Skip to content

Craig Godbold .com

Computer Science Resources

MENUMENU
  • Home
  • IB Computer Science
    • IB Paper 1
      • Topic 1
        • 1.1.1 - 1.1.7 - Planning and System Installation
        • 1.1.8 - 1.1.10 - User Focus
        • 1.1.11 - 1.1.13 -System Backup
        • 1.1.4 - Software Deployment
        • 1.2.1 – 1.2.3 – Components of a computer system
        • 1.2.4 – 1.2.11 – System design and analysis
        • 1.2.12 – 1.2.16 – Human interaction with the system
      • Topic 2
        • 2.1.1 – 2.1.5 – Computer Architecture & Memory
        • 2.1.6 – 2.1.8 – Operating systems and application systems
        • 2.9.10 – 2.9.10 – Binary representation
        • 2.1.11 – 2.1.13 – Simple logic Gates
      • Topic 3
        • 3.1.1 – Identify different types of networks.
        • 3.1.2 – The importance of standards in the construction of networks
        • 3.1.3 – Describe how communication over networks is broken down into different layers.
        • 3.1.4 – 3.1.5 – Identify the technologies required to provide a VPN.
        • 3.1.6 to 3.1.11 – Data Transmission
        • 3.1.12 – 3.1.15 – Wireless Networks
      • Topic 4
        • 4.1 General Principles
        • 4.2 – Connecting computational thinking and program design
        • 4.3 – Introduction to programming
      • Topic 5
        • 5.1.1 – 5.1.3 – Thinking Recursively
        • 5.1.4 – 5.1.10 – Abstract Data Structures
        • 5.1.11 – 5.1.13 – Linked lists
        • 5.1.14 – 5.1.17 – Trees
        • 5.1.18 – 5.1.20 – Applications
      • Topic 6
        • 6.1.1 – 6.1.4 – System Resources
        • 6.1.5 – 6.1.9 – Role Of The Operating System
      • Topic 7
        • 7.1.1 – 7.1.5 – Centralized Control Systems
        • 7.1.6 – Discuss the social impacts and ethical considerations associated with the use of embedded systems
        • 7.1.7 – Distributed systems
        • 7.1.8 Outline the role of autonomous agents acting within a larger system
    • IB Paper 2 Option D
      • D1 – Objects as a programming concept
      • D2 – Features of OOP
        • D.2.1 – D.2.3: Defining Terms
      • D3 - Program Development
        • D3.1 – 3.3 – Defining Terms
        • D3.4 – Primitive Data Types & The Reference Class String
        • D3.5 – D3.8 Constructing Code
        • D3.9 – Enabling Internationalization
        • D3.10 – Moral & Ethical Obligations of Programmers
      • D4 – Advanced Program Development
        • D4.1 – 4.4 – Recursion
        • D4.5 – D4.6 – Object References
        • D4.7 – Features of the Abstract Data Type (ADT) List
        • D4.8 – Describe Applications of Lists
        • D4.9 – D4.10 Construct Algorithms Using a Static Implementation of a List
        • D4.11 – D4.14 Construct algorithms using the standard library collections included in JETS
        • D4.15 – Style & Naming Conventions in Code
    • Paper 3 HL Case Study
      • Starting the Case Study 2020
      • Case Study 2020 – Key Terms
  • Tutorials
  • Links
  • Code Challenges

Blockchain Technology- Bitcoin mining

A great video explaining how bitcoin mining works and well worth taking the time to watch his whole playlist.

Author craiggodboldPosted on January 16, 2020January 16, 2020

Post navigation

Previous Previous post: Creating Art With Code
Next Next post: How secure is a 256-bit hash?

RSS TechCrunch

  • How VCs invested in Asia and Europe in 2020
    Falling seed volume, lots of big rounds. That's 2020 VC around the world in a nutshell.
  • MotoRefi raises $10M to keep pedal on auto refinancing growth
    A month before the COVID-19 pandemic had spread to North America, auto fintech startup MotoRefi — newly armed with nearly $9 million in venture capital — was preparing to bring its refinancing platform to the masses. CEO Kevin Bennett, and the investors behind the company, saw the opportunity to service Americans who collectively hold $1.2 […]
  • Dashlane taps JD Sherman, ex-Hubspot COO, as new CEO, as co-founder Emmanuel Schalit steps aside
    Our reliance on internet-based services is at an all-time high these days, and that’s brought a new focus on how well we are protected when we go online. Today comes some news from one of the bigger companies working in the area of password security, which points how business is shifting for the companies providing […]
  • Blobr, the ‘no-code’ company turning APIs into products, raises €1.2M pre-seed
    Blobr, a Paris-based startup operating in the no-code space with tech to make it easier for companies to expose and monetise their existing APIs, has raised €1.2 million in pre-seed funding. The round is led by pan-European pre-seed and seed investor Seedcamp, with participation from New Wave, Kima, and various angel investors. Blobr is also […]
  • Google threatens to close its search engine in Australia as it lobbies against digital news code
    Google has threatened to close its search engine in Australia — as it dials up its lobbying against draft legislation that is intended to force it to pay news publishers for reuse of their content. Facebook would also be subject to the law. And has previously said it would ban news from being shared on […]
MENUMENU
  • Home
  • IB Computer Science
    • IB Paper 1
      • Topic 1
        • 1.1.1 - 1.1.7 - Planning and System Installation
        • 1.1.8 - 1.1.10 - User Focus
        • 1.1.11 - 1.1.13 -System Backup
        • 1.1.4 - Software Deployment
        • 1.2.1 – 1.2.3 – Components of a computer system
        • 1.2.4 – 1.2.11 – System design and analysis
        • 1.2.12 – 1.2.16 – Human interaction with the system
      • Topic 2
        • 2.1.1 – 2.1.5 – Computer Architecture & Memory
        • 2.1.6 – 2.1.8 – Operating systems and application systems
        • 2.9.10 – 2.9.10 – Binary representation
        • 2.1.11 – 2.1.13 – Simple logic Gates
      • Topic 3
        • 3.1.1 – Identify different types of networks.
        • 3.1.2 – The importance of standards in the construction of networks
        • 3.1.3 – Describe how communication over networks is broken down into different layers.
        • 3.1.4 – 3.1.5 – Identify the technologies required to provide a VPN.
        • 3.1.6 to 3.1.11 – Data Transmission
        • 3.1.12 – 3.1.15 – Wireless Networks
      • Topic 4
        • 4.1 General Principles
        • 4.2 – Connecting computational thinking and program design
        • 4.3 – Introduction to programming
      • Topic 5
        • 5.1.1 – 5.1.3 – Thinking Recursively
        • 5.1.4 – 5.1.10 – Abstract Data Structures
        • 5.1.11 – 5.1.13 – Linked lists
        • 5.1.14 – 5.1.17 – Trees
        • 5.1.18 – 5.1.20 – Applications
      • Topic 6
        • 6.1.1 – 6.1.4 – System Resources
        • 6.1.5 – 6.1.9 – Role Of The Operating System
      • Topic 7
        • 7.1.1 – 7.1.5 – Centralized Control Systems
        • 7.1.6 – Discuss the social impacts and ethical considerations associated with the use of embedded systems
        • 7.1.7 – Distributed systems
        • 7.1.8 Outline the role of autonomous agents acting within a larger system
    • IB Paper 2 Option D
      • D1 – Objects as a programming concept
      • D2 – Features of OOP
        • D.2.1 – D.2.3: Defining Terms
      • D3 - Program Development
        • D3.1 – 3.3 – Defining Terms
        • D3.4 – Primitive Data Types & The Reference Class String
        • D3.5 – D3.8 Constructing Code
        • D3.9 – Enabling Internationalization
        • D3.10 – Moral & Ethical Obligations of Programmers
      • D4 – Advanced Program Development
        • D4.1 – 4.4 – Recursion
        • D4.5 – D4.6 – Object References
        • D4.7 – Features of the Abstract Data Type (ADT) List
        • D4.8 – Describe Applications of Lists
        • D4.9 – D4.10 Construct Algorithms Using a Static Implementation of a List
        • D4.11 – D4.14 Construct algorithms using the standard library collections included in JETS
        • D4.15 – Style & Naming Conventions in Code
    • Paper 3 HL Case Study
      • Starting the Case Study 2020
      • Case Study 2020 – Key Terms
  • Tutorials
  • Links
  • Code Challenges
Craig Godbold .com Proudly powered by WordPress