Thursday, May 5, 2016

HTML Project

Jamie is the BOMB
All About Jamie

Jamie's Email: Send Mail
Jamie's Blog


CSC 111 Professor

Jamie's YouTube Page

Jamie's Favorite Things

  1. Babies
  2. Coffee
  3. Steak

Monday, May 2, 2016

Study Guide for CSC 111 FINAL Exam 03 May 2016 6pm-8pm

Study Guide for CSC 111 Final Exam (03 May 2016)

What’s on the test: (BOLD MEANS IMPORTANT) (Italics mean, pay attention)

  1. CRUCIFEM and how it would be applied to designing a website
  2. Algorithms and their properties
  3. Crowdsourcing
  4. logic tables - digital logic circuit
  5. binary to decimal - decimal to binary conversion
  6. Turing test
  7. Artificial Intelligence and its applications
  8. How to protect yourself online

1.CRUCIFEM- “HCI Design” (like when we made our bean counters)
C- Consistency
R- Redo (back button)
U- Usability
C- Completion
I- Internal Locus of Control- the appearance that the user is in control of going to webpage but behind the scenes, it’s the webpage that is allowing it
F- Feedback
E- Error recovery and prevention- fails gracefully or goes to error prevention/management
M- Memory Loading- it takes less conscious decisions on the user to access the site; it’s intuitive (like the “you have mail” icon)


2.Algorithms and their properties
-algorithm: a precise, systematic method for producing a specified result
-Everyone uses and invents algorithms all the time to solve problems
-The agent running the algorithm does not need to be a computer
-There are better and worse versions of many algorithms

Programs ARE Algorithms
-programs: algorithms that have been specialized to a specific set of conditions and assumptions
-usually written in a specific programming language
-usually the words program and algorithm are used interchangeably

Algorithms we have learned

-Placeholder technique
protect “good” letter sequences by replacing them with a placeholder
edit the “bad” letter sequences
restore the “good” letter sequences
-Binary to Decimal Conversion
if there is a 1, write down the place value for its position in decimal
add up those place values
-Binary Addition
add as in decimal but limit digit positions to less than two

Algorithmic Properties

An algorithm must have five properties:
1.Input specified- the data to be transformed during the computation to produce the output
2.Output specified- the data resulting from the computation (your intended result)
3.Definiteness- Specifying the sequence of operations for turning input into output
4.Effectiveness- all of the steps must be doable
5.Finiteness- algorithm must stop with either the expected output OR “no solution possible”
Algorithmic Facts
  1. Algorithms can be specified at different levels of detail
  2. Algorithms always build on functionality previously defined and known to the user
  3. Different algorithms can solve the same problem differently (different solutions can take different amounts of time/space)

3.Crowdsourcing
-Refers to solving a problem or achieving a goal by combining the contributions of a large, unconstrained volunteer population
-Wikipedia is perhaps the most famous of the crowdsourcing enterprises
-The goal is to build a database of all knowledge through a global effort
-So, what’s in it for the participants?
-It’s fun
-Earn points, win prizes
-Participants receive a sense of satisfaction that they are contributing to a project
-Many projects require skills that are more challenging than watching TV


4.Truth Tables (Logic Tables)
AND
(T and T is always T, F and F is always F, T and F and F and T is always F)

P
Q

T
T
T
T
F
F
F
T
F
F
F
F



NAND (opposite AND) (N means NOT)
(T and T is always F, F and F is always T, T and F and F and T is always T)

P
Q

T
T
F
T
F
T
F
T
T
F
F
T


OR
(T and T is always T, F and F is always F, T and F and F and T is always T)

P
Q

T
T
T
T
F
T
F
T
T
F
F
F


NOR (opposite OR)
(T and T is always F, F and F is always T, T and F and F and T is always F)

P
Q

T
T
F
T
F
F
F
T
F
F
F
T















5.Binary to Decimal and Decimal to Binary Conversions

Binary to Decimal (8 bits (columns) is a “byte”)-least “significance” number starting on right

128
64
32
16
8
4
2
1
1
0
0
1
1
0
1
0
128
0
0
16
8
0
2
0
Bottom row equals- 154
(154 is the decimal answer to the binary conversion of “10011010”)
*make up binary number
*Any column with a 1 gets the large number, any column with a 0 gets the 0
*FYI, usually a space in the middle btwn every 4 bits

Decimal to Binary Conversion

Decimal # we are converting is 154
128
64
32
16
8
4
2
1
1
0
0
1
1
0
1
0
26


10
2

0


*154 divides into 128 so 1 goes into first binary number (red)
*Subtract 154 from 128 and get 26
*26 can’t divide into 64, so it’s a 0, same with 32 it is also a 0
*26 CAN divide into 16, so it’s a 1 and 26-16=10, the next number
*10 CAN go into 8, so it get’s a 1, 10-8=2.  2 is the next number
*2 can not divide into 4, so it get’s a 0
*2 CAN divide into 2 so it get’s a 1, 2-2=0
*0 can not divide into 1, so it gets a 0
Binary Conversion Answer is 10011010






6.The Turing Test

-Two identical rooms (A and B) are connected to a judge who can type questions directed to either room
-A human occupies one room and a computer the other
-The judge’s goal is to decide based answers received, which room contains the computer
-If the judge cannot decide for certain, the computer can be said to be intelligent

Passing the Turing Test

-Turing’s experiment sidestepped the problem of defining thinking, and also got away from focusing on any specific ability such as performing arithmetic
-When Turing conceived the test, no algorithmic process was known for analyzing English, as word processor’s grammar checkers do today
-Computers are still a long way from being perfect
-Good enough at language tasks that we can imagine a day when computers are better than most humans


7.Artificial Intelligence

-To be intelligent, a computer has to understand a situation and reason to act on that understanding
-Actions could not be scripted (pre-programmed) or predetermined
-Systems would have to understand natural language and/or have real-world knowledge











8.How to Protect Yourself Online

-Turn off Bluetooth when not in use
-Keep your phone and other computers locked
-Do not automatically click on email attachments
-Never enter sensitive information in a pop-up
-Thinking of getting something for nothing
Think again
-Know where you’re going
-Be somewhat skeptical
-Use extreme care when visiting notorious sites
-Run “modern” software
-Install updates often
-Install anti-virus software
-Set your Wi-Fi router to security level of at least WPA2
-Password-protect your phones and computers with appropriate passwords
-Use your knowledge, be wise
-Backing up computer files is an essential safeguard
It ensures that your files will survive for a long time, even if you don’t want them to
-The Do Not Track flag should be set, and DoNotTrackMe should be installed to avoid third parties building a profile of your Web surfing behavior
-The best way to manage privacy in the Information Age is to have OECD-grade privacy laws
-Use Encryption for serious privacy/security- There are two key features to encryption: private key and public key techniques

If something really bad happens…
-Turn off your computer immediately
-Use a different computer to do a web search about what happened
-Use an external source for the OS to reboot