Discussion

Lesson 7.8 Blown to Bits Questions

In what ways do national security and individual privacy sometimes conflict? Sometimes whats best for national security it to breach…

Lesson 5.8 Limits of Algorithms notes

A decidable problem is one which an algorithm can be constructed to answer yes or no for all possible inputs….

Lesson 5.7 Analyzing Algorithms

An Algorithm’s correctness refers to whether or not it contains errors. An Algorithm’s clarity refers to how easy it is…

5.3 & 5.4 Search Algorithm Notes and Sorting

Two types of search: Binary-Divide and conquer Sequential/Linear: 1 by 1, page by page, item by item Ordered list use…

Current Event Article- Mathematical simulations shed new light on epilepsy surgery

This article follows a group of mathematicians from the University of Twente teamed with researchers from¬†University Medical Center Utrecht that…

2.9 Binary Numbers

The Binary Numbers Binary System is similar to the decimal system Binary is only 0 or 1s Both are positional…

Lesson 2.6 Notes

An algorithm is a precise recipe: The basic building blocks of algorithms: Sequence A->B->C- is the application of each step…

© 2019 Keith Martin Portfolio. Theme by Anders Norén.

This site is part of the Trinity Portfolio Program, Trinity College, Hartford CT.

Skip to toolbar