Skip to content

Craig Godbold .com

Computer Science Resources

MENUMENU
  • Home
  • IB Computer Science
    • IB Paper 1
      • Topic 1
        • 1.1.1 - 1.1.7 - Planning and System Installation
        • 1.1.8 - 1.1.10 - User Focus
        • 1.1.11 - 1.1.13 -System Backup
        • 1.1.4 - Software Deployment
        • 1.2.1 – 1.2.3 – Components of a computer system
        • 1.2.4 – 1.2.11 – System design and analysis
        • 1.2.12 – 1.2.16 – Human interaction with the system
      • Topic 2
        • 2.1.1 – 2.1.5 – Computer Architecture & Memory
        • 2.1.6 – 2.1.8 – Operating systems and application systems
        • 2.9.10 – 2.9.10 – Binary representation
        • 2.1.11 – 2.1.13 – Simple logic Gates
      • Topic 3
        • 3.1.1 – Identify different types of networks.
        • 3.1.2 – The importance of standards in the construction of networks
        • 3.1.3 – Describe how communication over networks is broken down into different layers.
        • 3.1.4 – 3.1.5 – Identify the technologies required to provide a VPN.
        • 3.1.6 to 3.1.11 – Data Transmission
        • 3.1.12 – 3.1.15 – Wireless Networks
      • Topic 4
        • 4.1 General Principles
        • 4.2 – Connecting computational thinking and program design
        • 4.3 – Introduction to programming
      • Topic 5
        • 5.1.1 – 5.1.3 – Thinking Recursively
        • 5.1.4 – 5.1.10 – Abstract Data Structures
        • 5.1.11 – 5.1.13 – Linked lists
        • 5.1.14 – 5.1.17 – Trees
        • 5.1.18 – 5.1.20 – Applications
      • Topic 6
        • 6.1.1 – 6.1.4 – System Resources
        • 6.1.5 – 6.1.9 – Role Of The Operating System
      • Topic 7
        • 7.1.1 – 7.1.5 – Centralized Control Systems
        • 7.1.6 – Discuss the social impacts and ethical considerations associated with the use of embedded systems
        • 7.1.7 – Distributed systems
        • 7.1.8 Outline the role of autonomous agents acting within a larger system
    • IB Paper 2 Option D
      • D1 – Objects as a programming concept
      • D2 – Features of OOP
        • D.2.1 – D.2.3: Defining Terms
      • D3 - Program Development
        • D3.1 – 3.3 – Defining Terms
        • D3.4 – Primitive Data Types & The Reference Class String
        • D3.5 – D3.8 Constructing Code
        • D3.9 – Enabling Internationalization
        • D3.10 – Moral & Ethical Obligations of Programmers
      • D4 – Advanced Program Development
        • D4.1 – 4.4 – Recursion
        • D4.5 – D4.6 – Object References
        • D4.7 – Features of the Abstract Data Type (ADT) List
        • D4.8 – Describe Applications of Lists
        • D4.9 – D4.10 Construct Algorithms Using a Static Implementation of a List
        • D4.11 – D4.14 Construct algorithms using the standard library collections included in JETS
        • D4.15 – Style & Naming Conventions in Code
    • Paper 3 HL Case Study
      • Starting the Case Study 2020
      • Case Study 2020 – Key Terms
  • Tutorials
  • Links
  • Code Challenges

Images

Creating Art With Code

Creating Art With Code

I have been playing about with Processing lately and coming up with some pretty cool artwork based on code.

This was pretty simple and I think the whole program was about 12 lines.

Author craiggodboldPosted on November 20, 2019November 21, 2019Format ImageLeave a comment on Creating Art With Code

RSS TechCrunch

  • A quick peek inside Fontinalis, one of Detroit’s best-known young venture firms
    Fontinalis, the 12-year-old, Detroit-based early stage venture firm, is known for being among the very first investing outfits to focus squarely on mobility as an overarching theme. It wasn’t a surprising mandate, given that the outfit’s cofounders include Bill Ford, the great grandson of Henry Ford and the executive chairman of Ford Motor Company. Nevertheless, […]
  • EU plan for risk-based AI rules to set fines as high as 4% of global turnover, per leaked draft
    European Union lawmakers who are drawing up rules for applying artificial intelligence are considering fines of up to 4% of global annual turnover (or €20M, if greater) for a set of prohibited use-cases, according to a leaked draft of the AI regulation — reported earlier by Politico — that’s expected to be officially unveiled next […]
  • Amazon’s Alexa earbuds return with a smaller design and wireless charging
    It’s been about a year and a half since Amazon released the first Echo Buds. I reviewed them when they arrived, and they were, I don’t know, fine, I guess. They were a bit on the cheap side, facing some stiff competition in the category and, honestly, the idea of wearing Alexa on my head […]
  • Plex raises $50M growth round to fuel ad-supported streaming, expansions
    Streaming media software maker Plex announced today it has raised a $50 million growth equity round from existing investor Intercap ahead of its planned business expansion into rentals, purchases and subscription content. This is the first financing Plex has taken on since 2014 and is being partly used to purchase shares and options from Plex’s […]
  • Upstack raises $50M for its platform and advisory to help businesses plan and buy for digital transformation
    Digital transformation has been one of the biggest catchphrases of the past year, with many an organization forced to reckon with aging IT, a lack of digital strategy, or simply the challenges of growth after being faced with newly-remote workforces, customers doing everything online and other tech demands. Now, a startup called Upstack that has […]
MENUMENU
  • Home
  • IB Computer Science
    • IB Paper 1
      • Topic 1
        • 1.1.1 - 1.1.7 - Planning and System Installation
        • 1.1.8 - 1.1.10 - User Focus
        • 1.1.11 - 1.1.13 -System Backup
        • 1.1.4 - Software Deployment
        • 1.2.1 – 1.2.3 – Components of a computer system
        • 1.2.4 – 1.2.11 – System design and analysis
        • 1.2.12 – 1.2.16 – Human interaction with the system
      • Topic 2
        • 2.1.1 – 2.1.5 – Computer Architecture & Memory
        • 2.1.6 – 2.1.8 – Operating systems and application systems
        • 2.9.10 – 2.9.10 – Binary representation
        • 2.1.11 – 2.1.13 – Simple logic Gates
      • Topic 3
        • 3.1.1 – Identify different types of networks.
        • 3.1.2 – The importance of standards in the construction of networks
        • 3.1.3 – Describe how communication over networks is broken down into different layers.
        • 3.1.4 – 3.1.5 – Identify the technologies required to provide a VPN.
        • 3.1.6 to 3.1.11 – Data Transmission
        • 3.1.12 – 3.1.15 – Wireless Networks
      • Topic 4
        • 4.1 General Principles
        • 4.2 – Connecting computational thinking and program design
        • 4.3 – Introduction to programming
      • Topic 5
        • 5.1.1 – 5.1.3 – Thinking Recursively
        • 5.1.4 – 5.1.10 – Abstract Data Structures
        • 5.1.11 – 5.1.13 – Linked lists
        • 5.1.14 – 5.1.17 – Trees
        • 5.1.18 – 5.1.20 – Applications
      • Topic 6
        • 6.1.1 – 6.1.4 – System Resources
        • 6.1.5 – 6.1.9 – Role Of The Operating System
      • Topic 7
        • 7.1.1 – 7.1.5 – Centralized Control Systems
        • 7.1.6 – Discuss the social impacts and ethical considerations associated with the use of embedded systems
        • 7.1.7 – Distributed systems
        • 7.1.8 Outline the role of autonomous agents acting within a larger system
    • IB Paper 2 Option D
      • D1 – Objects as a programming concept
      • D2 – Features of OOP
        • D.2.1 – D.2.3: Defining Terms
      • D3 - Program Development
        • D3.1 – 3.3 – Defining Terms
        • D3.4 – Primitive Data Types & The Reference Class String
        • D3.5 – D3.8 Constructing Code
        • D3.9 – Enabling Internationalization
        • D3.10 – Moral & Ethical Obligations of Programmers
      • D4 – Advanced Program Development
        • D4.1 – 4.4 – Recursion
        • D4.5 – D4.6 – Object References
        • D4.7 – Features of the Abstract Data Type (ADT) List
        • D4.8 – Describe Applications of Lists
        • D4.9 – D4.10 Construct Algorithms Using a Static Implementation of a List
        • D4.11 – D4.14 Construct algorithms using the standard library collections included in JETS
        • D4.15 – Style & Naming Conventions in Code
    • Paper 3 HL Case Study
      • Starting the Case Study 2020
      • Case Study 2020 – Key Terms
  • Tutorials
  • Links
  • Code Challenges
Craig Godbold .com Proudly powered by WordPress