Skip to main content

Posts

Applying Data Structures and Algorithms - Newbie to Newbie

Why DSA? And How?      I have nearly completed an intensive five-week college course detailing the preliminary and general concepts of data structures and algorithms (DSA). We discussed arrays, searches, sorts, abstract data types (ADT), binary trees, and efficiency metrics, and implemented them in Java. When DSA is used, a relevant inquiry is made about whether some algorithms and data structures are better. The short answer is yes. In many cases, the more information is stored and manipulated, the more efficiency can be disrupted by inefficient algorithms. How do we choose between them? Shaffer teaches that an algorithm should be simplistic and designed for easier comprehension by code readers and for debugging (Shaffer, 2013, p. 3). Additionally, efficient algorithms and data structures use the computer’s resources efficiently (Shaffer, 2013, p. 3). When these two characteristics of efficient code are achieved simultaneously, the program is said to be “elegant” (Shaffe...
Recent posts

Java: A Powerful Programming Language

What is Java? Java is used by the top 95% of all employers worldwide to build mission-critical systems. Because of this demand, Java is widely embraced by the education community. Amongst its many features, Java is object-oriented, is written once and runs on any device, has built-in multi-threaded programming, an integrated UI library, and a rich ecosystem maintained by developers worldwide. For this and many other reasons, Java continues to attract educators. Java continues to evolve to meet the growing industry trends. (JavaCommunityProcess, n.d.). How to get started with Java An easy way to start with Java is to get an IDE suitable for using the language. As a suggestion, visit https://www.eclipse.org/downloads/ and download the most suitable package for your device. Once the IDE is downloaded, you can run the setup file from the folder it is downloaded to (in Windows, downloads typically go to the downloads folder). Once the setup is done, run the application! When it starts, it...

Information Technology and Technology Literacy

  IT and Its Relation to Technology Literacy and Technology History Information Technology is a career field centered around technology literacy. IT involves computer hardware, software, programming, architecture, security, database, developers, network and system administration, and IT leadership (Aha!, n.d.). “Information Technology refers to the management and use of information using computer-based tools. It refers to both hardware and software. Mostly, it is the term used to refer to business applications of computer technology rather than scientific applications” (Mathew & Murugeshon, 2013, p. 15, para. 1). The need for IT could be said to have started in the 1990’s “The information age just began in the 1990's, with human activity shifting from traditional industry to creating/managing/using computerized information” (Vahid & Lysecky, 2019, Section 1.1, Para. 3). Considering that IT has fields that manage data such as a Big Data Engineer (a type of data considered to...

Network Security: Malware and Steps to Avoid Technology Attacks!

  Types of Technology Attacks and Their Destructive Intentions Security is a critical topic when discussing the ever-increasing technology of today. Consider, for instance, the abuse of a ping command. Known colloquially as a Ping of Death (POD) or Ping Flooding, these attacks send large packets of information that aim to prevent the server from operating correctly; this type of attack is classified as a DoS or Denial of Service attack (Imperva, n.d., para. 1). Phishing is another type of security breach in which a user receives a link via email or messaging services. The link leads the user to a page that attempts to install malware to freeze the system or gain access to sensitive information, such as payment information, banking information, or theft of funds or identity (Imperva, n.d., para. 1-2). A ransomware attack is another form of phishing, allowing the attacker to stop a system from working correctly. The attacker demands payment to enable the user to get their files back ...

The Necessity for Computer Literacy in the Workplace

The Functions of Computers in Manufacturing and My Personal Experience With Them. I have worked in the manufacturing industry for 18 years. For ten years, I compression molded fiber-reinforced thermoset polymers (fiberglass matting and thick liquid resin mixed with colors and other chemicals, then pressed them into shapes at high temps to cause the liquid resin to cure and harden). Then I switched to the CNC industry, where I found automation and was fascinated by the potential of some of the devices. Many of the devices that make automation possible are unique and have unique types of Operating Systems and IDEs that make implementation difficulty range from easy to moderate. We rely on Microsoft Windows-based products for PCs with a more common OS. A prominent program that we use on PC is called Plex. Plex allows information to be transferred around at all the computer stations, both plant-wide and from locations outside the plant. However, access from outside the plant is only grante...

How Information Is Transferred on the Internet

  Describe how packets travel through the network. The simplest explanation is that the sending computer creates a packet (a bundle of information) which includes an address to go to, the type of packet, and the actual data (Vahid & Lysecky, 2019, Section 3.1, Figure 3.1.1). “The Internet's computers know how to route the packet to the destination address. Depending on Internet traffic conditions, packets might follow different routes” (Vahid & Lysecky, 2019, Section 3.1, Figure 3.1.1). It is also taught that when a computer uses a domain name to contact a site (as opposed to the IP address), a packet's first stop is a DNS server or Domain Name System server. This is necessary for the domain name to be converted to an IP address so all routers can move the information around. How the separate data destinations differ and the relationship between the roundtrip time and geographical location. After comparing pings between locations, I noticed that a ping to google.com in ...

The Role of Applications

  The Functions of Word Processing, Presentation, and Spread Sheet Applications Word processor programs create written documents with paragraphs of text or formatted lists. With a powerful word processor such as Microsoft Word, the text can be formatted in various ways utilizing different fonts, text sizes, text formatting, highlighting, text colors, page formatting, and much more. It is possible to insert tables, images, and spreadsheet information into MS Word documents. If formatted a certain way, each page could appear the same as any presentation slide. PowerPoint is a presentation application that allows text boxes, images, and text formatting. PowerPoint offers many themes and design suggestions to make multiple slide presentations orderly, conformed, and interesting. Once a presentation is created, PowerPoint provides various ways to present the information. One way is to record the PowerPoint using a mouse or other device to activate animations and slide transitions. Durin...