Skip to main content

Posts

Showing posts from August, 2025

Tech Topic Connection

Hey Digits!  Today we'll be discussing a Tech Topic that is a largely debated and chronically important in the technology world.  Privacy connects with information technology through the baseline of managing a reliable network by securing data. Confidentiality, integrity and availability should be the core values of what any organization should prioritize when using any form of technology. One of the biggest goals found in the IT career field is the privacy and security of data. It can be characterized as not only a legal obligation, but an ethical conviction, deeply rooted within the baseline of what IT stands for.  From a historical viewpoint computer science has always been tied to the security of data. As computer began to grow and evolve, the standard models no longer remained bases of isolated information, but progressed into a world that could now transfer, share, and connect data. The risks began to grow because remote ways of accessing this sensitive information ...

Network Security

 Hey everyone, Today I'll be diving into the intricacies of network security.  Information and system security is vital to the privacy and safety of every corporate organization or individual using technology for personal use. As societal dependence on technology grows, the laws, boundaries, and precautions need to evolve with it. Without these essential security managers, detrimental data and or personal information is exposed to attackers who are able to weaponize these findings for their own use. Some of the most common cyber attacks include malware, ransomware and computer viruses. “Malware is any software used to gain unauthorized access to IT systems in order to steal data, disrupt system services or damage IT networks in any way. Ransomware is a type of malware identified by specified data or systems being held captive by attackers until a form of payment or ransom is provided (CISA, 2024).”  These attacks have the ability to exploit various vulnerabilities in diff...

Computers in the Workplace

  Hey Everyone!  The industry I’ve chosen to speak about in today’s post is the healthcare field. I currently work in the healthcare industry and have a candid firsthand look at the constant evolution of technology within this career. Working in the emergency room and currently in the flight medicine clinic both require efficiency in the use of computers. Almost, if not every technician, doctor, assistant, or volunteer, has a computer or laptop. Computers have assisted in elevating patient care, enhancing researching processes, and ensuring every encounter is documented. Computers literacy in this field is essential for effective medical care. Providers being able to document legibly and communicate to the various parts of their medical staff is essential to the flow of patient care. There are a numerous number of systems that require medical personnel to be efficient in calculating measurements, imaging, and medication to be able to assist in a proper patient diagnosis. In 10...

Traveling Through a Network

Using the ping and trace-route commands were easier than I initially thought. I used the  google.com Links to an external site.  domain per the suggestion.The instructions were clear and I was able to gain valuable information about the process of finding and navigating data packages. Both the ping and traceroute commands work together to provide a useful and productive network travel process. The ping command used can be explained as, submitting information and waiting for a response, tracking the amount of time taken it takes for this process to happen. In the traceroute process this command reflects the specific paths these packets take, also displaying delays and encounters that happen during this process. In addition to this, I realized how important it was to consider the role that CDN plays in the faster load times, SEO, and overall experience for a user. Websites that does not use the assistance of a content delivery network often times relies on geographical network p...

Documenting A Day

 In today’s modern technical world, software applications play a large role in the way we create and present information, both personally and professionally. Recently, the opportunity to familiarize with these applications has presented itself in this week's assignment. Using Word, PowerPoint and Excel has provided me with the opportunity to calculate percentages, play with graphics and learn the power behind word alignment using journal entries. In doing this, I have been educated on the purpose each application may serve, in the creating of a program or project. This essay is a deep dive into the advantages and disadvantages of each program, examining what tool would be best for daily usage, based on an individual's needs or desires (Csernoch et al., 2022). The data application Word processor was the first application used. Assigned with the tasks of documenting a specific day, a numerous amount of information was incorporated into the word document. This tool is primarily us...

Web/App Mobile Review

Good afternoon class!  The app I’ve chosen to review is the airbnb app. I’ve chosen this app because I often travel, and use it continuously to find convenient places to stay on short notice. This app provides affordable options to a catered budget, in which you are able to specialize amenities and scenery. The usability of this app can be described as simple and beginner-friendly. When opening the app, the user is automatically taken to the home page, in which a search bar is displayed, with the option of selecting a specific location and filter, in which multiple options are provided in order to specialize your selection experience. Navigating the app is a smooth process, because of its easy to use features. The booking process is direct and rapid, oftentimes receiving booking, check-in/check-out as soon as your stay is purchased. Users are able to scan reviews, ratings and cancellation policies, creating a transparent experience for individuals considering booking their stay....

Programming Languages

https://scratch.mit.edu/projects/1202361259 Hi Everyone!      Using the Scratch program proved to be difficult, but very engaging. It was challenging to use this system on a laptop instead of a desktop because the ability to edit and drag icons are very limited. I chose to create a very simple interactive with small movements that I was able to pick up on using the tutorials provided on the website. I did not understand how to reset the character back to their original position after the loop finished playing. As a result my characters often ended up mushed together or not in the place they originally were. I also found it challenging to align the dialogues to flow and not be disconnected. An insight I gained during this process is the amount of intricacies and problem decomposition that are required when computer programming. Scratch does an excellent job at ensuring all the controls are visible, however without any prior experience it was difficult attempting to create ...