Skip to main content

Posts

Showing posts from June, 2022

The difference between explicit typed variables and implicit typed variables using examples.

  In this discussion we’re talking about variables, and the difference between explicit typed variables and implicit typed variables. So, I think it’s essential to find out what exactly is a variable? According to our text book, a variable is used to remember a value for later use. For example; Years is a variable which I can assign a value such as 10 to.   (Years = 10).   Python has two type of conversions. explicit type conversion and implicit type conversion. Explicit conversion, is when the user instructs the program to convert the data type to another data type, while implicit type conversion is when the interpreter knows what the conversion should be and does it for you automatically. Here is an example of explicit type variable conversion: num_int = 25 num_str = 15 print(“data type of num_int :”, type( num_int )) print(“data type of num_str :”, type( num_str ))   num_str = int (num_str) print(“data type of num_str after casting:” , type( nu...

Tech Topic Connection

  The Tech Topic I chose was Hardware components of the computer system. This topic relates to information technology and computer science concepts because so many hardware-related aspects of a computer contribute to computer performance. As we all know, a computer system comprises the hardware and software components necessary to support its operation. Therefore, it’s essential to remember that computer hardware components refer to the different pieces that make a computer. I often compare the hardware components of a computer to the different organs that work together to create a human being. It’s important to mention that computers rely on hardware and software to function correctly. When speaking of hardware components of a computer system, people always refer to the Motherboard, CPU, RAM, IO system, power supply, video display controller, Bus, and hard disk drive as the most essential. In reality, there are many hardware components. Computer Operating systems are programs ...

Computers in the Workplace

  For this assignment I choose healthcare because I work in this industry. Computers are usually used in almost every area in the healthcare environment, from top to bottom. They used computers to complete numerous tasks such as maintaining medical and patient data, financial information, scheduling, research and studies, communication and telemedicine, surgical procedures, inventory, teleconference, asset management. Having a solid base of computer literacy makes employees more dependable and provides a decent background for the everyday activities of healthcare professionals. It also prepares the healthcare environment to introduce and accept new technologies such as electronic health records and the electronic transfer of prescriptions. Having these abilities can positively impact the attitudes of end-users and patients. Although Computers have created opportunities for both positive and negative activities, using a computer increased efficiency and reduced human errors. Bes...

Network Security

  Information and system security are essential for individuals and organizations because of the potential threats they are exposed to. Most individuals and companies take the necessary steps to protect their information from data breaches, unauthorized access, and other disruptive data security threats to business and consumer data. One of the most common types of attack for which people use the PING command is the ping flood or ping of death. It's a type of Denial of Service (DoS) attack. An attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command. As I proceed with this assignment, I'll provide a high-level overview of security holes/ vulnerabilities and Social engineering. I will explain why computer systems are vulnerable to each kind of threat, Describe the symptoms and damage that each breach can inflict after compromising a system. I will also propose at least two recomm...

Documenting a Day

  As we are about to enter the third week of this course, I'm writing this essay about Microsoft applications and their advantages.   This week, we worked on assignments using Microsoft Word, Excel, and PowerPoint to speak of one day in our lives. The programs are different, but they have a lot of similarities and can be used interconnected together.  People mainly use Microsoft word for creating documents, such as brochures, letters, learning activities, quizzes, tests, and homework assignments. In my case, this week, I used it to document a day in my life. One of my favorite features of Microsoft word, which is very useful for various purposes, is its Navigation pane at the top. It is a visual representation of many functions. It is where you can select different functions depending on your need and make use of it conveniently. On the other end, Microsoft Excel is another great spreadsheet application used to manipulate stored data and PowerPoint to create slide sh...

Packets Traveling Through a Network

 For this post, I have decided to perform a few Ping and trace commands and analyze their results. As you can see in this screenshot, I pinged   Google.com. and the result shows 4 packets were sent and received and 0 was loss. The range of response speed was a minimum of 6ms, maximum of 8ms and an average of 7ms I did the same for Yahoo.fr and saw a big difference where  4 packets, four were received and 0 were loss. The range of response speed was a minimum of 89ms, maximum of 91ms and an average of 90ms. I also traceroute  Google.com, and youtube.com and the result shows that it takes 2 hops. The first hop is within my local network. Here, I have the hop number (1), the domain name/IP address (in this case a home router), then RTT1, RTT2, and RTT3 (Round Trip Time - the time it takes for a packet to get to the hop and back to the computer, in milliseconds). The only difference is that the round trip for google.com takes a little bit longer than YouTube Reflect...

Web/Mobile App Critique

The app that I decided to review today is  Fitbit. Fitbit is one of  the world’s leading apps for health and fitness. People use this app for many reasons. Some use it to track their day & progress over time, set goals, earn achievement badges & celebrate milestones. They also use it to find workouts, and nutrition programs, join communities and stay motivated on their journey. The app is available on IOS and Android platforms, and the latest version is 3.58. Fitbit app was created by James Park and Eric Friedman in 2013; It was built using java scripts programming language. The app also has other built apps available in it, such as peloton, Walgreens, etc., which allow users to connect with others and access different things. It is very user-friendly, and it works well with another Fitbit tracker and the smartwatch. This app consists of a health dashboard that shows various Fitbit measurements, metrics, and scores and informs you which are essential and why and what n...