Posts

Algorithmic Design and Data Structure Techniques

Image
Algorithmic design and data structure techniques are important in developing structured programs. These techniques help to break down a problem into smaller, more manageable parts. This makes the program easier to understand and debug. Additionally, these techniques can improve the performance of a program by reducing the amount of time needed to complete tasks. Different algorithms and data structures work better for different applications. However, some designs are more efficient than others, and it's important to be aware of these when making design choices. For example, a linked list is often a better choice than an array for representing a list of items, because it allows for faster insertion and deletion operations. I would apply algorithmic design and data structure techniques in developing structured programs by first identifying the problem that needs to be solved. I would then develop a solution using algorithms and data structures that will best solve the problem. Finall...

Java Tutorial: Create Your First Hello World Program

Image
In this article, you will be able to have a basic understanding of what Java is and how to install it to your computer. Once you have Java installed on your computer, you will then learn how to create your first Hello World program.  What is Java? Java is an object-oriented program language, and one of the most popular programming languages as it is very popular among the developers. On top of that,  Java is used by 95% of the enterprises as their primary language. T he popular programming language allows developers to compile Java code then run it on more than one operating system, such as Windows, Linux, macOS, etc. However, in order for this to occur, the developer must have a Java runtime environment installed. But the question is: How do you install Java on your computer? Installing Java On Your Computer  In this tutorial, you will learn how to download the Java Development Kit (JDK) on Windows, which  is a development environment for building applications and c...

Summary Blog Post

Image
  Features of contemporary operating systems are the following: Process Management, Memory Management, File Management, Network Management, Secondary Storage Management, I/O Device Management, and Security Management. Common contemporary OSs include Microsoft Windows, Mac OS X, and Linux. The process management component is a procedure for managing many processes running simultaneously on the operating system. The memory management process is conducted by using a sequence of reads or writes of specific memory addresses. A file management is a set of related information defined by its creator. Network management is the process of administering and managing computer networks. Secondary storage management also with storage devices, such as USB flash drives and CD/DVD drives. The I/O Device management helps to hide the variations of specific hardware devices from the user. Security management refers to a mechanism for controlling the access of programs, processes, or users to the resou...

Tech Topic Connection: Database Management

Image
What is Database Management? "Information technology (IT) is the  use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data   (Castagna & Bigelow, 2021) ".      Data has become an asset for organizations and it is important for the data that is being stored remain private, secure, and organized - especially when an organization is dealing with very large data. Data is collected using modern software applications and databases are a common way to store and manage data using such applications. Organizations uses database applications to  create and administer databases. Database Management Systems (DBMS) are desktop applications that users use for business purpose. The purpose of database management systems is to store and transform data into information to support businesses decision making.  Database management systems are in re...

Network Security

Image
     The type of attack that can be executed using pings commands is commonly known as the ping of death. The ping of death is a form of denial-of-service attack, and this is when attackers crashes or freezes a computer by sending a ping larger than the Internet Protocol packet which is formed of 65,535 bytes. Most legacy computers cannot handle larger packets. When attackers violates the IP rule, it overwhelms the computers memory and causes it to crash, destabilize, or freeze. In order for organizations to avoid this type of attack, they will need to avoid using legacy equipment's and constantly update their software as they are the most vulnerable.  Computers systems are vulnerable to phishing threats because hackers gain access to sensitive data such as passwords or credit card details. Hackers achieve this by pretending to be someone else like a well-known company or authoritative figure via email, text message, or telephone and manipulate user's into giving up ...

Computers in the Workplace

Image
       The use of computers is essential in the insurance industry.  The  main purpose of insurance is to protect our assets and  in the event  of a loss, we report a claim. Insurance companies must have a database that includes auto claims,  home claims, catastrophe claims and more.  Technology is used in insurance to assist policyholders with filing a claim and for adjusters to handle them as well  quickly and efficiently .        The functions of computers in the insurance industry are to store data or information and processing data/information.  The   employees that are handling claims have their own personal computer. They are required to keep their computers locked when they are away from their desk as there are customer’s personal information stored in a claims database that associates have access too. In order for the data to be processed or stored, the employees will input the data using their...

Traveling Through a Network

Image
     A  computer communicates via the Internet by  dividing data into chunks which are called packets and contains  information such as an address for a destination computer, the data size, and the data itself.  Packets  have a maximum of 30 hops  to a local Internet Service Provider (ISP) .         The three sites that I decided to  use were google.com, yahoo.co.jp, and abc.net.a u and o ut of all three websites, google.com was the fast est with traveling through the network.  The ping and traceroute results for abc.net.au shows that  the host is unreachable across an IP network  as the packets that were sent were lost during the ping activity and as for the traceroute  it reached its maximum 30 hops providing no results as it kept timing out.  Also, I have noticed that for yahoo.co.jp it was unreachable around hop 4 and 5 but it then started traveling through the network  just fine...