• Breaking News

    Sunday, October 21, 2018

    I suck at math , but want I CS degree. Computer Science

    I suck at math , but want I CS degree. Computer Science


    I suck at math , but want I CS degree.

    Posted: 21 Oct 2018 01:22 AM PDT

    So i currently suck at math right now and have aspirations of becoming a security engineer . I know a degree for this field is not required , but I have the opportunity of a life time to pursue this education practically free of charge from my employer . I have a vague time line in my head of when I want to start signing up for classes ( 6- 9 months ) , I am definitely willing to put the hours in practing on my own before I see a classroom . Do you guys know where I should start ? I don`t even have credits for basic math classes like 1101 college algebra yet .

    submitted by /u/toddowl6
    [link] [comments]

    i want Solution to how to count the number of loop

    Posted: 21 Oct 2018 02:56 AM PDT

    i want to know the solution of

    https://i.redd.it/2z74viwbhit11.jpg

    the question is There are 5 paths from A to G inside the loop. If the loop is repeated 18 times, the number of all possible cases is 3814697265625. Explain how to solve this calculation.

    submitted by /u/GoBacksIn
    [link] [comments]

    Compiling Prolog Into Microcode: A Case Study Using the NCR/32-000 -- Fagin et al. (1985)

    Posted: 20 Oct 2018 01:28 PM PDT

    People with degrees in Comp Sci/Business?

    Posted: 20 Oct 2018 04:58 PM PDT

    Just wondering but are there any famous people out there with a double undergrad major in computer science and business?

    submitted by /u/henryxu0
    [link] [comments]

    How do indiscriminate data collecting programs like GCHQ's Tempora and the NSA's Prism intercept things like facebook chats when the connection is "secure"?

    Posted: 20 Oct 2018 11:29 AM PDT

    Hello everyone,

    i posted this on ELI5 but the admins said it was too complicated and to try /r/compsci. So here I am!

    I know that government surveillance programs like Tempora and Prism gather data that is transmitted and received over "secure" connections? I read somewhere that using Tempora, an NSA/CIA officer can simply type someones name, then some keywords, say "ISIS, terrorism" and see all of their facebook interactions that match up to that search.

    I'm not trying to make a debate about if this is bad or not. I'm just really curious as to how the methodology would work? How do Prism and similar programs collect and decrypt, for example, conversational data between people, for storage if the chat is truly sent over HTTPS?

    Thanks in advance!

    submitted by /u/sidi9
    [link] [comments]

    Is the backend of a compiler an assembler?

    Posted: 20 Oct 2018 03:47 PM PDT

    No comments:

    Post a Comment