Class 40 - Personal Presentation
Lab 40 - Final Exam Prep
Setup
Code Challenge
Overview
Read this overview.
Video
Watch the video for this class from the demo playlist.
Demonstration
Look through these sample problems.
Challenges
- Navigate to the javascript folder within your data-structures-and-algorithms repository.
- Create a new branch for this challenge called for-each
git checkout -b for-each
- Retrieve the code challenge from the system
npm run get-challenge 01
- In your terminal, from the javascript folder, run npm test 01 to execute the tests in this file for this challenge.
- At this point you will see the failed tests scroll through your terminal window with a brief report of the number of failed tests at the bottom.
- If you do not see this, verify your installation of Jest by typing npx jest –version in your terminal. Filename typos can make things break!
- Write code to make the tests pass, one at a time. Let the error messages guide you.
- Once the test is passing, refactor as needed, then move on to the next challenge.
- Note, you can also run npm test (without a challenge number) to run all of the tests for every code challenge file assignment during the course all at once. This can get “noisy”, but it’s an opportunity to get a view of your overall progress
Submission
When you have completed the entire set of code challenges and all tests pass, create a pull request from your current branch to the main branch and merge it into main.
You will be able to see a test coverage report in GitHub on the Actions tab of your data-structures-and-algorithms repository. It should match what you saw on your terminal in the above steps. Your graders will be looking at this as well.
Submit a link to your pull request.
Written Class Notes
Read 1 - Introduction to React and Components
Resources Link/Pages
Answer
Statement on why this topic matter as it relates to what I’m studying in this module:
Adding on to what was learned in 201, components are like JavaScript functions. They accept arbitrary inputs (called “props”) and return React elements describing what should appear on the screen.
Component-Based Architecture
-
What is a “component”?
- A replaceable and reusable set of functionality. It is a software object, interacting with other components. Components are designed to be independent, allowing them to be deployed and composed individually.
What is Props and How to Use it in React
- What is “props” short for?
- It is short for “properties.” It is a special keyword used to pass data from one component to another.
Things I want to know more about
- How does React handle the communication of data between sibling components if it’s unidirectional?
Retrospective
Retrospectives are a critical part of Agile, and typically take the form of meetings held by a team at the end of a sprint cycle. To get us acclimated to that process, we will use the format of a retrospectives to guide today’s reflection.
This article gives a nice overview to the role of retrospectives.
- What went well, that I might forget if I don’t write down?
- What did I learn today?
- What should I do differently next time?
- What still puzzles me, or what do I need to learn more about?
- Thinking about each of your assignments for the day, reflect on:
- Is the assignment complete? If not, where exactly did you leave off, and what work remains?
- Do not get bogged down in written analysis; instead, focus on capturing the moment with an eye toward how your observations can guide you toward future productivity.
Career 35 - Partner Power Hour - Report #8
If there is no live presentation on campus in this module, select the appropriate presentation from the list below. All presenters are open to connections and invite you to reach out to them, so that you can to learn more about them, their company, and the industry.
You may find it difficult or challenging to connect with industry professionals and gain an inside look at how the tech world operates. We’ve drawn on our network to bring you speakers and topics relevant to this stage of your career transition. These presentations may serve to educate, enlighten, and motivate you along your journey. Take advantage of this opportunity, and make the most of the insights these presentations provide… you never know where a connection will lead.
- Breaking Down the Tech Interview w/Rover - Rover Engineering Team
- Whiteboarding Tips & Strategies - Roger Huba
- Automate Yourself Out of a Job - Adam Eivy
- Communication Under Stress - Eve Denison
- Deep dive - Dev Tools - David Souther
- CI/CD History Lesson - Kat Cosgrove
- The 7 C’s of Cybersecurity & Coding - Courtney Hans
- Your Net Worth - John Cokos
The 7 C’s of Cybersecurity & Coding - Courtney Hans
-
Share one or two ways the speaker’s information will change your approach to your career transition.
- She mentioned getting good at debugging and it was a good reminder that I need to start doing that more and learning how to be efficient about it and learn different ways in approaching it.
- I always think I don’t have enough experience for things and she was right that I don’t apply if I don’t check off all the requirements but I just need to evaluate how to translate my existing skills.
-
List a few key take-aways from this presentation.
- Conversion - translate your existing skill set. You are never starting from scratch
- Courage - keep imposter syndrome at bay , reach for jobs that seem out of grasp but really aren’t. Women often wont apply for a job if they don’t check off every requirement. Do it anyways
- Conversation - ask questions
- Coordination - not an individual effort, seek out help
- Consistency - commit to addressing complexity, to tackling hard problems, make a decision and commit to seeing it through, dedicate yourself to your goals
- Confession - ok to say IDK and be comfortable with it
- Cryptography - five primary functions of Cryptography
- Authentication: The process of proving one’s identity
- Integrity: Assuring the receiver that the received message has not been altered in any way from the original
- Key exchange: The method by which crypto keys are shared between sender and receiver
- Non repudiation: A mechanism to prove that the sender really sent this message
- Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver
- Symmetric encryption uses the same key for both encryption and decryption.
- Asymmetric encryption uses different keys for encryption and decryption, providing higher security.
- In asymmetric encryption, there’s a public key for encryption and a private key for decryption. The public key is shared openly, while the private key is kept secret.
- Learn human skills
- Learn to debug
-
Share a screenshot of your LinkedIn connection request, including a nicely worded note, sent to the speaker or someone else at their company.