Nancy Fleming

Life should be a colorful adventure!

Nancy Fleming

Lesson 4.11 Blown to Bits Chapter 2

Is it possible to identify someone, perhaps a patient, knowing just the gender, birth date, and zip code? Why or…

Lesson 6.3 Using and Analyzing Data and Information

Notes: for each “item” in list get “list” – do… Reflection: Describe your solution for the first project that added…

Lesson 6.2 Using and Analyzing Data & Information

Notes:   Reflection: Describe the significance of the global variable index. How is indexing used with lists in this app?…

Lesson 5.8 Limits of Algorithms

Notes: There are undecidable problems – cannot be solved by an algorithm. There are intractable problems – problems for which…

Lesson 5.6 Debugging Caesar Cipher

Notes: Debugging – the process of detecting and removing errors. Types of errors – syntax errors and semantic errors. syntax…

Lesson 5.5 Caesar Cipher

Notes: encryption https (the s stands for secure) Cryptography – secret writing Encryption – act of converting plain text into…

Project 2 – Endangered – final report

Endangered Introduction. Names of developers: Nancy Fleming            http://portfolios.trincoll.edu/nfleming/ Shamarah Patnett ’21   http://portfolios.trincoll.edu/spatnett/ Name of app:…

Lesson 5.7 Analyzing Algorithms

Notes: Types of analyses: correctness – does it contain errors clarity – is the code easy to read efficiency –…

Lesson 5.4 Sorting Algorithms

Notes:   Bucket sort – linear (on by one). Example: laundry – multiple piles. Pick up one item at a…

Project 2 – Endangered – process

Phase 1 of the “Endangered” project was to determine what it was we wanted our app to do. A brainstorming…

© 2019 Nancy Fleming. Theme by Anders Norén.

This site is part of the Trinity Portfolio Program, Trinity College, Hartford CT.

Skip to toolbar