Skip to main content

Posts

JAVA: Object-Oriented Programming Concepts

As a technical professional, it's crucial not only to possess the ability to work with programming languages like Java but also to effectively communicate complex concepts in a way that resonates with both technical and non-technical audiences. Let’s explore Java installation briefly and dive into the core principles of object-oriented programming (OOP) that form the backbone of Java development. Java Installation: Setting the Foundation To begin working with Java, the first step is to ensure that the Java Development Kit (JDK) is properly installed on your machine. The JDK includes everything needed to compile and run Java applications. While I won’t walk through every step here, I recommend referring to official documentation or trusted guides for detailed installation instructions.      To download JDK 23, follow the address below: https://www.oracle.com/java/technologies/downloads/?er=221886     I nstallation instruction can be found here: https://docs.oracle.com/en/java/j
Recent posts

Operating System Theory and Concept Map

Operating systems (OS) carry out various crucial functions that enable computers to operate efficiently and act as an interface between hardware and software. The major functions of an OS can be categorized into several key areas. Process management is one of the core functions, where the OS is responsible for creating, scheduling, and terminating processes, ensuring that multiple programs can run simultaneously without conflicts. Memory management ensures that each process has enough memory to execute properly while optimizing available physical and virtual memory to prevent crashes or slowdowns. File system management handles the creation, deletion, reading, and writing of files on various storage devices while maintaining security and organization. Device management ensures smooth communication between hardware components like printers, hard drives, and USB devices by using device drivers. Finally, security and access control protect the system's resources, enforcing rules about

Post 7: Tech Topic Connection

  Network agriculture was an interest of mine since starting my Information Technology degree. I learned how network agriculture is how we can connect to people around the world. The communication infrastructure plays a huge role in how fast and effective we can connect to one another. I learned this when I first executed a Ping command and a Tracert. The command prompt software allowed me to trace a connection route and analyze the health of the connection. This is all possible due to the infrastructure set in place between to computers. The ultimate goal of network architecture is to support application without any packet drops (Conran, 2017). The vast amount of information that is sent over the network it is important to make sure that the infrastructure is capable of handling the load with error.      The fundamental structure of the internet was established in 1973 by Vint Cerf. Cerf wrote the protocol that TCP/IP which describes the basic structure of the internet, and it made

NETWORK SECURITY

  Ping Commands' primary use is to test various points in network connectivity. Unfortunately, the ping command can be used to attack a network or website. These attacks are often called Denial of Service (DoS), which overloads a web server by sending too many ping requests. DoS attacks can slow down the web server, even causing it to crash (Guru99.com, 2020). These attacks work because the ping command requires sending small packets of information out to an IP address, which sends a response back. When thousands of ping commands are sent to one IP address or a web server, it causes it to slow down or crash due to the vast amount of bandwidth needed to process the packets being sent. A computer virus is a malicious software that infects the computer to spread to other networks and computers. Symptoms of a computer virus may vary based on the type of virus. However, common symptoms are unusually slow performance, frequent crashes, unknown programs, and mass emails being sent from

COMPUTERS IN THE WORKPLACE

 The industry I have chosen to discuss is the military industry. Computers play an essential role in the military. We live in a digital age, and the military adopts certain technologies that can help in any way possible. First, the military is no exception to the world's current state, where people must communicate while respecting social distancing. We currently use Microsoft Teams to conduct our mandatory meetings. Many are teleworking and use multiple apps to stay on top of their tasks. Secondly, the military has been moving towards the unmanned type of warfare vehicles. For example, we have unmanned drones that fly using computers to keep military members away from danger. Some of these drones are even controlled by Xbox controllers (Wired, 2008). The military will continue to adapt technology to prevents loss of life. It is essential to be computer literate because as technology advances, so does the military's technology. It may take some time to incorporate brand new tec

TRAVELING THROUGH A NETWORK

  This was my first experience using a command prompt to ping an traceroute and IP address. I learned a lot and found it interesting to track a packet as it travels through the internet. Even more interesting, the ping and Tracert command have various options to change how the command is ran. The packet travels through the network by a series of hops until it arrives at its destination. Each 'hop' represents a host that the packet travels through before the destination host. I ran a Ping command to three different websites. I was surprised to find out that the website located on Japan servers resulted in the fast round trip time at an average of 9ms. The Google website, as well as the Australian website, took 55ms and 69ms, respectively. No website resulted in any packet loss.  While trying to find websites to ping, I noticed that government websites resulted in 100 percent packet loss. I thought something was wrong at first until I choose a different website. I believe this ma

DOCUMENTING A DAY

  In this week’s assignment, I was instructed to uses three different software applications to document my day in my life. The three software programs were Microsoft Word, Excel, and PowerPoint. All three applications serve a different purpose, which is apparent after this week’s assignment. Word is an excellent application for writing out the text. Excel is great for inputting data and charts into a spreadsheet. PowerPoint is used to create a presentation a slide at a time, and it has a wide range of tools to help you do so. I believe it is essential to understand which application to choose to complete your task effectively.                     The advantages of Word are that it is practically universal and can be used to transcribe text quickly. It is an easy way to save text for later, and your document can provide easy travel via email or the cloud service. Excel is a great application that gives the user the ability to analyze large amounts of data. The ability to format cells