Posts

Image
    Greetings Everyone Regarding writing applications, algorithms are used to create the structure and steps the program must take to perform the task asked of it.  When developing programs, which algorithms are used should be considered as some are more efficient than others.   We can use the Rubik's Cube as an analogy.  Competitive Rubik's cube solvers use algorithms as a matter of course to create solutions for scrambled cubes.  Programmers use algorithms to solve other problems.  Some algorithms are better suited for specific scenarios.  With the Rubik’s cube analogy, the Layer-by-Layer method is easy to learn.  “Compared to other methods, there are only a few algorithms to memorize, and they are relatively intuitive.  This technique is perfect for beginners since it is the most accessible.  On the other hand, this method is not efficient for speedcubing (GoCube. 2020).  Layer-by-Layer is a great way to learn to so...
  Good Day Everyone,   Today we are discussing object-oriented programming (OOP).  Object-oriented programming aims to provide a method to create objects and contain them within classes.  Several concepts associated with object-oriented programming must be studied to understand the idea.  Java T Point states that “Object-Oriented Programming is a methodology or paradigm to design a program using classes and objects” ( Java T Point.  n.d.).  The core ideas behind OOPs are objects, classes, inheritance, polymorphism, abstraction, and encapsulation ( Java T Point.  n.d.).  By compiling a simple program to print a statement on a screen, we can begin to explore the concepts of object and class.  Logical objects are items that reside in the physical memory of a computer, and a class is a collection of objects.  ( Java T Point.  n.d.).  To explore Object-oriented programming, we can utilize Java™ as it embodies the concept...

CPT304: Week 5 Final Project: Blog Post

Image
  Week 5 Final Project:   Blog Post Aaron Bicknell CPT304: Operating Systems Theory & Design (IND2151A) Dr. Joshua Reichard January 31, 2022   The course, CPT304: Operating Systems Theory & Design (IND2151A), at The Forbes School of Business & Technology has given me the opportunity to review in detail the fundamental concepts of operating systems and prompted this overview for inclusion in this blog entry.   Computer operating systems are designed to provide services necessary for the functioning of computers and processing devices.   The textbook Operating System Concepts Essentials (2nd ed.) uses an anecdote to describe an operating system's job.   The book states that "An operating system is similar to a government. Like a government, it performs no useful function by itself.   It simply provides an environment within which other programs can do useful work" (Silberschatz et al., 2014, p. 4).   While it may not ...
Tech Topic Connection:            Week 5 Assignment 1:   Post 7:   Tech Topic Connection Aaron Bicknell INT100: Fundamentals of Information Technology & Literacy Prof. John Santorio September 20, 2021     The topic that I have selected for this blog post is programming languages.   In a previous post, I have provided some background on programming languages in general.   The other posts here have centered on other tech topics such as hardware, software, network topology, and digital security.   Out of all these topics, programming languages are what tie all these topics together and allow us to use computers as tools in our day-to-day lives.   Programming languages allow us to create the software packages that we use to interface with these machines.   They are the tools that tell the computers what to do by turning switches on and off.   These switches store data.   They ...
 Network Security: Security is one of the most critical components of computing in the modern age.   Computers are used to store vital information, carry out financial transactions and provide a multitude of services.   The compromise or disruption of any of these can be detrimental to people and businesses while being quite lucrative to criminals. A DDoS or a Distributed Denial of Service attack can be used to implement an attack with the ping command.   This type of attack is generally targeted at a service provider. With many service requests for ping responses, the servers become unavailable or unresponsive to provide their intended services.    Any system connected to the internet is vulnerable to these attacks as long as they are configured to offer ping responses, which many are.   The consequences of such attacks can be slow or nonexistent response times from the servers. There are various types of attacks that can be done.   Three commo...
 Computers in the Workplace: This week I am going to address the role of computers and technology in the power industry.   Specifically, I will discuss electric generation.   Back before computers were commonplace, generators and equipment in power plants were operated directly by switches, knobs, levers and dials.   As computers became more prevalent, they were integrated into power plants to operate electronic control systems, logic controllers and electronically controlled industrial devices.   This now allows plant operators to remotely monitor and adjust settings to keep power plants online and supplying reliable energy to the electric grid.   For this reason it is important for the control room operators to be familiar with computer operations as it will allow them to interface with and control the machinery that they are tasked with. There are many functions that computers serve in a power plant.   Just a few are monitoring screens, Electronic...
Image
Traveling Through a Network: Hello Everyone,            Here are my ping response times including google.com and sites from Japan and Australia.   As you can see, the turnaround time averages in the 10ms range.      I have recently had GoNetSpeed Fiber installed and have been pleased with the response times and low jitter rate.   As this is a growing ISP, I have found that when they add routers and switches, I often had to re-boot my router to pick up new routing tables and refresh it, however that has started to settle down now that they have canvassed my local area and the hardware at the last mile has been built up. For the trace routes to the same sites, you can see the path, where the packets leave my computer and head out over my router.   The gateway there is the 10.0.0.1 address which is a nice scheme that is commonly used if 192.168.1.1 is not available.   After that lightower.net is my last mile provider ...