What subfields in computer sciences may one study without learning Object Oriented Programming?

What subfields in computer sciences may one study without learning Object Oriented Programming or is there some kind of degree in Computer Science without the OOP knowledge requirement?

Is there a language without OOP?

Does one need to know OOP to simulate a CPU?

I wanted to earn a CS degree without ever learning OOP. Is there a name for that?

My guess what that Computer science without OOP is simply applied Statistics or Machine Learning using SKlearn and packages.

Time study / Data fetch and input from database

Below is an example , where Blue is user input either entering/drop-down , Yellow is from the database that the user can pick from drop-down list and Green is automatically calculated by the system . Hopefully I'm getting my point across. If you worked on a similar project , I would really appreciate if you can share your examples / tutorials / experience you had making a web-page that takes in value and stores in a database , either SQL, MySQL, access or any DB and guide me please. Any…

Time study / Data fetch and input from database

Raspberry Pi Security Issues: SSH ATTACK? Case Study [closed]

This is a scenario that took place a year back when I had very almost no knowledge of raspberry pi. Right now I am trying to learn some stuff about it hence this post.

In our apartment area in the university, a lot of the students including my roommate used raspberry pi for the purpose of WiFi through the Ethernet port provided by the uni. And my roommate was kind enough to share the wifi with me. For a few weeks, the wiFi was working fine, when one day it suddenly stopped working.

It looked like the Ethernet port was blocked by the uni IT guys. When contacted them they said (it is a year ago, so I might have misunderstood something or forgotten something but this is the rough idea behind it): They received complains from the Network Provider that some of the raspberry pis were being used for the SSH bruteforce attack(?) and they received complains from the network provider. So, they had to either block the pi mac address/ block the port the pi was on.

Can someone please provide their insights on this about how it must have happened?

There were quite a few people using the same pi method for their wifi but all of them were not too close to each other (few hundred meters apart). How can the hacker possibly know which wifi was the one with the pi? Even if the ssh password was the default, he still needed to connect to the pi to ssh with the wifi password? Similarly, how could he have done this all, I mean, unless he had a wider view of all the devices that were connected to some university level network?

I don’t know if this sounds crazy, I am just starting learning this and it may not make much sense some of the things that I said. But I would really appreciate if you all can provide some of your knowledge and sort of reverse engineer this case and explain as to what could have happened. I would be really interested to know this.

[RAW| How can a Demilich use staves, scrolls, etc., and study their spellbooks from a distance?

3.5’s Demilich has the ability Phylactery Transference:

Headbands, belts, rings, cloaks, and other wearable items kept in close association with the demilich’s phylactery transfer all their benefits to the demilich no matter how far apart the demilich and the phylactery are located. The standard limits on types of items utilized simultaneously still apply.

I have a wizard demilich that has an extremely well-guarded phylactery way over that-a-way, and part of the phylactery’s protection involves the lich simply not visiting it any more than absolutely necessary, lest some freak combination of bad timing and a divination spell reveal its location or defenses.

However, the lich still wants to be able to use staves, scrolls, wands, and rods, and wants to study their spellbooks every night so they have their wizard spells available the next day. Ideally, they’d like to use the odd feather token or other one-shot wondrous item, with bonus points if they can access storage near their phylactery (eg., so their skull form can appear without any treasure, but can still pay for a night at an inn if they so choose).

They’re a 21st level wizard with 2 open non-epic feats and 500,000 gp to spend on magic items for this purpose. They do have Scribe Scroll and Craft Wondrous Item already, and crafting doesn’t cost XP (for the players, either). They also have an augmented Handy Haversack (with plenty of extra storage in the main area). They can also take levels in non-wizard classes, so long as all of those levels increase their wizard caster level (eg., taking levels of Loremaster is acceptable, but Eldrich Knight is out).

I’m looking for a RAW-compatible option for this recurring villain to have access to their non-wearable stuff while keeping it away from the players for now. If the PCs find the lich’s stash, which will include a journal functionally detailing their character sheet, the full ability of the lich to stay away from their phylactery for years on end must make sense. Whether the PCs can use any of the gear in the stash to have similar remote access is irrelevant (my presumption is that they wouldn’t, because Phylactery Transference will be key to the whole thing working, but if it works for them, great!).

So, short of GM Fiat, how can my floating skull swap between staves?

What are the downsides of asking your current users to participate in a study (e.g. for new functionality)?

What I mean is, you rarely see companies put some form of banner out there on their homepage saying:

“Hey, we’re developing some new stuff and would like our customer’s opinions on it. Take a quick test!”

Usually, they do those tests behind closed veils and with specifically filtered testers (e.g. in remote testing).

So my question is, what is the primary reason for that?

These thoughts come to mind as arguments against it:

  • Only specific users would participate and skew the perspective. The average user, who is the main buyer, will ignore it; while the power or frequent users will use the chance to complain or inject their very specific wishes.
  • Your users are also accustomed to the site by now and will most probably view any new design changes as “bad” and will vote for keeping what they already know.

On the other hand, these are the things that could be said in favor of it:

  • You can get insight into problems that only long-term users might face, while new users do not even know they exist.
  • You build more loyalty due to the trust you display for their opinion.

I guess I kind of answered my own question, as it usually depends on context. You use foreign, new users to test things that are supposed to attract new paying customers, while you can ask existing users when you want to improve deeper & more complex functionality.

But it seems you never see the second case, but most always the first one.

Does anyone have further points to add to the two lists or other thoughts related to that?

Where can I get step-by-step solutions to Algorithms by Cormen for self study?

I want to study Algorithms myself. So, I am using Intro to Algorithms by Cormen. Where can I get reliable step-by-step solutions to all the problems in the book ?

I have seen the official Instructor solution manual and also the one by Rutgers University. Unfortunately, they are not really step-by-step. They just give you the final answer or last few steps. Ex. in the insertion sort example, the exact steps to figure out the equation for running time are provided. But, in the exercise for selection sort, only the final equation is given.

Thanks !

PS – Please let me know if there is a better forum to ask this instead of this one.

Given the syllabus which I will study in the next semester, what kind of machine learning project can I do? [on hold]

Given the syllabus which I will study in the next semester, what kind of machine learning project can I do? Machine learning syllabus:

  • Module 1: Introduction to Machine Learning, Examples of Machine Learning applications – Learning associations, Classification, Regression, Unsupervised Learning, Reinforcement Learning. Supervised learning- Input representation, Hypothesis class, Version space, Vapnik-Chervonenkis (VC) Dimension
  • Module 2: Probably Approximately Learning (PAC), Noise, Learning Multiple classes, Model Selection and Generalization, Dimensionality reduction- Subset selection, Principle Component Analysis
  • Module 3: Classification- Cross validation and re-sampling methods- K-fold cross validation, Boot strapping, Measuring classifier performance- Precision, recall, ROC curves. Bayes Theorem, Bayesian classifier, Maximum Likelihood estimation, Density functions, Regression
  • Module 4: Decision Trees- Entropy, Information Gain, Tree construction, ID3, Issues in Decision Tree learning- Avoiding Over-fitting, Reduced Error Pruning, The problem of Missing Attributes, Gain Ratio, Classification by Regression (CART), Neural Networks- The Perceptron, Activation Functions, Training Feed Forward Network by Back Propagation.
  • Module 5: Kernel Machines- Support Vector Machine- Optimal Separating hyper plane, Soft-margin hyperplane, Kernel trick, Kernel functions. Discrete Markov Processes, Hidden Markov models, Three basic problems of HMMs- Evaluation problem, finding state sequence, Learning model parameters. Combining multiple learners, Ways to achieve diversity, Model combination schemes, Voting, Bagging, Booting
  • Module 6: Unsupervised Learning – Clustering Methods – K-means, Expectation-Maximization Algorithm, Hierarchical Clustering Methods, Density based clustering

Site / tool to contact multiple study participants with their IDs after pseudonymization

For this multiple-weeks research study with an early access app, a pseudonymization process is used to disconnect the participant’s emails from their data with a random ID.

I need to contact those people after they registered through the pre-form and provide them with the app link and their ID. They will need it to fill out the post-form and provide the ID so the data of this second form can be connected to the data of the first.

Now the thing is that I have about 60 people and it would be annoying to send each of them an individual mail with their ID.
Can anyone recommend something that would make this easier?
To somehow automate the process of sending out the correct ID to the correct email?

I’ve thought about tools like Mailchimp, but you can only dynamically reference variables that the user provided (e.g. name or gender).