Weekly Writing Assignment, Week 8

Write a 250-word memo addressed to Prof. Ellis with the subject, “Other Sections for Instruction Manual,” in which you strategize what other sections to include in your instruction manual document. Below, you will find some suggestions. Also, look at the Instructions chapter and Instruction examples in David McMurrey’s Online Technical Writing Textbook for models that you can look to about how they are organized. Copy-and-paste your memo into a comment made to this post.

1.0    Introduction
1.1    Purpose
1.2    Intended Audience
1.3    Scope
1.4    Organization Description
1.5    Conventions (abbreviations, left/right)
1.6    Motivation (answers the “so what” question)
1.7    Safety and Disclaimers
2.0    Description of the Equipment
2.1    Illustration of the Equipment
2.2    Description of the Equipment’s Parts
3.0    List of Materials and Equipment Needed
3.1    Illustration of the Parts Needed to Carry Out the Instructions
3.2    Tools needed
3.3    Table of the parts with description of each
4.0    Directions
4.1    Assemble the Skateboard
4.1.1    Step 1 (don’t write Step 1--write a brief statement on what the first step is)
4.1.2    Step 2
4.1.3    Step 3...Step n (write as many steps--briefly--as you can think of--you can fill this list out later)
5.0    Troubleshooting
6.0    Glossary
7.0    Reference List

Lecture, Week 7

To help with this week’s Weekly Writing Assignment below, study and make notes on the commonalities between the instruction manuals discussed in last week’s class.

Sample Instruction Manuals

Weekly Writing Assignment, Week 7

Watch and take notes on this week’s lecture before proceeding.

Write a memo to Prof. Ellis that presents a basic numbered, process list for your Instruction Manual.

Write as much as needed to show the process in your instruction manual.

However, this is a draft–you may add, subtract, and change as needed later.

Include notes about what images to include with each step as appropriate (think of WOVEN).

We will look at the other components of your Instruction Manual next week. 

Copy-and-paste your memo into a comment made to this post on our OpenLab Course Site.

Lecture, Week 6

After watching this week’s lecture, watch for Prof. Ellis’ email to your team to begin peer review on your Expanded Definition project. Use the model below for your Expanded Definition memo. Remember to copy-and-paste your completed memo draft into your “Reply-All” email to your team along with your ask-and-offer.

TO:         Prof. Jason Ellis
FROM:     Your Name
DATE:         Due Date
SUBJECT:     Expanded Definition of Your Term

Introduction [Heading Level 2]
What is the purpose of this document? What term are you defining? How are you discussing the way it is defined and the way it is used in context? Describe a road map for what follows (definitions and context). This content should be published as paragraphs, unlike the heading for this section, which is a level 2 heading.

Definitions [Heading Level 2]
Compare and contrast at least two quoted definitions from different sources of the term that you selected. Provide quotes and IEEE in-text citations for each definition, and include your sources in the References section at the end of the document. Each definition that you include deserves discussion in your words about what it means and how it relates to the other definitions that you include. Consider how they are alike, how are they different, who might use one versus another, etc. And, as a part of your compare and contrast, discuss the etymology or history of the word (e.g., one definition might be more like what the word meant originally or more recently). Each quote should have an IEEE in-text citation and reference entry.

Context [Heading Level 2]
Compare and contrast at least two sentences that use the term as it appears in different sources. This discussion should focus on how the context of the word shapes its meaning. A range of sources would provide the best source material for your discussion of how the term is used in these contexts. For example, a quote from an academic journal, a quote from a newspaper or magazine, a quote from a blog, and a quote from social media would give you a range of uses that might have different audiences. For each quote, you should devote at least as much space as the quote discussing what it means in that context and how it relates to the other quotes in context. Each quote should have an IEEE in-text citation and reference entry. 

Here’s a quote example from The New York Times: Technology Opinion Writer Kara Swisher wrote about the bombshell allegations made by Facebook whistleblower Frances Haugen in a television interview: “Everything the former product manager on Facebook’s dispersed/disbanded (depending on whom you believe) Civic Integrity team said in her interview with CBS’ “60 Minutes” on Sunday rang true, including her allegations that the company’s algorithm is a wildfire that feeds on rancor and that the company always chooses its business over safety” [3]. The use of the term algorithm here refers to how Facebook surfaces certain content and submerges other content on a given Facebook user’s feed. 

Another quote example from a book on optimizing Rust language programming applications: While Swisher uses the term algorithm to refer to a specific decision-making technology at Facebook, Moraza uses it in a more general way where he writes: “You will also understand the difference between the common standard library collections so that you can choose the right one for your algorithm” [4, p. 1]. Algorithm here refers to the programming code that the reader of Moraza’s book is developing using the Rust programming language. Any computer code that is performing a process would qualify as an algorithm in this context while Swisher’s use of the term algorithm referred to a specific algorithm developed and used by a specific company.


Working Definition [Heading Level 2]
Based on the definitions and word history that you quoted and discussed, and the contextual uses of the term that you quoted and discussed, write a working definition of the term that's relevant to your career field or major, which you will need to identify (this is the specific context for your working definition).

References [Heading Level 2]
Order your IEEE references in the order that they appear in your document. The first would be [1], the second would be [2], etc.

[1]    "Algorithm," in Oxford English Dictionary, 3rd ed. Oxford, UK: Oxford Univ. Press, Mar. 2012, def. 2. [Online]. Available: https://www.oed.com
[2]    “Algorithm,” in Science and Technology Encyclopedia, Chicago, IL: University of Chicago Press, 2000. [Online]. Available: https://archive.org/details/sciencetechnolog00univ/mode/2up 

[3]      K. Swisher, "Brazen is the order of the day at Facebook," The New York Times, Oct. 5, 2021. [Online]. Available: https://www.nytimes.com/2021/10/05/opinion/facebook-blackout-2021.html

[4]      I. E. Moraza, Rust High Performance: Learn to Skyrocket the Performance of Your Rust Applications. Birmingham, UK: Packt Publishing, 2018. [Online]. Available: ProQuest Ebook Central.

Weekly Writing Assignment, Week 6

After watching this week’s lecture, begin thinking about what tasks and processes would be appropriate and interesting for you to write an instruction manual on for the next individual project. Possible instruction manuals should focus on your degree and career goals so that you create something relevant to your training and illustrative of your communication skills.

For this week’s Weekly Writing Assignment, write a 250-word memo addressed to Prof. Ellis with the subject line of “Instruction Manual Topic Selection.” In the body of your memo, discuss the pros and cons of three possible instruction manual topics and state which one you choose to work on for the project. Copy-and-paste your memo into a comment made to this post.

To aid in your thinking, review the links below for sample instruction manuals, and see a sample instruction manual outline at the bottom of this post.

Sample Instruction Manuals

Sample Instruction Manual Organization

1.0    Introduction
1.1    Purpose
1.2    Intended Audience
1.3    Scope
1.4    Organization Description
1.5    Conventions (abbreviations, left/right)
1.6    Motivation (answers the “so what” question)
1.7    Safety and Disclaimers
2.0    Description of the Equipment
2.1    Illustration of the Equipment
2.2    Description of the Equipment’s Parts
3.0    List of Materials and Equipment Needed
3.1    Illustration of the Parts Needed to Carry Out the Instructions
3.2    Tools needed
3.3    Table of the parts with description of each
4.0    Directions
4.1    Assemble the Skateboard
4.1.1    Step 1 (don’t write Step 1--write a brief statement on what the first step is)
4.1.2    Step 2
4.1.3    Step 3...Step n (write as many steps--briefly--as you can think of--you can fill this list out later)
5.0    Troubleshooting
6.0    Glossary
7.0    Reference List

500 – Word’s how escalators change our sense of space forever

TO: Prof. Ellis
FROM: Olamide Yomi
DATE: Sep 20, 2021,
SUBJECT: 500 – Word’s how escalators change our sense of space forever

The following is a 500-word or close to 500-word summary of a peer-reviewed article that describes computer science and the importance of teaching computer science in methodology method to help students get a wide view of computer science. This will give students more zest in every course they take. According to the author of the article with teaching computer in a methodology method “guide students to understand computer science from a higher perspective and learn computer science through the methodology of subject and educate students to face the future.” [1, p. 293].

The introduction of computer science and technology help provide students with the understanding of computer science major, by which setting a stage for students to think about computer science course more deeply. There are two types of computers and technology arrangement. One is the general understanding of soft and hardware and mastering the utilization of the operating system and office software, the other is also comparable to the methodology of computer science and technology trying to understand deeply its basic sequence.

College basics teach computer from implementation limiting student perspective of the computer science. Unlike methodology of computer science and technology dive deeper into the cognition of nature of computer science and the main field and essential character of computer science.

The researcher hopes to get a new perspective of the “methodology of the subject” and introduce core conception, essential question, typical teaching method, and knowledge system. They also trust that students would understand the higher perspective and learn it through the methodology of the subject and educate to face the future. In this article Educationalist B. A Cyxomjnhcknn says “learning interests are the important part of learning activities” [2, p. 293].  interest in computer course itself is what attracts students and scared them at first. The cultivation of the student’s interest is the top consideration for all teachers. Teachers must lead students into learning it.

Core technologies and core concepts will help students understand the strategies of learning computer science. Algorithms describe the process of solving a problem and taking limited procedures in solving it. Students would be to learn about algorithms both emotionally and rationally make a description in form.

According to students’ questionnaires, 88 percent wish they can apply the skill to using the software after they finish their course. Teachers have the responsibility to constructing works so students can study themselves and their practical abilities through task-driven mode.

the main content of the theoretical part is the introduction of computer hardware and software systems; the scientific problem has three discipline forms and the core concepts. Typical mathematical method and system and system science. Students thought of enlightened through the proportional variation-seeking algorithm, the mathematical method for problem-solving and this make them realized the leading character of mathematics in computing discipline and guidelines of subject methodology. This improves their curiosity and their thirst for knowledge can be inspired. Strong practical characteristics will be able to demonstrate to students when they get on a computer, they can watch and simultaneously operate.

Every teacher has a concept about the methodology of computer science and technology. The teaching

Schools should adopt different means of teaching students different means to teach content. The most important is to implement research-oriented teaching in the classroom.

[1]          Fu Hefang and Li Zhaoxia, “Research and discussion on Introduction to Computer Science and Technology teaching based on methodology,” 2010 2nd International Conference on Education pp. 293-295 Technology and Computer, 2010, https://doi: 10.1109/ICETC.2010.5529680.

500-Word Summary Of Article About Unikernel Security

TO: Prof. Ellis
FROM: Edwin Baez
DATE: October 6th, 2021
SUBJECT: 500-Word Summary Of Article About Unikernel Security

The following 500-word summary of an Article about Unikernel Security. The author discusses the risks and benefits of running applications on Unikernel environments. By showing many diagrams and going in-depth on what each type of kernel does and allows, we can differentiate which kernels are right for us.

The Kernel is the essential center of a computer’s Operating System. It is basically the core that provides basic services for all other parts of the OS. Modern-day applications require cloud services to run in a Kernel environment, making it vulnerable to attacks. A unikernel is a specialized, single address space machine image constructed using the developer’s minimal set of a selection of services. With Unikernel environments, attacks are less likely due to the lightweight memory footprint and self-contained environment.

Virtualization is the process of mirroring or emulating a system using the resources of a host machine. It can be used to re-create networks or emulate a whole new machine, thus making it more secure to use. Virtual Machines cannot communicate with each other, so if one is ever infiltrated then no harm will be caused to the actual host machine. In other words, you can use your computer to run a virtual computer and whatever happens to that virtual computer will have no effect on your actual computer/hardware.

There are various types of Virtualization. The first is Full-Virtualization, which aliases the hardware the guest machine runs on. The main appeal is its ability to mirror hardware, making it more reliable, provides more consistent performance, and is able to isolate in case of a malicious attack. If a cyber-attack were to happen, the attacker cannot attack the host but can eventually see that It is attacking a virtual machine. The second type of virtualization is OS-Virtualization. OSV is ran on a single kernel but it runs many operating systems at once. It’s basically many containers and each holding its own operating system. These containers don’t have access to the hardware of the physical machine so it is limited to the OS of the host. With that said, If the machine was ever to get attacked, all containers will be compromised.

There are two types of unikernels whose security profiles differ. Clean Slate Unikernels are not emulators. They are written in a single programming language whether it’s C++, HalVM, or Javascript. They also allow language-specific virtual machines to function, for example, Java Virtual Machine (JVM). Legacy Unikernels, on the other hand, implement a subset to ensure unmodified software can run while only requiring minor configurations. According to J. Talbot et al, “They don’t support timesharing (the ability to simultaneously run multiple independent programs), instead, they delegate this role to the virtualization layer” [1, p.2].

Isolation is the main goal of most, if not all, security enthusiasts. Software running on a Unikernel is more isolated than software running in a container. This is due to the fact that unikernels are singular and have a reduced attack surface.

REFERENCE

[1] J. Talbot et al., “A Security Perspective on Unikernels,” 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2020, pp. 1-7, doi: 10.1109/CyberSecurity49315.2020.9138883.

Overview of Expanded Definition

To:            Prof. Jason Ellis

From:       Mamadou Sakho

Date:        10/6/2021

Subject:    Expanded Definition of Artificial Intelligence (AI)

The goal of this document is to research and define Artificial Intelligence. What it is? How does it work? The term which is of concern here is AI or Artificial intelligence. Artificial Intelligence has been defined in various ways depending on the context it has been used. For example, the meaning given to it in the context of a computer system is different from the meaning in a human context.

 The term Artificial Intelligence is defined in various ways. For example, according to Merriam Webster, “Artificial Intelligence is an area of computer science that deals with giving machines the ability to seem like they have human intelligence [1].” In order words, Artificial Intelligence refers to the fact machines are programmed in a manner that they can do work that humans do such as making coffee, cooking, etc. According to Oxford English Dictionary, “Artificial Intelligence is the capacity of computers or other machine to exhibit or simulate intelligent behaviour [2].” To rephrase it, Artificial Intelligence is the programming of computers or machines to demonstrates movements or acts associated with human beings. Both of these definitions have more similarities than differences because they both define Artificial Intelligence as machines acting like humans. By looking at the Etymology of the term in question here, Oxford English Dictionary provides useful information. For example, in Anglo-Norman and Middle French artificial means” skillfully made or contrived, brought about by human skills or intervention (1267 in Old French).” In classical Latin, it means” artificialist made or contrived by art (used by Quintilian in rhetorical context, translating ancient Greek).” However, Merriam Webster only provides information about when it was first used in the meaning provided above which is 1955.

Reference:

[ 1]    “Artificial Intelligence,” Merriam-Webster. [Online]. Available: https://www.merriam-webster.com/dictionary/artificial%20intelligence. [Accessed: 04-Oct-2021].

[2]        “artificial, adj. and n.” OED Online, Oxford University Press, September 2021, www.oed.com/view/Entry/11211. Accessed 4 October 2021.

500-Word Summary of Computer Science Education

To: Prof. Ellis

From: Michael Vanunu

Date: Sept. 21, 2021

Subject: 500-Word Summary of Computer Science Education

Computer science and technology have been developing well over time, this has instantiated multiple computer science courses. These courses can lead to problems which a new student wouldn’t be able to obtain reasonably. This will lead to future problems without assistance of people with more experience and knowledge on the subject.

More systems were developed to solve the problem. People like Chanyan Nuntwawong, Karim Hadjar, Antonio Maffei, and others have tried to fix the problem by presenting their ideas throughout the years.

The paper explains how a computer course can help fresh learners explore reasonable and appropriate curriculums.

The design of OSCCA has five basic steps, “Including data collection, data preprocessing, construction Ontology, establishing reasonable rules and implementing the system” [1, Sect. II]. For the first part, knowledge and unit’s points are being collected from the data that includes courses and universities as well as the likes of those places and locations to provide the best data possible. The second step is a very crucial one. The raw data is going to be processed into NLP, which stands for, Natural language processing. This is going to be a very rough processes that uses Apriori algorithm and things alike. The third step will include the interrelationships of the data collected that will be applied to an ontology. The fourth step defines the four reasoning rules that are important to the whole thing. The fifth and final step is to build a website using java that can provide great and available services for people who are new to learning computer science.

Datasets for the course are being collected through internet information as well as college curriculums. A python spider package named scrappy is used to fetch information for the course. “The course datasets consist of courses, units and knowledge points” [2, Sect. III]. These are the points that “Scrapy” fetches to make the best possible outcome for new students trying to learn.

The analysis and the terms of relationships are analyzed by how each item will be defined. NLP is used to detect and extract the best and contributed items. The Apriori algorithm is used in here again. Apriori algorithm will be solving the frequent items as well as the set problems to assist databases.

Computer courses are increasing at a rapid pace. The courses provided by many courses are independent. Newer learners of the computer science field might be confused by a lot of unneeded and unnecessary information. The solution to the problem is the course for OSCCA (a course ontology stem for computer science education is developed).

Y. Wang, Z. Wang, X. Hu, T. Bai, S. Yang and L. Huang, “A Courses Ontology System for Computer Science Education,” 2019 IEEE International Conference on Computer Science and Educational Informatization (CSEI), 2019, pp. 251-254, doi: 10.1109/CSEI47661.2019.8938930.