Pages

Monday, November 6, 2023

Tech Topic Connection

 



Network technology is an integral part of information technology and computer science and is a significant part of the history of computers and how computers operate. It involves the interconnection of computers and other devices to share resources, exchange information, and communicate. The use of devices uses rules and communications protocols physically or wirelessly. Additionally, it facilitates the operation of various applications, services, and systems.

Networking relies on processors, memory, storage, input/output devices, network interface cards (NICs), etc. Additionally, said components allow for the transmission of data between devices, which is essential for the operation of networks. Programming languages and program execution methods are also critical for networking, enabling communication between the computers and other devices in a network. 



Application software is fundamental to networking, as it determines the specific functionalities and services available to users to access and use network resources. Network protocols and standards are in place to ensure a seamless process and connectivity for applications like email clients, web browsers, and file-sharing applications.


        Database and database management are closely related concepts essential to networking as they enable data to be stored and retrieved from the network. Network architecture, management, and security is critical as they determine how the network is structured and how data is exchanged and protected. Databases store and retrieve information, and networks enable the efficient access and sharing of this data. Database management systems use networking protocols to facilitate communication between clients and database servers, ensuring reliable data transactions and query responses.



Network architecture, management, and security are three basic concepts that are essential for the successful operation of a network. Network architecture refers to the physical and logical structure of the network, its components, and the type of connections used to link them together. The architecture should be designed to meet the needs of the user and capable of handling the amount of traffic expected. Network management is responsible for making sure the network is running correctly and efficiently. Tasks such as configuring devices, troubleshooting problems, and monitoring performance are prime examples of the importance of network management. Network security protects the network from unauthorized access and malicious attacks. By deploying countermeasures such as firewalls, intrusion detection, and antivirus software or encryptions, network security is essential.

In summary, network architecture, management, and security are interconnected aspects of networking that collectively contribute to the design, functionality, and protection of a network. A well-designed architecture, effective management practices, and security measures are essential for creating a reliable, efficient, and secure networking environment.


Friday, November 3, 2023

Network Security

   Information and system security is an increasingly important consideration for individuals and organizations in today's digital world. Cyber attackers are constantly on the rise, and there are always new methods and techniques being used to bypass even the best systems in place. With a security system, it can adjust, enhance, and adapt just as quickly to learn to defend itself from the same attack style should it come again by understanding the faults within its system and unknown ones.      

    When using ping commands, there are a few different types of attacks that can be executed, one being a "ping of death." Ping of death is a denial-of-service attack that uses the fragmented packets of how IPs are set up and attack. Once sent, a payload of data larger than the maximum packet size causes the target computer to crash. Social engineering and phishing are two common security incidents that can occur. Social engineering is when attackers use psychological manipulation to access confidential information, while phishing is when attackers send emails or other messages with malicious links or attachments. Both types of attacks can lead to the theft of personal data or the installation of malicious software. 


    Computer systems are vulnerable to many cyber threats because they are often connected to the internet, making them accessible to attackers. Being connected to not only the internet but also unstable and unprotected, like open Wi-Fi networks for anyone to use without authentications, allows for easy access to personal data that leaves users vulnerable to attack and infiltration. Additionally, user accounts can also be hacked through weak passwords or stolen credentials, and unpatched software leaves systems open to attack. The symptoms of a security breach can vary depending on the type of attack. Generally, the damage can include the theft of data and information, corruption, or the installation of malware.


Computers in the Workplace

 In the healthcare industry, computers are used to help manage patient records, track medical supplies, and process insurance claims. Electronic medical record systems allow medical staff to access patient health information and update records quickly. Computers are used to analyze patient data, enabling healthcare providers to make more informed decisions about treatments and medications. Additionally, computers are used to perform diagnostic testing, monitor vital signs, and assist with real-time and up-to-date information regarding the symptoms while at the same time producing medical cures.   



    Employees in these industries must be computer literate to use the technology effectively. Computers have become an integral part of many job functions, and employees need to be able to quickly and accurately use the technology to succeed. Additionally, understanding the basics of computer technology can help employees understand how it can be used to their advantage by streamlining processes that once took hours to access and process.  



    Significant computer hardware, operating systems, and networking advancements will likely occur in the next ten years. These evolutions in technology will majorly impact the different industries listed above. For example, faster processors and larger storage capacities will allow computers to perform more complex tasks in less time. Additionally, artificial intelligence technology will likely become more commonplace, allowing computers to handle more tasks autonomously. These advancements will undoubtedly improve productivity and efficiency and will help shape how these industries operate.

Documenting a Day

  Word processors, spreadsheets, presentation, and database applications are all essential software for any business or organizational use. Each application has a unique purpose and function, and they can be used together to create projects and presentations for data management and analysis. 

Word processors are used to create documents, such as journal entries or reports, while spreadsheets can be used to calculate, analyze, and visualize data. Presentation software is used to create slideshows or other visual aids for presentations. Database applications are used to store, manipulate, and analyze large amounts of data.
While having personally used all of these applications in the past in various situations. Each of these applications has its advantages and disadvantages. Word processors are easy to use, but they are limited in functionality compared to other applications, as their primary function is complying text. Spreadsheets are more powerful than word processors, but they require more experience with their functionality to go beyond text on a page. Spreadsheets use input data and formulas that can aid Word documents if needed. Presentation software is great for visualizing data, but it can be challenging to understand all areas of opportunity in using a program that primarily focuses on visual data. 
Overall, each of these applications can be used to create robust solutions for data management and analysis, but they each have their unique advantages and disadvantages. By understanding the functions of each application, you can choose the best one for your needs.
In conclusion, the choice of application depends on the specific task at hand. Combining these tools can lead to a more comprehensive and efficient workflow, allowing users to leverage the strengths of each application in different stages of a project.



Web/Mobile App Critique

 






    When creating a blog, it is essential to identify the intended audience and consider how that audience will impact the design choices. Knowing the target audience helps to determine appropriate content, layout, and styling elements. For instance, if the blog targets teens, the design should be more vibrant and creative, with features like bold colors, interactive components, and modern fonts. If the blog targets a professional audience, the design should be classic and sophisticated, with features like subtle colors, an organized layout, and traditional fonts. For me personally, my target audience would be everyone with an open mind. For example, teenagers and their moms or parents are interested in two completely different things. Still, both are willing to compromise and be available for something new with the help of inviting verbiage, neutral colors, and relatable themes regarding family or a perspective that would shed light on experiences one party may go through that the other could never experience. Having this type of inclusion is something that I would want to incorporate not only as a conversation piece but to create a unique experience that's personal but thoughtful as well.      

Programming Languages

 Click to View: Scratch Project

Upon using the Scratch program, I found it a bit. Challenging. As this program is meant to create a story, there was a specific vision I had in mind for how I wanted the story to be shown, and between the lack of experience in using the program and trying to come to my understanding based on active use of the multiple functions caused multiple challenges. My first difficulty was transitioning from the original to the changed background. Additionally, with the changing environment, the visibility of the added characters only shows in the new scene after the transition. Experiencing single step-by-step instructions from the textbook made it easier to understand the program's possibilities, as there were many scenarios you were put through. 

The insight I gained from using scratch is how different programming languages can be. Some, like scratch, are easy for me to use but still have a level of complexity to execute your end goals. The easiest programming language for me was Python, as I am familiar with this programming language. In comparison to Scratch, Python was much more manageable. Scratch is simple, but I over-complicated it, causing issues using the program.




Regarding programming language uses, Machine learning would be used extensively in social media for image recognition on products or well-known individuals. Assembly programs are greatly used for stocks and trading. Due to the fast-paced nature of trading, the advantage of using assembly programming allows you to write code for efficiency. Other high-level programming languages, like Python, are great for system programming. 

The most popular programming language might be high-level. Programs like Python or Javascript is a craft that takes time to develop, and due to their complexity, not only are you learning the most complicated languages, but it you'll also learn the basics that would cover how to use some of the other programming languages that are much easier to use.