Wednesday, November 30, 2016
Shakespeare complete works
Shakespeare has approximately 3.5 million characters in his complete works. Which is bigger the plain ASCII or the 4 min Mp3 song. This depends on the file size of the Mp3 and the quality. The highest quality for an Mp3 4 min song will be 7.68 Mb. The Shakespeare complete works will take about 3.5 million bytes. A one minute Mp3 will be about 700 KB which is 2800KB if it was 4 minutes. 1 kilobyte is 100 bytes. Which means shakespeare has a bigger file. Which means Shakespeare play has about 600,000 more bytes than a 4 minute song. I got this b
Sunday, November 27, 2016
Flash Talk:Protocol Vulnerabilities
Flash Talk
Protocol Vulnerabilities
The Internet is expanding and becoming bigger everyday and Vulnerabilities/hacking are increasing. The Internet or the “Net” is a global system that interconnects with many computer networks. In other words the internet is a system that connects the networks which could send and receive information to users. Internet Vulnerabilities could be very common at times and could increase the risk to be hacked. This is called Internet spoofing, but there is more to it. For example, Internet spoofing is a created internet protocol packets that have a false Ip address. An Ip address is a bunch of numbers that is separated by periods that identifies each computer in the internet. Once that Ip address is false you could be lead to a fake website which is vulnerable. For hackers it could be easy to intercept or encrypt the data. This could be dangerous and cause the hacker to steal the information. There are many Protocol Vulnerabilities in the Internet protocols. For example some of them are HTTP, DNS,TCP, IP,etc. These are protocols that guide or instruct the computer on what to do.
There are many protocol vulnerabilities that affect the computer and may cause a threat to users. A malicious hacker could intercept data and use it for his/her advantage. An example of this could be a command protocol, DNS. The Domain Name Server (DNS) is the main directory and looks up the Ip address. In other words it's like the phone book of the internet. It could be a worldwide collection of the DNS servers that are available. They communicate using network protocols. It's a database system that send and retrieves data to the servers and computers. But there are vulnerabilities to DNS, and could exploit your information to the hackers. There are many security issues with the DNS and is a nice target for many of the hackers out there. Traffic could also be a issue to this and cause delays with the server. But since these are hackers hacking into the DNS we call it DNS spoofing or DNS cache poisoning.These attacks send out false information to a user it could be a server exchange. An example of this could be an unrelated attack. The hacker uses a recursive query so get into the DNS server by requiring a domain. He will then add answers to the cache this way to emote this DNS server. Another is related data attack and it is just like the unrelated attack but the hacker adds extra information to the original query. To sum up there are many attacks that may intercept/add the information from the DNS servers. Finally, the internet is expanding and getting better, so does the DNS but it can't keep up with its vulnerabilities to its server.
https://en.wikipedia.org/wiki/IP_address
https://www.lifewire.com/what-is-a-dns-server-817513
Wednesday, November 16, 2016
WBL Workshop
The WBL workshop on November 14, 2016 was a very important workshop that dealt with discovering your career DNA. DNA stands for "Dynamic Natural Abilities." They have gave us a packet and explained why its important to find your career that you like doing. This was very complicated at first since I was confused on what to do. I usually like doing something in the engineering, medical, and business field. But I wasn't sure so they gave us a series of exercises that were in this packet. My first exercise I was interested in entrepreneurship,Social,Artistic values. After this there were multiple activities in the packet which had many surveys or questions on my preferences. I then found out I liked Data and working with ides during my job. In fact, I started to find out that I was inserted in the medical/business more than the engineering. But I still wasn't sure. Once we finished the packet we will soon find out but it will change throughout the years. Lastly, this WBL workshop was great.
Thursday, November 10, 2016
W3Schools CSS
Today we have read and done some W3school CSS exercises. These exercise have helped me I new what to do once I have read and took notes on the different types of Selectors and Syntax. For example the CSS stands for Cascading Style Sheets. Which displays Html elements. There are many different style sheets. They could be displayed in several ways. Css syntax is a rule that has a selector and declaration. Some of the selectors were Element, Id, Class, and Grouping. Most of them were used during the exercises. The exercises were difficult during some parts but most were quite easy.
![]() |
| Element selector |
![]() |
| Id selector |
![]() |
| Group selectors |
![]() |
| Group selector |
Sunday, November 6, 2016
Google Trip
On November 1, 2016 our Web Design teacher Mrs. Ramirez has invited us to go to a google trip. This trip was really fun in overall and I learned many new things with the people that worked their. To start this trip was during after school so we gathered during after school to take the train to Google Offices. As soon as we arrived they gave us google badges since this was a well protected vicinity. After this we were broken up into groups of fives's. And was escorted by people that worked their. They showed us the place and everything was going great. What I found cool about this was when I saw that they had a game room had great food and their was creativity everywhere. Google offices has felt like it has transformed into a personal household and was created for the comfort of its people. Once we were finished they sent us to an conference room. In this conference room they talked about what they do there and how they do it. We asked them a few questions about how their day was like. We have gained not only knowledge but how we could get into working in such a place. As time went by the google employee asked as to personally go to the people that work their and ask them questions. These questions were one on one and soon became conversations of how they got where they are today. We then finished and thanked these people for taking time of there day. I loved the google trip and I hope I will be there, again someday.
Subscribe to:
Comments (Atom)



