Skip to main content

Posts

Featured Posts

Compendium Article 10: Essentials Unveiled - Mastering the Art of Selection in Data Structures & Algorithms

Recent posts

Compendium Article 9: A Newbie's Introduction to Object-Oriented Programming, Java, and tutorial links to keep you motivated

            Hello fellow Java noobs! As my journey continues further into the world computing and specifically programming, we’ve now arrived at Object-Oriented Programming (OOP) and Java. The names alone sound intimidating, but don’t worry! I'm here to explain what Ive learn to your ------from one beginner to another. Getting Started 1.       Go to the Oracle website or OpenJDK to get the Java Development Kit (JDK). 2.       Pick the JDK version that matches your computer (Windows, macOS, Linux) and download it. 3.       Open the downloaded file and follow the on-screen setup instructions. 4.       To check if Java is installed, type java -version in your command prompt or terminal. If you see a version number, you're all set! 5.       For writing Java code, you'll need an IDE (a program where you’ll write the code). Good options for beginners include Eclipse, NetBeans, Visual Studio Code, and IntelliJ IDEA. 6.       After doing some Google research I chose I

Compendium Article 8: Decoding Operating Systems: A Concept Map Exploration

  Operating systems, the backbone of modern computer systems, ensure optimal performance through functions like memory management, process coordination, and access control, facilitating smooth hardware-software interactions. This post dives into operating systems theory, examining the structures and roles of current systems in information sharing, memory management, file handling, and access control. Additionally, we will explore how these principles enhance efficiency and resource management in future courses and professions. Contemporary Operating Systems and Their Structures Today, we have more types of computing than when the first modern computer was built. These include traditional computing, mobile computing, distributed systems, and others, like cloud computing or real-time embedded systems. Operating systems, the heart of our computers, help hardware and software work together smoothly. They do many things, like providing a user interface (Silberschatz et al., 2013). An OS pro

Compendium Article 7: From Mainframes to Mobile - How TEC 101 Changed My Perspective on Computing History

Compendium Article 7: From Mainframes to Mobile - How TEC 101 Changed My Perspective on Computing History Are you new to computers and interested in the world of technology and how it affects people? If this is the case, a TEC 101 may be your ideal course. You will study the past and future of computers in this course, diving into their hardware and software components, the significance of networking and security, and even blogging. Throughout TEC 101, you will have the opportunity to investigate and apply best practices for blogging, confront and resolve any concerns or problems, examine the potential role of your blog as an educational tool, and plan for its ongoing maintenance and enhancement as you continue your education. TEC 101: Exploring Its Origins TEC 101 provides students with a foundational understanding of information technology by emphasizing the significance of the past and future of computers. This course begins by outlining the development of computers, from basic calc

Compendium Article 6: The Digital Guardian - Securing Information and Systems in the 21st Century

  Network Protection    Safeguarding confidential and sensitive information      Information and system security are vital for the success of any business or organization. To maintain a competitive edge as technology advances and the digital world becomes more interconnected, it is essential to safeguard private and sensitive information against unauthorized access and theft. Businesses must take a proactive approach to increase information and system security by developing a customized information security policy, developing secure and manageable passwords, remaining current on the latest technology security threats and vulnerabilities, configuring network security measures to prevent unauthorized access, infiltration, and data theft, and installing anti-virus software and other malware protection on all company-owned devices. This paper will present basic information on the importance of information and system security in today's digital age, as well as practical advice and metho