Summary Blog Post Understanding the fundamental concepts underlying operating systems provides a solid foundation for comprehending the features, structures, and mechanisms employed by contemporary operating systems. This knowledge is valuable for a range of roles involving system administration, software development, and working with computer systems in various domains. While being in this course, I have gained new insights into how operating systems theory works as well as understanding the fundamental concepts that underlie operating systems. When these concepts combine, they form the foundation for the design and functionality of contemporary operating systems. Below are my responses for the final questions for this course. I will say that this course was a vast venture into how the theory and design of operating systems truly work and function. Describe Features of Contemporary Operating Systems and Their Structures St...
Posts
Applying Algorithmic Design and Data Structure Techniques
- Get link
- X
- Other Apps

Java Newbie? Come on In! Today we will be talking about applying algorithmic design and data structure techniques in developing structured programs. Do not fret; I intend to take you through this as a newbie to a newbie would! First, we need to understand what algorithmic design and data structure techniques are. A data structure is a particular way of storing and organizing data so that it can be used efficiently. Arrays, trees, linked lists, stacks, graphs, etc. are all data structures that allow us to perform different operations on data. Algorithm design is simply just a collection of different steps that will lead you to the correct output. The two work hand in hand by influencing each other more specifically the design of the end result. Are some algorithms and data structure designs better than others? In my opinion yes they absolutely can be. It is highly definitive on the desired output that you are seeking. Both of these complement each other to prod...
Java? What is that?
- Get link
- X
- Other Apps
Today I will give you some insight on where to download Java and an IDE to get you started with Java. You may already have Java installed on your computer or laptop. You can check by going to your command prompt and inputting this line below. If nothing appears, I recommend you head over to Java's Website and download it! Java (Link will take you direct to Java's website) If you are still having issues, I would recommend taking a glance at the following tutorials for guidance on installation and setting up. Java Tutorial Once you have downloaded Java, you will probably be like me. I saw it was downloaded, and my command prompt told me that it was..yet I couldn't find it? Turns out you need a IDE installed with it for it to work. I chose Netbeans as the tutorial I found recommended that specific IDE ( Netbeans Guide ). The tutorial also will walk you through the Hello World Program as well. Once you have your IDE And Java Installed, y...
Final Blog Post
- Get link
- X
- Other Apps
For the tech topic paper, I chose the topic of hardware components of computer systems. This topic interested me as I have loved building and researching computer builds. It has always fascinated me on being able to assemble and create exactly what I want out of a computer versus what some companies assumed I needed. I did my first one about six years ago and since then I have done many for friends and coworkers. It's fun planning the build-out and researching certain components based on the end users' needs. Everyone’s needs change from build to build and component to component. One person may need a high-end graphic build while the other guy may just want something to browse the internet and use basic software. Being able to sort through the different components and know what you are looking for is a great skill to have as there are tons of different options when it comes to hard drives, ram, graphics cards, cases, and processors. In this assignment, I will show how...
Network Security
- Get link
- X
- Other Apps
Network security is a very important thing when it comes to the world of Information Technology. Without it we would all be at the mercy of hackers and others. In this paper, I will discuss different types of ways that a network can be vulnerable; this includes Dos attacks, phishing, and computer viruses. Let’s start by discussing a DoS attack and how it can affect your network and/or computer. DoS stands for denial of service. “A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users” (What is a denial of service attack, 2022). These attacks utilize a massive amount of information and traffic sent to a specific network IP address. These then overflow the network causing it to shut down. The damage done by this can be huge to a company if it cannot function without its network. Take, for example, I play video games on a well-known platform ran by Blizzard. Blizzard is often hit with DoS attacks, and...
Computers In The Workplace
- Get link
- X
- Other Apps
For this week's discussion, I chose the telecommunications industry. I chose this one because that is the industry in which I am employed. Computers play a significant role in this industry. Specifically dispatching, taking customer calls, and communicating. Our dispatching system has two ends, one being the dispatcher and the other being the technician on the receiving side. Our dispatcher uses many computer programs to task jobs to technicians and does any communications via Microsoft teams to us if need be. Without computers, we would be where we were about 20 years ago with radios for communication. With our industry comes the excellent task of talking to our customers and addressing their issues. The person that picks up the phone has to use their computer to research the account using a program made for that. Then they have a different program to create a work order for that customer. That then gets dispatched to the technicians to assist the customer. Employees in this ind...
Traveling Through A Network
- Get link
- X
- Other Apps
Here are the results from my Ping Tests. Here are the results from my Trace Routes. Traveling Through a Network Reflection Essay So for this week's discussion, we will be breaking down how ping tests and trace routes work. The two are somewhat similar but have their differences. The ping test lets you send data via packets to the address that you have selected, and it sends back the allotted time that it took to get there. We use this at my job quite often, considering I work for a large ISP, and we get called out for trouble calls about packet loss. We use the command -t to send a continuous ping so it can gather a larger pool of data. It's quite simple if you are sending 100 and get back 90, you have a 10% packet loss. Trace Routes are a little different than ping tests. A traceroute gives you the path that your packet is traveling. When you have this data, you can see where there is any drop-off and where it was when this happened. This ...