Skip to main content

Posts

Newbie to Newbie Blog Part Two- Algorithmic Design and Data Structure Techniques

Algorithmic design and data structure techniques are fundamental aspects of computer science and programming that help in solving problems. An algorithm is a step-by-step procedure or formula for solving a problem or accomplishing a task.   Algorithmic Design: Understand the Problem: Before diving into coding, you will need to thoroughly understand the problem you are trying to solve. Then identify the inputs, outputs, and constraints of the problem. Choose the Right Algorithm: Depending on the problem, choose an appropriate algorithm. For example, sorting algorithms like quicksort for sorting tasks. Pseudocode: Write pseudocode before actual coding, this helps in outlining the logic without worrying about syntax. Code Implementation: Translate the pseudocode into the programming language of your choice.    Data structures are fundamental components in the development of structured programs. They provide a way to organize and store data so that it can be accessed and mani...
Recent posts

Newbie to Newbie- Intro to Java

  Newbie to Newbie- Intro to Java As much as I love coffee, unfortunately this is not about coffee or great drink recommendations to request from your barista. We are going to learn a bit about Java and object-oriented programming. So grab your favorite coffee, frappe, or speciality drink and let's get into it. Object-oriented programming refers to languages that use objects in programming, they use objects as a primary source to implement what is to happen in the code. Java is a widely used object-oriented programming language and software platform that runs on billions of devices.  There are 4 major principles of object-oriented programming: encapsulation, data abstraction, polymorphism, and inheritance. Encapsulation is the hiding of data implementation by restricting access to accessors and mutators. To understand encapsulation, let’s talk about what accessors and mutators are. Accessors are methods used to ask an object about itself and mutators allow the users to set or ...

Operating System Theory

The components of an operating system exist to make different parts of a computer work together.     The fundamental concepts that underlie operating systems include process management, memory management, device management, file management, error detecting, and security. Operating systems are essential in a computer system. Some common contemporary operating systems include Microsoft Windows, Mac OS X, and Linux. Features of an operating systems includes user interface, program execution, I/O operations, file system manipulation, communications, error detection, resource allocation, accounting, and security.  Operating systems “allocate resources that allow the process to exchange information. It synchronizes among processes and safeguards the resources of other processes” (Mishra, 2023).   Memory management controls and coordinates a computer’s main memory by accessing, allocating and protecting the memory. Memory management considers “the capacity limitations of th...

Final- Information Technology Blog

Discuss how your selected tech topic connects to the fundamentals of information technology covered in this course. IT careers connects to the fundamentals of information technology covered in this class because there are so many different paths that you can choose to begin your career in information technology. This course provided the foundational knowledge to understanding how software works and provided insight into the basic IT troubleshooting steps used when helping with technology issues. The fundamentals of information technology covered in this course helped provide some of the basic skills needed when looking into different IT careers available. Information Technology careers may involve creating business applications, performing system analysis, designing, developing, supporting, and managing computer software, or even working in the field of robotics and artificial intelligence. None of which would not be possible without learning the foundation covered in this class.  ...

Network Security

  PING command, better known as Packet Internet Groper, checks to see that a device or website is available and how quickly you can access it. More descriptively, PING is “a basic program that allows a user to test and verify if a particular destination IP address exists and can accept requests in computer network administration” (Zola, 2021). It is used diagnostically to ensure that a host computer the user is trying to reach is functioning. According to Impreva (n.d.),  “there are a number of ping commands that can be used to facilitate an attack, including: The -n command, which is used to specify the number of times a request is sent. The -l command, which is used to specify the amount of data sent with each packet. The -t command, which is used to continue pinging until the host times out.” Ping flood attacks and ping of death are two different kinds of Ping attacks. Ping flood attacks Ping flood, “also known as ICMP flood, is a common Denial of Service (DoS) attack ...

Computers in the Workplace

     I chose to go with the Healthcare industry as it relates to information technology. Honestly healthcare was my initial degree choice. I've always accelerated in math and science related courses like Chemistry for example. Anatomy made me realize that I no longer desired to become a nurse! Information Technology in healthcare or the medical field continues to advance rapidly.       Even when you think of simple things at emergency rooms like the check in process. In the early years of emergency rooms there was a paper sign in sheet. You wait to be called up to complete the digital process that includes getting your wristband printed.  Nowadays you can schedule an emergency appointment ahead of time as well as get in line to hold your space in a patient queue. Many doctors offices also offer their patients the opportunity to complete most of the first time visit prescreen paperwork prior to coming into the office for their scheduled visit....

Traveling Through a Network

  The Internet functions by sending packets. Each packet moves from one computer through a network, then the packet goes through a local Internet service provider (ISP). Ping and traceroute are two commands that may be used together to determine how long it takes for data packets to go over a network. The outcomes of running the ping and traceroute commands might be used to analyze and contrast the various routes to their respective destinations. The results provide the roundtrip time for each packet, which may be utilized to get an understanding of the link between the round-trip time and a location's geographical position. The results of the ping and traceroute tests conducted on the various websites demonstrate that the pathways to the various destinations are distinct from one another. If you are having issues with your internet connection, you may troubleshoot them by using the ping and traceroute commands. It's possible that an issue with the path between your computer an...