Posts

Showing posts from January, 2022

Tech Topic Connection: Database Management

Image
What is Database Management? "Information technology (IT) is the  use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data   (Castagna & Bigelow, 2021) ".      Data has become an asset for organizations and it is important for the data that is being stored remain private, secure, and organized - especially when an organization is dealing with very large data. Data is collected using modern software applications and databases are a common way to store and manage data using such applications. Organizations uses database applications to  create and administer databases. Database Management Systems (DBMS) are desktop applications that users use for business purpose. The purpose of database management systems is to store and transform data into information to support businesses decision making.  Database management systems are in re...

Network Security

Image
     The type of attack that can be executed using pings commands is commonly known as the ping of death. The ping of death is a form of denial-of-service attack, and this is when attackers crashes or freezes a computer by sending a ping larger than the Internet Protocol packet which is formed of 65,535 bytes. Most legacy computers cannot handle larger packets. When attackers violates the IP rule, it overwhelms the computers memory and causes it to crash, destabilize, or freeze. In order for organizations to avoid this type of attack, they will need to avoid using legacy equipment's and constantly update their software as they are the most vulnerable.  Computers systems are vulnerable to phishing threats because hackers gain access to sensitive data such as passwords or credit card details. Hackers achieve this by pretending to be someone else like a well-known company or authoritative figure via email, text message, or telephone and manipulate user's into giving up ...

Computers in the Workplace

Image
       The use of computers is essential in the insurance industry.  The  main purpose of insurance is to protect our assets and  in the event  of a loss, we report a claim. Insurance companies must have a database that includes auto claims,  home claims, catastrophe claims and more.  Technology is used in insurance to assist policyholders with filing a claim and for adjusters to handle them as well  quickly and efficiently .        The functions of computers in the insurance industry are to store data or information and processing data/information.  The   employees that are handling claims have their own personal computer. They are required to keep their computers locked when they are away from their desk as there are customer’s personal information stored in a claims database that associates have access too. In order for the data to be processed or stored, the employees will input the data using their...

Traveling Through a Network

Image
     A  computer communicates via the Internet by  dividing data into chunks which are called packets and contains  information such as an address for a destination computer, the data size, and the data itself.  Packets  have a maximum of 30 hops  to a local Internet Service Provider (ISP) .         The three sites that I decided to  use were google.com, yahoo.co.jp, and abc.net.a u and o ut of all three websites, google.com was the fast est with traveling through the network.  The ping and traceroute results for abc.net.au shows that  the host is unreachable across an IP network  as the packets that were sent were lost during the ping activity and as for the traceroute  it reached its maximum 30 hops providing no results as it kept timing out.  Also, I have noticed that for yahoo.co.jp it was unreachable around hop 4 and 5 but it then started traveling through the network  just fine...

Documenting a Day

Image
 The Role of Applications  Computer applications  is also known as desktop applications.  There are numerous of computer applications available for users , some examples are Microsoft Word or a  calendar  app .  An  application , another term is app,  is a type of software that allows  a  user to perform specific tasks.  Today, we will go over four different types of computer  applications: word processor, spreadsheet, presentation, and database applications.    Computer Applications   1. Word  Processor   A common computer application for  creating formatted text , design ing  a flyer, and  creating  many other types of documents  is a word processor.  The most well-known processors  include  Microsoft Word and Google Docs.  The  advantage  of Word is that is gives users the ability to markup the document for changes. It allows for a series of...