Believe in yourself!



Here you will find what I have accomplished so far.

Randy Pausch Assignment:

Time management can be established in many ways just as Randy Pausch explained:

1- You should consider your priorities when doing a certain job, and put in mind which one you will need to finish earlier.

2-You can arrange the tasks that needs to be done by adding them in the four quadrant to-do list.

3-Planning falls under the most important ways to your time management success.

4-Try your best to avoid procrastination when doing your assigned tasks in order to save time for other ones as well.

5- Have inspiration and try your best to believe in yourself and your abilities.

Professor Christos' Presentation Summary

  1. What is a decision problem?

A decision problem is when an individual faces a problem to decide the ways they need to approach a task assigned to them. In the examples professor Christos have provided in his presentation, each character had to implement the tasks assigned to them by their bosses differently.

  1. What does it mean for a decision problem to be decidable?

In order for a decision problem to be decidable, the logic behind it needs to be considered and if it can be truly applied in real life. The scenario of three cases that professor Christos has created in the lecture is a great example. The characters, as professor Christos explained, needed to think about the logic behind it and if it was possible to implement the tasks in real life.

  1. What is the class P? What is the class NP?

The class "P" stands for "Polynomial-time" and it is a subset for class "NP" which stands for "Non-deterministic Polynomial-time". Professor Christos' mentioned that the meaning of "Non-Deterministic" means that it is a way to characterize the data using imagery algorithm and create a theoretical model.

  1. What is the intuitive meaning of the "P versus NP" question?

In the examples that professor Christos explained, in the P class the method of a cyclic route can be used. However in the NP class, it can not be used because as he mentioned that there is no reasonable logic trying to find a cyclic route with odd integers.

  1. If you resolve the P versus NP question, how much richer will you be?

Professor Christos mentioned that if a person was able to find a solution on Non-deterministic Polynomial-time tasks, they will be rewarded $1,000,000.

Professor Ryan's Security Talk

In the three articles "Apple Says China's Uighur Muslims Were Targeted In The Recent iPhone Hacking Campaign" published by MIT Technology Review, "Apple Says Chinese Muslim Minority Uighurs Targeted In iPhone Attacks" written by the corporation Thomson Reuters and published by CBC News, and "Uighurs In China Were Target Of Two-Year iOS Malware Attack - Reports" written by Alex Hern and published by The Guardian, the issue about how a lot iPhone users were hacked and the majority of the users were the Chinese Uighur muslims.

1. Who discovered the attack? How long has it been going on?

According to the three articles, Google has discovered the malware attack and informed Apple about it. It was rumored that the attack lasted for two years as it was mentioned in the three articles. However, as Reuters and Hern mentioned in their articles, it actually only lasted for two months after a detailed research that was done by CNN and TechCrunch.

2. Who orchestrated the attacks? How do we know?

The attack was originally orchestrated by China according to what is written in the three articles, and in Hern's article he quoted the first reported on that incident Zack Wittaker who worked in TechCrunch when he said that it was all a part of "a state-backed attack".

3. What did the attack allow the attackers to do to a victim's phone?

It allowed the attackers, in this case the Chinese government, to know the whereabouts of the Uighers and to monitor them by holding them in detention centers in China just as Reuters mentioned in his articles.

4. On a technical level, what did the attack do? How did it do it?

Hern mentioned in his article that the attackers have taken advantage of the undetected weaknesses that were present in the operating system, to the point that the attackers' websites had almost full control of the users' devices without them being aware of it.

5. Why were the security flaws not patched earlier?

It might be because the attacks got updated more than once for different operating systems, just as Hern mentioned in his article about the attackers doing that because the tech usage of the Uighur community has changed.


Professor Hammoud

1) Why and what is cloud computing?

Cloud computing is an alternative way to store, manage and process data by the practice of using a network of servers hosted on the Internet, rather than storing data on a personal computer or a local server. (Google Dictionary)

2) Is cloud computing a new technology? In other words, what is unique about cloud computing?

What makes cloud computing unique is the amount of potential it holds in our new technology era, and how extremely beneficial it is. There are many benefits provided by cloud computing that would help reduce network latency for users, as well as improves and strengthens security measures. 

Businesses can also benefit from cloud computing because it saves time and easily provides the users with extra bandwidth and therefore users can avoid the trouble of needing to deal with the expense of IT infrastructure.

3) What are the three major cloud service models, and which service model would you use to run your simple python programs?

The three major cloud services are IaaS (Infrastructure As A Service), PaaS (Platform As A Service), SaaS (Software As A Service).  Python programs are provided by the PaaS vendors who supply the needed equipment to build the application in the cloud. Therefore, we use the PaaS service model in order for us to run the simple program.

4) What is the economic/business model of cloud computing?

The economic/business model of cloud computing is the IaaS (Infrastructure As A Service) model, which focuses on providing the  infrastructure required to support the particular software. It also provides extra storage usage for corporations' data backups, and a company can have a network bandwidth for its website server.


Professor Giselle's Presentation

  1. What are programming languages for?

The uses of the programming languages vary depending on the type of the language. For example, Python is used for scientific computing, Java is used for educational, health service and financial purposes, HTML is used for "Web development.

2. How do we translate solutions to computer programs? What are the limitations?

There are steps that can help a user to translate their solutions from the normal language into machine language. The first step is to identify the problem that needs to be solved. Then, the user can manually design a solution in order to understand what needs to be done to solve the problem. Later on, the user can start writing the problem by converting the normal language into machine language. This step includes three stages which are coding, compiling and debugging.

3. How many programming languages are there? What does this number tell you?

There are 256 programming languages, this tell me that with time technology changes and new programming languages are created to satisfy the change.


Professor Gianni's Presentation

  • Can you give both an operational and a philosophical definition of AI?

The relation between Artificial Intelligence and philosophy is that AI has a the closest scientific connection with philosophy than other types of sciences. The connection between them is mainly an outcome of what both share in common. AI share some concepts; such as action, consciousness, epistemology, with philosophy.

  • Can you name at least three different techniques or sub-fields of AI?

1-) Neural Networks.

2-) Machine Learning.

3-) Planning.



6-) Natural Language Processing.

  • AI has been around since about 70 years so far. Why is it booming right now?

What mainly drove AI to boom right now more than ever are three forces: Computing Power, Data Availability and Better development of algorithms due to availability of data.

In the computing power sector, because earlier computers did not have the right hardware and infrastructure as they do now, and the best quality computers were too expensive.

While when the subject fall under data availability, more data is getting generated now a days than in the previous years. That explains why there is better algorithms now a days than at earlier times since building algorithms depended on the availability of data.

  • Can you name at least three application sectors where robots are being largely employed? What are the reasons?

1-) The Health Care Sector.

2-) Military and Public Safety Sector.

3-) The Manufacturing Sector.

4-) The Mining Sector.

  • Can you identify three potential challenges for a wheeled autonomous robot that would perform a 24h surveillance task in a large facility?

1-) Robots cannot easily adapt to a workplace.

2-) They can only follow a hard-coded programming.

3-) If the robot is disabled it will not be able to fix itself.


GitHub Account



Google Calendar