Posts

Newbie-to-Newbie: Getting Started with Java and OOP

  Newbie-to-Newbie: Getting Started with Java and OOP Hey everyone! When I first started out, I thought I could get by just using an online compiler (and honestly, it worked fine for quick tests). But as soon as we started diving deeper into Java, I realized it made more sense to install Java on my computer and use an IDE. I went with IntelliJ, which actually walked me through the Java installation as part of the setup. It felt a little intimidating at first, but following the prompts and checking the official Java download page made it pretty straightforward. For anyone new, my advice is: start with an online compiler to get your feet wet, but don’t be afraid to install Java locally—it gives you more control and gets you closer to the “real” workflow. The Four Pillars of OOP (Made Simple) When people talk about object-oriented programming (OOP), they’re really talking about four main ideas. Here’s my “newbie-to-newbie” take: 1. Encapsulation Think of it like a medicine bottle...
Image
  Full Concept Map of Operating Systems Theory Jonathan Centeno The University of Arizona Global Campus CTP304 Pete Limon 9/29/2025                   The Fundamental Concepts of Operating Systems: A Concept Map Summary Understanding operating systems (OS) is crucial for grasping how modern computer systems function. Throughout this course, I have built a concept map that incrementally connected the major features, structures, and mechanisms of OS theory. The map visually represents how core components such as processes, memory, file systems, input/output (I/O), and security interact to form the foundation of operating systems. By integrating all five sections, I can now answer the focus question: What are the fundamental concepts that underlie operating systems? Features and Structures of Contemporary Operating Systems The first section of my concept map highlights the features and structures of contemporary operating systems. The featur...

Post 7: Artificial Intelligence in Healthcare

The rapid advancement of information technology has redefined how industries operate and serve their customers. Among the most transformative developments is the integration of artificial intelligence into healthcare. This final project explores AI in healthcare and its deep connection with the core principles of information technology, including computer hardware, software, programming languages, databases, and networking. It demonstrates how AI can enhance patient outcomes and operational efficiency while highlighting the significance of computer literacy for professionals in this evolving landscape. The purpose of this paper is to showcase how AI in healthcare exemplifies the key components of information technology while serving as a foundation for future learning and innovation in the field. AI connects to foundational IT concepts by utilizing basic computing processes, including data input, binary logic, and program execution. Programming languages like Python and Java are used t...

Post #6 – Network Security: Phishing & Ransomware.

Two major types of cyber threats that individuals and organizations commonly face are phishing and ransomware. Each represents a unique risk vector and can cause significant harm if not mitigated. In today’s digitally connected world, information and system security are more crucial than ever for both individuals and organizations. With an increasing reliance on internet-connected devices, cloud computing, and digital transactions, the potential for malicious attacks grows daily. These threats not only disrupt operations but can also result in financial loss, identity theft, or damage to reputation. Understanding the types of threats and how to protect against them is essential to building resilient and secure systems. Phishing Attacks   Phishing is a form of social engineering that involves tricking users into providing sensitive information like usernames, passwords, or credit card numbers. Attackers typically disguise themselves as trustworthy sources through emails, text messag...

Post #5 – Computers in Healthcare

In the healthcare industry, computers have become essential tools for patient care, data management, diagnostics, and communication. Electronic Health Records (EHRs) are at the core of modern healthcare IT, enabling providers to store, retrieve, and share patient information quickly and securely. Computers also facilitate advanced imaging technologies, such as MRIs and CT scans, which rely on high-performance processing power. Additionally, they are vital for billing systems, insurance verification, appointment scheduling, and telehealth platforms that connect providers and patients remotely. Computer literacy is crucial for healthcare professionals, from administrative staff to nurses and physicians. The ability to navigate EHR systems, input accurate patient data, interpret digital lab results, and communicate through secure messaging platforms is essential for efficient, error-free care. Without basic IT skills, healthcare workers risk data entry errors, compliance violations, and c...

Post #4 – Traveling Through a Network: Ping VS Traceroute.

Week 3: Using the ping and traceroute commands offered valuable insights into how data packets travel through the network. When a ping command is executed, the computer sends small ICMP packets to a specified destination. These packets then travel through various routers until they reach their target, and a reply is sent back. This process helps measure the roundtrip time between the source and the destination, allowing users to evaluate connection speed and reliability. Traceroute works differently by identifying each network hop a packet takes to reach its destination. It increases the Time-To-Live (TTL) value with each packet, mapping out the full path and showing where delays or failures occur. Based on the results, all successfully pinged sites including google.com, google.com.mx and google.com.au —had average roundtrip times around 49 to 51 ms, despite being tied to different countries. This suggests that Google uses local servers to minimize latency, making geographical location...

Post #3 – Documenting a Day

Completing this assignment during week 2 gave me a better understanding of how Microsoft Word, Excel, and PowerPoint can be used together to document, organize, and present information. Each part of the assignment challenged me to use different features of these applications in a practical way. In Word, I was able to focus on formatting, text alignment, and list creation while reflecting on a typical day in my life. This helped me see how Word can be used for more than just basic writing—it’s a tool for structured communication. In Excel, I learned how to input and calculate data related to my daily activities. It helped me better visualize how time was being spent throughout the day. Using formulas and formatting made the spreadsheet clear and easy to interpret. Finally, PowerPoint allowed me to transform my written and numerical information into a visual story. By using images, animations, and text, I was able to make my routine more engaging and easier to share. Overall, this experi...