Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Replace wrong single and double quotations with correct one #2977

Open
wants to merge 8 commits into
base: master
Choose a base branch
from
1 change: 1 addition & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -51,6 +51,7 @@ Types of change:
## January 4th 2022

### Fixed
- [Multiple Topics - Multiple insights - Replace all occurances of "wrong" quotations that break the "solve this question" feature with normal quotations](https://github.com/enkidevs/curriculum/pull/2977)
- [Linux - Converting Between Unix And Windows Text Files - Replace wrong quotation character with the correct one](https://github.com/enkidevs/curriculum/pull/2976)

## December 30th 2021
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ A blockchain is a ??? ledger.
[1:Distributed Ledger]
A distributed ledger is a database that exists across several locations or among multiple participants.

Think of blockchain and distributed ledger in the same way you might think of Kleenex and facial tissues. The former is a type of the latter, but it has become so popular that it becomes ingrained in peoples minds as what the product is.
Think of blockchain and distributed ledger in the same way you might think of Kleenex and facial tissues. The former is a type of the latter, but it has become so popular that it becomes ingrained in people's minds as what the product is.

[2:Wallet Address]
Unlike a real address, this will be a long string of numbers and letters.
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ The increase in Bitcoin price made mining a highly profitable field. Many compan

The most expensive ASIC has a hash rate of `13.5 TH/s` and it sells for $3,000. Latest generation CPUs can perform at most couple hundreds hashes per second (200-300 H/s), which means the ASIC is *40 trillion times* faster.

The problem is ASICs take a long time to ship. Some people even think that the producers use them to mine bitcoins before sending them to users. And by the time they reach the customers, they arent as effective as they might have been because the network's processing power is only increasing over time.
The problem is ASICs take a long time to ship. Some people even think that the producers use them to mine bitcoins before sending them to users. And by the time they reach the customers, they aren't as effective as they might have been because the network's processing power is only increasing over time.


---
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ revisionQuestion:

**Bitcoin** was the first public blockchain which works as a ledger for tracking bitcoin token[1] transactions happening between users. A token is a "e-currency based on cryptographic proof"[2]. The first block was mined on the 3rd of January 2009.

It was all the idea of Satoshi Nakamoto (or a team with that alias). No one knows who Satoshi Nakamoto really is. Theres been plenty of speculation over the years about who it was, but none of them were confirmed.
It was all the idea of Satoshi Nakamoto (or a team with that alias). No one knows who Satoshi Nakamoto really is. There's been plenty of speculation over the years about who it was, but none of them were confirmed.

Some say this worked in favor of Bitcoin: by using a pseudonym, Satoshi Nakamoto made sure the spotlight was pointing at the technology rather than the person behind it. Slowly, but surely, the value of Bitcoin increased year by year, attracting more and more enthusiasts.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ Recall that any byte changed in the input changes the output drastically: by inc

The more 0's the hash has to start with, the more difficult the computation is. The first block mined had *difficulty 1* and it needed to begin with at least 8 *0*'s. The last block discovered (at the time of writing) had a difficulty of *3 trillion*, or roughly 18 *0*'s. This difficulty is equivalent to a hash rate of 22,500 PH/s (PetaHashes/s), or 22 million trillion hashes per second.

In the learn more section, youll find a link to an online block explorer where you can play around.
In the learn more section, you'll find a link to an online block explorer where you can play around.


---
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ In the previous insight, we talked about people sending bitcoins to others. But

Unlike real world currencies, that are issued by a country's central bank to meet a financial goal, bitcoins are part of a limited supply of 21 million. They are **created by the network** to **reward** the miner who appended a valid block to the blockchain.

In a sense, they are created from thin air. But the steady rate at which they are created and the feature of having a limited supply make them a desirable asset. The **block reward** in 2009 was 50 bitcoins and its been halving ever since, every 210,000 blocks.
In a sense, they are created from thin air. But the steady rate at which they are created and the feature of having a limited supply make them a desirable asset. The **block reward** in 2009 was 50 bitcoins and it's been halving ever since, every 210,000 blocks.

A new block is discovered roughly every 10 minutes, so the block reward remains constant for about 4 years. The reward was 12.5 bitcoins until May 11th 2020.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ After a certain period of time (dependant on internet speed and latency), and a

A distinction can also be made between nodes: there are **full nodes** and **mining nodes**. In short, mining nodes, or simply *miners*, are the ones that verify and bundle the valid, available[1] transactions into a new block. They also make sure to include a reference to the previous block in the chain. Full nodes are the ones that receive the bundled blocks from miners and verify its *integrity*. If everything is in order, they then forward a confirmation message to other nodes.

To prevent nodes from turning against the network, they *are rewarded* whenever they find a valid block. Well discuss node rewards later.
To prevent nodes from turning against the network, they *are rewarded* whenever they find a valid block. We'll discuss node rewards later.

The high-level components of the blockchain can be enumerated as follows:

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ practiceQuestion:

In a payment system, a transaction will contain a sender, a recipient and a transaction value. In a domain name registration service, a buyer, the domain bought and the value of the domain will most likely be recorded. The data in a block that stores decentralized applications will most likely be the code. In other words, any application will have its own transaction type.

We've got data that goes in the block, now we need the link between them. We also need a way to ensure that once a block is in a blockchain it cant be modified - such that a simple reference to its position in the blockchain would not be enough. This is where **cryptographic hash functions** come into play.
We've got data that goes in the block, now we need the link between them. We also need a way to ensure that once a block is in a blockchain it can't be modified - such that a simple reference to its position in the blockchain would not be enough. This is where **cryptographic hash functions** come into play.


---
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,13 +29,13 @@ The only difference being that computers require specific instructions. (Don't t

### Data: Variables

Data is information and information needs to be stored somewhere. Thats where variables come in. For instance, when you meet someone new you could store their `name = "Batman"` and `age = 24` as two separate pieces of information.
Data is information and information needs to be stored somewhere. That's where variables come in. For instance, when you meet someone new you could store their `name = "Batman"` and `age = 24` as two separate pieces of information.

In this case, `name` and `age` would be the variables that store information.

### Data: Types

Its easy to divide 24 by 2 and get 12. However, dividing “Batman” by 2 might land you in jail. To avoid going to jail, we group information into distinct *data types* depending on whether the values they hold are numbers, texts, or something else.
It's easy to divide 24 by 2 and get 12. However, dividing “Batman” by 2 might land you in jail. To avoid going to jail, we group information into distinct *data types* depending on whether the values they hold are numbers, texts, or something else.

These *data types* save us from attempting number related operations on texts and vice versa.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -99,9 +99,9 @@ the shortest paths between a source node and every other node?
???

- Bellman-Ford algorithm
- Prims algorithm
- Kruskals algorithm
- Dijkstras algorithm
- Prim's algorithm
- Kruskal's algorithm
- Dijkstra's algorithm


---
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -83,10 +83,10 @@ which starts from a given node we choose, which algorithm should we use?

???

- Prims algorithm
- Kruskals algorithm
- Prim's algorithm
- Kruskal's algorithm
- Knapsack algorithm
- Dijkstras algorithm
- Dijkstra's algorithm


---
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ In the following insights we will assume that a left node has priority over the

**Breadth-first traversal** (also known as *Breadth-first Search* or *BFS*) is the tree traversal that prioritize neighbors (nodes on the same level) over nodes on other levels.

Lets consider the tree:
Let's consider the tree:

![treeex](https://img.enkipro.com/857d47ddc50f5dfa0e2947ab092854df.png)

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,13 +25,13 @@ revisionQuestion:

As the name suggests, Big Data refers to **extremely large volumes** of data that are hard to analyze using traditional techniques.

Its more helpful to read it as, so much data that you need to take careful steps to avoid week-long script runtimes.
It's more helpful to read it as, "so much data that you need to take careful steps to avoid week-long script runtimes."

Just think about Amazons recommendation algorithm...
Just think about Amazon's recommendation algorithm...

The company takes all your buying history together with what it knows about you, your buying patterns, and the buying patterns of people like you to come up with some pretty good suggestions.

Its a marketing machine, and the company's big data analytics capabilities have made it extremely successful.
It's a marketing machine, and the company's big data analytics capabilities have made it extremely successful.

Companies or governments use software frameworks like Hadoop[1] to store and process huge amounts of any kind of data quickly.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ Think about height and shoe size. These are *positively correlated* variables.

### Mean

The mean gives us a sense of a typical or average value for a group of numbers.
The mean gives us a sense of a "typical" or average value for a group of numbers.

It is calculated by dividing the **sum of a list of values** by the **number of values** in that list.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ If you spot any outliers, make sure you investigate them to understand what caus

Measures how **spread out** values in a data-set are.

The square root of the variance gives us the **standard deviation**, which is more intuitively useful because its expressed in the same units as the values themselves.
The square root of the variance gives us the **standard deviation**, which is more intuitively useful because it's expressed in the same units as the values themselves.

If we plotted out the points from a normally distributed[2] data set this would form a bell-shaped curve.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ And here is the last set of important terms to be aware of 🤓.

### Statistical Significance

A result is statistically significant when we judge that it probably **didnt happen due to chance**.
A result is statistically significant when we judge that it probably **didn't happen due to chance**.

Check out the **Learn More** link for an explanation on how to calculate it!

Expand Down Expand Up @@ -57,7 +57,7 @@ Data mining is the process of **discovering patterns** in large data sets that i

Similar to data analysis, but more narrowly focused on **business metrics**.

The technical side of BI involves learning how to effectively use software to generate reports and find important trends. Its descriptive, rather than predictive.
The technical side of BI involves learning how to effectively use software to generate reports and find important trends. It's descriptive, rather than predictive.

We'll be looking at some of the most popular BI tools, such as Tableau, Looker and Mode, later on!

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ If your raw data has already been tampered with and you can't download it again,

1. **Unpretty your spreadsheets**

- Remove merged cells as these cant be used in pivot tables and are not well supported by external tools
- Remove merged cells as these can't be used in pivot tables and are not well supported by external tools
- Remove multi-line headers
- Remove titles, formatting, file version, date and authors (use the file history and versioning for that)

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -35,9 +35,9 @@ These can always be changed if you prefer a different type of chart.

There are loads to choose from including **line and area graphs**, **column, bar and pie charts**, **scatter plots**, and, if you have geographical data, even **maps**!

> 💡 To represent different data over time using lines and bars, try a **combo chart**. For example, you can show revenue in bars and profit margin in a line across the same chart, giving you a more complete picture of your organizations financial health.
> 💡 To represent different data over time using lines and bars, try a **combo chart**. For example, you can show revenue in bars and profit margin in a line across the same chart, giving you a more complete picture of your organization's financial health.

> 💡 To draw attention to a key metric or KPI, try the **scorecard chart**. For example, you can show the total sales number for your organizations top selling product, and even call out percentage changes over time.
> 💡 To draw attention to a key metric or KPI, try the **scorecard chart**. For example, you can show the total sales number for your organization's top selling product, and even call out percentage changes over time.

You can also edit loads of other display options such as the axes, legends and colors.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -30,16 +30,16 @@ revisionQuestion:

### Hits and Sessions

With each user interaction on your website, the Analytics tracking code automatically sends whats called a hit to Google Analytics. A hit is a URL string with parameters of useful information about your users.
With each user interaction on your website, the Analytics tracking code automatically sends what's called a "hit" to Google Analytics. A "hit" is a URL string with parameters of useful information about your users.

The three most common types of hits are:

1. **Pageview hits**
1. **"Pageview" hits**
When a user loads a webpage with the tracking code.
2. **Event hits**
2. **"Event" hits**
When a user interacts with a particular element on your website.
3. **Transaction hits**
Can pass data to Analytics about ecommerce purchases such as products purchased, transaction IDs, and stock keeping units (SKUs).
3. **"Transaction" hits**
Can pass data to Analytics about ecommerce purchases such as products purchased, transaction IDs, and "stock keeping units" (SKUs).

> 💡 Setting up **Enhanced Ecommerce** allows you to pass additional ecommerce data like product category, whether items have been added or removed from a shopping cart, and how many times users viewed a product.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ The Master View is your working view. It means that you can apply many different

The Test View is where you test all of your filters first. You could always skip testing a filter, but even experienced users should refrain from doing this.

The Raw Data View is an untouched view where you dont apply any modifications (like filters) that alter the data collection process. This view allows you to always go back if anything goes wrong in your working view(s).
The Raw Data View is an untouched view where you don't apply any modifications (like filters) that alter the data collection process. This view allows you to always go back if anything goes wrong in your working view(s).

> 💡 Google allows you to set up 25 views on one property so make sure to use them wisely!

Expand Down Expand Up @@ -87,7 +87,7 @@ The Analytics tracking code can collect which of the following?
???

- Device and operating system
- Users favorite website
- User's favorite website
- User's browsing history


Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ Again you can always segment your data by dimensions such as device (mobile vs d

It's also worth noting another useful dimension - **user type**. This segments users into *new* or *returning* visitors.

New users are *first-time users*. Googles tracking snippet creates a random, unique ID that gets associated with the user's browser cookie. Each unique ID is a unique user.
New users are *first-time users*. Google's tracking snippet creates a random, unique ID that gets associated with the user's browser cookie. Each unique ID is a unique user.

> 💡 This information will be lost if a user clears their browsing data, and Google Analytics also doesn't recognise users who visit sites from different devices by default.

Expand All @@ -62,7 +62,7 @@ New users are *first-time users*. Google’s tracking snippet creates a random,

## Practice

What is a metric in Google Analytics?
What is a "metric" in Google Analytics?

???

Expand All @@ -76,7 +76,7 @@ What is a “metric” in Google Analytics?

## Revision

What is a dimension in Google Analytics?
What is a "dimension" in Google Analytics?

???

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ links:

Marketing aims to reach consumers at the moments that **most influence their decisions**.

Thats why over a decade ago, Amazon began offering targeted recommendations to consumers already logged in and ready to buy. And it explains P&Gs decision to sponsor radio and then TV programs to reach audiences most likely to buy its products — hence the term soap opera".
That's why over a decade ago, Amazon began offering targeted recommendations to consumers already logged in and ready to buy. And it explains P&G's decision to sponsor radio and then TV programs to reach audiences most likely to buy its products — hence the term "soap opera".

Marketing analytics is crucial in aiding these decisions and is the practice of **analyzing marketing strategies to maximize their effectiveness**.

Expand All @@ -43,5 +43,5 @@ Growth hacking is an umbrella term for strategies focused solely on growth. It i

The goal of growth hacking strategies is to acquire as many users or customers as possible while spending as little as possible.

Many startups use Dave McClure’s “pirate funnel as a recipe for growth. These are **acquisition**, **activation**, **retention**, **referral**, and **revenue** (AARRR).
Many startups use Dave McClure's "pirate funnel" as a recipe for growth. These are **acquisition**, **activation**, **retention**, **referral**, and **revenue** (AARRR).

Original file line number Diff line number Diff line change
Expand Up @@ -79,4 +79,4 @@ Organic search traffic is a highly effective indicator of overall SEO success.
## Footnotes

[1:SEO]
Search engine optimization (SEO), in its simplest terms, is the process of making changes to your website's content to make it more visible to search engines and improve your sites rank.
Search engine optimization (SEO), in its simplest terms, is the process of making changes to your website's content to make it more visible to search engines and improve your site's rank.
Loading