Posts

Showing posts from February, 2021

Documenting a Day

Image
                                                                                                      Documenting A Day Generally, word processors, spreadsheets, databases, and presentation applications are tailored towards simplifying related activities and data manipulation to save time. Word processing applications such as Microsoft Word enable the creation of professional documents that cater to the organization and enhance the clarity of information (Synder, 1993). In my experience, working around word processors has been gravely important. Essentially, word processing applications are equipped with features that enable the user to appreciate various formats. Therefore, specifically working with Microsoft Word, my work more straightforward to create journal entries with the format instructed by my professor. I have enjoyed such features as font, setting the required spacing for my text, and an in-built grammar checker. The main advantage of using word processors is its ability to

Computers in the Workplace

Image
  Today computers are essential in healthcare. Among the major use of computers in healthcare includes computer-assisted therapy, care of critically ill patients, computer-assisted decision making, laboratory computing, medical imaging, and patient data analysis and storage. Lougheed  et al.  (2018) discern that computers can monitor heart rates, blood pressure and recording ultrasound data in healthcare. When used together with a medical computer cart, caregivers have all they need in one place to diagnose and engage with patients for better treatment.       Computer literacy in healthcare is thus crucial because it allows nurses to quickly access relevant information regarding a patient’s electronic health record and illness and treatment plan. Also, computer literate nurses can access such information as health reports from other team members and access to data from x-ray results and laboratory tests. Alamri (2018) asserts that a substantial level of computer literacy forms the basi

Programming Language

Image
     My experience building a program using Scratch       From my experience using Scratch, I believe there is a clear connection between Scratch and Computer science. Using Scratch has built confidence in me in creating things with computers and allowed me to explore coding using different programming languages. My first program was an animation that I created using blocks. I never got stuck with any syntax issues and any error messages since it uses blocks. I tried parallelism, which I later learned using Java and Python.  Difficulties I encountered building program in Scratch       Using Scratch doesn’t give the programmer full control of the program. Some of the functions and instructions have already been set within the blocks when using Scratch. Such programs cannot be edited to suit the programmer’s needs (Maloney et al., 2010). Since it uses a drag and drop method, which lets children perform actions quickly and easily, actual code is not given; hence full control of objects is

Network Security

Image
       Network security entails a multitude of technologies, processes, and devices. This domain refers to a set of configuration and rules designed to protect the confidentiality, accessibility, and integrity of computer data and networks using hardware and software technologies (LaBounty, 2020). Most organizations require network security solutions to protect them from ever-growing cyber threats. Hackers are always trying to exploit and find vulnerabilities in various areas such as devices, users, data, applications, and locations. Thus many network security management tools address individual exploits and threats and regulatory non-compliance. In network security management, many layers safeguard an organization's data since attacks can happen at any network security layer. Therefore, organizations employ computer gurus to model hardware, software, and policies designed to address all network layers. Furthermore, network security has three different controls mainly, technical,

Traveling Through a Network

Image
     A packet is simply a piece of information traveling through a network. To begin with a packet arrives at the router which is responsible in determining the IP address of the packet, the IP address usually centers back to the original device used having been placed by the IP protocol. When the router has determined the packet’s IP address then it is sent to that address. If the IP address is not found then the packet is sent to a backup router where hopefully its destination is determined if not then it is passed to another router until the destination’s IP is found.      A ping can be explained as a signal sent to a site that requires response. The ping sent to google.com brought positive feedback as shown in the diagram 1 below, it shows the ping reached its destination and feedback has been sent back. The trace route to amazon.jp is shown in diagram 2 whereby we see the ping having trouble reaching its destination hence the timed out error at the end. Finally the trace route sho

Web/Mobile App Critique

Image
  The application I chose for this weeks discussion was the   YouTube Web App. Usability Once a user loads the web app, he/she quickly notices a search box with a search button where one can search videos they want to watch. The search tool makes it easier and simple for a user to find a video of their choice without going through all the videos uploaded in the website's database. Additionally, it provides a microphone, an alternative to the search box, which can be very useful for physically challenged persons.  Besides, it has a user-friendly menu where users can click and view trending videos, browse the history of watched videos, liked videos, and your videos. The app allows users to create a list of videos to be watched later.    The app also provides a platform where users can create personal accounts using their email addresses to subscribe to videos they like and get notified whenever new videos are uploaded. This reduces the time and complexity, and saves data bundles for

Tech Topic Connection

     The fundamentals of information technology prepare students to succeed in their workplaces and future careers. Students usually begin their careers by establishing awareness of the role essentials to professional communications skill and leadership and their essentials for an organization's success. Information technology careers relate to the fundamentals of information technology through development. The fundamental of information technology is a discipline that trains students and trainees on building the skills professionally and ethically and use them for the organization's success. Various IT careers develop information technology fundamentals—learners, for instance, gain presentation management software skills, email, and word processing knowledge. A computer operates through capturing information, processing it, and giving outputs. Information technology fundamentals enable students to demonstrate digital literacy through the introductory study of operating systems