Monday March 19th Create Task

User check is in, does not function correctly yet. Asks for input from user twice. Lists function correctly, but I'm not sure if they need to be extended. How to reply to input of a fruit that is not on either list?

Friday March 16th Create Task

Created two lists, one of the fruit that will be on sale, one of all available fruits to pick from. Need to create a check for user input that is valid and non numeric.

3/12/2018 Create Task

Decided to do a fruit store program, it will have user input and functions to check what fruit is available an on sale.

The Internet and IP Addresses

What is a protocol?Widely accepted rules that govern how data is shared through the internet
 What is an Internet Protocol (IP) address?The digital address, which consists of a unique sequence of numbers for each device accessing the internet, that can be used as a reference of where to send data to, as well as a way to track where data comes from. 
 How is it organized hierarchically?Most IP Addresses have 4 parts, 8 bits each, dividing into country, region, sub-region, and specific device. 
 How many bits are in an IPv4 address?32 bits
 How many IPv4 addresses does that mean there are?  2^32, or roughly over 4 billion
 What is the difference between IPv6 and IPv4.  IPv6 has 128 bits while IPv4 has only 32 
 Why do we need IPv6?IPv6 is necessary because it will ensure that enough unique IP addresses can be created for all of the devices accessing the internet
 What is an IP packet?IP packets are pieces of information send individually through the internet and are reassembeled upon arrival …

10/27/17 Homework

Article 1:

This is about AccuWeather using anonymous data from its users even after the user says they do not want to share their data outside of the app. The reason they were able to do this is because in their question they specified that they would not use the information through the app while it runs in the background, but they are using the anonymized data outside of the app. This article shows that apps have access to your data, which is not a new idea, and that they can use it without your knowing. 
Article 2:

The second article initially introduces the idea that fake ads could be used by employers, strangers, or digital theives to trick you into giving away information.  To further on this the article states that for roughly $1,000 can purchace online ads to track the location of individuals and find out what apps they're using. To do this, interaction with the app is not needed. There are some ways this could be delt with, such as watching ad buyers usage patterns. A patter…

10/2/17 Homework

Micro Chipping in Humans:


Prevent child abductions, or help locate lost childrenReduce theft rate (in cases where micro chip is replacing a physical item)Identification (no more baby mix ups!)Health analysisCriminal management 


GPS would know if you were speeding, minor crime preventionData leaks, new technology always has bugsHardware replacement / upgradesBody migrationMRI scanners cannot scan with metal implantsNo universal standardsor all in one chip Micro chipping in humans has a wide range of possibilites, many of which are beneficial and would improve the lives of many. Being able to protect children and elderly, for example, would be a paramount civilian safetly improvement. Because there are no universal standards it seems this technology will be developing for a while, though. The inconvienience of getting multiple micro chips, or having them taken out and put in a multitude of times is highly unappealing.