Skip to content

Instantly share code, notes, and snippets.

View jcasimir's full-sized avatar

Jeff Casimir jcasimir

View GitHub Profile

Insertion Sort

Instructions

Complete these steps with roles Person 1 (P1) and Person 2 (P2):

  • P1 selects 5 of your numbers at random
  • P2 walks through the algorithm sorting those five numbers out loud to practice without counting steps
  • P1 adds three new cards, shuffles, and sorts the set out loud. P2 counts the steps using the guidelines below.
  • P2 adds two more cards, shuffles, and sorts the set out loud. P1 counts the steps using the guidelines below
@jcasimir
jcasimir / BigO.markdown
Last active October 15, 2018 19:26
Big O Analysis

Big-O Analysis

Learning Goals

  • Be able to explain why we care about the algorithmic complexity of our programs on a practical level
  • Be able to explain why we analyze algorithms in terms of asymptotic and worst-case performance
  • Explore the performance characteristics of some common algorithms/operations

Lesson Plan

Axe World

Your happy hour is boring. What better way to spend time with your coworkers then throwing axes?

We've got a bustling business where small groups book appointments then come to us to throw axes at the wall. But managing the paperwork is becoming a huge pain. Please help us with your database skills!!

I0: Getting Going

I think we should have a database called axeworld just like our business.

Hacking for Fun, Power, and Profit

Part 1: Understanding the Landscape

Agreeing to Terms

  • "Hacking" code = programming
  • "Hacking" hardware/etc = building things against their intent
  • "Hacking" in a traditional sense: people or computers/software

Hashing in Practice

You can complete these exercises in JavaScript or Ruby.

                  Declaration of Independence

               [Adopted in Congress 4 July 1776]

The Unanimous Declaration of the Thirteen United States of America

When, in the course of human events, it becomes necessary for one people to dissolve the political bands which have connected them with another, and to

Top-Down & Bottom-Up

As we think about process there are two general ways to solve a software problem: top-down and bottom-up.

Top-Down

Top-down development tries to first define how the user or consumer will utilize the system. To do it well you ask questions about the interactions like:

  • What kind of interface will the system have? (ex: web, mobile, hardware, etc)
require 'twitter'
client = Twitter::REST::Client.new do |config|
config.consumer_key = "kcQ0FsbLjuUHInJhYhvQeE6Ie"
config.consumer_secret = "cD6E48fsjTZN5Kfg0YqtZzV5ovJdgGplFMzjcgjd9QaVtgIcko"
config.access_token = "59792365-gSSa2N8i8JY6rZmq3P4LudsStVIRyU5LkK1BdxxRS"
config.access_token_secret = "wA09lkSkIcGDGDML9t3XLaslmlhwGQO5T1eNBgMC6L7o3"
end
client.update("I'm learning how to code at Turing School!")
  • Randal Springer, Ricky Amparo, Michael Marlow
  • Nick Teets, Samuel Snider, Michael Heft
  • Nicholas Mbogo, Rufus Welsh, Jason Hughes, Marvin Dale Bonds
  • Alex Banister, Liam Barstad, Young Jung, Adam Mescher
  • Brandon Stewart, David Ryan, Jorge Perez Garcia, Danny Trujillo
  • Aaron Hursh, Timothy Joo, Erik Ingvalson, John Boudreaux
  • Mimi Le, Matt Renn, Ben Porter, Joan Harrington
  • Amy Holt, Kali Borkoski, Whitney Sjostrom, Lola Brenner
  • Zachary Cook, Robbie Greiner, Jennifer Woodson, Gabriel Afflitto
@jcasimir
jcasimir / pattern_generator.rb
Last active March 22, 2017 21:52
pattern matcher
require 'pry'
class PatternGenerator
def verify(example, pattern)
example.chars.zip(pattern.chars).all? do |example_char, pattern_char|
verify_single(example_char, pattern_char)
end
end
def patterns