Thursday, December 5, 2019

Explore Task Day 2

Yesterday when I began my explore task, I was able to find informative sources and do research. I wrote down a  good beneficial effect for my computing innovation, EHR software,  and wrote down the purpose of it and function of it.

Today I plan to find a harmful effect for my innovation.

Wednesday, December 4, 2019

Submarine Cables

1. While sharks have bitten the cables in the ocean in the past, they do not do it often enough for it to actually be threatening to the cables regularly.

2. Ships and fishing boats cause destruction to the cables by dragging their anchors. There are also environmental factors such as earthquakes and tsunamis that can disrupt and tear the cables.

3. Telecom carriers, mobile operators, multinational corporations, governments, content providers, and research institutions, and even us as normal citizens utilize these submarine cables for the internet.

4. The cables are not usually that wide, about the width of a garden hose.

5. Lasers of light are shot at one end and travel quickly through the glass fibers in the cable to the other end of it.

6. Something I found really interesting was the amount of submarine cables around the world! There are over 1.2 million kilometers of the cables, each of them varying in length from 131 km to 20,000 km, which is crazy to even think about.

Wednesday, November 27, 2019

Protocols, IP Addresses, DNS

1. A protocol is a system of rules or commands that, if all parties agree to it, will allow communication between them.

2.  An IP Address is an address assigned to every computer that is connected to a network in order to identify each computer using the Internet Protocol to communicate.

3. Country->Region->Subnetwork->Device. The hierarchy basically narrows things down from country's network in the first section of numbers, the region's, then to the subnetwork, and finally the device that the IP address perfectly belongs to according to the numbers included.

4.  In IPv4, each set of numbers separated by periods represents 8 bits, and the addresses are 32 bits long.

5. 2^32-->  There are over 4 billion IP addresses that can be assigned.

6. IPv4 is an IP address with numbers separated by periods, while IPv6 is split up with colons. IPv6 also provides more unique, numerical IP addresses necessary for Internet-enabled devices to communicate, being able to be 128 bits long instead of 32 bits.

7. When people had first created the internet, they didn't prepare for exactly how popular it'd become and they thought that 4 billion would be plenty. Having IPv6 allows for more addresses to be unique, and for more devices to be connected. With IPv6, there can be over 340 undecillion addresses as opposed to 4 billion.

8. An IP Packet message of data that includes information to direct its message from its original source to the computer it is supposed to go to.

9. The IP packet contains the data intended for the machine identified by the IP address as well as the IP address, whereas the IP address is simply the just the address of a specific computer.

10. The purpose of DNS is to store and translate domain names to IP addresses. For example, if someone was to type into their computer the domain name www.amazingexample.org, the DNS will translate it to whatever the IP address for that would be( i.e. 199.116.431.2.), reading it from the right to the left.

Sunday, November 24, 2019

Koans

Koan 2 talks about how computers, when handling and creating information, are much more successful in its ability to terminate any space for error. Despite our striving for perfection, humans are not perfect, and make mistakes all the time. However, with computers it is different. The networks don’t just pass bits from place to place, but in fact they recognize and revise any bits that become damaged and correct them in the process. Because of this, errors when transmitting information has decreased tremendously. This resonated with me because I feel that computers are much more efficient in its capability to negate errors in different situations, something that humans will never be able to do. A person can write a book a hundred times over but will never be able to get rid of every mistake.


Koan 3 is about storing paper files into digital files for more convenience, and the negative effects of  not having digital files. Imagine this: someone is trying to show records of a person's medical history, for example, if they've ever taken a stress test. The information was not on their private server, but there was a paper file that unfortunately, the doctor could not access. It wasn’t in the computer, so the doctor had to use the patient's memory, a tool that was inevitably inaccurate and unofficial. This example that was brought up in Koan 3 demonstrates how having medical files and just files in general digitized makes them much easier to access and maintain, somewhere where the information can be permanent and useful in specific scenarios. This stood out to me because of the example they used, since one of the ideas behind putting the files onto computers is that it will prevent as much human error, such as simply retrieving facts from memory, which kind of goes along with Koan 2.

Monday, November 4, 2019

Field Trip to Maritime Center


The image above showed the evolution of the telephone. I chose it because I saw that one of the phones was a phone that my brother had when he was in high school, so it stood out to me. Something else that stood out to me that I found interesting was that the phone was once in a bag, and people would bring them around like suitcases. Phones especially helped with people who wanted to communicate with one another from far distances, allowing wireless communication to occur.


This board in the gallery showed different pieces of technology that I use in my everyday life, which is why I choose to take a photo of it. Everyday before I leave for school I turn the lights off, and get my car key to go drive to school, etc. It is interesting to think about how that way of life was very different so long ago. These two inventions made it easier for people to control the lights in their house by a single switch, and let people have the ability to unlock their cars from a certain distance. 



The image above shows the ordinary appliances that were found in an American household- a phone, cassette player, small TV, etc. I took a picture of this because I have family that still have such machines from their lives in the 70s and 80s, so the inventions are relatively familiar to me. The phone specifically, while it has evolved to become more efficient in wireless communication, back then was just as significant in supporting the conversing between two people in two different places. 



The image shows the timeline of circuits and microchips. The reason I took a picture of the timeline was out of sheer curiosity to look over and read how it has evolved over the years. After the official production of the CPU chip, devices such as computers were given the ability to store and execute programs for a variety of purposes. Computers today can now communicate with wirelessly through email, Skype, and even through text message, which is a significant leap in the timeline of technology. 




Above is a morse code machine. These had the ability to wirelessly communicate to other countries and continents through a code. This code was a series of dots and dashes that were administered to the machine, and they were translated into English letters. I find different types of communication to be interesting, so that is why I took a picture of it. It was interactive as well, so I could tap out words, which was pretty fun. It was an essential machine to use throughout history, especially during times of crisis in which phones may not have been available. 




The image above shows a typical workstation for someone working at the center back in the 20th century. I picked this place to take a picture as it shows every piece of tech that they would typically use on a daily basis when being employed there- a typewriter, radio, and morse code machine! As mentioned before, I find morse code very interesting, and is a significant method of wireless communication. Another form that is seen in this photo, while it is much slower, is sending letters by inscribing a message through a typewriter.






Three Things I Learned:
-How an enigma machine works; plugging in a specific code, then pressing the buttons to view what the real code actually is.
-A maritime center on Cape Cod was involved with the saving of over 750 lives that were on the Titanic when the iceberg had hit.
-When viewing a video, it is evident that morse code is actually more efficient than texting concerning the speed of the message and how long it takes for it to be transmitted and translated.

Friday, October 25, 2019

Coding With Music Article

I picked this article because I am fascinated by music, and thinking of a computer as an instrument is a really interesting concept. The more I thought about it, the more I saw that music and coding have very similar objectives needed for being an expert in both of them. You have to practice in both a lot, and even when there are mistakes made, fixing them is extremely satisfying with both of them. The author, Jason Riggs, creates music software by blending coding in with his love of music, often referring to computers as instruments. As well as being well versed in the concept of coding and algorithms, he must also understand the different types of instruments, the notes that they play and what movements produce those responses from the user. There are specific universities that offer dual majors in which one could study both music and computer science. Jason Riggs in this case did not do this, but has moved on to receive a masters degree and learn computer science.

Wednesday, October 23, 2019

Internet is for everyone, but it won't be if...

Challenges 7 and 8 pose deeply problematic questions that stand out to me: 

7.  Internet is for everyone - but it won't be if its users cannot protect their privacy and the confidentiality of transactions conducted on the network.  
My parents have gotten into situations in which their privacy was compromised before, and so I feel that it is super important for others to have their personal information protected in circumstances where they have to upload such things. If we could not protect our information, it would be vulnerable to those who wish to exploit and use it. For example, a person's social security number could be used for some sort of identity theft, so without that protection, a person could easily access everything they need to become another person.

8. Internet is for everyone - but it won't be if parents and teachers cannot voluntarily create protected spaces for our young people for whom the full range of Internet content still may be inappropriate.  
Being a student, I understand that there are specific websites and pieces of content on the internet that parents/teachers should be able to block. I personally have come across websites as a result of keywords that are not the educational information I desired, but instead something heinous or unwelcoming. Thankfully, the administration at my school has software of the school-issued computers that allow for those specific website to be blocked from the viewer. If the Internet could not be restricted as such, adults would most likely inhibit the amount of time minors can have access to the internet, which could result in less productivity and less useful resources. 

Explore Task Day 2

Yesterday when I began my explore task, I was able to find informative sources and do research. I wrote down a  good beneficial effect for m...