Home | Siuuuu Project | Study Plan | Data Structures Project | Notes | Github Actions | Create Task |
Github Actions
5.6 Safe Computing:
-
I have seen PII (Personal identifiable information) when working with databases. For example, in our menu and submenu on replit, we have a database function that consists of my name, birthday, sport, or hobby. This is all personal information that can be viewed by the public. As well, in our CRUD program from last trimester, we dispalyed our name, age, and email on a public page that could be viewed by anyone (Cspcoders.nighthawkcodingsociety.com)
-
I think that PII should be kept personal because it is personal information and everyone has the right to privacy. For example, PII can be dangerous because stalkers or scammers can hack the information to find things about you: social security number, school, birthday (age) and more.
-
Good passwords are usually heavily protected because they consist of special keys (capitol letters, symbols, lowercase letters, numbers) that cannot be easily be cracked. Having a bad password would include something that is easily accessible to people online, such as your name, birthday, and age. People can find that information online and would be able to hack your personal accounts, whether it be your bank account or social security number. A way to protect your personal accounts, if they manage to crack your password, would be to have multi-factor authentication.
-
Symmetric encrpytion is where only one key is used to both encrypt and decrypt the information/data. Asymmetric encryption is where a pair or related keys are used to decrypt and encrypt information to secure it from unauthorized sources.
-
Example of encryption in deployment is the software we use to deploy the website. The website must be secure through HTTPS, and we use Amazon Web Services with an EC2 Instance. The security of the software, Amazon Web Services, can be encryption in deployment.
-
I have never fell for a phising scheme, but some of my friends and family have experienced scammers pretending to be from a company that hopes to aid in securing their accounts. The scammers ask for personal information so that they are better suited to help, but they actually steal PII or send malware/viruses to the device that you open the links on.
5.5 Legal and Ethical Concerns:
Difference Licensing Types for Github:
- MIT License
- GNU (General Public License)
- Apache License 2.0
- Unlicense
- GNU GPLv3
- Creative Commons License
5.4: Crowdsourcing
- A crowdsourcing idea for our CompSci class would be to have everyone try to learn a new instrument. One thing the entire department has in common is experience with computer science and programming. Since there would less bias towards an instrument, it would be easier to ask everyone to learn a new instrument. Initiating it in the environment would require us to However, some people in CompSci already know how to play an instrument, which shows that crowdsourcing can reach other areas within a specific field. Del Norte Crowdsourcing is harder than for CompSci because there are so many people with different backgrounds. In computer science, we all that in commmon. However, people all over the school have interests in their own thing,so our final project would be better would crowdsourcing. We can gather data from everyone and have them try to learn programming and develop their skills in it.
5.3: Computing Bias
Even though it was a big mistake, I do not believe that the owners of the HP computer company are racist. They just had a lack of diversity when creating the feature. It was not in their intention to rule out people with darker skin, but when creating the software, they only geared it towards people with lighter skin because they probably did not have all racial perspectives (the development team lacked diversity and inclusion). Even though it is harmful, it was not intentional. I believe that the mistake should be corrected because the feature excludes a lot of people from participating it. It was a flaw on the development team’s side, so it is their responsibility to fix it and make it accessible for everyone.
5.2 Github Actions: Digital Empowerment and Divide
- How does someone empower themself in a digital world?
- Someone empowers themselves digitally by constantly trying to learn and improve their digital skills. For example, a majority of the population use technology on a day-to-day basis. However, how many of those people know what is actually going on to enable them to use the technology. Being able to learn those skills and replicate human creation digitally is very important for the future. A digital world revolves around technology, so it is important and empowering to know how to use it properly.
- How does someone that is empowered help someone that is not empowered? Describe something you could do at Del Norte HS.
- If someone is not empowered, it most likely means that they do not have access to technology or just not interested in immersing themselves in the digital world. One way that we could fix this at Del Norte is by providing everyone with a piece of equipment that is not fully restricted but monitors any unsafe and harmful actions.
- Is paper or red tape blocking digital empowerment? Are there such barriers at Del Norte? Elsewhere?
- Paper is an alternative form to digital education, so in a way, it is hindering digital empowerment. At our school, we do not have many barriers to digital education since a majority of curriculum’s are now mostly online, and only use paper during things like tests. Elsewhere, I know that many schools do not have enough money to afford a fully digital education, or they are too restrictive on using technology.
5.1: Beneficial and Harmful Effects of Computing
Come up with three of your own Beneficial and corresponding Harmful Effects of Computing
Beneficial: Firstly, computers can store endless amounts of information and can help reduce the wastage of natural resources that goes into the production of paper, books, supplies. Secondly, computing connects users with millions of people across the internet through messages, social media, and more. This used to not be possible without the development of technology and computer automation. Thirdly, the internet allows us to stay notified and informed about important things happening around the world (ie. a war, pandemic, earthquake). Harmful: Firstly, too much use of technology can make you addicted to unrealistic things without experiencing proper social interactions that are crucial. Secondly, computing and the distribution of private information online is a prominent issue in our world and is very hard to prevent. Lastly, a heavy reliance on technology and computing can remove the need to do things individually as we now rely on something other than ourselves.
Talk about dopamine issues above. Real? Parent conspiracy? Anything that is impacting your personal study and success in High School?
Answer: Dopamine issues are where you are too addicted to doing something to the point where you rely on the pleasure it gives rather than its harmful consequences. For example, I have fallen into the trap of playing video games and watching YouTube instead of preparing for school because of the pleasure I received in the moment from the release of dopamine. It can effect school and physical performance if that is the only thing you focus on.