Skip to the content.
Home Notes Data Structure Create Task Study Plan Quiz Corrections Replit

Week 2: 5.5 and 5.6

Weeks

Week 0 Week 1 Week 2

Patent: Shows ownership. Can make money

Licence and Patent could have conflict. Licence that contains things from a Patent.

Free and open source: Freedom to edit and change it online. Less restriction

Licence: could be free or restricted to make money off of it. (Talk to sponsor about it)

Github Page Action

1.When you create a GitHub repository it requests a license type. Review the license types in relationship to this Tech Talk and make some notes in GitHub pages.

MIT Licence:

GPL Licence:

2.Make a license for your personal and Team project. Document license you picked and why.

I chosed a MIT licence for my individual page and Team Project. This is because I believe that I wouldn’t come back to this code after the school year has ended.

TPT 2.0 Safe Computing 5.6

PII: Personal Identifiable Information

This that can go wrong with computing:

Solution:

(Recommend Watch College Board 5.6 Video 2)

Github Page Action

1.Describe PII you have seen on project in CompSci Principles.

I have seen PII in my current team project. For example, the contact us page. This page in our website contains information about my teammates emails as well as our sponsors email.

2.What are your feelings about PII and your exposure?

I personally feel that having my PII exposed could cause me harm, like my IP address. Yet there are some information that I’m fine with sharing like my personal name.

3.Describe good and bad passwords? What is another step that is used to assist in authentication.

A good password would contain uppercase and lowercase characters, numbers, symbols, and just a password that isn’t easily guessed

A bad password would be short and predictable. EX: 123456 or password

Another step to assist in authentication would be having 2FA (Two Factor Authentication) or adding a sign in question to ensure that it is acutally you who is signing in.

4.Try to describe Symmetric and Asymmetric encryption.

Symmetric Encription: A key that can both encrypts and decrypts information

Asymmetric Encription: Two keys. One used for encrypting and one for decrypting information

5.Provide and example of encryption we used in deployment

An example of encryption in deployment is when we need to update our website to the newest version. When we update the website, it would ask us to provide a password in order to keep the data of the website sacred.

6.Describe a phishing scheme you have learned about the hard way. Describe some other phishing techniques.

A phishing scheme that occured to me made a bot sign into my account and started messaging everyone I know with the same message that hacked my account. I quickly changed my password with stopped it from sending messages to people. Another phishing technique could be sending people emails about them winning a award and that they just need to provide some infomation in order to redeem it.