Monday, December 2, 2013

Internet? Privacy? Worry?

Nowadays, network seems to make everything possible, we are not taking about only the virtual world, instead we are afraid of how real world is connected with the internet. On a personal level, everyone rely on the internet as a mean of communication. By browsing on the internet every day, we are making an exchange of information. For example, UOFT students check blackboard and emails frequently. Thanks to the internet, we are able to know the latest news about our courses and also make progress on them in an easy and convenient way. However, at the same time, have we ever thought about the privacy leaks? Do we always agree to the terms of rights without even a glance at it? The UTmail has been contracted out to the Outlook. That is to say, all your information is exposed to the out world. We have talked about the concentric circles of privacy in class, with I myself in the centre of the circle and as the distance of your life circle goes father, you are likely to share less with the people on the outer circle. However, internet brings about the change of personal information sharing. Let’s think about it. The computer records all what you have been browsing in the cookies, maybe you can eliminate cookies by choosing invisible mode on browser, but you are still be informed that you cannot get rid of others who are tracking on you. As some of your key personal information being shared on the internet like your date of birth and your post code, others can simply detect your identity with more than 80% accuracy. For instance, when you are doing online shopping, you have to leave your accrual contact information for the seller. 
Last but not least, what you should consider right now is how to increase your privacy and safety online. Be careful and think twice every time when you have to leave your contact or other personal information. Always keep your pins and password in a safety place. Update your security software and run your antivirus software at least once a week to keep your computer in a healthy condition. Anyway, it all depends on your consciousness related to the online security. 

Monday, November 25, 2013

week 11

After last week's lecture, I have gained a deeper understanding of recursion. In particular, we worked on the flatten recursion.
This excise is kind of straightforward. Here, (cons? L) produces true if L is a list, false then otherwise. So basically, you just need to substitute different number for L, and go through the conditions step by step.

Another tricky example,
however, I find that the number of the brackets inside the depth function determines the answer with other conditions being equal.

Wednesday, November 6, 2013

amazing recursion

Sierpinski's triangle
















example of recursion

image-width of the circle : the original radius is doubled