Posts

Showing posts from October, 2022

Network Security

Image
In today’s world, security is a main concern, especially since we are connected globally. One security concern is called a ping flood. A Ping flood, or ICMP flood, is a common Denial of Service (DoS) attack in which an attacker takes down a computer by overwhelming it with pings. There are several ping commands that can be used to facilitate an attack. The n command represents the number of times a request is sent. The l command represents the amount of data sent with each packet. The t command, used to continue pinging until the host times out. For a ping flood to be successful, the attacking computer must have access to more bandwidth than the potential victim. The attack involves flooding the victim’s network with request packets, knowing that the network will respond with an equal number of reply packets. The exhausted server is then unavailable to process legitimate requests. According to (Larsen, ...

Computers in the Workplace

Image
  The industry I chose is manufacturing. In Demilitarization and Semiconductors, the fields where I have the most experience, almost all processes are automated. We use ladder logic to connect devices such as instrumentation and pumps to function in a process line automatically.  Ladder logic is a programming language used to program a PLC. It displays a diagram with electrical notation and symbology used to show how electromechanical switches and relays are connected. We also control Robots and many other pieces of equipment through information technology. Computers and computer programs are used for several steps in the process line to keep production running more efficiently. . All maintenance employees are also tasked with learning CMMS systems; these are maintenance tracking systems. PMs and other data are collected through these programs. In addition, employees also use Microsoft applications such as word and excel to document daily activities and equipment data. Informa...

Traveling Through a Network

Image
  This exercise was my first time using the ping and traceroute commands. Because I am using a Windows computer, I began both commands by right-clicking on the Start button, selecting “Run” and then typed in “cmd.” This takes you to a command screen. This is where you type in either “ping” or “tracert”, a space, and then the website. PING is the abbreviation for “Packet InterNet Groper.” When you ping a website or IP address, you send 32-bit packets of data out and hope for a reply. A successful ping will result in four replies that echo the packets of data sent out and the response time. I tried this for three different websites: Google, Yahoo, and the President of Ukraine’s website. These pings resulted in minimum, maximum, and average times for all four packets of data sent out. Google had an average round trip time of 129ms. The second website that I pinged was president.gov.ua, It had an average ping time of 65ms, which was surprisingly faster than Google. Yahoo was slower tha...

Documenting a Day

Image
  This week I documented a typical workday in Microsoft Word, Excel, and PowerPoint. In each application, I created a list of 10 activities that I perform on a typical day. I wrote a very basic and simplified description of my workday. I wrote my list differently in each application. The version of my day in Microsoft Word was a short story describing my day through text. I tried to keep the details of the events brief. I could have added a table like I did in Excel, as well as pictures of the events of the day, but I felt that those items were more suited for the Excel and PowerPoint portion of this assignment. However, Word does have functions available to add pictures, charts, graphs, etc. In a work or education setting, I usually don’t feel the need, or it’s not required to add images to Word documents; however, it is possible. When I used Microsoft Excel, my description of my day was the most to the point and was more of a timeline with numbers than anything else, as this ...

Web/Mobile App Critique

Image
  The Mobile App I decided to review is Candy Crush Saga. I have been playing this puzzle game for almost a decade.   Currently,  there are 12,275 levels ; this  game can last a lifetime if you choose to play that long. The objective is to match at least three of the same-colored candies in a row to clear areas of the board. There are several different special candies you can use to help clear the board. Here is how  the special candies  work: Striped Candy: This is made by matching four  Candies in a straight line. When matched, the Striped Candy removes all the Candies ,  either a horizontal or vertical line across the board. This is determined by the direction of the stripes on the candy. Wrapped Candy: Wrapped Candies are made by matching five Candies in an “L” or “T” sh ape. The Wrapped Candy explodes, taking out all the surrounding Candies. Color Bomb: Match five Candies in a straight line to make a Color Bomb. Swap th e Color Bomb with...

Programming Languages

Image
  This week I learned basic information on programming languages through reading assignments and practice sections in our textbook,  TEC 101: Fundamentals of Information Technology & Literacy  (Vahid, 2019). I learned about different programs such as high-level language, assembly language, and Python. There are exercises to familiarize the student with the program languages. Later I learned Scratch's basics by using hands-on application practice. Here is the project I created through that exercise.   https://scratch.mit.edu/projects/743712300   I started playing around with Scratch when I had free time over the weekend. I noticed that the commands were basic and easy to piece together. I found the Tutorial "Getting Started" To be very informative. There are other options to start events, but I just wanted a simple click of a button to start the animation. Once I determined how to start my sequence of events, I needed to build sprites to accomplish my p...