Posts

Newbie to Newbie part 2-Algorithmic design and data structure techniques

Image
Algorithmic design and data structure techniques are used in developing structured programs to ensure that the program is efficient and effective. If you're new to learning algorithmic design, you may ask yourself, what is an Algorithm? And what are data structure techniques? Algorithms are defined as programs or a sequence of steps to solve problems. A Data structure is a type of storage mechanism for data. A few types are Linear and nonlinear data, Arrays, Strings, Stacks, Queues, graphs, and trees. Each of these types allows us to perform different operations efficiently. According to Geeks for Geeks," There are several algorithm design techniques that can be used, such as brute-force or exhaustive search, divide and conquer, greedy algorithms, dynamic programming, branch and bound algorithm, and randomized algorithm." The choice of algorithm design technique depends on the problem being solved and the problem's limitations. The algorithm choice is solely dependent...

Newbie to Newbie Blog- Part One

Image
  Hello Newbie, Let’s talk about Object-oriented Programming and Java. The four principles are encapsulation, abstraction, inheritance, and polymorphism. But before we get into that let’s discuss some programming concepts first. According to https://docs.oracle.com/javase/tutorial/java/concepts/index.html The following concepts provide an introduction of the syntax in Java programming. What Is an Object? An object is a software bundle of related state and behavior. Software objects are often used to model the real-world objects that you find in everyday life. A real-world example might be a pen, chair, table, computer, etc. What Is a Class? A class is a blueprint or prototype from which objects are created. A simple class can cleanly model state and behavior.  What Is Inheritance? An interface is a contract between a class and the outside world. When a class implements an interface, it promises to provide the behavior published by that interface. What Is a Package? A package...

OS Theory

Image
Categorize, describe, and give examples of the major functions of operating systems. An Operating System acts as an interface between the user and computer hardware.  An Operating System manages the computer's resources, such as the central processing unit, memory, disk drives, and printers. In addition, the operating system executes applications software. The purpose of an operating system is to provide a platform on which a user can execute programs conveniently and efficiently. The main task an operating system carries out is the allocation of resources, such as the allocation of memory, devices, processors, and information. The operating system also includes programs to manage these resources, such as a scheduler, memory management module, I/O programs, and a file system.   The primary functions of an operating system are:  ·          Memory Management-Keeps track of primary memory. ·   ...

Post #7 – Tech Topic Connection

Image
  The technical topic I chose is programming language. I find the topic to be fascinating as it is constantly evolving. "Computers originated from telephone switches in the early 1900s. Engineers realized switches could be used for performing calculations, with a switch's on position meaning 1 and the off position 0" (Vahid & Lysecky, 2019, sec. 1.1). Did you know that Ada Lovelace wrote the first computer programming language in 1883, not Charles Babbage? He created the device, not the code. Programming has significantly evolved since the golden days of programming. Programming is a part of the fundamentals of information technology. Information technology is used to create, store and communicate information electronically. Information technology courses focus on using computers, technology, hardware, software, databases (data and information storage), Networks, Telecommunication, and IT Professionals. Programming affects all of these things because it is the code th...

Network Security

Image
In today’s world, security is a main concern, especially since we are connected globally. One security concern is called a ping flood. A Ping flood, or ICMP flood, is a common Denial of Service (DoS) attack in which an attacker takes down a computer by overwhelming it with pings. There are several ping commands that can be used to facilitate an attack. The n command represents the number of times a request is sent. The l command represents the amount of data sent with each packet. The t command, used to continue pinging until the host times out. For a ping flood to be successful, the attacking computer must have access to more bandwidth than the potential victim. The attack involves flooding the victim’s network with request packets, knowing that the network will respond with an equal number of reply packets. The exhausted server is then unavailable to process legitimate requests. According to (Larsen, ...