Posts

A Beginners Guide to Algorithmic Design and Data Structures

  In the realm of computer programming, there exists a vast spectrum of algorithmic and data structuring techniques.  These algorithms and data structuring techniques are the backbone of software development and enable developers to create logical programming solutions capable of solving an array of computational challenges. With these profound technological innovations, the ability to effectively manipulate and organize data as well as optimize performance and operational efficiency has aided programmers to meet the demands of today’s technological landscape. As a beginner new to the landscape of computer programming, it is important to note that each of these algorithms and data structuring techniques serve a specific purpose in the facilitation of problem solving and data management. Some common algorithms include search, sort, and numerical algorithms. Below is a brief explanation of the purpose of each as well variations of these algorithm types. Searching Algorithm...

Java Installation and Object-Oriented Design Principles for Beginners

  Salutations fellow Techies, For those of you who are just beginning to explore the world of Java this is the post for you. This article will provide a brief historical overview of Java, its applications, features of object-oriented design principles, and installation guidance. History and Applications Originally developed by Sun Microsystems and later acquired by Oracle Corporation, Java has since become one of the most popular programming languages in the world. Java was originally released in 1995 and has since been used for a wide variety of applications including web, mobile applications, enterprise software, and scientific computing development. Java is an object-oriented programming language, meaning that it is based on the concept of objects and classes. The fundamental features which allow developers using Java to create maintainable, scalable, and reusable code are Encapsulation, Inheritance, Polymorphism, and Abstraction. Below, I will brief upon the purpose of ...

Week 5 Final Project: Blog Reflection Paper

  My experience building a blog In retrospect, I thoroughly enjoyed learning about blogs and creating my own for the first time. I’ve heard of them before, but I have never actively read, viewed, or been very attentive to them. However, spending more time creating one, I have a newfound appreciation for creating content using this format and I will surely continue making a few more of my own in the future. I think it would be a great opportunity to learn through research and networking. Plus, I may even be able to generate passive income from my content, create a sense of community, and possibly even come across career opportunities. Blog practices I incorporated using research The are many elements in my blogs design, aesthetic, and content flow that I have incorporated from the research I have done. Through research, I have developed a better understanding of the best practices to implement to further the chance of having a successful blog. Some of these elements I have incorpo...

Week 5 Final Project : Tech Topic Connection

  This post will be an exploratory overview made up of several questions regarding Careers in Information technology. Below is a list of subjects that this post will cover in more depth: ·        How do Careers in IT relate to fundamental concepts covered in this course? ·        How do IT Careers relate to the concepts of information technology and computer science, including the history of computers and the means by which they operate? ·        How reliant are IT careers on modern hardware and computer functions? ·        How do Careers in IT incorporate programming languages and program execution methods? ·        How does application software play a role in IT careers? ·        Relationship to database concepts and database management? ·        How does netw...

Network Security

               In this post, I will cover several topics including the importance of information and system security for both individuals and organizations, the types of attacks that can be executed using ping commands, computer viruses, and social engineering. I will also further explain how users are vulnerable to viruses and social engineering as well as the symptoms and damages each can impose. I will also recommend ways that users can help prevent and protect themselves from these types of breaches.  For both individuals and organizations, having some type of information and system security is crucial. Without the implementation of a form of protection, individuals leave themselves vulnerable to having their personal information like bank account details, credit card information, social security number, identity, and other sensitive personal information stolen.   As for organizations, the scale of a breach or cyber attack can...

Computers in the workplace

In this post, I will be covering the functions of computers in the aerospace industry.  Or more specifically, space exploration systems development. This post will also explain why it is important for employees in this industry to be computer literate and how the aerospace industry is expected to evolve in the next ten years. Space exploration system development refers to the process of designing, building, testing, operating, and implementing the technology and systems to explore space.  This sector is responsible for creating propulsion systems, spacecraft, communication networks, space habitats, life support systems and a vast array of other technologies necessary for the purpose of reaching the next frontier.               The scope of the aerospace industry’s use of computers is incredibly extensive. In fact, the aerospace industry played a critical role in the advancement of computer technolog...

Traveling Through a Network

Image
  When data is transmitted through a network, it is divided into several smaller units called” packets.” Each packet contains a portion of the data sent. These data packets are separated and organized into several distinct layers, each with its own set of functions and protocols. The most used packet layer model today, is the Open Systems Interconnection model or OSI, which is made up of seven layers including the application, presentation, session, transport, network, data link, and physical layer. Originating at the starting point or source device, these layered packets are then sent on to a destination device. In transit, these layered packets move through or “hop” through a series of devices called routers. Routers are devices that forward packets through different networks. They work by assessing the destination address using what is known as the packet header. Once the destination address is verified using the packet header, it uses what is known as a routing table to selec...