Wednesday, April 13, 2022

Algorithms and Data Structures

 

        

        How to apply algorithmic design and data structure techniques in developing structured programs is solved by finding which one is needed for the specific problem that is being solved because there are a lot of different ones. 

    An example of this is if elements have greater value or lesser value the element has to be searched and the binary tree has to be used and stack or queue is not.

    But there are data structures that can be used that will make it less space to store if it is needed to not take up much space. This will be useful if there is only a limited number of spaces given to use up.

     Are some algorithms and data structure designs better than others?

    Every program has specifics they need to run off of. So before it's figured out which one is better come up with a design strategy. It can be figured out with this design strategy what's the better one for the program you are making. Choosing between the top-down or bottom-up approach is the right way to apply which one is needed. Make sure not to forget to take the execution time in the process of deciding how much it will be to store it because these are important in choosing which ones will be best to use.


Thursday, March 17, 2022

Java Installation and Concepts of Object-Orientated Design Principle's

 

    Java is a high-level object-orientated programing language it was made by the company Oracle. It was designed so programmers can write the code one time and use it on any platform that has java without having to recompile. 

When I installed Java I found a really good tutorial that helped me:

https://java.com/en/download/help/download_options.html

Also, there is a good tutorial to help with making the Hello World program its a good first program to make in java. Since I used the IDE Apache NetBeans 13 I used this tutorial and I recommend using Apache NetBeans 13 as your IDE but also there are many different kinds. If you want to use It I provided the link below along with the tutorial to install. 

https://netbeans.apache.org/download/index.html

https://docs.oracle.com/javase/tutorial/getStarted/cupojava/netbeans.html

Object-oriented design is a computer programing model that has software design around data or objects. The object can have different behaviors and attributes. 

There are four major principles of object-orientated design :

1. Encapsulation: It is when an object keeps private inside a class. Other objects don't have access to it because it's private they only call a list of public functions. 

2. Abstraction: is the development of classes, objects, types like their function. 

3. Inheritance: Since in object-orientated design there are so many objects that are very similar they have to abstract the common knowledge and unique logic into separate classes this is inheritance.

4. Polymorphism: There are two kinds Compile time Polymorphism and run-time Polymorphism and the difference is the compile chooses which method will be excuted.When the code is made this is decided. 



Sunday, May 23, 2021

Tech Topic Connection

 


I like to learn more about program languages. They connect to the fundamentals of information technology that I learned in this course because if they didn’t exist they wouldn’t even have a computer to have information technology. The computer as a whole wouldn’t even be able to function to have any good or bad problems. We wouldn’t even be able to do anything. “When we push the "ON" button on a computer, a desktop, interface, and pull-down menus appear on the screen because several lines of code instruct it to. Moving the mouse and watching the cursor on the screen move correspondingly, opening, editing, and saving files”(Herbst,2004). Without program languages, the simplest of tasks couldn’t be done.

Like I said before computers can operate without the program languages it needs to read to complete functions so that things that need to be done on them can be. That the first computer programmer is the one that got it started that more stuff can be done on a computer. Her name is Ada Lovelace. She augmented the document with her own notes (named A - G), tripling the size of the original document. Note G detailed the steps to compute the Bernoulli numbers and is considered to be the first computer program (Vahid,2017). This is the history of computers and how they were created to do the things we do today. 

Computer languages rely on major hardware components and functions of a modern computer system because without it being modern it can be too old and it won't work because it's too old of software with everything getting newer outdated stuff cant use the programming language on certain computer tasks. 

It directly uses computer programs to put out what the user puts in. It helps take control of what the user puts in. It helps make programs do tasks that the user wants them to do. Application software relates to computer languages because they come hand in hand together without the programming language the user wouldn’t be able to run the application software.


Basic concepts of databases have to do with computer programs because when you execute a command on a computer, even saving a file requires the computer to have to write code to do it. Computer programs relate to database management because all the software to manage the computer is run by a computer program language. 


Network architecture influences program languages because it is built around them to let all the computer function and it has to be used so the system works. It influences management because to manage the computer you need the program languages. It influences security because the program languages are made in software so that it protects the computers better from viruses and other threats. 



References 


Herbst, C. (2004). Then and Now: Gender, Code and Literacy. Social Semiotics, 14(3), 335–348. https://doi-org.proxy-library.ashford.edu/10.1080/10350330408629683

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/









Thursday, May 20, 2021

Network Security

 Security information and systems is very important for individuals and companies since a lot of important information is stored online and there will always be someone trying to hack through systems and computers to steal this information. This may cause a lot of money being stolen and even identities stolen. Ping commands can be used to steal information because it shows the IP addresses the websites are using. This can lead to the website being hacked. Password hacking can be an easy thing to do if you make your passwords easy with birthdates and names of things instead of just using symbols which will make it harder to hack. Also email spam can do really bad damage if you download a file that can be a virus or spyware that can go through all your stored information on the computer without the user even knowing. When I did the ping command exercise I realized that it can make a hacker be able to hack websites easier because it gives the information what IP addresses the website is coming for to get to the computer the user is on. The thing is if they select the information on the server to be private you won't see the IP address it’s coming from and it makes it a little safer not saying all the way safe. Computer systems are vulnerable to passwords being hacked because a lot of people make easy passwords or write them down using multiple passwords that are the same for multiple devices, applications, and websites. The damage it can cause can be from just stealing your card information to stealing your whole identification. They can also get information like private photos, files, and videos. So it really is important to make sure to use a lot of symbols in your passwords or there is three-factor authentication. “To pass the authentication, the user must input a password and provide a pass code generated by the token (e.g., RSA SecureID), and scan The Network Security Paper 3 her biometric features (e.g., fingerprint or pupil). Three-factor authentication is a comprehensive defense mechanism against password stealing attacks, but it requires comparative high cost”(Kumari,2013). Use sites that have this to make sure your information is more secure. Also make your passwords have more symbols and don’t reuse the same passwords. Computer systems are vulnerable to email spam because they can have files with virus and spyware on them. It could be a long time before it's realized it's there until your computer doesn't work anymore with a virus. The spyware you won't even know it’s on there as it goes all through your computers files and looking at information. Over time there are more and more computer threats like viruses and spyware.”Many malware attacks use emails (e.g. Melissa, Love Bug); some others use self-propagating programs called (e.g. Code Red) and yet others use a combination of these two techniques (e.g. Nimda). In spite of developing more advanced antivirus software, new malware routinely get released over the Internet and continue to cause lost machine cycles and man hours”(Data,2005). The damage this can cause is that your computer runs slower, starts to run by it self, stops working completely, and your information thats personal getting out to people you don't know. To protect better not fully protect it but it’s better to have it is a computer program called anti virus software. “Antivirus software is a program that looks for known viruses and strives to disable found viruses, by searching a hard drive, and/or by monitoring visited websites and downloaded files. Some company websites, like drive.google.com, check for viruses on the server before providing a file for download”(Vahid,2017). Another one is to be cautious and to not click links or download files from emails you don’t know because it could be a threat. It’s better to be this way because nothing fully protects your computer from online threats. 

References 

Kumari, C. S., & Rani, M. D. (2013). Hacking resistance protocol for securing passwords using

personal device. 2013 7th International Conference on Intelligent Systems and Control

(ISCO), Intelligent Systems and Control (ISCO), 2013 7th International Conference On,

458–463. https://doi-org.proxy-library.ashford.edu/10.1109/ISCO.2013.6481198


Data, S., & Hui Wang. (2005). The effectiveness of vaccinations on the spread of email-borne

computer viruses. Canadian Conference on Electrical and Computer Engineering, 2005.,

Electrical and Computer Engineering, 2005. Canadian Conference on, Electrical and

Computer Engineering, 219–223.

https://doi-org.proxy-library.ashford.edu/10.1109/CCECE.2005.1556914


Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from

zybooks.zyante.com/

Computers in the Workplace

 I choose healthcare because it is very important to have computer skills in this field. There are so many medical files on computers now that if there was a breach at a hospital. Someone can get thousands and thousands of people's personal and medical information. In healthcare, they use computers to look up the patient medical information and to add any information to their files. They also have medical transcripts which their job is to make sure all the person's files are put together printed out and on the computer. They also print a lot of things and copy them for their records. They might print a lot to mail to their patients. They also started to have medical websites where the patients can see their appointments and medical records. Patients now can mail their doctor and make an appointment.  It's very important to know computers in this industry because they put every medical record in the computer now and they got to add things and change them constantly.

In the next 10 years, the healthcare industry is going to be doing everything that it can possibly do on the computer even ordering your prescription on websites so you can pick it up from the store or it mailed or delivered from the pharmacy. It's going to need more cybersecurity in the medical field because so many things are online and on a computer. We are all going to be checking into our appointments by computers. They already have this at my doctor's office.

Andrea

Sunday, May 16, 2021

Traveling Through a Network

 Hello Everyone,

When I took a ping of google.com I got 4 packets sent. Packets I received 4. Packets lost zero. The range of response speeds was minium: 32ms maximum 40ms the average was 34ms.  

Untitled.jpg

 

So I pinged a Japanese site this one https://www.atelier-aqua.jp/ (Links to an external site.) 

I got 4 packets sent. Packets I received 4. Packets lost zero. The range of response speeds was minium: 112ms maximum 115ms the average was 113ms.  

 

2.jpg  

 

I pinged a Germain site https://www.bild.de/  (Links to an external site.)

I got 4 packets sent. Packets I received 0. Packets lost 4. I had a 100% loss.

third.png  

 

google.com traceroute went through 15 routers and has over a maximum of 30 hops. It didn't fail before it reached its destination. 

  trace 1.png  

https://www.atelier-aqua.jp/ (Links to an external site.)  when I traceroute this site I that it went through 16 routers but the numbers 10, 11,14,15 the request timed out but all the other ones were there. The last one still reached its destination. It had over a maximum of 30 hops.

trace 2.jpg  

 

When I traceroute https://www.bild.de/  (Links to an external site.)

this site had 9 routers and over a maximum of 30 hops. It didn't fail before it reached its destination. 

 (Links to an external site.)trace 3.jpg  

 

As I talk about my experience with pinging and traceroute I see now how long it takes to ping amounts of data from a site and sites from a different country are hard to ping without request timing out unless they have a lot more routers. Just like the japan site 4 of the routers timed out but because they have more it didn't fail that much because it still has a lot that works. But the reason why the ping failed 100% of the time on the german site is that they only have nine routers and japan had 12 that worked. I think because japan has a lot of people they made more routers so it's easier to get to me. But both had problems more than google because the google that I traced is closer to me. But if I tried germans google or japan google it might not work.

The ping and traceroute commands can be used to troubleshoot internet connection problems because they show if someone else's router is messed up and it's not working because of them, not you. But they can do it for their site and see where the problem is coming from. Also, it shows how long it takes to get from router to router and if the IP addresses are working correctly to pass to your computer. A ping might turn back with a timed-out message because it cant reach or find the IP address that's connected to the site. Or your computer could have connection problems to the internet. Traceroute can come back with an error message because it can't find some or all of the routers to continue to their destination. Another problem can be that the router was taking down and it's still trying to connect to that one.

Andrea

Documenting a Day

Hello,

When I compare word with excel and powerpoint they all are tools to help do projects for school and work. But they are all different in what they do. Word is used to write a lot of things like papers or even used to write for books or newspapers. Excel is used to write very useful spreadsheets and you can calculate easily and the columns make it really neat to write the numbers and peoples names. It can be used for work where you want to show a graph and spreadsheet of numbers of something or workers. To just your everyday time, spend doing things like exercise. Powerpoint is used to create presentations for work or to show people something you like in a creative way.

The advantages of word is that you can correct spelling and you can edit your documents so there is the format you need like APA style.”A word processor typically has icons or menu items that allow a user to format text, such as bold, italics, or underline”(Vahid,2017). The disadvantages are if you don’t know how to work word you may have some issues with doing the format you need correctly. The advantages of using excel are that if you need to make a chart that's neat it will do it for you as long as you fill in the column right and you can also make a neat graph. The disadvantage is if you mess up with entering the numbers then the chart and the graph won’t be right because the graph and chart only goes off of what numbers you entered. The advantages of Powerpoint is that it will have many options to help you make really nice presentations with cool animations and ways that the stuff on the screen comes up. The disadvantages are you can make it so much that the people aren't paying attention to the slides or you can't read the text. You got to make it simple enough but interesting enough so it's easy to pay attention.

The best application for documenting your day would be word because you are writing a lot and when you do it’s the best application for it. It also would be good to use word if you're writing a blog entry or even an entry for a newspaper. It would be good to use excel if you're trying to document the time you use on everyday activities or even how much time you're on the computer each day. A good time to use the powerpoint world is when you're trying to explain something to your group about what's going to change for the month or to show who's going to be the new leader of the group.


Powerpoint presentation 



 

 

 

Word Journal Entry 

  1. I start by opening word and I must make the font times new roman.  

  1. must add page numbers, so I go to insert page numbers and click the one that says numbers on the top right. 


  1. I got to start with my reference page, so I must go to the top and click text alignment and click the middle one I type the name of the paper enter then type the class enter the teachers name enter then University of Arizona gobal campus enter then the date then I press enter till its center in the first page. 

  1. I then click on the page number and add the title of the paper to the left-hand upper side. 

  1. I then start writing my paper on the next page after my title page. 

  1. I start the first paragraph I first click enter so that my paper starts with an indent. 

  1. At the end of the paragraph, I click enter to go lower on the page to start another paragraph. 

  1. At the end of the paper, I go to another blank page and at the top I make the font bold and go to the top and click text alignment and click the middle. The I type References 

  1.  I then press enter and make sure I go back to text alignment and click the left-hand side. 

  1. I then start typing my references and I highlight each one then I click layout and go to the top right and click the three dots and click hanging indent and the first line of all the references will be hanging and then I am done with it, and I click download so I can upload it to waypoint.   


Spreadsheet




Andrea



 

Search This Blog

Followers

Contact Form

Name

Email *

Message *

Algorithms and Data Structures

                      How to apply algorithmic design and data structure techniques in developing structured programs is solved by finding w...