Skip to main content

Posts

Recent posts

CPT 307: Data Structures & Algorithms - Week 1!

 Hello World! I am back in the blogosphere after several months. The present course is called "Data Structures & Algorithms" and this week's focus is centered around installing Java and reviewing object-oriented design principles.  Thankfully the instructions embedded within the course made the installation of Java and IDE (integrated development environment) NetBeans seamless. The links provided to each website were straightforward (for the most part):  NetBeans (version 16):  https://netbeans.apache.org/download/index.html Java (version 19):  https://www.oracle.com/java/technologies/downloads/ The 4 major principles of Object-Oriented Programming:  1) Encapsulation - The hiding of data implementation by restricting access to accessors and mutators. The pieces that surround the data that forms the class. An Accessor is a method that is used to ask an object about itself (Lewallen, 2005). This is typically in the form of properties. Mutators are public methods used t

Tech Topic Connection

                 The tech topic I chose was the fascinating and growing world of mobile applications. The biggest reason behind this is because of the vast potential mobile applications, or apps, possess. The website emizentech.com reviewed a Statista report indicating “there are about 7.1 billion app users worldwide,” and that, “global revenue is expected to reach $808 billion in 2022,” (EmizenTech, 2022). This is a burgeoning industry that is only expected to grow in the coming years.     Apps translate, “communication efforts into interactive customer experiences heightening cognitive, emotional, emotional, and behavioral responses,” (Kim & Yu, 2016). The world is now more connected than ever before. Through certain apps, individuals have the capabilities of crossing geographical boundaries and allows us to communicate with anyone who also uses the app and has an internet connection.    I use my smartphone every day and often take for granted the amount of behind-the-scenes work

Network Security

    With the advent of computers and the internet, so too came the invention of harmful scams. These malicious entities have become more and more prevalent since the turn of the century and exist in various forms. From existing in different types of computer viruses, spam emails, phishing, and Denial of Service (DoS) attacks there are a multitude of ways for user’s personal information to be accessed and disseminated without knowledge or consent.               During week 3 of our course we learned about ping commands and even practiced using these to access different websites. This week’s venture into security took the concept even further by revealing how one can use ping commands in a negative and harmful way in the form of Denial of Service (DoS) attacks. These types of security breaches require no hacking of any kind, nor does it involve the installation of any type of malicious software which is also known as malware. How these attacks work is that a single user first creates a b

Computers in the Workplace

       The role of computers in the workplace has shifted immensely over the past decade. Especially in the Education field. Being computer literate is definitely a must for everyone considering computers have become an essential aspect of the job. Whether it be with students learning from a computer, educators teaching from it, or administrative staff using computers to perform their daily tasks.         Technology’s presence in the workplace has been growing since the turn of the century with the advent of faster computers that could perform greater tasks, but I feel that the pandemic expedited this change even more so. For the last couple of years the education field has shifted to rely more heavily on technology by having instructors teach remotely from virtually any location. This may have been present before 2020 but the pandemic really forced most, if not all, colleges and K-12 schools to go virtual at higher rates. This is also the case for administrative staff at these educati

Traveling Through a Network

  Hi World,        Ping Command Activity – This was a great exercise that highlighted how ping commands work in a hands-on way. I enjoy being able to play around with topics we are learning about. Here are the screenshots of my ping results. The two other websites beyond google was the official Australian government response website: Australian.gov.au and the official website of the government of Japan: Japan.go.jp         I was rather shocked to see that the ping to Japan was the quickest when compared to google and the Australian website! The average speed for Japan was 24.025 ms (milliseconds). Google’s average speed was 24.474 ms and the Australian site’s average was 188.582 ms. Given how far away those countries were I expected them to take longer because there is so much more distance that needs to be traversed. Given that the Australian ping took the longest was expected, but the fact google sits in the middle is a surprise.       Traceroute Command activity – Much like the ping

Documenting A Day

   Working with Microsoft Word, PowerPoint and Excel was just the refresher that I was needing. I have worked with these platforms for years now but as we know, the less we ‘use’ it the more we ‘lose’ it. As in lose our memory for how to properly navigate each platform and take advantage of their respective features and capabilities. As such, this exercise was very much needed and I am thankful for it. Each program has their own strengths and specialties, and it ultimately boils down to what it is we are trying to do.    Word has always been my go-to for writing papers and this makes sense because it was built with this in mind. Word is literally billed as a ‘Word processor’ computer application. This means it was designed specifically for creating formatted text. “Formatted text refers to features of a document like margins, text size, bold text, italicized text, colors, number of columns, etc,” (Vahid & Lysecky, 2019). These features come in handy to express different emotions th