Skip to main content

Posts

Showing posts from March 9, 2025

Information and System Security

Importance of Information and System Security Information and system security are essential for both individuals and organizations as they protect sensitive data, uphold trust, and ensure business continuity. For individuals, information security helps protect and safeguard personal data. It guarantees that personal information remains confidential against unauthorized individuals. Information security also prevents the risk of identity theft and uses security measures to protect individuals from financial scams and fraud. For organizations, information and system security are essential for maintaining a competitive edge. Implementing measures such as multi-factor authentication helps protect sensitive data and ensures customers are safeguarded against fraud. Businesses must prioritize their cybersecurity posture in their plans and business strategies. To do so, a business must safeguard its networks, ensuring that only authorized personnel have access and preventing unauthorized...

Education and Computers

 My experience as an Instructional Designer, using computers was an integral part of designing curriculum to fit the needs of students and educators.  In education, computers serve as information providers, facilitate interactive learning experiences, enable personalized learning through adaptive software, and provide platforms for online and distance learning. Instructional design is the process of developing effective and efficient instructional materials and activities based on learning and instructional theory. With the use of technology, instructional design has become an essential component of education.  (Jones, 2024) Instructional designers use software platforms to create eLearning courses for a variety of uses. Using computers to design courses requires tools such as Articulate and Adobe Captivate to create engaging content using animation, multimedia, and screen recording. Instructional designers use computer-based technologies; therefore, they need to be ...

Ping and Traceroute Commands

  Ping Activity For the Ping activity, I chose to ping Amazon.es and yahoo.es; both websites are from Spain. When I pinged both Amazon.es and yahoo.es, I sent 4 packets and received 4 packets with none lost. Both came back with the same round trip times.   Traceroute Activity For the traceroute activity I used the same websites. Both websites hopped 15 times. Amazon.es timed out twice while yahoo.es timed out seven times.  Traveling Through a Network Reflection Essay These tests showed me how data is transmitted and received within a specific time. The information contained in the packet that is sent contains fragments of information which is routed through the network. Each packet contains information about its source and destination and allows it to navigate through different paths to reach its final destination. These two commands help determine connection problems. Pinging a website or a computer can help the end user by checking the connectivity and...