Monday, 23 March 2020

Tech Topic Connection


During my time in this course, I was asked to pick a topic from a list of topics in which I would like to further my knowledge on. The topic that I chose was “Network Security”. My reason for choosing this topic is the fact that upon completing my bachelor’s degree, I would like to focus on cyber security. Securing the network is ultimately what I would like to do. It’s my way of continuing to serve and protect my countries network from cyber attacks from what I can best describe as “the enemy”. Which may be attempting to gain access to our network to use information against us maliciously or simply be trying to gain for other reasons.
The information that I learned throughout this course in essential to the start of my journey as I have learned the basics of how computers operate. To understand protecting the network one must first understand how the network operates. In addition, I also learned some of the basic ways that one will attempt to gain access to your own personal network. Such as phishing, password crackers, viruses, etc.
In the case of network security, a “hacker” can use programming languages to gain access to networks. Creating algorithms of program languages to sneak into a network. Doing this a hacker can gain access to your own personal bank accounts, photos within your computer, access any or all of your social media platforms, and so much more. A hacker is only limited by there own level of skill or imagination.
When it comes to software, I learned that when your device pops up with a software update, it’s important to download the update. Outdated software is one way to allow your network to be vulnerable to an attack. I personally use to wait to update my devices because I thought that downloading updates right away would have glitches and cause issues for your device. However, through this course I have learned that that’s a possibility but not always the case. Software updates are to protect your device as well as your network.
In closing I have learned the basics of information technology and have payed particular attention the network security section within the text. With all the information I have learned regarding the basics of network security, I am more knowledgeable on ways to better protect my own personal network and look forward to learning more advanced ways to not only my own network/devices but the networks within the private sectors.

Thursday, 19 March 2020

Network Security

In today’s world where technological advances are constantly changing and improving our way of life; they can also be quiet damaging. Just about everything that we use has some form of technology and/or uses the internet, connecting all our information and allowing us to easily transition from one piece of equipment to another. For this reason, it’s imperative that everyone understands ways to protect their network. By doing so, a security breach of your network can be avoided. According to our text, “a security breach is a case of unauthorized computer access” (Vahid, F., & Lysecky, S., 2017).

I will be touching on a couple of topics within network security such as security holes/vulnerabilities and computer viruses. I will be discussing the vulnerabilities of each, symptoms and damages of each, and some recommendations to help protect your network. Security holes are ways that an intruder will use to gain access to your computer. One way that unauthorized users accomplish this is by passing through security holes in OS’s; specifically, outdated OS’s. The effects of this are that an unauthorized user can access personal information, gain access to all accounts, and even have access to all photos; using them however they see fit. If your computer has a computer virus then it’s considered infected. Which means a person has gained access to your computer without permission. In doing so, the uninvited guests can steal information such as credit card numbers, credit card information, or just completing damaging your computer from the inside out.

Ways that you can protect your computer system as well as network from security holes/vulnerabilities and computer viruses are simple. Security holes can be protected against by paying attention to for OS updates. OS updates are to fill those security holes/vulnerabilities to keep intruders out of your computer systems. Computer viruses can be protected against by purchasing antivirus software and by not clicking unknown emails. Computer viruses are typically spread through emails but can be distributed other ways as well.

We have covered the impacts and effects, symptoms of, and some protective measures against security holes/vulnerabilities and computer viruses. In short, will everything we use today having access or requiring access to the internet it’s imperative that securing your network be a priority.

References:

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

Traveling Through a Network

 
 
Using the “ping” command sends information packets through the network to a specific internet protocol address requesting a response back. The ping command can be used as a troubleshooting tool because if there’s an issue with the internet or with the website/IP address being pinged then that’ll let you know where to start troubleshooting. If you receive a response back, then that tells you that the internet is operating as it should and that you are able to reach out to the opposite destination. When you ping an IP address/website and its successful then a report will generate, showing the number of packets sent, received, and/or lost. If the ping is unable to reach the destination after a certain amount of time, then the ping will timeout.

A traceroute will list out the routers that the packets have taken to reach the destination. A traceroute will trace up to 30 hops per request. If the traceroute cannot make to the destination, then the traceroute will show exactly where the packets got held up at. Of the three websites that I performed traceroutes on (google.com, yahoo.co.jp, bland.is) the one the in Japan had the most hops (22), while google.com had the least number of hops (12). However, the website in Iceland (bland.is) had 15 hops, the traceroute was completed with zero timeouts.

Documenting a Day


The applications that I will be discussing are Microsoft Word, Microsoft Excel, Microsoft PowerPoint, and Microsoft Access. Each of which has its own set of advantages and uses.
Now a similarity amongst all the applications of discussion is the fact that you can manipulate the text font, text size, and font style (bold, italics, and/or underlined). Using Microsoft Word, you can format your text to create a document such as an official letter, a journal entry, and/or a memo for work.  Microsoft Excel is an application that allows you to create spreadsheets. Spreadsheets are good to have to manage and keep track of information. In the military we use them for just about everything. The best part about excel is if you learn the proper formulas, all you need to do is input the information and it’ll automatically calculate stuff for you. The disadvantage to excel is if you don’t know the formulas or at least the correct one for your needs; you are stuck trying to calculate information to hard and old fashion way. Microsoft PowerPoint is an awesome application to use when presenting something to a group. By adding a few photos, texts, and animations the slideshow can be very interesting. Another great thing about PowerPoint is the fact that there are many themes that you can use if you aren’t the creative type. The last application is the Microsoft Access application. Access is a database application that enables you to store and calculate anything you choose over a period. It’s an application that I would say is good for businesses to manage inventory and calculate revenue. In my opinion the disadvantage to Access is that I found it difficult to operate. I think that excel can produce similar results and it’s easier to use. The application that I found most beneficial for my “A Day in My Life” assignment was Word and PowerPoint. Word because I was able to explain why I do that event. I was able to stress the importance of each. PowerPoint because I was able to illustrate the events I did throughout that day. Showing illustrations over just sending words can create a different outlook on the event.
All in all, I truly enjoyed learning and working with the applications. I have my specific applications that are my go-to; mainly because I’m very familiar with them. Those would be Word, Excel, and PowerPoint applications.

Web/Mobile App Critique



A mobile app that I am fairly familiar with and will be focusing on is “JEFIT”. JEFIT is known as a weight-lifting routine tracker, but it can do so much more than that. With JEFIT you can search for workout routines that may fit within your fitness goals, you can create custom routines to fit your individual needs, there are 1300+ exercises stored in the database, provides motivation by letting you know when you have hit a new personal record, have detailed instructions of every exercise within its exercise database, and there’s the availability of sharing your completed workouts with friends to hold each other accountable and keep the motivation high. The mobile app can do that and so much more. The overall usability and design of the mobile app is great. Very simple to navigate through, account setup, maintaining info, and uploading progress photo’s (if you choose to). Once you setup your account it's really easy to navigate your way through the app. 


In the screenshot above you see all of the 1300+ exercises that the app has stored in it's database. You can view them based on the actual part of the body that will be used during the workout or you are able to see every exercise. This is how you would put your own routine together or there are plenty of routines that you can choose from. The screenshot below is an example of the routines that can be chosen.

Now although this is a great app to use there are a few things that I feel may make the app better. First being that I think that a web app should be created for this app. I understand that most people do most things from there smartphones, however in order to change the repetition range for the exercises you need to change it on every exercise, for every single day. It's very time consuming and tough to do on a smartphone. Coincidentally, that is also another recommendation that I have for the app. Maybe preset repetition ranges based on your goals. For example, if you wanted to gain weight your rep range may be between 6-8 reps lifting heavy weights. If you wanted to lose weight your rep range my be between 15-20 reps lighting light weights.




As you can see in the above screenshot you can track your body stats. Progress on body parts based on the goals you have set for yourself. That's great if you are truly into measuring all those body stats. One thing that I think could set this app over the edge is if they incorporate a calorie tracker or some sort of food tracker. In my opinion that would make this app a one stop shop. Instead of having multiple apps for trackers.

So that is my review of the mobile app called "JEFIT". Overall a good app for tracking workout routines (whether created or found within the app) but in my opinion can potentially be better with the small recommendations that I made suggested.

Programming Languages

https://scratch.mit.edu/projects/370725425/

First let me start by discussing my experience in using Scratch. Overall, I can say that the program is a very good one. At first, I was completely lost and honestly didn’t know where to begin. After reviewing the “Getting Started Guide” and some of the tutorials, I just jumped right in and started going at it. I will say that I have gained a newfound respect for programmers. Now the tutorials assisted me in creating my story, but I still ran into a few challenges.
The challenges I came across were figuring out the timing through when the characters were having conversations as well as when transitioning to a new location. I overcame that figuring out how to calculate the times throughout the conversations and also with the help of my son who has used Scratch a little bit in the coding club at his school. I also ran into the of trying to make the characters face and walk in certain directions. I haven’t quite cracked that one yet, but I am most certainly determined to with some time.
The insight I gained from using Scratch was very interesting. As I stated earlier, I have developed a newfound respect for programmers. Initially programming doesn’t seem all that difficult but let me tell I’ve learned that it’s so much more to it than I thought. Calculating every step, every action, and timing the script for conversation are tough and has to be spot on in order for everything to be smooth. I’m sure that over time it gets easier but initially it’s not.
Learning the different programming languages was interesting as well. Prior to this I honestly thought there was only one. However, there is machine language, assembly language, and high-level language. Machine language is the language that the actual piece of equipment understands. Basically 0’s and 1’s! Assembly language is the human understandable language of 0’s and 1’s. Higher-level language is a programming language that has a bit more instruction included.
When programming first started, I feel as though machine language was an easier language to program. However, with the advancement in technology I think that assembly language is an easier programming language to master. Clearly it takes practice, but I think that it’s by far an easier language to understand and learn. I would say that the high-level language is most popular because you are able to provide detailed instruction for what you are trying to program. I would also say that that’s the language used to make video games, CPU’s in vehicles, smartphones, etc...
In conclusion I would have to say that even though I ran into some challenges operating on Scratch, I’m glad that I have the opportunity to create a story on it and I’m also looking forward to creating more stories or other animations using Scratch.

OS Theory Concept Map

  The operating system is one of the most critical parts of a computer system. A computer's operating system includes system software th...