Posts

Newbie to Newbie: Applying Algorithmic Design and Data Structure Techniques

  Understanding Algorithmic Design and Data Structure Techniques Before you decide to apply algorithmic designs to your programs, it is vital that you understand what it is you are applying and how different techniques and designs will affect your programs. Algorithmic Designs are essentially the building blocks of an application and create a pathway to solutions and problem-solving in software development. It is important to know the fundamentals of what makes algorithmic designs and data structure techniques. An algorithmic design is created with the intent to solve a particular problem that has been introduced via a number of steps.   Better than Others? Some algorithms and data structures will be better implemented depending on the situation or issues introduced. There are a few classifications to keep in mind when choosing which design and technique you are looking for. These classifications are as follows: Organization: Due to the complex nature of algorithms, ...

Java: Written for Beginners by a Beginner

Image
Greetings fellow newbies! I've written the following post in hopes of providing help and guidance within the world of Java through my own experiences. Below I have included some exposition of my own experience with learning new programming languages and how I have navigated the trials and tribulations that come with it. Before we begin, please navigate to the following website through the link provided and go to the "Getting Started" tab. This will help you to install Java with simple instructions. JAVA Tutorials https://docs.oracle.com/javase/tutorial/index.html      If you have previously dipped your toes into the world of programming languages, you have most likely heard the term "Hello World!". This is the first program you will ever complete as a beginner in any language. It is a simple, educational instruction for whatever language you are currently focused on and introduces the basics of your selected language.         While first learning Java,...

Post # 7 - Tech Topic Connection

  My Tech Topics will be Network Security and Privacy and how these two concepts coincide with one another in a multitude of ways. My current career has progressed within a team that considers cyber security to be of utmost importance. This is especially prevalent in the current world, as technology continues to grow and expand in many ways. With this progression comes just as much opportunity for malicious attacks and the misuse of confidential information. Keeping member information secure and confidential is essential to the job roles within a business. There is an expectation made when members decide to utilize certain services, and these expectations extend to the secure and responsible use of their information. One thing that if prevalent in this course is how technology has evolved over time and continues to do so. Just as security and privacy progress into more impressive standards, the same is being done simultaneously with those who wish to break through these security ...

Post #6 - Network Security

Information and System Security is a necessity when utilizing a computer on both personal and professional levels. A common type and most well-known type of ping attack is a DoS or Denial of Service attack. This attack will attempt to destabilize any type of firewall and ultimately crash a computer's service or freeze existing actions. This can be done with a single ping command that contains an oversized/malformed packet. This is otherwise known as a Ping of Death. In addition to the discussion on ping attacks, I will be discussing the dangers of email spam and phishing attempts. Any person who utilizes an email will have spam that comes through. Many of these spam emails will be filtered by a spam identification program but it is never 100% reliable. There is always a danger of misinterpreting a spam email as something more innocent. It is important to understand when these emails are attempting to bait you into giving up important information. This is also known as phishing, whi...

Post #5 - Computers in the Workplace

  I will be choosing the mortgage industry considering I have been a part of it for a couple years now. Within this industry, there are a multitude of departments that utilize computers in differing ways. My team works closely with Underwriters, who utilize Excel, encompass, and DNA, among other applications that allow them to determine and calculate a borrower's income. This determination helps the credit union to decide whether to approve an individual for the loan amount they have requested. There are other calculations that can be done regarding a borrower's debt versus their income. This is called a Debt to Income ratio, or DTI, and it is the ultimate deciding factor. If a DTI is over 50%, there are choices that can be made and changes a borrower can provide that will lower their ratio, like signing a car loan over to another party or paying off a credit card with outstanding debt. Within my team specifically, I have mentioned before how we are utilizing computer-built BOT...

Post #4 - Traveling Through a Network

Image
     For this activity, we performed pings and traceroutes utilizing our own computers. This type of action can help with internet connectivity and diagnosing whether an internet connection is strong enough. These types of commands are commonly used to troubleshoot these problems. Pings help to detect the connectivity of a device that is using a particular network. Traceroutes "trace" that connection and determine the path on the way to the destination. Ping Activity: The ping activity for my below screenshot is as follows:  Every ping had these package results; 4 sent, 4 received, and none lost. Google.com had an average speed of 18ms Google.jp had an average speed of 45ms Google.cn had an average speed of 24ms Traceroute Activity: The Traceroute activity for my below screenshot is as follows: Google.com has a total of 2 requests that resulted in unsuccessful hops. There were a total of 13 routers but only 11 of them had successful hops. The speed mirrors our ping t...

Post #3 - Documenting a Day

     First and foremost, this assignment opened my eyes to how monotonous my daily routine can be. I am a stranger to journaling considering I would much rather read about others' lives in books than document my own. In terms of utilizing these different applications, including Word, Excel, and PowerPoint, I came to appreciate the practice.      Starting with Microsoft Word and its advantages, there has always been a preference to use Word over Google Docs. For me, this is purely due to the formatting experience and use of Tools. I often use Google Docs over Word because of the autosave function and never having to worry if something I have just written is actually saved properly. Still, I find myself utilizing Word for class assignments. Word is perfect for journal entries as well as research papers because of the extensive formatting options and ease of use. PowerPoint is another great application but is much better utilized on a visual level. The possibi...