Michele L



  • Agree!

  • Agree!

  • Michele L made a comment

    I am also struggling with this one. I'm stuck on it changing it's current state...I'm not sure how you could predict that...

  • If I'm NOT tired AND I have time, then I'll cook dinner.

  • 7 in binary: 111
    15 in binary: 1111
    40 in binary: 101000

  • My students love the somewhat mythical story about Grace Hopper finding a real bug inside her computer when we talk about "debugging". I usually show clips of her talking (she was on Letterman!) to show that this is so recent. I also like to pair activities with people who are currently making history.

    One more book recommendation: Broad Band: The Untold...

  • Students seem to really respond to the historical context! They are awed by how far we've come.

  • Hi, I'm Michele! I teach grades 5-12 CS and I always get questions from students about the very technical details of how computers and their circuits work. I'm hoping to have better ways to answer their questions!

  • I had the same error - thanks for the help!

  • Michele L made a comment

    Using the first simple parsing approach, what would happen if the network_name variable contained a comma?
    The network name would then be split into two sections when being decoded. This would throw off the steps after like when you identify each part in the list by the index.

    What do you think the downsides of using serialisation might be?
    I think it's...

  • Hi, I'm Michele from Pittsburgh, Pennsylvania! I teach middle and upper school computer science. I've been teaching about how the internet works for a few years now, but it always feels very high-level and abstract. I'm hoping showing the students how it actually works using a language they already know (Python) gives a deeper understanding to the concepts...

  • Michele L made a comment

    An attack would use information that you put out about yourself, perhaps on social media or other public places. Longer passwords have more room for variation and are more challenging to guess. Avoid being hacked by not giving out personal details through unsolicited emails or calls.

  • If a blagging attack is coming from someone you supposedly know in real life, reach out to them through another form of communication. Also, be careful of spammy sounding email addresses and domain names.

    Always be aware of your surroundings. Avoid using public computers, if possible.

  • Michele L made a comment

    Social engineering attacks are used to get personal information so the attackers can sell or use your information to get into your accounts. They're effective because people aren't careful about what information they're giving out, especially in scenarios like the name generator attacks or other personality quizzes because people think they're "just for fun"....

  • People have to be responsible for setting their own, secure password. There is also a programmer, process, and technology on the other side to protect the user from themselves who might set parameters like how long a password must be and what it may or may not contain.

  • Michele L made a comment


    I've been teaching computer science for 5 years and the one thing students always ask to learn is how to "hack". I want ways to teach them how to be responsible consumers and ethical hackers.

  • I'm looking forward to some hands-on activities to share with my students!