Posts

Tech Topic Connection

  Among the current landscapes of information technology, web and mobile applications have become increasingly vital components for enhancing user experience, managing data, communicating, and providing services. Information technology principles covered in this course, such as system architecture, data processing, and user interface design, are illustrated through these applications in everyday life. With web-based applications, you can access dynamic content and services from various device types. At the same time, with mobile apps, you can personalize your experience based on the universal nature of smartphones. By combining web and mobile technology, this interaction demonstrates concepts such as client-server modeling, database management, and software development methodologies. Understanding the underlying principles of these technologies is vital to harnessing their full potential for solving real-world problems and driving innovation in numerous industries. A web applicat...

Network Security

Ping commands can accomplish various attacks, including Ping of Death and Connection Exhaustion. These attacks fall under two categories: Denial of Service (DoS) and Distributed Denial of Service (DDoS). DoS attacks usually involve flooding a server with an extreme number of packets that overwhelm it and cause it to slow or crash. Attacks by DDoS typically originate from multiple locations through linked devices. The attack can disrupt regular traffic between them by bombarding servers, services, and networks with data. As a result, servers and networks receive an enormous number of continuous service requests, making it challenging to identify a trustworthy source of information (Haseeb et al., 2023).  A ping-of-death attack is a packet of data maliciously engineered to cause a server-side system failure. Most ping flood assaults are designed for sheer volume, so the data are practically irrelevant. Ping-of-death attacks cause the victim's device to stop or break by exploiting its...

Computers in the Workplace

 The industry I chose to cover is the telecommunications industry. I currently work as a communications technician in this industry, which requires an above-average level of interaction with computers compared to most other industries. Company phones and tablets are issued to perform everyday work functions. The devices are managed by IT personnel and have specialized virtual private networks (VPN) networks to access proprietary company software and personal identifying information (PII). Daily jobs are accessed through company software and routed with computer-assisted routing and human intervention when necessary. Before heading to a job, 2-way communication devices are pinged to give information about online status, signal levels, and other information relevant to the call type (installation or repair). Signal level meters are distributed and aid in the installation of services and troubleshooting alike. These signal level meters measure a digital signal, converted from an old a...

Traveling Through a Network

Image
  Understanding the path packets travel through a network is crucial for network administrators and IT professionals. The ping and traceroute commands are essential tools that provide this insight, allowing us to measure the time it takes for packets to reach their destination and analyze the route they follow. Ping is a simple network utility that sends packets to a specified host and waits for a reply. This process helps determine whether a particular host is reachable and how long it takes for packets to travel roundtrip between the source and destination. Traceroute, on the other hand, is a useful tool that provides detailed information about the path packets take to reach a destination. When packets with increasing Time To Live (TTL) values are sent, routers along the path will send ICMP Time Exceeded messages in response. Analyzing these messages enables traceroute to map out the path taken by the network from source to destination, helping to understand the network's structu...

Documenting a Day

Several software applications have become essential tools for individuals and organizations to streamline work processes and improve productivity. Word processors, spreadsheets, presentations, and databases are the most commonly used applications. Each performs distinct functions and has advantages and disadvantages unique to it. This paper compares these four types of applications, examines their advantages and disadvantages, and provides additional scenarios where each application would be most beneficial. A word processor is primarily used for creating, editing, formatting, and printing textbased documents, such as letters, reports, essays, and memos. Spell checking, grammar checking, formatting options (font styles and sizes), and templates are some features offered (Vahid & Lysecky, 2019). In spreadsheets, data is organized in rows and columns (tables) for calculations, analysis, and budgeting. By using formulas and functions, users can perform complex math operations. Using...

iMessage Review

Image
Usability: Apple’s iMessage is a popular messaging app that is exclusively available on Apple devices, including iPhones, iPads, and Mac computers. One of the things Messages is known for is its usability. Since its inception, the messages app has had a very simple and user-friendly interface that most people will find easy to navigate. The app also allows users to send text messages, photos, videos, and audio messages easily. If someone is highly invested in the Apple ecosystem (tablets, Macs, wearables) messages can be accessed seamlessly across devices. Apple's minimalistic approach to the app makes it less intimidating for people who are not very technologically savvy. Design: iMessage's design is minimalistic and has gotten sleeker over the years, but has not deviated too far from its initial look on the first iPhone. The text bubbles from senders and recipients of other Apple users are blue and grey, while messages sent to an Android device are green, which can be slightl...

Programming Languages

My Scratch Project   When I began building a program on Scratch, I initially had trouble coming up with an idea. After some brainstorming, I came up with a general idea, and then I began putting the various code blocks together to try to execute my vision. The order of code blocks threw me off at first, and I couldn’t make the sprites do what I wanted at specific times. After watching a few tutorials, I struggled more until I decided to hang it up for the night and try to approach it the next day. The following day, I thought about Scratch and why I had trouble with it. After returning home, IU decided to give it another shot after watching more tutorials. For some reason, it clicked better for me, and I could assemble the blocks to make a sequence I was satisfied with. I often overthink and unnecessarily complicate things, so taking a break to regroup usually helps me to solve a problem. I learned from this exercise that the order of the programming blocks is very important in ach...