Bouts of Binary

I've completed my first set of actual problems in the Python Programming course on edx.org. It was quite the pain at times. There were three parts to the problem and they all had you solving a mathematical problem regarding paying off a credit card. I wrote a code that computed a few different ways to pay off the debt in one year. Here's one example: they wanted to know the lowest possible monthly payment to make in order to pay off a balance in one year. Seems simple enough, eh? Well here's a link to the working code: http://codepad.org/cp7gIFKu 

This ended up being an excruciating trial and error process to get everything to work correctly. My brain is still resisting thinking like a computer.

We also started learning about recursion methods. They differ from iteration methods in that they allow the same looping mechanisms to be executed in a more simplified manner via a shorter, cleaner code. Here's a cool example of this type of code solving the puzzle, The Tower of Hanoi (make sure to listen to the podcast for more in-depth explanations):

Code: http://codepad.org/IwdsxXey

The Puzzle: http://en.wikipedia.org/wiki/Tower_of_Hanoi

I also purchased a Security + Study book on Kindle (which I'm currently reading on the Kindle app on my phone)...it says to set goal to take exam in 45 days...also I'm supposed to have 2 years of experience working on network and Network + cert lol. Thus far  I'm getting an overview of basic security principles. It hasn't delved into anything too bad yet, just concepts such as:

  1. Identification: usernames
  2. Authentication: passwords
  3. Authorization: granted by proof of identity
  4. Non-repudiation: proves a person's identity and prevents them from denying they took specific actions
  5. Defense in depth: necessary multiple layers of security
  6. Implicit deny: indicates that unless something is explicitly allowed, it is denied
  7. Availability: data is readily available when needed...disk/server/site redundancy; backups; alternate power; cooling systems
  8. Integrity: provides assurances that data hasn't been modified, tampered with, or corrupted...hashing techniques ensure integrity
  9. Confidentiality: helps prevent unauthorized disclosure of data...uses multiple methods, such as authentication, access controls and cryptography

Week three in Python course is covering some more complex items such as tuples, lists, dictionaries and objects. More shall be revealed.

May the force be with you,

/e