Posts

Post #7- Data Analytics

     Welcome to this published post and please enjoy and respond to any questions that may come up in your head? Data analytics is newer than some of the other IT positions you may see on job boards. It is gaining popularity and the pay scale is high enough to motivate yourself to learn. Data analytics  is the process of analyzing raw data to find trends and answer questions. It has a broad scope across the field. This process includes many different techniques and goals that can shift from industry to industry (Master's in Data Science).       This tech topic correlates to the class at UAGC called TEC101 for the large scope of reading material the class provides. A testout book regarding IT fundamentals and a comprehensive, 11-chapter, Zybooks digital textbook that covers everything from the history of hardware and software to ip addresses and the way to ping them using a command prompt. The class material covers some data as well that can be ass...

Post #1- Programming Languages

Image
  Scratch is a visu al programming language and an online community developed by the MIT Media Lab (Lenovo). When I first started adding blocks from the wide range of topics in the left pane, I did not see any changes being made in the right pane with the cat. It was not until I started clicking on each block after having   attached to another block, where the cat would make programmable changes. I heard the cat meow, move from one side to the screen to the other, move to the left and right, and rotate clockwise. It was very interesting to learn when you add an input you will see changes in the output. There are many languages in programming. The last chapter (2.11) ends with introducing a popular language called Python. Most programmers should learn it and many other fields like Cyber security recommend people to learn it. Also, the textbook in Zybooks includes hyperlinks to css, html5, c#, and c++. These are the main ones and there are many more. I believe the easiest was th...

Post #2- Web/Mobile App Critique

Image
  this is going to be about MyFitnessPal. Another well known diet and calorie tracker is Chronometer, but for all intensive purpose and because most of my experience comes with utilizing this app for the last decade on and off and most consistently the last two years. I took a screenshot of a random day with mainly my breakfast choices. I also included another screenshot for the minimum and decided to not add more despite taking more and having them in my file folder. These were shots of a graph with macros and more statistical breakdown of steps, calories needed for the day, and calories consumed. I like Mariana's way of attaching many screenshots via pngs, but this will do for now. Anyone may use it, but it is most popular amongst individuals who are regular exercisers and whom want to make progress towards nutritional goals and body composition goals. The screenshots depict the website version and mainly use the app through my mobile. The mobile one is more user-friendly because...

Post #3- Documenting the Day

Image
  I believe identifying a target audience for a blog is very important and should be the groundwork for a new blogger like myself. This audience should be a specific group of people you are writing to each time a published article goes on the internet or social media for viewing. My greatest interest is exercise and clean eating so that should be my target audience. The fact is that this is geared more to the technology side. My number one goal is to research as much about technology through the subcategories of popular news sites like Fox and NBC and also read as much on TLDR as possible and then target an audience related to the most important topics you deem necessary to gain traction. There are a lot more to choose from as well. Below, 15 industry experts from  Forbes Technology Council  share layperson-friendly resources they recommend for accurate, up-to-date—and easy to understand—news on tech developments (Forbes Expert Panel).      In my res...

Post #4- Traveling Through a Network

  I pinged and tracerouted  www.google.com  to a ,  www.ups.ch , and  www.alibaba.ch . . The ping command verifies whether a host is reachable at a specific IP address by sending ICMP echo request packets and awaiting a response. Traceroute displays the route taken by packets to reach their destination, providing information about each hop along the path. After pinging the three sites and tracerouting them as well, I was able to collect a lot of information about them. Google had the fastest ping of the three and that is because of the popularity and how often Google is visited on a daily basis and its all around exposure. All 4 packets were sent and received and none were lost on the ICMP ping request. Minimum round trip was 16ms and maximum was 26ms. The UPS.ch ping took much longer and had a time to live of 46. This one had a minimum round trip of 236ms and a max of 247ms, but no data was lost. Finally, the Alibaba.ch ping was in he middle of the three. All p...

Post #5- Computers in the Workplace

Image
  I work for one of the sister companies at Cencora. Cencora is a giant pharmaceutical organization that you can search on the fortune 100 and they have four or more subsidiaries that they oversee. This company was founded in 2001, which would make it around the same time as the dotcom boom. Almost all jobs involve some computer use in 2024 and it will only increase in use. Just like our text book describes running out of Ipv4 addresses after 4.3 billion. I do not go a day without using their technologies. I punch in on their company-provided phone through Workday, sign onto the Geotab app for electronic logging since I am a cdl driver. The main app I utilize for recoveries at airlines and pharma companies is called Dash. This app is constantly asking me to update it using the in-tune app. Not to mention, I have to take pictures of invoices, house way bills, airline paperwork, and physical boxes themselves. I could not imagine a day without the use of technology in this place. The ...

Post #6-Network Security

Image
  Pings can be used to do a ping of death. The ping of death is a denial-of-service (DoS) attack that occurs when an attacker crashes or freezes a computer by targeting them with oversized data packets. Another common attack is an ICMP flood attack which is another DoS attack where the attacker sends a large number of ICMP packets to overwhelm the victim’s computer. The first threat that I will be mentioning is email spam. It is a type of unsolicited communication that is sent in a large volume. They can be annoying and can contain malicious links. Computers are vulnerable to this threat because of the way people often communicate in the modern world. Then those attackers see a way to exploit since so many people are online emailing. One thing we can do is to use spam detection to help minimize these threats. “Spam  detection compares the non- spam  and  spam   emails , which will help to avoid the  spam   mail  from receiving into the user's inb...