Pages

Friday, June 27, 2025

Computer Operations and Network Architecture

When I started this course, I wasn’t sure what to expect. After 13 years as an Air Force medic and now working in more of an administrative role, I’ve spent plenty of time using computers. However, I never really understood what was happening behind the screen. That curiosity is what brought me here. I wanted to know how computers actually work and how they stay connected in today’s digital world. Two topics quickly stood out to me: how computers operate, and network architecture.

Why These Topics?

Let’s be honest, computers are everywhere. Whether I’m scheduling appointments, managing records, or just sending emails, I rely on them constantly. But I realized that if I want to grow in IT, I need to go beyond just using the tools. I need to understand them. That’s where these two topics come in.

How Computers Really Work

It’s easy to take for granted how a computer boots up or runs a program. But under the hood, there’s a whole world of components working together. The CPU (central processing unit) is like the brain. “The CPU determines the sequence of execution of instructions, and guides the movement of data within the machine. It directly interacts with all other components” (Mercando, 1995). RAM (random access memory) temporarily holds data so the CPU can access it quickly, while storage keeps everything saved for the long haul. Learning how these parts interact has helped me understand why performance issues happen. For example, if a computer is running slow, it might not be a virus. It could just be low on RAM. Knowing this gives me the confidence to troubleshoot instead of panic.

Programming and Machine Language

Even though I’m still new to programming, I’ve learned that everything a computer does starts with code. High-level languages like Python or Java get translated into machine code that the CPU can understand. This process, whether through a compiler or interpreter, is what makes software run.

Software: The Tools That Make It All Click

Application software is what lets us interact with computers in meaningful ways. Whether it’s Microsoft Word or a network monitoring tool, software relies on the hardware to function. In IT, tools like Cisco Packet Tracer help visualize how data moves through a network through simulation, and “helps us build simple and complex networks” (Bhola, 2022), which is incredibly helpful for someone like me who learns best by seeing things in action.

The Power of Networks

Now let’s talk about networks. Whether it’s a home Wi-Fi setup or a global cloud infrastructure, networks are what keep us connected. I’ve learned about LANs (local area networks), WANs (wide area networks), and the devices that make them work such as routers, switches, and servers. “Wide Area Network (WAN) has enormous demands in the digital era because WAN connects computers/devices globally to the Internet. Where these connections help in the communication of devices and data transfer to users at geographical locations. WAN is a collection of two or more Local Area Networks (LANs)” (Bhola, 2022). What really fascinates me is how network architecture supports both performance and security. In today’s hybrid work environments, where people are logging in from everywhere, having a solid network structure is more important than ever. Tools like VPNs and cloud services make it easier to stay connected and protected.

Database Systems

Behind every system is a mountain of data. That’s where databases come in. They store, organize, and manage information so it can be accessed quickly and securely. Whether it’s patient records in a hospital or user logs in a corporate network, understanding how database management systems (DBMS) work is key to keeping everything running smoothly.

Bringing It All Together

What I’ve learned is that computer operations and network architecture aren’t just technical topics, they’re the foundation of everything in IT. They’ve helped me see the bigger picture and given me the tools to start thinking like a tech professional. As the course text puts it, “a solid understanding of computing fundamentals and network structures is critical for any IT professional” (CertMaster Learn Tech+, 2024). I couldn’t agree more. This is just the beginning of my journey, but I already feel more confident and capable. Whether I end up in cybersecurity, systems administration, or technical support, I know these skills will be with me every step of the way.

References

·         Bhola, A., Jain, A., Lakshmi, B. D., Lakshmi, T. M., & Hari, C. D. (2022). A Wide Area Network Design and Architecture using Cisco Packet Tracer. 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), Contemporary Computing and Informatics (IC3I), 2022 5th International Conference On, 1646–1652. https://doi.org/10.1109/IC3I56241.2022.10073328

Tuesday, June 24, 2025

Network Security

In todays digital age, its no surprise that nearly every part of our lives is touched by technology. From

online banking and grocery apps to entire hospital networks and business operations, computers and 

connected systems play a massive role in keeping the world running smoothly. But with that 

convenience comes risk, and thats where information and system security become essential.

Whether you're an individual protecting personal files or part of a company responsible for sensitive data, keeping digital systems secure isnt optional anymore. Its a daily necessity. As technology advances, so do the tactics used by cybercriminals. Theyre constantly looking for vulnerabilities to exploit, often catching people off guard. In this post, well explore the importance of cybersecurity and take a closer look at two of the most common threats: malware/ransomware and phishing. Well also look at ways to protect against them, both for personal users and organizations.

Lets start with malware and ransomware. Malware is short for malicious software,” and it includes things like viruses, worms, spyware, and ransomware. These are programs designed to damage or take control of your computer without your permission. Ransomware, in particular, is one of the more terrifying versions. “Ransomware is a type of malicious software, or malware that blocks access to data in a computer system, usually by encrypting it, until the victim pays a ransom fee to the attacker. Historically, ransomware attackers focused almost exclusively on encryption and were not otherwise interested in the underlying data” (Sumner & Keenan, 2022). Its like someone breaking into your house, changing all the locks, and refusing to give you the keys unless you pay up. One of the scariest parts of ransomware is how quickly it can spread across a network. A single careless click on an infected email link could shut down an entire hospitals system, freeze a small businesss operations, or wipe out a students final project. Once its in, the damage is fast and often expensive.

To protect yourself against such an attack, you can perform regular backups on your device. If your data is backed up to an external or cloud location, you have a way to recover it if ransomware hits. You can also install reliable antivirus software thats kept up to date and can detect and block many threats before they have a chance to do damage. Its also important to avoid downloading software or opening attachments from unfamiliar sources, as these are often how malware sneaks in.

Now lets talk about phishing, which is one of the most common cyber threats, and one that relies more on deception than software. Phishing attacks are often disguised as legitimate messages from banks, co-workers, or even streaming services. They usually include links or attachments that, once clicked, either install malware or trick you into giving away personal information like passwords or credit card numbers. The danger of phishing lies in how believable these scams can be. Some are so convincing that even tech-savvy users get caught off guard. Hackers don’t always know if the victim has a particular account. So they send an email blast to tens of thousands of users, with the hope that if they pick a large business with more customers, then they'll be more successful.” (CertMaster Learn Tech+, n.d.). And now, with AI being used to craft smarter, more personalized messages, these scams are only getting harder to spot. To defend against phishing, education is key. People need to know how to recognize suspicious emails. Looking out for misspellings, generic greetings, or strange-looking links. Organizations should run regular cybersecurity training sessions to keep employees alert. On the technical side, enabling spam filters and multi-factor authentication (MFA) adds extra protection. MFA makes it much harder for attackers to access accounts, even if they manage to steal a password.

In both cases, malware and phishing, the human element is just as important as the technical one. Having good tools in place is essential, but they only work if people are trained to use them properly and stay cautious. This is especially important in workplaces where a single mistake could impact dozens or hundreds of people.

As we look to the future, it's clear that threats like these are only going to become more sophisticated. The increasing integration of artificial intelligence, machine learning, and smarter networking tools will benefit both defenders and attackers. Thats why we need to continue learning and adapting. Cybersecurity isnt just the responsibility of the IT department anymore; its something we all need to care about. At the end of the day, protecting our systems means protecting our personal lives, businesses, and communities. By understanding how these threats work and staying proactive, we can help make our digital world safer for everyone.

 References

CertMaster Learn Tech+. (n.d.). FC0-U71: Introduction to Information Technology. CompTIA.

Sumner, P., & Keenan, R. (2022). Ransomware Attacks on Healthcare Providers--What You Need to Know. Journal of Health Care Compliance24(2), 11–69.

Computers in the Workplace

Computers play an essential role in the healthcare field, impacting everything from patient records to life-saving diagnostics. As someone with a background in healthcare, I’ve seen firsthand how critical computer systems are for delivering efficient and accurate care. Electronic Health Records (EHRs) allow providers to access a patient’s history instantly, improving treatment outcomes and reducing errors. Scheduling systems streamline appointments, billing software helps manage insurance claims, and diagnostic tools like MRI and CT scanners rely on computing power to operate effectively. Computer literacy has become a basic necessity for healthcare workers, not just a bonus skill. Nurses, technicians, and even administrative staff need to understand how to use EHR platforms, input data accurately, and recognize when a system isn’t functioning correctly. With privacy laws like HIPAA in place, employees must also be aware of how to handle digital information securely. Being comfortable with technology is no longer optional as it directly affects patient care and safety. Looking ahead, the next decade will bring even more rapid change. AI is already beginning to assist with tasks like analyzing X-rays, predicting patient deterioration, and streamlining hospital workflows. As computer hardware becomes faster and more powerful, and operating systems more intuitive, I believe healthcare providers will rely even more on real-time analytics and decision-support tools. Networking advancements will continue to support remote monitoring, telemedicine, and large-scale data sharing for research. Those who embrace these tools will be better prepared to proactively offer personalized care. Staying updated on IT developments isn’t just a tech job; it’s becoming a critical part of being an effective healthcare professional.

Traveling Through a Network





Part 1: Ping Activity

Google.com

Packets: Sent = 4, Received = 4, Lost = 0 (0% loss)
Minimum = 14ms, Maximum = 17ms, Average = 15ms



 


Ca.yahoo.com

Packets: Sent = 4, Received = 4, Lost = 0 (0% loss)
Minimum = 19ms, Maximum = 20ms, Average = 19ms



Yahoo.jp

Packets: Sent = 4, Received = 4, Lost = 0 (0% loss)
Minimum = 120ms, Maximum = 186ms, Average = 152ms

 

Part 2: Traceroute Activity

Google.com

Hops: 15
Time Range: 1ms to 47ms
No failures, stable route



Ca.yahoo.com

Hops: 13
Time Range: 1ms to 28ms
3 hops timed out but route completed successfully



Yahoo.jp

Hops: 12
Time Range: 3ms to 237ms
Several timeouts occurred; route completed



Part 3: Traveling Through a Network Reflection Essay

Using ping and traceroute tools gave me an inside look at how data travels through a network. With ping, I saw the time it took for small data packets to reach a destination and return. The traceroute tool allowed me to follow the path those packets took across routers and networks, showing each hop in the journey. Google.com had the fastest response, likely because it is hosted close to my geographic location. Yahoo Japan had the slowest response and highest round-trip time, which reflects the longer distance and international routing. This proves a clear correlation between geographic distance and round-trip delays. Ping and traceroute are incredibly useful for troubleshooting network issues. Ping checks if a device is reachable and measures the speed, while traceroute helps identify where delays or failures occur. If a ping times out or a traceroute shows unreachable hops, it could be due to firewall settings blocking traffic or high congestion at a network point. Overall, these tools helped me visualize network communication and taught me how to interpret packet loss, delays and routing patterns. This knowledge is essential for identifying and solving internet connectivity issues effectively.

 


A Day in the Life

 

Introduction

Digital applications have become essential tools in both academic and personal productivity. As part of the "Documenting a Day" assignment, I used four major types of application software: word processor, spreadsheet, presentation, and database. Each program served a distinct role, contributing to the overall structure of the project. This paper compares the functions, advantages, and disadvantages of these applications and recommends the most appropriate one for capturing daily activities. Additionally, it provides examples of how each application can be used in other scenarios.

Microsoft Word

Word processors like Microsoft Word are designed primarily for writing and formatting text documents. In this assignment, I used Word to create a journal entry describing ten tasks I completed in a day. The software allowed me to adjust font size and style, align the text, and create a numbered list. One major advantage of word processors is their ease of use for general writing tasks such as essays, letters, and journals. They offer formatting tools and spell check features that support clear communication. However, word processors are not ideal for numerical data or visual presentations. For example, calculating percentages or displaying charts can be difficult in a word processor. Aside from journaling, another valuable use case for Word is writing professional documents like resumes or cover letters.

Microsoft Excel

Spreadsheet applications such as Microsoft Excel are powerful tools for organizing and analyzing numerical data. In this assignment, I used Excel to record how much time I spent on each task and calculate the percentage of my day each activity consumed. Excel’s built-in functions like =SUM() and =B3/24 made it easy to compute totals and percentages quickly and accurately. The biggest strength of spreadsheet software is its ability to process large amounts of data and generate visual summaries with charts and graphs. However, Excel can be intimidating for beginners due to the complexity of formulas and functions. Outside this project, spreadsheets are excellent for creating personal budgets, tracking data, or scheduling tasks in the workplace.

Microsoft PowerPoint

Presentation tools like Microsoft PowerPoint are best used for creating visual summaries and communicating ideas in an engaging way. I created a presentation that highlighted each of my daily tasks using text, images, and animations. PowerPoint’s visual design features helped make my journal content more interesting and easier to digest. A key benefit of presentation software is its ability to combine multimedia, images, text, animation, and transitions, to support spoken delivery. A potential disadvantage is that it can oversimplify content if overused or poorly designed. Beyond this assignment, PowerPoint is widely used for lectures, and project updates or proposals.

Database Software

While not directly used in this project, database applications like SQL-based systems are important when dealing with large, relational datasets. “In addition to being the most important query language in use, SQL functions as a data definition language, a data manipulation language, and a data communication language. Using SQL to address the issues in the case utilizes all these functions and allows students to see how tables get created, keys and constraints get applied, and data get manipulated” (Blankley, 2006). They allow users to store, retrieve, and query information efficiently. Though powerful, they often require more technical knowledge to use effectively. A practical scenario for databases is in customer relationship management, where companies track interactions, purchases, and support history.

Most Appropriate Software for This Assignment

Out of all the applications used, Microsoft Word was the most appropriate for documenting my day. It enabled me to tell a complete story, organize my thoughts clearly, and apply visual formatting to enhance readability. Journaling is inherently a written process, and Word provided the perfect structure to capture that.

Conclusion

This assignment emphasized the importance of choosing the right application for the task at hand. Word processors are ideal for written documentation, spreadsheets handle data and calculations, presentations bring content to life visually, and databases manage data relationships. Understanding the strengths and limitations of each tool is key to working efficiently in both academic and professional settings.

References

BLANKLEY, A. I. Using SQL to Develop Database Query Proficiency: A Follow-Up Note to Borthick, Jones, and Kim (2001). Journal of Information Systems, [s. l.], v. 20, n. 1, p. 117–137, 2006. DOI 10.2308/jis.2006.20.1.117. Disponível em: https://research.ebsco.com/linkprocessor/plink?id=94faedac-9d29-3fdf-a31c-0ebe30349b14. Acesso em: 8 jun. 2025.

Web/Mobile App Critique

 Usability

The app I’ve chosen to review is Uber. From the moment you open the app, Uber makes it easy to get going. You’re greeted with a simple “Where to?” bar at the top and a map that shows where you are. It even remembers your frequent destinations, like home or work, so you don’t have to retype them every time. That might sound like a small thing, but it really helps when you’re in a rush or juggling bags at the airport. It doesn’t take long to figure out how to schedule a ride, change your payment method, or view your ride history. The menus are straightforward, and the app guides you along each step, from requesting a ride to getting updates about your driver’s location and estimated time of arrival.

Design and Look

Visually, the Uber app is clean and uncluttered. It uses a lot of white space, soft colors, and clear fonts that make everything feel modern and easy to read. The icons are simple and intuitive, and there’s a dark mode for those late-night rides or those with eye sensitivity, which I personally appreciate. The real-time map is also a nice touch. It updates constantly to show where your driver is and where you’re going, which adds some reassurance that everything is on track.

Functionality

Functionally, Uber does what it’s meant to do. You can request rides, track drivers, rate trips, and pay through the app without any hassle. It gives you a price estimate upfront, which helps you plan, and the receipt shows up in your email right after your trip ends. There are also handy features like the ability to split fares, add extra stops, and even share your trip with a friend or family member for safety. It’s great that you can choose ride preferences too, like if you’d rather not chat, or if you like the car cooler or warmer.

Improvement Recommendations

1.      The in-app messaging could definitely be improved. Sometimes messages don’t go through right away, or there’s a delay in replies. It would be helpful if there were delivery confirmations or read receipts, so you know if your driver saw your message.

2.      For users who have vision challenges or are older, Uber could benefit from a simplified view mode, larger buttons, less clutter, maybe even a voice-command option. It works okay with screen readers, but there’s room to do more here.

3.      We’ve all seen it, those sudden price hikes when demand is high. But the app doesn’t really explain why prices are higher. Adding a short explanation like “Event in area” or “Driver shortage” would make it feel more transparent. A timer showing how long the surge is expected to last would be even better.

At the end of the day, Uber does a good job of making transportation quick and convenient. It’s a well-designed app that most people can use without much of a learning curve. Still, with just a few tweaks, especially around communication, accessibility, and pricing transparency, it could become even more user-friendly for everyone.

         

 

Computer Operations and Network Architecture

When I started this course, I wasn’t sure what to expect. After 13 years as an Air Force medic and now working in more of an administrative ...