J. Luke Randazzo“Explore” Hamming CodesIn the early days of computing, methods for detecting errors were created. They ranged from simple ‘parity’ checks which used a single bit…Apr 8, 20182Apr 8, 20182
J. Luke RandazzoBlog Week 81. Samy Kamkar highlights three ways the Internet is vulnerable. Which do you think is the most vulnerable and/or would cause the most…Mar 11, 20181Mar 11, 20181
J. Luke RandazzoQuiz 31. Why should all Internet users be aware of copyrighted material?Mar 11, 2018Mar 11, 2018
J. Luke RandazzoBlog Week 7Where do you fall on the Net Neutrality debate (for or against) and why?Mar 5, 20181Mar 5, 20181
J. Luke RandazzoBlog Week 6: Violence in VideogamesThis is not an easy topic to delve into, and it’s made especially hard to respond because the pro/con website lists a ton of sources, but…Feb 25, 20181Feb 25, 20181
J. Luke RandazzoBlog Week 4: BtB Chapter 21. In the United States, legislators have toyed with requiring always-on body cameras on police officers in the United States. What are…Feb 9, 20181Feb 9, 20181
J. Luke RandazzoBlog Week 3: BtB Ch. 1, Prompt #1The main assertion from the chapter that I disagree with is the idea that technology is neither good nor bad (Abelson 14). On the surface…Feb 1, 20181Feb 1, 20181
J. Luke RandazzoHomework: Blown to Bits Chapter 11. What is a bit and what does it mean to say that “it’s all just bits”? (Koan 1) Give examples of the things today that are stored in…Feb 1, 2018Feb 1, 2018
J. Luke RandazzoBlog Week 2: Why use functions in Computer Science?There are three primary reasons we use functions in Computer Science: predictability, efficiency or replicability, and simplification.Feb 1, 20181Feb 1, 20181