Posts

Tech Topic Connections

Applications are essential to making computers work, from helping keep data organized to helping us communicate through shared documents. Even the settings are accessed through apps. Applications have many types and can be defined through multiple categories. The three major ones are productivity, collaboration, and business. Productivity applications help with daily tasks such as Word or Excel. Collaboration applications bring users together, such as emails or Zoom. Business applications like stock trading or accounting apps help keep businesses on track. These applications are becoming more and more common in many industries. Doctors and specialists can easily communicate the best way to treat a patient within minutes. In education, obtaining a degree is more flexible with online classes because web browsers are also applications. In financing, banking services and stock markets are made more accessible and can be accessed anywhere due to Applications. As computers advance, so will t

Network Security

Computers are very vulnerable to many different kinds of threats. I will be focusing on phishing and password-cracking threats. A phishing threat is an email scam trying to get the user to provide sensitive information such as passwords or social security numbers so the scammer can either use themselves or sell that information to other scammers. Some of the best ways to identify phishing emails are to first look for spelling errors, see if the greeting is generic, and see if there are any ties to the company, such as accounts or services. If you need clarification on whether an email is legit, always contact the company through their official website and not through the contact information within the email. The other threat that can compromise a computer is password cracking. Password cracking can take many forms; the first is by brute force, which means the hacker keeps plugging inconceivable combinations of characters in order to guess the right ones in the correct order. Another is

Computers in the Workplace

Image
 Technology has helped accounting move forward, such as introducing artificial intelligence and the cloud. Instead of wasting hours upon hours performing tedious tasks such as data entry or multi-comparisons, also known as the grunt work, AI can run a simple computer program to generate the data quicker while reducing human error. Cloud technology allows accountants to work anywhere rather than in an office. Many believe that with advancing technology, accounting will be a thing of the past. Instead, accounting has adapted to technological advancements to increase transparency and creativity. Now, it has almost become a requirement that accountants have some knowledge of computer applications and can work with them extensively. The two main ones are Excel and Word. As technology advances, we can look at what accounting may be like in 10 years. It can really be hard to say, but it really depends on what company you look at. John Daly (2018) talks about two books written by Jim Collins c

Traveling Through a Network

Image
 My experience using the ping and traceroute commands was enjoyable. Packets travel through the network by communication links. When comparing the ping and traceroute results from each website, we can see how they differ from one another. First, let's look at google.com. The ping shows that out of the four packets that were sent, all four were received, and it displays how long each packet took to make the round trip. It also displays all four packets' minimum, maximum, and range. The traceroute shows the path the packet took, indicated by the first set of numbers in the first column, meaning it passed through 12 different routers to reach its destination because the first set is the home router. The last set is the destination router. We also see three other columns representing the packets sent out simultaneously, and the last column shows the router it passed through. Now, we can use this information to assess the other two websites. All four pings were lost with the France

Documenting a Day

 I will reflect on using three applications: Word, Excel, and PowerPoint. I will define each of the advantages and disadvantages of certain situations. I will also be providing some functions that may be useful when it comes to professional usage.  First, we will start with Word. Word is great for writing up memos or procedures. Adding bullet points is a great way to keep things organized and neat. Making essential words and phrases bold or italicized makes them more noticeable. Using this application as a primary source for a meeting would be ill-advised because there would be too much information to read through. It would be better to use it as a second source, such as a printout of the main points. PowerPoint is a better meeting application because you can highlight the main points. With PowerPoint, you can add graphs to support your points and add a crisp, clean look to your presentation. Adding too many slides can cause the opposite effect, making your presentation feel clustere

Web/Mobile App Critique

Image
 Pandora is an audio streaming service that provides music and podcasts. You can listen for free or pay a subscription. The free version offers personalized stations and looking-up songs, which are provided with an ad or two. Pandora offers two subscriptions, $4.99 per month and $10.99 per month. The first subscription gives ad-free stations and unlimited skips. The second subscription has the same benefits as the first but adds making and sharing playlists.  Usability: Pandora's usability is relatively easy. Once installed, log in or create an account and start listening.    You can browse to look for stations or artists you like. If you like a song, give a thumbs up to it, and you will get songs based on that recommendation.   If you don't like a song, click the thumbs down, and you won't hear that song again on that station. If you want to know more about the song, artist, or album, tapping the arrow up will give you more information, like the lyrics and background of th

Programming Languages

 Many programmers see programming as a secret language, and there are many ways to view it. There is machine language, which is mainly used for electricity, instructs here the 0s and 1s must go in order, for example, when turning off and on a switch. Then, there is the assembly language that turns machine language into textual language so we can understand it better. We will be looking at my experience with a website named Scratch and how that programming differed from the ones explained in our textbook. My experience with Scratch was pretty good once I got the hang of it . My main difficulty was trying to get the blocks to achieve what I wanted. With some trial and error, I achieved what I wanted them to do. The insight I gained was how difficult it can be to create an animated story and to make it coherent. When comparing my insight from Scratch to my insight into participation activities in the textbook, I enjoyed Scratch a lot more than I did the activities. I also understood more