Wednesday, October 4, 2017

Surveys and Data with Spreadsheets





Spreadsheets can be modified to collect survey and test data. Google has integrated their forms to allow students, teachers and others to quickly share data and gather information. Here is an example of  a test created with Google Forms.



We used Excel and Google Sheets to do data calculations and to display forms.
Here are the results of a survey that I created after editing them in Word and uploading them to my Google Drive.


Wednesday, September 13, 2017

Graphical Editing Using PhotoShop


Computer Science opens many doors. One of the most important things computers can do, is manipulate media. Whether the computer is modifying audio files, video files, graphics or simple text, there is an application that can convert pure thought into an algorithm to make our life better.

 Photoshop is an extremely popular application that can perform near miracles with graphics. Photoshop and other programs, such as GIMP, which is open source, and competitive with its very expensive and full featured cousin, use filters and layers to make changes to the pixels that comprise digital images.
These lessons focuses on a couple of examples of graphical trickery: The first assignment in this graphical unit was a superimposition of two people over a background. This lesson focused on techniques such as background cutting using the magic wand and lasso tools.

The second project was a bit more involved.
We needed to use masking techniques to create the illusion of a composite celebrity. We blended in the main characteristics of the author into the target celebrity or superhero. Similar techniques are used in video media and other digital media. We will be exploring programming techniques to modify graphics later in the semester when we explore game programming. bit that's for another post.


Friday, August 18, 2017

The Internet of Things



The internet of things is an emerging technology that allows people to communicate with small devices over remote connections. It is a revolutionary technology that allows the users to have control over their environment in ways that were never before possible. Many devices have become popular in recent years, their utility range from control over electronic devices such as televisions, DVR's and home entertainment systems to the control of home security.

Along with the advances in this utility, there is an increasing danger of abuse. Devices such as internet cameras that can be controlled remotely, also provide the opportunity for outsiders to hijack video signals for their own use. Instead of a security device monitoring a home, the device can be used to detect whether a number of potential victims are in their domiciles. Security over these devices is an area that needs supervision very urgently.

Not only can signals from devices controlled in a home network be hijacked, but the devices themselves can be used to form part of a botnet or group of networked devices that can exchange in other forms of nefarious activity.

Examples of devices on the Internet of Things:









Monday, August 14, 2017

Ethics and Computers (First Assignment)

Assignment #1




Create a blog using Blogger. It is an extension of Google.
If you do not have a Google account, you will need to make one.
Use a format using your new username which is composed of the first letter of your first name+your last name+
your unique studentid.

For example: Jose Vasquez has a 10 digit student number ending in 98
His student name is jvasquez98

Create an account in Google using this format. It will make grading work much safer and easier.
We will take a quick look at some of the programs available in Google and  focus our attention on Blogger.

A blog is basically an online magazine written by a very limited number of people, usually one, that
focuses on a particular issue or skill. There are blogs on everything from knitting to electronics to horticulure to
taking care of Poodles. Your blog will be on 21st Century Technology.

You must be logged into Google to make the blog. It will not work if you do not log in!
You will need a unique url for your blog.
When asked for the URL for the blog, name it ECS2017 and add your student id.
In the case of our student Jose Vasquez, his blog will be named ECS2017jvasquez98.


Give Your Blog the name "Exploring Computer Science"
Create an entry based on the article that we are reading today.
Save the article as Ethics and Technology

Your blogs will appear under a url similar to this:
 http://ECS2017jvasquez98.blogspot.com/2016/09/Ethics-and-Technology.html

 All your blog entries will start with your username followed by blogspot.com.
 All articles are public and must be saved in order for anyone else to see them.

Follow the example I have created for you.

Read the following article and write your blog entry based on the item that you have been assigned.
Your blog entry must contain a summary of the ethical points presented by the author, the problems that may occur if people abuse this issue and ways to prevent this abuse from occurring.
https://www.internetsociety.org/what-we-do/internet-issues

When you have completed your blog entry, add a couple of pictures to make it look more professional.

It is very, very important that you share your blog in order for me to be able to see it and grade it.
After you save it, you will need to click the share button. This will be true every time you create a blog entry.