Skip to main content

Posts

Understanding Java Through Object-Oriented Programming Concepts

 When beginning with Java, one of the most important things to understand is that the language is built around object-oriented programming (OOP). Rather than focusing only on writing instructions, Java encourages developers to think in terms of objects, classes, and how those pieces interact with each other. According to the Oracle Java tutorials, object-oriented programming introduces key concepts such as objects, classes, inheritance, interfaces, and packages, all of which are designed to model real-world systems in code . Understanding these concepts early on helps build a strong foundation for writing clean and scalable programs. Getting Started with Java Before diving into these concepts, setting up Java correctly is essential. Instead of outlining every step, I recommend using the official Oracle guide below, which provides a reliable walkthrough of installation and running your first program: https://docs.oracle.com/javase/tutorial/getStarted/cupojava/win32.html Using offici...
  Fundamental Concepts of Operating Systems Theory Introduction Operating systems serve as the foundational layer that enables modern computing systems to function efficiently, securely, and reliably. Throughout this course, my understanding of operating systems theory has expanded beyond surface-level definitions to a deeper appreciation of how core mechanisms, such as process management, memory management, storage, and protection, work together to support both users and applications. This summary blog post reflects on the fundamental concepts that underlie operating systems and synthesizes the insights gained while refining the final concept map. Features and Structure of Contemporary Operating Systems Contemporary operating systems are designed to manage hardware resources while providing a stable and convenient environment for software execution. Key features include multitasking, multiuser support, hardware abstraction, and fault tolerance. Structurally, modern operating syste...

The Internet of Things (IoT): Where IT Fundamentals Come to Life

  The Internet of Things (IoT): Where IT Fundamentals Come to Life Introduction The Internet of Things (IoT) connects billions of devices worldwide, embedding computing power and connectivity into everything from home thermostats to industrial machinery. These “smart” devices sense their environment, exchange data, and sometimes act autonomously, blending the physical and digital worlds seamlessly (Gillis & Yasar, 2025). What makes IoT fascinating is that it showcases how core IT fundamentals, hardware, programming, networking, databases, and security work together on a massive scale. From ARPANET Coke Machines to Today’s Smart Cities IoT’s origins trace back further than most realize. In 1982, Carnegie Mellon students connected a Coca-Cola machine to ARPANET so it could report inventory remotely — arguably the first “smart” device (Foote, 2022). Two decades later, Kevin Ashton coined the term “Internet of Things” to describe a world where computers could “sense” ...

Network Security

In today’s digital era, individuals and organizations are increasingly reliant on computer systems for communication, productivity, and data storage. With this reliance comes vulnerability to a variety of cyber threats. Strong information and system security measures are essential for protecting sensitive data, maintaining user privacy, and ensuring operational integrity (TestOut Corp., 2024). Without robust security, systems become susceptible to attacks that can lead to significant financial loss, reputational damage, and legal consequences. A major category of threats exploits the human element rather than technical flaws. This is known as social engineering, a manipulative tactic in which attackers deceive people into revealing confidential information or granting unauthorized access (Smith, 2020). Notably, the majority of security breaches stem from such human-targeted attacks; for instance, 68% of data breaches involve attacks on humans, not on technology (Office for Civil Rights...

Computers in The Workplace

Healthcare has become one of the most tech-driven industries on the planet. Computers are everywhere, from the check-in kiosk at your doctor’s office to the AI-powered systems behind the scenes that flag potential risks before a human even blinks. According to  CertMaster Learn Tech+  (TestOut Corp., 2024), information technology powers everything from electronic health records (EHRs) and diagnostic imaging to billing systems and secure provider communications. It’s less “computers are helping” and more “computers are running the place, but politely.” That’s why computer literacy isn’t optional in healthcare; it’s survival. Whether you’re scheduling appointments, interpreting lab results, or updating EHRs without accidentally violating HIPAA, knowing how to navigate secure systems is critical. Patient safety, privacy, and efficiency all depend on employees being fluent in the digital language of modern medicine. Without it, errors multiply, data leaks happen, and chaos moves i...

Traveling Through a Network

  Using the ping and traceroute commands gave me a clear picture of how packets travel across networks. A ping test works by sending packets to a server and measuring how quickly they return, while traceroute reveals the series of routers (or “hops”) that those packets pass through on their journey. Together, they show both the speed and the path of internet communication. Ping Results My first ping test to Google.com was very fast, with an average round-trip time of 22ms, ranging from 16ms to 25ms, and no packet loss (Figure 1). When I pinged Google.jp, the times were higher and more variable, with an average of 40ms and one spike reaching 91ms (Figure 2). Finally, pinging Google.cn showed an average of 20ms, with results ranging from 15ms to 26ms (Figure 3). In all cases, there was 0% packet loss, which indicates a reliable connection. These results highlight how geography and routing can affect speed. The closer servers (such as Google.com in the U.S.) had consistently lower lat...

Documenting a Day

Software applications are essential tools in academic, professional, and personal settings because they help individuals create, organize, analyze, and present information. In the “Documenting a Day” project, I worked with four major application types: word processors, spreadsheets, presentation software, and databases. Each application had a distinct role and offered different strengths and limitations. This essay will compare these applications, analyze their advantages and disadvantages, recommend which was most effective for documenting my daily activities, and describe additional scenarios where each would be particularly useful. Comparison of Application Functions Word processors, such as Microsoft Word, are designed primarily for composing and formatting text. In this project, Word allowed me to write a narrative-style journal entry that conveyed details of my day in a structured, readable format. Spreadsheets, such as Microsoft Excel, are built for organizing numerica...