Posts

Showing posts from September, 2025

Tech Topic Connection

Image
 The Impact of Hardware Upgrades on Database Management Introduction Advancements in hardware technology have dramatically transformed the field of database management, allowing organizations to store, process, and retrieve data with unprecedented speed and reliability. As computing power has increased, so too has the capacity of databases to handle large volumes of information efficiently. This blog post explores how updates in major hardware components—such as processors, memory, storage devices, and networking equipment—have enhanced database management systems (DBMS), and how these updates connect to fundamental concepts of information technology (IT) and computer science. Hardware Components and Database Management Modern database management heavily relies on the capabilities of computer hardware. Central processing units (CPUs) with multiple cores and higher clock speeds enable faster query processing, while increased random access memory (RAM) allows more data to be held...

Network Security

Image
  Network Security   In today’s technology-driven environment, information and system security play a critical role in protecting individuals and organizations. For individuals, security safeguards sensitive data such as personal identification numbers, financial records, and login credentials. Compromised security can lead to identity theft, financial fraud, or even blackmail. For organizations, security is equally vital as breaches can result in reputational damage, financial loss , regulatory penalties, and a decline in customer trust. As technology continues to advance, cybercriminals adopt increasingly sophisticated techniques, making it essential for both individuals and organizations to adopt robust security practices (Laudon & Laudon, 2023).   One major security incident is phishing and smishing. Phishing refers to fraudulent email attempts to trick individuals into sharing personal data, while smishing involves similar tactics through text messages. Both rely...

Computers in the Workplace

Image
  Computers in Military Aviation Training            Computers are essential in military aviation training because they enable realistic, efficient, and safe instruction for aircrew members. High-fidelity flight simulators replicate real flight conditions, allowing trainees to practice complex maneuvers and emergency responses without the risks or costs associated with live flying. Networked simulators further enhance realism by connecting multiple trainees in shared scenarios, supporting both individual and team-based mission rehearsal. Computer-based modules also standardize training through digital assessments, feedback, and recordkeeping (CompTIA, n.d.).           Computer literacy is critical in this environment because modern aircraft, mission planning systems, and instructional tools are all computer driven. Aircrew must understand how to interact with avionics, data systems, and mission software. Without this proficienc...

Traveling Through a Network

Image
  Part 1: Ping Activity 1. Google 2.yahoo auctions japan 3. news Australia Part 2: Traceroute Activity 1. Google 2. Yahoo auctions japan 3. News Austrailia  Part 3: Traveling Through a Network Reflection Essay    While completing the ping and traceroute activities on my MacBook, I gained a clearer understanding of how packets travel through a network. A ping essentially measures the time it takes for a packet to travel from my device to a destination and back, providing roundtrip times and success rates. Traceroute, on the other hand, breaks down the journey into each “hop” along the way, showing the different routers and servers that handle the packet before it reaches its final destination. Together, these commands illustrate the complexity of internet communication and the number of systems involved in connecting to websites around the world.    When I tested Google, Yahoo Auctions Japan, and an Australian news site, I noticed distinct differences in bot...

Documenting a Day

Image
Introduction   Software applications are part of my daily life, both in school and at work. They make it easier to write, calculate, present, and manage information in ways that would take much longer by hand. In this assignment, I used Microsoft Word, Excel, PowerPoint, and a database program to document a typical day. Each program served a different purpose and showed me how much these tools can help organize and communicate information. This essay compares the functions of each application, explains their advantages and disadvantages, and shares which was most effective for documenting my day.   Word Processing Applications   Microsoft Word was the program I used to create my journal entry. The word processor made it simple to organize my thoughts, adjust the font and alignment, and follow APA formatting requirements. I was able to clearly describe my daily routine, list my tasks, and reflect on their importance. Word also made it easy to edit and make changes, which i...