Posts

From one newbie to another - Algorithmic design and data structure techniques.

Image
Hi, and welcome to my latest blog, “How to apply algorithmic design and data structure techniques in developing structured programs for Newbies.” Yes, I know this is a long title but I’m glad you found this page. As with my previous blog on Object-oriented Programming, this was a learning experience on algorithmic design and data structure techniques and how they can apply to the real world. Thank you for taking the time to read and I hope you find this blog informative as well.   Our first question is, “How to apply algorithmic design and data structure techniques in developing structured programs.”. You’re probably wondering why there’s a picture of delicious lasagna and what that has to do with our blog topic. Well, before we dive into that, let’s go over some concepts of algorithmic design. What exactly is algorithmic design? This concept, in short, refers to the process of creating step-by-step instructions to solve a problem or perform a task. This concept can be app...

From one newbie to another - Let's talk Java

Image
Hi, and welcome to my blog, “Object-oriented Programming (OOP), and Java for Newbies.” Just like you, I too am learning about the many concepts of OOP and how they can be used in the real world. Now, there are other OOP’s out there such as Ruby as well as hybrid languages like C++ and Python, but for this blog, we will be concentrating on Java. Thank you for taking the time to read and I hope you find this blog informative.   Installing Java and an integrated development environment (IDE)   To start, we will quickly go over the installation process for Java as well as an IDE which will assist with many tutorials. While there are various outlets that provide these two items, the one widely known location is directly from the Oracle website, more specifically the Java Tutorials page which can be found by navigating to: https://docs.oracle.com/javase/tutorial/getStarted/index.html . This page has some additional topics as well, but we will be concentrating on the Java...

Tech Topic Connection

Introduction There are many positions within Information Technology (I.T.) with various responsibilities, but one common item is the want to advance in one's I.T. Career. A new position doesn’t come by default and does require some additional work, education, and experience. This could come by learning the hardware components of a computer, or the various programming languages. In either case, knowing the fundamentals of information technology can help anyone wanting a career in I.T. to not only be prepared for the job but also move up within the industry.  My selected topic of I.T. Careers has a direct connection to the fundamentals of I.T. that were covered in this course. Many of the careers within I.T. touch all parts of each of the topics, from the basic knowledge of computer hardware and software to learning programming languages. Within my department, there are various levels of I.T. support which range from end-user computing support, and database administrators, to softwar...

Network Security

Introduction   There are various types of security used around the World. Some types are within the financial system in the forms of debt and equity while others are more physical such as a guard or a bouncer. While those types of security are valuable to those entities, one type of security that is imperative to have in the World today is network security. According to Poole (2002), “Network security is an important issue, because of the dependence and utilization of computer networks to store, access, and provide business information, internally within an organization and externally to customers and suppliers.” (p.1). With so many dependent on the use of networks and the internet, it is critical precautions are taken to ensure network safety against the different types of attacks.    When it comes to the types of attacks, one that some may not take into consideration is the ability to attack using ping commands. A ping command attack can come in many different ways, but...

Computers in the Workplace

I picked public safety for the industry in connection with the functions of computers. Many years ago, I had the honor of working on a project supporting a new technology (at the time) for the local Fire Department which was introducing mobile units on each apparatus. The goal was to replace all paper forms with these mobile units so they could enter patient care information while at the scene for a faster response time and the ability to input the patients’ symptoms. The units that were selected for this project were Panasonic Toughbooks which are rugged laptops for outdoor use. According to pcmag.com, these were “build to be beaten up”. When first introduced to the department, there was a lot of hesitation from many of the staff due to the new technology and being used to the old way. There were a few technical issues as well such as connectivity, issues with the patient care software, and communication with the different hospitals. After some time and improvements to those issue...

Traveling Through a Network

Image
For this exercise and in addition to pinging Google, I chose to ping  www.onlymelbourne.com.au and  sina.com.cn Below is the information and screenshot of my results.   Part 1: Ping Activity GOOGLE: Pinging google.com [142.250.68.14] with 32 bytes of data: Reply from 142.250.68.14: bytes=32 time=30ms TTL=59 Reply from 142.250.68.14: bytes=32 time=26ms TTL=59 Reply from 142.250.68.14: bytes=32 time=27ms TTL=59 Reply from 142.250.68.14: bytes=32 time=34ms TTL=59 Ping statistics for 142.250.68.14:     Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds:     Minimum = 26ms, Maximum = 34ms, Average = 29ms ONLYMELBORUNE.COM.AU: Pinging www.onlymelbourne.com.au [104.26.8.2] with 32 bytes of data: Reply from 104.26.8.2: bytes=32 time=104ms TTL=58 Reply from 104.26.8.2: bytes=32 time=29ms TTL=58 Reply from 104.26.8.2: bytes=32 time=30ms TTL=58 Reply from 104.26.8.2: byt...

Documenting a Day

Introduction Microsoft first debuted the Office Suite in 1989 which at that time was only available for the Apple Mac. Within the year, Microsoft became available for both Apple Mac and Windows 3.0. At that time, the Suite only included three options which were Word, Excel, and PowerPoint, and was very limited by today’s standards. ( Jones, 2019).  Since then, there have been many versions of Office released along with many advancements with applications for both businesses and students. The Microsoft Office Suite is now referred to as Office 365 and includes additional applications such as Access, Outlook, OneNote, Publisher, and Skype for Business. (Posey, 2016). This reflection essay will cover my experience with using some of the applications available with Microsoft Office. Compare the functions of a word processor, spreadsheet, presentation, and database applications. There are many options and functions of the applications available with the Microsoft Office Suite. With th...