Saturday, May 10, 2025

Tech Topic Connection

 Throughout this course, I’ve explored many different aspects of information technology, but one topic stood out to me the most: how computers operate, and how operating systems tie everything together. These fundamental concepts are essential not only for understanding how we use computers today, but for grasping the underlying logic behind nearly all modern technology.

At the core, a computer functions by processing input, performing calculations, storing data, and delivering output—all coordinated by a central processing unit (CPU), memory, and supporting components. What amazed me during this course was learning how even basic user actions, like clicking a mouse, involve a complex series of electrical and software-based instructions. We often take for granted that computers "just work," but under the surface, it's a layered dance of hardware and software working in perfect coordination.

Operating systems (OS) are what make this coordination possible. Acting as the "manager" of all system activity, the OS controls hardware usage, runs software applications, and ensures system resources are allocated efficiently. Without an OS, a computer would be little more than a collection of wires and chips with no direction.

 Connecting to IT Fundamentals

This topic directly connects to multiple course concepts:

  • History of Computers: Early machines performed a single task at a time and required punch cards or manual programming. Today’s computers, by contrast, are multifunctional and controlled by highly sophisticated operating systems that can run multiple programs simultaneously.

  • Hardware Components: Modern computers rely on hardware elements like the CPU, RAM, storage drives, and input/output devices. Each component has a role to play in the execution of tasks, and understanding these has helped me see how computer performance is tied to physical limitations and design.

  • Programming Languages: Even operating systems are built using programming languages—typically low-level languages like C or assembly. Learning Scratch and reading about other languages gave me insight into how software instructions ultimately drive hardware behavior.

  • Application Software: Software like Microsoft Word, browsers, and video games all depend on the operating system to function properly. The OS provides the environment where apps run, allocating memory, controlling display output, and managing file access behind the scenes.

  • Databases and Management: Many operating systems have built-in tools or work closely with software to manage databases and user data. For example, the Windows OS uses system registries and file permissions to manage access to sensitive information.

  • Network Architecture and Security: Finally, the OS plays a crucial role in network communication and defense. Whether it's managing IP configurations, handling incoming/outgoing packets, or deploying firewalls and antivirus protocols, operating systems are central to maintaining a secure digital environment.

 Final Thoughts

Understanding how computers operate and the role of operating systems has given me a new appreciation for the machines we interact with daily. This foundational knowledge will help me as I move into more advanced IT areas—whether that involves working in cybersecurity, system administration, or network design. Everything starts here.

Network Security

 

In today's digital world, the security of computer systems is more critical than ever. Individuals and organizations alike rely on interconnected technologies that, while improving efficiency and communication, also expose users to various cyber threats. Two of the most damaging and prevalent forms of cyberattacks are phishing and ransomware. Both threats exploit human error and system vulnerabilities to gain unauthorized access to data, disrupt operations, and demand financial or informational ransom. This paper explores how phishing and ransomware attacks compromise system integrity, what symptoms and damage they cause, and how users can effectively defend against them.

 

Phishing and Smishing Attacks

Phishing refers to fraudulent attempts to obtain sensitive information, such as usernames, passwords, or credit card numbers, by disguising as a trustworthy source in electronic communication. Smishing is a subtype of phishing that occurs via SMS text messages. These attacks often rely on social engineering, exploiting human trust rather than technical vulnerabilities (Hadnagy & Fincher, 2018).

System Vulnerabilities

Computer systems are particularly vulnerable to phishing due to users' tendency to trust familiar-looking emails or messages. Attackers often mimic corporate branding, fake email addresses, or urgent requests (“Your account has been compromised”) to manipulate the recipient into clicking a malicious link or submitting personal data.

Symptoms and Damage

Once compromised, phishing can result in stolen login credentials, identity theft, or unauthorized access to secure systems. This can lead to financial losses, data breaches, or system downtime. For example, a successful phishing attack on a corporate email can allow attackers to access internal documents, reroute funds, or distribute malware.

Protection Recommendations

  1. User Awareness and Training: One of the most effective defenses is to educate users about the red flags of phishing, such as misspelled domains, suspicious attachments, and urgent language (Chen et al., 2021).
  2. Multi-Factor Authentication (MFA): Even if credentials are stolen, MFA can prevent unauthorized access by requiring a secondary verification step.

 

Ransomware Attacks

Ransomware is a type of malicious software that encrypts the victim’s data and demands payment, often in cryptocurrency, for the decryption key. It has become a global threat affecting hospitals, schools, municipalities, and private companies.

System Vulnerabilities

Ransomware often enters systems through phishing emails, unpatched software, or unsecured remote desktop protocols (RDP). Once inside, it can spread across networks and lock out users entirely.

Symptoms and Damage

A system affected by ransomware typically experiences sudden inaccessibility to files, pop-up ransom notes, and disabled security tools. The 2021 Colonial Pipeline attack is a high-profile example, where ransomware forced a major fuel supplier to shut down operations, leading to fuel shortages and economic disruptions.

Protection Recommendations

  1. Regular Backups: Maintaining offline backups ensures that, in the event of a ransomware attack, critical data can be restored without paying a ransom.
  2. System Updates and Patching: Regularly updating software and operating systems helps close security holes that ransomware can exploit.

 

Conclusion

As technology continues to evolve, so too do the threats that target its users. Phishing and ransomware are particularly dangerous because they often bypass technical defenses by preying on human behavior or exploiting outdated systems. To protect both individual users and organizations, a layered defense strategy is essential. One that includes user education, strong authentication, regular system maintenance, and robust data backup protocols. Awareness, preparedness, and vigilance remain the cornerstones of effective cybersecurity.

Computers in the Workplace

 Hello everyone, 

I chose this week's discussion on sales as it is what I have done with my professional life. In the field of sales, computers have become indispensable tools for everything from lead generation and customer relationship management (CRM) to data analysis and communication. Sales professionals rely on hardware such as laptops, tablets, and smartphones to stay connected with prospects and clients, while software tools like Salesforce, HubSpot, and Microsoft Dynamics help manage customer pipelines and track performance metrics in real time.

Computer literacy is critical in this environment. Salespeople are expected to navigate a range of digital tools to stay competitive, productive, and informed. Those who lack the technical skills to use CRMs effectively or analyze key performance indicators (KPIs) can fall behind. Moreover, modern sales strategies are data-driven, and the ability to interpret insights from analytics tools or integrate automation platforms directly impacts both efficiency and closing rates.

Looking ahead, advancements in computer hardware and networking will likely accelerate the speed and scope of sales operations. Mobile and cloud computing will continue to evolve, allowing reps to work seamlessly from anywhere. At the same time, the integration of Artificial Intelligence (AI) will profoundly reshape the industry. AI-powered chatbots, predictive lead scoring, and automated email campaigns are already influencing how businesses interact with customers. Over the next decade, expect to see more sophisticated AI tools that can anticipate buying behavior, generate personalized sales pitches, and even assist with real-time negotiations. For sales professionals, staying current with IT trends and AI technologies won’t just be an advantage, it’ll be a requirement for success.

Traveling through a Network

 When I pinged three different websites—google.com, google.jp, and google.eu—I observed firsthand how data is sent across multiple networks before reaching its destination. Each packet travels through various routers, also called hops, and the time it takes for the packet to go from my computer to the destination and back (roundtrip time) depends heavily on the network path and physical distance.

The ping results showed that packets traveling to google.com had the shortest roundtrip time, averaging around 20 milliseconds, while packets traveling to google.jp and google.eu had significantly higher roundtrip times, often exceeding 60 milliseconds. Similarly, traceroute results revealed that the path to google.com had fewer hops, while paths to google.jp and google.eu required many more hops. This makes sense because google.com servers are located geographically closer to my location in the United States, while the other two are overseas, requiring more transfers between routers and across different international networks.

The ping and traceroute commands are valuable tools for troubleshooting internet connection problems. For example, if a website is slow or unreachable, using ping can determine if packets are being lost or if there is a high delay. Traceroute can then help pinpoint where along the path the connection is failing or slowing down, whether it’s at the local network, an internet service provider’s (ISP) node, or a distant network. There are a few reasons why a ping request or traceroute command might time out or return an error. First, some routers and firewalls are configured to block ICMP packets (which ping and traceroute use) for security reasons, preventing a response. Second, network congestion or hardware failure along the route can cause timeouts if the packets cannot reach their destination or are significantly delayed.


image.png

Google.jp

image.png

Google.eu

image.png

Documenting a Day Application Functions

 

Working through the “Documenting a Day” assignment gave me a hands-on look at just how much we rely on different types of software in our daily routines, especially when trying to organize or present information. I used a word processor to journal my day, a spreadsheet to calculate and visualize how I spent my time, a presentation tool to bring that story to life, and reflected on how databases would support even larger-scale organization. Each of these applications served a unique purpose, and together, they helped me understand how choosing the right tool can really shape the outcome of a task.

Starting with the word processor, Microsoft Word, in this case it was the most natural tool for writing out a narrative of my day. It gave me the flexibility to structure my thoughts, use bullets for clarity, and tweak the formatting to make everything easier to read. According to CertMaster Learn Tech+, word processors are specifically designed for creating and editing text-based documents, making them perfect for journals, essays, and reports (Chapter 6.2). Their simplicity and flexibility are major advantages, but they’re not designed for data analysis or in-depth visuals. Outside of this assignment, I regularly use Word for the majority of my written assignments here at UAGC, personal notes, and drafting anything that requires polished written communication.

Excel, on the other hand, let me take that same set of activities and look at them in a completely different way. I entered the hours I spent on each task, calculated the percentages, and created a pie chart that showed where my time actually went. What stood out to me was how quickly I could verify that everything added up to 24 hours, and how clearly the chart displayed my daily balance, or lack there of. As the textbook explains, spreadsheet applications are powerful for analyzing, organizing, and visualizing numerical data (CertMaster Learn Tech+, 2022). The downside is that Excel can feel a little intimidating at first, especially when using formulas or formatting tools. But once I got the hang of it, I saw how useful it could be for things like budgeting, time tracking, or even project planning.

When it came time to present everything visually, PowerPoint gave me the structure I needed to create a slide-by-slide walkthrough of my day. I added suggested graphics, labeled each task clearly, and noted where animations could bring it all to life. The strength of presentation software is its ability to combine text and images in a way that’s engaging for the audience. However, it can be easy to focus too much on the visuals and not enough on the content if you're not careful. That said, I could definitely see myself using PowerPoint to create training modules or share updates in a team meeting, any time I need to communicate something clearly and visually. Research suggests that productivity and cognitive performance can vary significantly depending on the medium used; visual and multimodal formats often improve comprehension and retention in comparison to text alone (Oviatt, Arthur, & Cohen, 2006).

Although I didn’t directly build a database for this assignment, I did spend time thinking about how useful they are for organizing large amounts of information. CertMaster Learn Tech+ points out that databases are ideal when information needs to be accessed, related, and updated efficiently over time (Chapter 6.2). They’re especially good for long-term data, like tracking inventory or storing customer profiles. The tradeoff is that they’re a bit more technical, setting up relationships between tables, running queries, and designing interfaces takes more skill than opening a spreadsheet or typing into Word. Still, for scenarios that involve recurring or large-scale data, they’re the best tool for the job.

Looking at all four tools, I found Excel to be the most useful for this particular assignment. It let me capture time data, ensure accuracy with formulas, and create a visual representation of how my day unfolded. As a visual learner, this helped me really understand how my day is represented, and things I could move around to become more or less productive, as the situation presents. The pie chart alone made it easier to reflect on my habits than reading a journal entry ever could. While Word helped me tell the story and PowerPoint helped me present it, Excel helped me understand it.

Overall, this assignment helped me appreciate the different strengths of common software applications and how they can be applied in everyday tasks. Word processors are great for structured text, spreadsheets for analysis, presentation tools for communication, and databases for large-scale data management. Knowing when and how to use each one gives me a stronger foundation—not just for this course, but for academic, professional, and personal projects going forward.

Web Mobile App Critique

 The Blizzard Mobile/ PC App, created by Blizzard Entertainment, serves as a hub for fans of games like World of Warcraft, Overwatch, and Diablo IV. As someone who uses the app frequently to chat with friends, track updates, and manage my games, I’ve developed a solid understanding of its strengths and areas where it could be improved. From a usability standpoint, the Blizzard App is relatively user-friendly. The interface is consistent with Blizzard’s overall aesthetic—dark mode design, clean fonts, and easily recognizable icons. The homepage provides quick access to chat, news, account settings, and the game store. Navigation is intuitive for users familiar with Blizzard’s ecosystem, though newcomers may need a moment to get their bearings. A key usability feature is the seamless chat function, which mirrors what you’d find in the desktop Battle.net client.

image.png

In terms of design, the app sticks to a highly branded experience, incorporating visual themes from its top game franchises. The dark interface minimizes eye strain and helps spotlight game-related visuals. However, the design leans heavily into aesthetics, which occasionally sacrifices clarity. Some users may find icons or buttons less obvious, especially when updates shuffle features around. The app could benefit from small UI cues or tooltips that provide brief explanations of less-used functions.

The app’s functionality is where it shines and stumbles. Core features like real-time friend chat, news updates, and game tracking work well. Notifications for in-game events or new patches are timely and relevant. Account management—such as verifying login attempts or managing two-factor authentication—is smooth and secure. However, the app occasionally struggles with load times, especially when switching between screens like News and Shop. Additionally, the lack of direct game-launching (like on the desktop Battle.net client) limits its overall utility. Making an app like this with its high end functionality and design, while still remaining free to download is a great thing to the consumer. Obviously, without any of the Blizzard/ Battle.net programs having the app alone is just a fancy messaging app, but there is no reason to purchase if one doesn't feel like it. 

image.png

Recommendations for Improvement:

  1. Enhanced onboarding for new users: Adding a brief walkthrough or UI tutorial would help new users navigate features more confidently. While long-time Blizzard users are likely comfortable, those exploring the ecosystem for the first time might struggle.

  2. Optimize screen transitions and load times: Some screens (especially News and Account Settings) lag slightly when loading content. Streamlining back-end caching could improve responsiveness.

  3. Reintroduce game-launch functionality (even through remote desktop): While launching a game from the mobile app isn’t currently possible, allowing users to initiate a remote download or launch could bridge the gap between mobile and PC experiences—especially helpful for gamers managing large updates on the go.

In summary, the Blizzard App is a strong companion tool for Blizzard fans, offering solid design and useful functionality for chatting, browsing game news, and account management. With a few tweaks to performance and usability, it could evolve into a more essential part of the Blizzard ecosystem.

Programming Languages Post



We made a scratch post assignment this week. 

Scratch Project URL: https://scratch.mit.edu/projects/1161281531/


Engaging with Scratch provided an insightful introduction to programming logic and computational thinking. This exercise allowed me to construct a program incorporating various elements such as motion, sound, and control structures, culminating in a dynamic and interactive project.

Experience Building the Scratch Program

Developing the Scratch project was both educational and enjoyable. I struggled at first to really get the hang of what each command was wanting to do. I created a countdown sequence that transitioned into a dancing animation, complete with background changes and sound effects. Utilizing over 30 blocks, I integrated variables, loops, and event-driven programming to achieve the desired functionality. This hands-on approach facilitated a deeper understanding of how different programming constructs interact to form a cohesive program.

Insights Gained About Programming

Through this exercise, I gained valuable insights into the foundational concepts of programming. The visual nature of Scratch made it easier to comprehend abstract ideas such as loops, conditionals, and event handling. I learned the importance of logical sequencing and how small changes in code can significantly impact the program's behavior. This experience highlighted the necessity of precision and planning in programming.


Tech Topic Connection

 Throughout this course, I’ve explored many different aspects of information technology, but one topic stood out to me the most: how compute...