Ghost in the Machine reflection (Blown to Bits p. 73-88)
Ghosts in the Machine, pp. 73-80 (What You See Is Not What the Computer Knows), then answer the following questions:
Give an example of your own when just knowing what a computer did wasn’t sufficient - you really needed to know how and why it was doing what it was doing as well.
-An example of when this happened to me was when I was building my own computer, and I needed to start it and install the operating system onto it. This process was difficult, and I needed knowledge about computers to complete it.
Talk about file metadata and how it “fingerprints” a file. Include a discussion of file metadata benefits and challenges.
-Metadata includes information such as the name, description, the owner of the computer that created the document, the last time the document was edited, and the last time the document was edited. This information can be useful. However, leaked authorship information can have consequences. If you plagiarize someone else’s work, then use it as your own, the metadata may reveal what you did. The useful features of Metadata can be
Read Blown to Bits (www.bitsbook.com), Chapter 3, Ghosts in the Machine, pp. 80-88 (Representation, Reality, and Illusion), then answer the following questions:You can find this under forms and docs/Blown to Bits
How does highlighting in a PDF doc work? What are the computational ideas utilized?
-Highlighting a PDF works by using the “highlighter tool” to mimic felt markers and highlight certain parts of a document. This highlighter can also be made different colors, such as black. In the case of the US government, however, whoever wrote a report on the death of an Italian service agent, didn’t know that the highlighted areas of documents could be removed, which lead to information that could be useful to the enemy being revealed.
Continue the exploration of HTML by determining how you would complete today’s activity in HTML. Further compare your own protocol with HTML.
-Today’s activity could be created by creating your own webpage using HTML, and then coding the text that you wanted to into the page.
Give an example of your own when just knowing what a computer did wasn’t sufficient - you really needed to know how and why it was doing what it was doing as well.
-An example of when this happened to me was when I was building my own computer, and I needed to start it and install the operating system onto it. This process was difficult, and I needed knowledge about computers to complete it.
Talk about file metadata and how it “fingerprints” a file. Include a discussion of file metadata benefits and challenges.
-Metadata includes information such as the name, description, the owner of the computer that created the document, the last time the document was edited, and the last time the document was edited. This information can be useful. However, leaked authorship information can have consequences. If you plagiarize someone else’s work, then use it as your own, the metadata may reveal what you did. The useful features of Metadata can be
Read Blown to Bits (www.bitsbook.com), Chapter 3, Ghosts in the Machine, pp. 80-88 (Representation, Reality, and Illusion), then answer the following questions:You can find this under forms and docs/Blown to Bits
How does highlighting in a PDF doc work? What are the computational ideas utilized?
-Highlighting a PDF works by using the “highlighter tool” to mimic felt markers and highlight certain parts of a document. This highlighter can also be made different colors, such as black. In the case of the US government, however, whoever wrote a report on the death of an Italian service agent, didn’t know that the highlighted areas of documents could be removed, which lead to information that could be useful to the enemy being revealed.
Continue the exploration of HTML by determining how you would complete today’s activity in HTML. Further compare your own protocol with HTML.
-Today’s activity could be created by creating your own webpage using HTML, and then coding the text that you wanted to into the page.
Comments
Post a Comment