Posts

Create Timeline Blog

3-12-18
Today I finalized my decision for my create task. I am going to make a program that is designed to create work stubs for employers. I plan on making the program work by taking input from the boss: the input will be how many hours a week the person will be working, and how much money they make. The program will then take out taxes, social security, medicare, etc. and output all this information on a pay stub. I plan on gathering information tomorrow, such as what percent of each check goes toward what. I hope to start the program tomorrow as well.

3~16~18
Today I started my program. I created my first function, and started a second function for it to call upon. My programs define every needed variable, for social security, medicare, and state and federal taxes. I plan on making each of these taxes, their own function. My main function, will be what the persons max income would be before taxes. Then this function will call on others to show what is taken out of their pay.

3~19~1…

Encryption

1.) Cryptography has been around since 2000 BC.
2.) FV LV FRRO
3.) substitution ciphers
4.)Random substitution cipher is more secure than a Caesar shift because there are 4 x 10^26 different ways to decode the substitution, therefore it is nearly impossible to decode the cipher.
5.)Frequency analysis could crack any substitution cipher.
6.) According to the reading a Random Substitution cipher they look easy to crack but is actually hard to crack.
7.) It would take me between 5-10 minutes to crack a message encrypted with a Caesar shift cipher.





































new favicon

Image

favicon

Image

Homework 11-15-17

What is a protocol?A well known set of rules and standards used to communicate between machines What is an Internet Protocol (IP) address?A way for computers to send and recieve information to specified devicesHow is it organized hierarchically?8 bits for each part of its address, country of network, region of network, sub network and address How many bits are in an IPv4 address?32 bitsHow many IPv4 addresses does that mean there are?  Up to 4 billion unique addressesWhat is the difference between IPv6 and IPv4.  128 bits per address vs 32 bitsWhy do we need IPv6?Because there are so many devices, the addresses could run out, this way there's enough for every piece of grain of sand on earth to have an IP addressWhat is an IP packet?It contains both a segment of data to be transferred and the address where the data is to be sent.What is the difference between an IP address and an IP Packet?The IP Address is the specific location of the device, an IP packet transfers the data to whe…

Explore task Oct23- Oct 27

Article 1: This article covers how Accuweather services, which is an app, can use ones location to sell anonymous information about the user to add companies as well as other companies trying to invest in information about a user. Although this may not be illegal, this infringes on peoples right. This app asks the user to allow the app to access the users location and if you click allow, the app now can use your information to create a profit for themselves. 


Article 2: The University of Washington and some other concerned individuals have recently come across some concerns regarding advertisements on mobile devices. Add companies have made it so someone looking to stalk another person, would be able to access your information, for as low as $1,000. Research has shown that these advertisement companies can track a person up to 8 meters away, and show where an individual has been within a short period of time after. This is raising concerns because even if a mobile device user doesn'…