Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

[EN] Escape Room 2017 Pro

Programozás tábor 5. napi prezentációja (Kodu Pro nyári tábor 2017)
by

My Logiscool

on 18 July 2017

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of [EN] Escape Room 2017 Pro

it was a pleasure working with you today!
ISMERKEDJÜNK
MEG !
Internet:
data compression
information encryption
Security
NÉZZÜNK NÉHÁNY PÉLDÁT....
what is compression good for?
Why are we compressing?
Why should information be encrypted?
lossy compression
Lossless compression
phishing = Data stealing
how to use the internet?
ALKOSS SAJÁT TITKOSÍRÁST !
programming camp
5th day
What we are going to talk about today:
escape room
encryptions
social networking sites
data takes up less space
less data goes through the network
Internet becomes faster!
lossless compression
pictures sounds
texts
programmes
huffman coding
high incidence letters
Shorter code
greener
g: 1 db
n: 1 db
r: 2 DB
e: 3 DB
G
N
+
R
+
+
E
= 1 Bit (1 or 0)
g r e e n e r
greener
with "ASCII" coding (1 letter is 1 BYte, so that is 8 bit):
7*8 bit =
56 bit
1 0 0 1 1 1 0 1 0 0 1 1 0
with "huffman" coding:
13 bit
+ the codeboard!
The longer the text is and the more repetitions are in it, the more it worth to compress this way!
repetition
encryptions
repetition
repetition
polybos square: We can decode every letter with two numbers.
fold abc:
Every letter is coded by one sign
caesar cipher:
we move every letter by three signs
runic writing:
every letter belongs to a sign
only the adressee can read it ...
It protects other information (for ex. passwords)
except us, NO ONE ELSE can get it
passwords
Use two-factor Authentication!
the strong password:
at least 8-9 characters or more
there is a number in it
There are small and capital letters in it too
There is a symbol in it : ! ? #
Don't give your password to anyone!
use a password manager program!
passwords
How can be possible to create and memorise this many passwords?
One possible solution could be the using of a watchword.
Find out a sentence that you can remember easily. For ex.:
My
favourite
ic
e cream consists of
2
cones:
ch
ocolate and
p
istachio.

Let's take some of the first letters of the words (optional) and substitute one or two characters for symbols!
Myic€2chp
website or e-mail that seems real
which address did we get the letter from?
Check the address of the website!
Don't give your personal data to strangers!
your name
phone number
address
pictures
passwords
the PIN code of your debit card!
experiences?
positive? negative?
more advantages than risks!
Full transcript