Blog Post #6 – Network Security Title: Network Security: Protecting Against Phishing and Ransomware Information and system security is one of the most important concerns for individuals and organizations today. With so much personal and professional data stored digitally, the consequences of a breach can be devastating—ranging from identity theft and financial loss to damaged reputations and interrupted operations. Even basic commands like ping , which are used for network troubleshooting, can be misused by attackers. For example, a ping flood or ping of death attack overwhelms a system with traffic, causing it to slow down or crash. This shows how tools meant for diagnosis can also be exploited as weapons. Two of the most common threats today are phishing and ransomware . Phishing is a form of social engineering where attackers impersonate trusted sources to trick users into revealing login credentials or sensitive information. Systems are vulnerable because attackers exp...
Posts
- Get link
- X
- Other Apps
Blog Post #5 – Computers in the Workplace Title: Computers in the Fitness Industry: Present and Future Computers play an essential role in the modern fitness industry, transforming how trainers, gyms, and clients interact. From scheduling sessions to tracking progress, computers and mobile devices have become the backbone of fitness operations. Gym management software handles memberships, billing, and scheduling, while wearable devices collect data on heart rate, steps, and calories burned. Trainers and clients both rely on apps and online platforms to monitor performance, set goals, and adjust workout plans. Computer literacy is crucial for employees in this industry. Trainers need to know how to use fitness tracking platforms, analyze data from apps, and communicate with clients online. Administrative staff must manage customer information, handle online payments, and ensure secure handling of data. Even marketing in the fitness world now relies heavily on computer skills, ...
- Get link
- X
- Other Apps
Blog Post #4 – Traveling Through a Network Title: Traveling Through a Network: Understanding Ping and Traceroute When we send information across the internet, data is broken into small units called packets. Each packet contains both the message and the addressing information that helps it reach its destination. These packets pass through multiple routers and servers, hopping across networks until they arrive at the target device. Tools like ping and traceroute make this process visible, showing us how data travels and where issues may occur. The ping command tests connectivity by sending packets to a destination and measuring how long it takes to receive a reply. It provides the roundtrip time (RTT) in milliseconds. In my tests, pinging a website hosted nearby returned much faster results than pinging one located across the country. This confirmed that geographical distance often increases latency. The traceroute command goes a step further by mapping each “hop” along t...
- Get link
- X
- Other Apps
Blog Post #3 – Documenting a Day Title: A Day in the Life of Applications: Word, Excel, PowerPoint, and Databases As part of my course work, I had the chance to use four different types of applications—word processors, spreadsheets, presentation tools, and databases—to complete a variety of tasks. Each one offered unique strengths, but also came with some limitations. The word processor (Microsoft Word) was the most familiar. It made journaling easy with formatting tools that allow for clear structure, spelling checks, and quick editing. The advantage is its flexibility for writing tasks, though it is not efficient for handling large sets of numbers or data. The spreadsheet (Excel) stood out for its ability to calculate and analyze information quickly. By entering formulas, I could manage percentages and data in ways that a word processor cannot. Its biggest advantage is automation and accuracy, though for beginners, the functions can feel overwhelming. The presentation a...
- Get link
- X
- Other Apps
Blog Post #2 – Web/Mobile App Critique Title: Robinhood App Review: Usability, Design, and Functionality Robinhood is one of the most popular mobile trading platforms, allowing users to buy and sell stocks, ETFs, options, and cryptocurrencies. Its appeal comes from its sleek interface and commission-free trades, which opened the door to investing for many people who might not have tried it otherwise. From a usability standpoint, Robinhood is designed with beginners in mind. The app is intuitive, with simple buy/sell buttons and an easy-to-read portfolio dashboard. The navigation tabs at the bottom make it simple to switch between markets, watchlists, and account settings. In terms of design , Robinhood uses clean visuals, minimalistic colors, and smooth animations that make the user experience engaging. The charts are interactive, allowing quick analysis of price movements, though they are fairly basic compared to professional trading platforms. The functionality of the a...
- Get link
- X
- Other Apps
Blog Post #1 – Programming Languages Title: Learning to Program: My Experience with Scratch and Beyond When I first began programming with Scratch, I quickly realized that coding is not just about typing commands into a computer—it’s about learning to think logically and creatively at the same time. Scratch made it easy to visualize how programs run because every command is represented by colorful blocks that snap together like puzzle pieces. This gave me a clear sense of how instructions are ordered and executed, which was especially helpful as a beginner. One challenge I faced while creating my project was figuring out how to control movement and timing. At first, my animations didn’t run smoothly, but by experimenting with loops and timing blocks, I was able to refine the flow. This problem-solving process helped me gain confidence in debugging and taught me that trial and error is a natural part of programming. Through this exercise, I learned that Scratch is very differ...
The fundamental elements of information technology form the basis of cybersecurity which protects people and organizations and governments from cyber threats.
- Get link
- X
- Other Apps
Blog Post #7 Introduction Information technology has established cybersecurity as its most vital domain because it defends people and organizations and governments against escalating cyber threats. Data protection and system security have emerged as essential priorities because the world continues its digital transformation. The practice of cybersecurity extends beyond basic security tools because it depends on fundamental IT principles which include hardware systems and programming languages and database management and network infrastructure. The fundamental elements of information technology serve as the foundation for cybersecurity which this article demonstrates through its analysis of these essential components. Connection to IT Fundamentals The fundamental knowledge of IT serves as the foundation which cybersecurity professionals use to develop their work. System protection requires complete knowledge of computer operations and data processing methods and worldwide netwo...