Posts

Post #7: Tech Topic Connection

 My selected tech topic was network security. Network security connects to the fundamentals of information technology covered in this course because it “involves protecting both the hardware and software technologies used within a computer network, to safeguard data, devices, and systems from unauthorized access and malicious activities.”  (ajith, 2024) In this course, we have learned about the hardware of computers, the different software that comes on computers, and the ways to protect personal data, secure devices, and the many ways that attackers try to access systems.  Network security relates to the history of computers and how computers operate, as the internet became available to the public, causing an increase in people’s personal information being available online. This gave criminals a way to steal data from individuals and government agencies via the web. With network security threats increasing exponentially, the demand for firewalls and antivirus programs a...

Post #2: A Day In My Life

  Most of my days are very routine, especially the days that I have to go to work. I chose to go over a day that is not so routine, my day off. My last day off was Friday, April 18, 2025. Although it was my day off, it was a very busy day. Here’s what took place over the course of my day: 1.      Hygiene: After waking up and getting out of bed at 6:30am, I brushed my teeth, did my skincare routine, shaved, took a shower, and put on my outfit of the day. This entire process took me approximately one and a half hours. 2.      Drop my daughter off at school: Once my hygiene was complete, it was then 8am and time to take my daughter to school. The drive to my daughter’s school took 20 minutes. Leaving at 8am ensures she has enough time to make it to her first class that starts at 8:30am. I wished her a good day, gave her a kiss, and was off to my next destination. 3.      Breakfast: After leaving my daughter’s school, I ...

Post #6: Network Security

Individuals and organizations need to have high-quality information and system security practices. These practices are critical to protecting oneself or a company from computer security incidents such as social engineering, pharming, computer viruses, phishing or smishing, HTTPS phishing, ransomware, and malware. Familiarity with practices to combat these security incidents will be essential to protecting personal and/or company information from hackers and scammers. Social engineering is a form of complex cyberattacks to take advantage of people and get them to reveal sensitive information about themselves or their organization. This type of security threat takes place between people, which is what gives it the social aspect. It depends on predicting how people behave in social interactions. The engineering aspect comes from threat actors manipulating social interactions to accomplish what they want.  (Tech+, 2025) Computer systems are vulnerable to social engineering through s...

Post #5: Tech Topics

  The two topics that I am interested in from the Tech Topics list are IT careers and Network security. I would like to know more about the different fields in information technology and the job duties that they entail. I would also like to learn more about securing networks and the process of how this is performed. I am interested in learning more about IT Careers because I think having a better understanding of the different career types will help me solidify which role suits me best. If I know more about the different career fields within information technology, I can narrow down which fields interest me and which ones I would not be interested in. This will be important when choosing a long-term career. One question that I hope to answer by researching this topic in more detail is, which IT career will I enjoy the most, will allow me to perform at my highest capabilities, and will provide me with a decent living wage to support my family comfortably? There are more than 21 diff...

Post #4: The Blog Design Plan

Image
  To design my Information Technology Blog Final Project, I will take a simple approach. Less is more in this case, and simplicity will help drive a wider audience to my blog. I will include the required elements of a header, main text, sidebar, and footer. This basic approach will help me to focus on the design and maximize my time to get creative. The audience for my blog will be healthcare workers in tech and those new to the technology field. My intended audience will impact my design choices as I will need to create a design tailored to beginner technology. This means making sure the elements of my design resonate with my audience and attracts them to explore all the aspects of my blog site. I will need to come up with a concept that helps me stand out from other blog sites within my niche  (Dean, 2024) . Creating a captivating “about” page will be critical in helping me connect with my audience. It is here where I will be able to tell my story and build a personal connec...

Post #3: Role of Applications Reflection

  My experience creating a journal entry, calculating percentages, developing a presentation, and manipulating a database, along with my understanding of software applications, has taught me that there are multiple ways to report and convey your message. Each one uniquely identifies the information that you want your audience to receive. The best software depends on the information that you want to convey. You can report your information in a word processor, spreadsheet, presentation, or database application. With a word-processor application, you can create a digital document of your information (Tech+, 2025) . Like writing a paper by hand or using a typewriter, you can type and format documents such as reports, letters, essays, and journal entries. You can format the text in your document by selecting different font options, changing the size of the text, adding a list in bullet or numbered format, and adjusting your text alignment (Campus, 2025) . With a word processor, what wou...

Post #1: Programming Languages

  After playing around with Scratch and watching several tutorials, I decided I wanted to create a game. It was nice to see the functionality of creating the game. Each action I wanted to perform was determined by the command I chose. I even had some fun playing my own game once it was finished. While programming in Scratch, I realized that compiled language does a lot of the work for you and takes the hard part of coding away. “Coding with these languages is kind of like building a model from a kit. Most of the hard work, like molding plastic and cutting metal, is done in the factory. When you get the kit home, you just need to put the pieces together and paint the model how you like.”  (Tech+, 2025) Creating a program through the web browser also allowed me to utilize Interpreted Language. Through interpreted language, I was able to select the right inputs to produce the outputs I was looking for. When the inputs were incorrect, so were my outputs. I don’t believe I experie...