Are you an expert in DNS?

1)Why does the internet use IP addresses?              - The internet uses IP addresses in order to identify which website is which, and who it belongs to. 2)Why don't we need to know IP addresses?             - Because sometimes, one IP address stays the same for one website, and it never changes. Henceforth IP address stay the same as it originally was for some websites, but not all. 3)Why do we need a Domain Name System?             - Because we need to know certain tags for websites, when they cant be accessed by how they originally are. 4)Why don't we all maintain our own DNS?             - Because having our own DNS isn't always necessary or needed all the time. 5)Is there one big DNS for the entire internet?             - In my opinion, I don't think so because, the internet is just to big of a source for it to hav...