5.1
Social Media
Benefits:
- Easy to keep up with friends that have moved to areas that are mostly inacessable.
Harms:
- Has brought social anxiety and similar disorders to an all time high.
Video Games
Benefits:
- Stress relief that needs very little space. (Example: Sports take equipment and space)
Harms:
- Video Game addictions can be very serious and have harmful health impacts.
Artificial Inteligence
Benefits:
- Drastically increases speed of complex problems.
Harms:
- Cheating in education settings is far easier.
5.2
How does someone empower themself in a digital world?
- Self empowerment in the digital world can be done by focusing not on what you cannot do but to do what you can to be yourself.
How does someone that is empowered help someone that is not empowered? Describe something you could do at Del Norte HS.
- Helping to empower others in the digital world can be done by helping others achieve their goals, such as complementing another students work.
Is paper or red tape blocking digital empowerment? Are there such barriers at Del Norte? Elsewhere?
- The biggest case of red tape in the digital world is actually in the physical world. Access to electronics and internet connected devices is not avalible to all people.
5.3
Reflection:
Computing bias is an ongoing problem in the modern technical age. Computers are advancing at incredible rates but inequality in access has led to unjust code being developed. One notable example is an ola version of HP’s camera targeting system that malfunctioned if presented with a face of darker skin. Another example of computing bias is when basic programs require excessive hardware, limiting the amount of people who can use it. A great example of this is Windows 11, which requires a Trusted Platform Managment system to be in place to install.
5.4
Using Crowdsourcing
In my project this trimester, I will have a feature where users can input their own data into the system, allowing the platform to evolve without developer assistance. Users will be able to add their own ingredients to my measurement converter as the main CREATE function of my CRUD system.
5.5
Creative Commons universal:
Full public domain, everything is completely free to use.
MIT:
Free use of code but able to publish closed versions that are not freely usable.
GPL:
Free use of code but no ability to release closed versions.
Our Project
I would use the MIT Licence because it allows the use of code freely and the making and distributing closed source versions.s
5.6
- Some of us have created password systems to keep individuals data safe.
- I feel that I have been successful in limiing my persohnal exposure by making very little of my information public.
- A good pasword has complexity, but also needs to be memorable.
- Symmetryc encryption has the same system on both ends (encode and decode), while assymmetric has a different system on either end.
- All of our projects have hash keys that are required to use and edit the code.
- I was lucky to grow up with a father in cybersecurity as I have never fallen for a phishing scam.