Skip to main content

Computers in the Workplace

    The role of computers in the workplace has shifted immensely over the past decade. Especially in the Education field. Being computer literate is definitely a must for everyone considering computers have become an essential aspect of the job. Whether it be with students learning from a computer, educators teaching from it, or administrative staff using computers to perform their daily tasks. 

 

    Technology’s presence in the workplace has been growing since the turn of the century with the advent of faster computers that could perform greater tasks, but I feel that the pandemic expedited this change even more so. For the last couple of years the education field has shifted to rely more heavily on technology by having instructors teach remotely from virtually any location. This may have been present before 2020 but the pandemic really forced most, if not all, colleges and K-12 schools to go virtual at higher rates. This is also the case for administrative staff at these educational institutions as well. 

 

Remote work is now far more available than ever before. As such, being computer literate is crucial because we no longer have immediate access to an IT department that can come over and fix our problems within minutes. Now we have to call a tech line and have someone walk us through issues over the phone which places a bit of pressure on those who might not be familiar with computers. 

 

   My current role completely changed from 100% in-person working in an office to 100% remote working from home since March 2020. Even now there are no signs of ever going back so this change is seemingly permanent. I was sent home with a laptop, a monitor and a ton of wires and equipment. We were given instructions to assist us setting everything up which was helpful and luckily I had some experience with the equipment form my own past so it wasn’t too difficult, but that was not the case for everyone. This is why being literate is so key, because as we move forward the impact of computers will only continue to grow in all sectors, not just education. 

 

Michael Streat 

Comments

Popular posts from this blog

Network Security

    With the advent of computers and the internet, so too came the invention of harmful scams. These malicious entities have become more and more prevalent since the turn of the century and exist in various forms. From existing in different types of computer viruses, spam emails, phishing, and Denial of Service (DoS) attacks there are a multitude of ways for user’s personal information to be accessed and disseminated without knowledge or consent.               During week 3 of our course we learned about ping commands and even practiced using these to access different websites. This week’s venture into security took the concept even further by revealing how one can use ping commands in a negative and harmful way in the form of Denial of Service (DoS) attacks. These types of security breaches require no hacking of any kind, nor does it involve the installation of any type of malicious software which is also known ...

Applying Algorithmic Design & Data Structure Techniques

   This week's resource article describes an algorithm as, "a procedure that you can write as a C function or program, or any other language. An algorithm states explicitly how the data will be manipulated." (Complexity Analysis, n.d.).    The length of time a program takes to complete a given task depends on its algorithm. The algorithm deals with how data is organized and how it is accessed. The biggest considerations for creating applications are time complexity and space complexity.     With time complexity, this refers to the number of operations needed and the time it takes it takes for them to run. This is typically measured in milliseconds. Operations are typically: 'compare', 'swap', 'fetch from memory' and 'send to memory'. While each operation takes only a small amount of time; the number of operations that are necessary grow exponentially. As the list of operations grows, so too does the time it takes for them to be enacted.    ...

CPT 307: Data Structures & Algorithms - Week 1!

 Hello World! I am back in the blogosphere after several months. The present course is called "Data Structures & Algorithms" and this week's focus is centered around installing Java and reviewing object-oriented design principles.  Thankfully the instructions embedded within the course made the installation of Java and IDE (integrated development environment) NetBeans seamless. The links provided to each website were straightforward (for the most part):  NetBeans (version 16):  https://netbeans.apache.org/download/index.html Java (version 19):  https://www.oracle.com/java/technologies/downloads/ The 4 major principles of Object-Oriented Programming:  1) Encapsulation - The hiding of data implementation by restricting access to accessors and mutators. The pieces that surround the data that forms the class. An Accessor is a method that is used to ask an object about itself (Lewallen, 2005). This is typically in the form of properties. Mutators are public...