Posts

Showing posts from April, 2025

Tech Topic Connection | Network Security

  Network security functions as an essential IT element which protects data as it moves between computer networks. Digital communication growth requires network protection against unauthorized access and attacks and data breaches to become an essential priority. The paper investigates how network security relates to fundamental IT concepts including hardware and software and programming and databases and network architecture.Network security functions to defend IT systems by protecting data through confidentiality integrity and availability which represent fundamental cybersecurity principles. These principles remain essential for protecting data throughout its transmission and storage processes. Bayuk et al. (2012) stress that strong security policies form an essential foundation to defend IT infrastructure from cyber threats which threaten operational continuity and data confidentiality. Network security has developed through the progressive stages of computer science. The e...

Network Security | Social Engineering & HTTPS

  Modern interconnected operations create a situation where information system security stands as an essential fundamental component. The online storage and transmission of sensitive data expose individuals and organizations to rising cyberattack threats. Information systems require secure confidentiality and integrity and availability protections because they prevent financial losses and reputational damage and privacy violations. The National Institute of Standards and Technology (NIST) defines information security as the set of processes which protect digital data against unauthorized access or modification (NIST, 2020). The attacks which take advantage of human behavior along with standard tools are equally dangerous as those that exploit technical vulnerabilities. The "ping" command serves as a primary illustration of misuse. The ping command serves network diagnostic functions, but attackers use it to execute Ping Flood and Denial-of-Service (DoS) attacks. Attackers lau...

Computers in the Workplace | Military

  Computers are essential for military personnel, especially in the IT roles like System Administration. In my 3 years with the United States Air Force, and working with computers as my job, I've seen how computers support communication, cybersecurity, and mission operations. They help manage networks, keep systems secure, and ensure everything runs smoothly. So being able to know computers and properly control digital systems is crucial for the military because everything depends on digital systems, and understanding different operating systems and networking tools helps keep military operations efficient and secure. Military personnel must know how to fix technical issues, secure networks, and protect against cyber threats.  In the next 10 years I know that technology will continue to shape and support the military, but I also believe it is important that military personnel can do their jobs and protect US grounds without using technology. I can see the growth of more advanc...

Traveling through a Network | Traceroute & Ping

Image
  The ping command is used to send packets to a server and receive responses, the time between sent and received packets is called the round-trip time. This is a fairly simple way of telling how long it takes to exchange data with the server, effectively measuring the network latency.  The traceroute command is more informative; it shows the sequence of routers through which the packets travel and the addresses of these routers. This lets us know not only the time it takes for the packets to reach the destination but also where the packet is delayed. When comparing the outcomes of the ping and traceroute commands from different websites, e.g., Google.com (U.S.), Gov.uk (U.K.), and China Daily (China), I was able to see the path that the packets took and the time it took to receive a reply. Google had a response time of 31 ms and the path was fairly short, meaning there were fewer network hops, and it was relatively close to my location.  Among the three, Gov.uk has the mi...

Documenting a Day | Application Software

  All types of application software were developed for certain purposes in the field of data processing and presentation.   The main purpose of Word processing software, including Microsoft Word and Google Docs, is to develop, modify and arrange text documents. These applications help the user to organize the written content in a systematic way and also offer the user the ability to make the content more presentable to readers through formatting. Spreadsheet applications like Microsoft Excel and Google Sheets are used in organizing numerical data, performing calculations and presenting the data in forms of charts or graphs to represent the information in a better way. Presentation software including Microsoft PowerPoint and Google Slides assists the user in developing multimedia slideshows that are often used in educational or professional settings.   Database applications like Microsoft Access and MySQL are used in the collection, storage, and retrieval of structured dat...

Mobile App Critique | Spotify

Image
  Spotify is easy to use and navigate around as a result, you will be able to find all of the features easily. The main navigation options which are Home, Search, Your Library and Premium are located at the bottom of the screen and helps users navigate to different areas of the app easily. The app enables easy access to the personalized recommendations, curated playlists and genre. Searching for a certain song, album or an artist is quick and efficient, and the suggestions are usually accurate. Making playlists and adding tracks to your collection is also quite easy and can be done in a few taps. Spotify social features enable people to share their playlists and follow other users which makes it more interactive. However, it can be quite confusing to new users especially with so many features that are not obvious at first. For instance, features like collaborative playlists or Daily Mix playlists may not be easy to find without knowledge or help from an introductory guide. The curr...

Programming Languages | Scratch

Through the use of Scratch, I was able to get my first real exposure to programming and gain some important understandings of the process and its fundamentals. Scratch is a graphical user interface programming language which uses blocks of codes that can be dragged and connected instead of typing in codes. My project was a simple one, where two cats would converse with the user and provide responses and move around. This exercise helped me grasp the fundamental of programming like loops, conditionals and events. The feedback was almost instant which made testing and debugging easier and thus I got a clearer picture of how the code is executed and how it is linked within the program.   The major thing that I was able to learn from this experience was that every process should be divided into parts or steps in order to make the solution of a problem easier. For instance, I broke down my scratch program into components such as movement, looping and questions. This is very essential in...