Skip to main content

Posts

Showing posts from October, 2022

Final- Information Technology Blog

Discuss how your selected tech topic connects to the fundamentals of information technology covered in this course. IT careers connects to the fundamentals of information technology covered in this class because there are so many different paths that you can choose to begin your career in information technology. This course provided the foundational knowledge to understanding how software works and provided insight into the basic IT troubleshooting steps used when helping with technology issues. The fundamentals of information technology covered in this course helped provide some of the basic skills needed when looking into different IT careers available. Information Technology careers may involve creating business applications, performing system analysis, designing, developing, supporting, and managing computer software, or even working in the field of robotics and artificial intelligence. None of which would not be possible without learning the foundation covered in this class.  ...

Network Security

  PING command, better known as Packet Internet Groper, checks to see that a device or website is available and how quickly you can access it. More descriptively, PING is “a basic program that allows a user to test and verify if a particular destination IP address exists and can accept requests in computer network administration” (Zola, 2021). It is used diagnostically to ensure that a host computer the user is trying to reach is functioning. According to Impreva (n.d.),  “there are a number of ping commands that can be used to facilitate an attack, including: The -n command, which is used to specify the number of times a request is sent. The -l command, which is used to specify the amount of data sent with each packet. The -t command, which is used to continue pinging until the host times out.” Ping flood attacks and ping of death are two different kinds of Ping attacks. Ping flood attacks Ping flood, “also known as ICMP flood, is a common Denial of Service (DoS) attack ...

Computers in the Workplace

     I chose to go with the Healthcare industry as it relates to information technology. Honestly healthcare was my initial degree choice. I've always accelerated in math and science related courses like Chemistry for example. Anatomy made me realize that I no longer desired to become a nurse! Information Technology in healthcare or the medical field continues to advance rapidly.       Even when you think of simple things at emergency rooms like the check in process. In the early years of emergency rooms there was a paper sign in sheet. You wait to be called up to complete the digital process that includes getting your wristband printed.  Nowadays you can schedule an emergency appointment ahead of time as well as get in line to hold your space in a patient queue. Many doctors offices also offer their patients the opportunity to complete most of the first time visit prescreen paperwork prior to coming into the office for their scheduled visit....

Traveling Through a Network

  The Internet functions by sending packets. Each packet moves from one computer through a network, then the packet goes through a local Internet service provider (ISP). Ping and traceroute are two commands that may be used together to determine how long it takes for data packets to go over a network. The outcomes of running the ping and traceroute commands might be used to analyze and contrast the various routes to their respective destinations. The results provide the roundtrip time for each packet, which may be utilized to get an understanding of the link between the round-trip time and a location's geographical position. The results of the ping and traceroute tests conducted on the various websites demonstrate that the pathways to the various destinations are distinct from one another. If you are having issues with your internet connection, you may troubleshoot them by using the ping and traceroute commands. It's possible that an issue with the path between your computer an...

Documenting a Day

     Documenting a day in my life using different applications was interesting. I immediately noticed the differences when entering the information into each application. I noticed when documenting my day how each different application can be used. This assignment made clear that each application was made for a specific reason and when it is best appropriate to use each application.              Word processor is best used for creating documents like reports and writing long documents like books, really anything that requires a lot of text. According to Microsoft (n.d), word can be used to “create impressive documents and improve your writing with built-in intelligent features.” Spreadsheets, like Excel, is best used for managing and analyzing data because of the chart graphs easily available to create with your already available data. Excel can simplify complex data and create easy-to-read spreadsheets” (Mi...

Web/Mobile App Critique

Did not complete assignment 

Programming Languages

     Scratch is “the world’s largest coding community for children and a coding language with a simple visual interface that allows young people to create digital stories, games, and animations.” This was my first-time using Scratch so at the time of making my own story, I had to refer to the tutorials quite a few times. One thing I noticed is that it was best to write a bit of the story, run it, and then continue to add to it. This ensured that what I entered did what I wanted to happen. It was best to have test runs throughout the process.     The difficulty I encountered at the beginning was not realizing that that if I wanted my sprite to switch from one costume to another to animate it, I needed to enter at least a second wait time in between the costumes so it would create the motion I wanted. Otherwise, the costume overrode the last costume listed first which just made it stay in the position of the last costume in the script. The wait one secon...