Posts

Newbie to Newbie Blog Part Two

Algorithmic design and data structure techniques are at the core of creating efficient, structured programs. An algorithm is a logical set of steps for solving a problem, while a data structure organizes and stores information so those steps can run smoothly. The right combination makes a major difference in how fast and effectively programs perform. In large-scale systems such as a retail inventory database, efficiency is key because thousands of items must be processed, updated, and retrieved instantly to avoid delays in sales or restocking. Not every algorithm or structure fits every problem. Some designs are simple but slower, while others are more complex yet faster for large datasets. For example, insertion sort is easy to code but has an O(N²) runtime, while merge sort or quick sort handle large inventories more efficiently. When managing data, hash tables allow quick lookups for product IDs, while trees help organize items by categories or price ranges. The best choice depends ...

Newbie to Newbie: Java for Beginners

When I first started with Java, I was honestly a little nervous about setting everything up. The good news is that installing Java is not as intimidating as it looks. I went to the Oracle website to download the Java Development Kit (JDK), and I used the NetBeans IDE because it makes compiling and running programs really easy in one place. If you’re just starting out, I recommend checking out:  Oracle Java Tutorials – Getting Started YouTube: Java Programming for Beginners Both explain the process clearly without overwhelming you. Following those resources helped me get to the point where I could write a simple program that printed my name, which gave me the confidence that my setup was working. Once Java is installed, the next step is to understand what makes it different from other programming languages, and that’s where object-oriented programming (OOP) comes in. OOP is based on four main principles: Encapsulation is about keeping data and methods bundled together s...

Post #7: Tech Topic Connection

Throughout this course, I’ve learned how deeply connected network security and privacy are to the fundamentals of information technology. As someone working in fraud prevention and aiming to become a cybersecurity analyst, these two areas are not just topics of interest. They are at the heart of my career path. Understanding how computers operate is essential in cybersecurity. In both my coursework and real-world job experience, I’ve seen how systems process and transmit data and how cyberattacks can exploit those processes. The textbook introduced the IPOS model (input, processing, output, and storage), which helped me understand how each stage is a potential entry point for threats. Tools like Scratch also helped me understand basic program execution by showing how logic flows in real time using motion, control, and event blocks. Hardware components such as the CPU, memory, and storage devices are critical in securing information systems. Attackers often target these components using...

Post #6: Network Security

Cybersecurity is no longer just a concern for large organizations; it has also become essential for individuals. With so much of our personal and financial information stored online, information and system security play a vital role in safeguarding people and businesses from increasing cyber threats. Two of the most common and dangerous threats today are malware (particularly ransomware) and phishing attacks. These attacks can result in significant harm, including data breaches, financial loss, and identity theft. Malware is malicious software designed to harm, exploit, or turn off devices, systems, or networks. A specific and highly disruptive form of malware is ransomware, which encrypts a user's data and demands payment in exchange for access. These attacks often begin when a user unknowingly clicks on a harmful link or downloads a suspicious file. Once inside the system, ransomware can spread rapidly, especially in environments without adequate security protocols. As noted by M...

Post #5: Computers in the Workplace

As a Fraud Advisor in the credit card department of a bank, I witness everyday just how essential technology is to protect customers and keeping operations running smoothly. In today’s fast-paced banking environment, computers and secure digital systems are not optional. They are the backbone of fraud detection, communication, and customer protection. One of the most impactful technologies I work with is our real-time fraud detection system. It automatically flags unusual activity on customer accounts, allowing us to act quickly before the situation escalates. Without this system, identifying threats would take much longer, giving fraudsters more time to cause severe damage. Platforms like FICO® Falcon® Fraud Manager use predictive analytics and machine learning to detect up to 50 percent more fraud than traditional rule-based methods (Falcon Fraud Manager, 2025). This level of accuracy helps keep customer accounts safer while making fraud prevention faster and more efficient. Computer...

Post #4: Traveling Through a Network

Image
Running the ping and traceroute commands helped me better understand how information travels across the internet. These tools show how fast my computer can reach a website and the path that data takes to get there. When I tested websites like Google and Amazon UK, the results reflected the impact of distance and routing. Google had the fastest ping result with an average response time of 22 milliseconds, while Amazon UK was much slower with an average of 126 milliseconds. This difference makes sense because Google likely has a server closer to my physical location in the United States, while Amazon UK's traffic has to travel farther, possibly across the ocean, adding more delays and "hops" in the process. Traceroute provided a detailed map of each step the data made to reach the destination. These steps, called hops, represent routers between my device and the website's server. The traceroute to Google showed consistent hops with low response times, and a few timed ou...

Post #3: Documenting a Day

For a recent course assignment, I documented a full day in my life, my 30th birthday, using three types of application software: a word processor, a spreadsheet, and a presentation tool. Each program allowed me to organize, present, and reflect on how I spent my time in a different but valuable way. I began with Microsoft Word to create a journal-style entry detailing the day's events. From my early morning workout to family dinner and evening meditation, I used Word's formatting tools, including bullet points, bold headings, and alignment, to structure my thoughts. The platform made it easy to reflect on the experience in a clean, readable format. Next, I used Microsoft Excel to calculate the duration of each activity and visualize how my time was distributed. I applied formulas such as =SUM() to total my hours and =B3/24 to convert time values into percentages. I also created a pie chart to present my 24-hour day in a visual format. Excel helped me better understand how I bal...