PROJECTS
International Students and Refugees
The Rewards of Cultural Exchange and Support
Posted At: 2016-05-10 04:00:00
Edited At: 2016-05-10 04:00:00
<p>Researching cultural differences is a vital part of being an Ambassador, to help International Students properly integrate in Canadian society you need context. Every student has challenges, and researching helps point out culture shock from personal feelings. It is very rewarding supporting students from other countries. In my spare time, after becoming an Ambassador, I study Japanese and will be interested in taking a course at Saint Mary's University.</p>
<p>Recently, I have helped in welcoming refugee families to our community. I was asked by my Multicultural Club leader if my family would be translators for sponsoring churches in my area. They said yes, and although I cannot speak Arabic well, I understand the culture and am very proud to be a part of the welcoming committee and volunteer for the sponsor of the Hill Grove Baptist Church.</p>
<h3>Final Thoughts</h3>
<p>I found out so much about the world and I still have so much a want to learn, It's the thing that keeps every day, a great day. I am looking forward to the rest of my life, there is nothing more inspiring than, finding out about the world around you. I want an adventure. If I had never decided to be an ambassador, I think my life would have been a very sad one, filled with sameness, but now I’m surrounded by very different cultures every day, I love my life.</p>
Sort List Dynamically
This program sorts a list of up to ten integers. After each integer is added to the list, this program will sort the list using pointers and a bubble sort algorithm.
Posted At: 2024-02-13 17:00:00
Edited At: 2024-02-13 17:00:00
Sensors
This Android application uses gravity and touch. The goal of the game is to have the circle or Ball object (which is controlled either via sensors or by touch) have contact with the Blue Square. Once the ball interacts with the Blue Square, the 'Win' scor
Posted At: 2020-01-22 05:00:00
Edited At: 2024-02-13 17:00:00
Server Hardening
Windows 2016 Server Security is an important issue when planning network deployment and architecture. Understanding what needs to be done to ensure security is an important step.
Posted At: 2020-01-09 05:00:00
Edited At: 2024-02-13 17:00:00
Android Google Maps App
This project is a Google Maps API application, with custom markers and map drawing.
Posted At: 2019-12-18 05:00:00
Edited At: 2019-02-18 05:00:00
Movie Reviews Using MongoDB
Analyzes thousands of users' movie reviews using MongoDB.
Posted At: 2019-11-27 05:00:00
Edited At: 2024-02-13 17:00:00
<h3>worstMovies(score, noRevs)</h3>
<p>The following program takes in the number of ratings and the rating value to determine the 'worst' movies. The arguments entered help create rules for how low a movie's average rating can be to be considered bad and the minimum number of reviews a movie needs to count as a highly reviewed movie.</p>
<h4>CODE:</h4>{code_snippet_id=1}
<h3>avgMovieRating()</h3>
<p>The following program finds the average review for all movies in the database.</p>
<h4>CODE:</h4>{code_snippet_id=2}
<h3>whtWatching(userid)</h3>
<p>The following program uses the given user id to find out what they have been reviewing.</p>
<h4>CODE:</h4>{code_snippet_id=3}
Bookkeeping and Automation
On Tuesday, November 19, 2019, I attended an event titled 'Pathfinder: Bookkeeping & Tax: Automation' where Julie Walters, the founder of Pathfinder spoke about how to automate bookkeeping. The topics discussed are listed below.
Posted At: 2019-11-19 05:00:00
Edited At: 2019-11-19 05:00:00
IT Generalist First Year
Short Term: Pass all my courses, for the first year of IT Generalist. This will be a goal that I will regularly monitor my grades to make sure I am on track.
Posted At: 2018-10-30 04:00:00
Edited At: 2018-10-30 04:00:00
Remain Current in IT
Long-term Goal: Remain current in IT. By regularly attending IT events and researching trends regularly.
Posted At: 2018-10-30 04:00:00
Edited At: 2018-10-30 04:00:00
Computer Science Degree
Mid-Range Goal: Graduate with a computer science degree from Dalhousie University, by regularly monitoring grades for each semester.
Posted At: 2018-11-14 05:00:00
Edited At: 2018-11-14 05:00:00
IT Generalist and the Future
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 18Posted At: 2018-12-03 05:00:00
Edited At: 2018-12-03 05:00:00
I attended Saint Mary’s University in 2017 with the intention of graduating from the Bachelor of Commerce program. During the second semester, I realized that I did not enjoy theory-based learning, instead, I needed to find a program that interested me more and that was rewarding. In the summer of 2018, I learned about the IT Generalist course at NSCC on the Burridge campus. I felt had the patience and organization skills, to succeed in an IT-related field. After graduating from the IT Generalist program, I hope to have a job in programming. I see myself in five years as a software engineer.
Study Topic: Excel
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 18Posted At: 2019-01-21 05:00:00
Edited At: 2019-01-21 05:00:00
I have chosen to research Microsoft Excel’s functions and features. Excel is a spreadsheet program made by Microsoft for manipulating data. Excel can organize, calculate and display data and charts.
I have chosen to research Excel because I find that it would serve as a very useful skill in potential IT-related jobs. Most small organizations can not afford to hire a data analysis and an IT Programmer, so understanding how spreadsheets work and how to create them is an extremely important asset.
Resources I plan on using for my study are;
LinkedIn Learning also is known as Lydia.com, as my main resource for research. LinkedIn Learning is an educational video platform that is taught by industry experts.
Support Center, Excel Help. Support Center is a source for Microsoft client’s questions to be answered and moderated by Microsoft employees.
Stack Overflow. Stack Overflow is a great tool for troubleshooting a wide range of programming and data issues. Stack Overflow is an educational website, where others in the same field can help resolve a user’s inquiry. I have used this tool many times when searching programming inquires.
YouTube, there are many YouTube videos created by educators that explain how to accomplish Excel specific goals.
Topics I will be covering in this report are;
Skills and Expectations for my study.
Timeline for study and case study finalization.
A descriptor for the use of Excel features.
A descriptor for the use of Excel formulas.
How I will assess my learning, Final Assessment.
?I look forward to completing a self-directed study for this course, ICOM 3010. In this proposal, I will include a rationale for my topic, the resources I plan on utilizing, and the skills I plan on acquiring after my study. I have developed a timeline and an assessment tool in the form of case studies to allow me to be evaluated in this self-directed course.
Skills and Expectations
I believe my current skills in programming will help me be successful in researching Microsoft Excel. I have a strong interest and skill in programming and find programming and Excel are very similar. Both programming and Excel software deals primarily with having a set script language for functions and manipulating variables by utilizing preset functions. Because I find a great number of similarities in programming and Excel, I believe my programming experience will help me greatly in my research.
I expect throughout this study to be able to learn to use Microsoft Excel to create formulas, functions, and macros, to a level that I could pass information off to a data user to complete their daily tasks.
Timeline
I have broken down my study into two main topics, functions and features that will be accomplished at different periods of time. Each week, we are given 4 hours to complete research for our study, that I have set research goals for. I will stop many times during my study to assess what I have learned and see how I can create a spreadsheet to show my learning, see Appendix 1 for details. The five spreadsheets will be created from detailed case studies describing who will be using the data and its purpose to the user or organization.
Features
Excel Features make viewing important spreadsheet entries easier through the use of headers/footers and conditional formatting. Excel features can also help users see trends in data via graphs, sparklines, and trendlines.
Formulas
One very important topic I will be studying is formulas, a large part of creating business professional spreadsheets is utilizing formulas. Excel formulas are often used to perform automated math operations to data in the spreadsheet.
Final Assessment
I will deliver my final assessment in the form of five case studies. These case studies will explore a user or organization that will benefit from visualizing data, examples being office supplies cost, seat capacity for a week and payment/interest budget. I will be assessed on how well I was able to create a detailed spreadsheet based on the predetermined wants and needs of the data user.
By following this detailed proposal commencing January 21, 2019, I will begin to research functions and features in Microsoft Excel. In between studying new concepts, I will begin creating spreadsheets based on case studies. The case studies will be accurate representations of new learning. In the research process, I will be using LinkedIn Learning as a resource. The completed case studies will be used as an assessment tool for the evaluation of my learning.
Skills Inventory: Updated 12.12.2018
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 18Posted At: 2019-04-19 04:00:00
Edited At: 2019-04-19 04:00:00
Listed below is a list of skills I have demonstrated since enrolling in the IT Generalist program.
Information Technology Skills:
- Design and build database management system with MySQL
- Observe and update data using the appropriate technology
- Essential skills to develop and maintain a website
- Two years with experience working with Python, HTML, and CSS languages.
- Two years with experience working with Linux and Windows operating systems.
- Use a range of software technologies (e.g. e-mail, MS Word, Excel)
- Build Local Area Networks
- Manage server virtualization with cloud services
Miscellaneous Skills:
- WHMIS and OHS certificate
- Demonstrate interest, effort, and attention to detail
- Committed to assisting others.
- Assess a situation and identify the root cause of its problem
- Work independently or as part of a team
- Continuously monitor the success of a project or task and identify ways to improve
Organizations Structure
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 18Posted At: 2019-02-28 05:00:00
Edited At: 2019-02-28 05:00:00
Understanding how organizational archetypes work is imperative to understand the organization you are working for, and whether the organization prioritizes money or employee behaviour. In this document, I discuss the five archetypes of organizational culture, organization charts, business models and business cycles.
The Five Archetypes of Organizational Culture
The five archetypes of organizational culture are:
1. Customer-Centric Culture
A customer-centric culture is a way of doing business, where customer experiences are at the forth-most importance of an organization’s decisions. The most important part of a customer-centric strategy is for an organization to listen to customers' feedback with an open mind, and learn from it by putting it to action.
Employees of a customer-centric organization must think of how to intentionally think about how to improve customer experience, this can be accomplished in 3 steps:
Look for opportunities to make the organization better for customers.
Look at the opportunity, as something you can accomplish.
Finally, do something to bring the opportunity to life.
2. One-Team Culture
One-team culture is a Japanese-style way of doing business, where the main interest of the organization is to have employees work in a group to achieve goals. One-team culture is built on sharing, trust, perspective leaning, openness and the belief that people generally have good motives.
3. Innovation Culture
The culture of innovation is a way of doing business, where the main interest of the organization is to encourage innovation within the organization. Encouragement of openness in learning, risk-taking, and curiosity are all attributes of innovation culture.
4. Achievement Culture
The culture of achievement is a way of doing business, where the main interest of the organization is to achieve goals. Achievement culture is built on accountability, healthy confrontation, communication and truthfulness.
5. People-first Culture
The people-first culture is a way of doing business, where the main interest is treating employees well. A people-first culture is built on trust, second chances, training, opportunity and a lack of hierarchy. Because the employees in people first culture tend to be treated well, people-first culture creates a culture of loyalty and better performance overall.
Table 1 Example of an organizational chart used to chart employment ranks.
Organizational Charts
An organizational chart is a diagram that structures an organization's relationship with its positions. Organization charts can be used to chart the organization's workforce, and staff performance. For an example of an organizational chart for a gaming company, See Table 1.
Business Models
Business models show how an organization earns money, by creating and viewing an organization's economic value. Business models are very important for an organization to make decisions based on trends represented in its business model. The business model structure can change greatly depending on the organization's preferences. An example of what a business model would measure would be cost and revenue over a period of time.
Business Cycle
The business cycle represents an organization's rise and fall of GDP occurring over time. It is important for organizations to understand their trends in a business cycle, this way organizations can make sensible management decisions where finance is considered.
The four phases in the business cycle are:
Expansion phase: Expansion represents when economic growth strengthens. Expansion happens between trough and peak
Peak phase: Peak happens when expansion moves into the contraction phase.
Contraction phase: Contraction represents when economic growth is weakening. Contraction happens between peak and trough.
Trough phase: Peak happens when contraction moves into the expansion phase.
Excel Progress Report
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 18Posted At: 2019-02-26 05:00:00
Edited At: 2019-02-26 05:00:00
As planned my study began on January 26, 2019, thus far I have learned about Excel's functions and created two case studies based on my knowledge.
Topics I will be covering in this report are;
• Analysis of Study
• Expectations
As of now February 23, 2019, I am directly on track with my study, currently, I am transitioning from researching Excel’s functions to learning about its basic features.
During the week of January 23, 2019, I studied functions SUM, COUNT, AVERAGE, MAX, MIN and
ROUND respectively. The week of February 02, 2019, I created a case study that describes an air travel company’s flights over a period of seven days detailing the volume of passengers. Statistics are based on daily flight capacity, were created from using functions that I learned from the week prior. Another area I focused on during the week of February 02, 2019 was learning functions IF and SUMIF. In keeping with my work plan, the week of February 09, 2019, I researched functions COUNTA, PMT, IFERROR, VLOOKUP and HLOOKUP.
Finally, on the week of February 16, 2019, I started my most recent case study that creates statistics on students based upon the grades achieved in a course. Statistics are created using the functions I’ve learned in the study thus far.
Analysis of the Study
In my opinion, I have completed fifty percent of my goal, thus far because I have completed four of the nine learning objectives I have set out for this study. It is now February 23, 2019, I have created two case studies based on my study of Excel’s functions. In keeping with my schedule, I will be beginning to learn about basic features, such as doing math with dates, headers/footers, and how to switch between relative, absolute, and mixed cells. On April 09, 2019, I would have created 5 case studies, two based on Excel's functions and three based on Excel's features.
Expectations
Going forward if there is a task not completed on schedule, my plan completes the task, on the weekend following the set time frame, this way I do not fall far behind in my study.
Networking
In career fields networking is one of the most important skills to have. Here I will share an example of a networking event I attend hosted by Juliana Kroscen, a UX/UI Designer at HomeExcept. Where I learned very important skills to have when developing s
Posted At: 2019-04-07 04:00:00
Edited At: 2019-04-07 04:00:00
<p>In career fields, networking is one of the most important skills to have. Here I will share an example of a networking event I attended hosted by Juliana Kroscen, a UX/UI Designer at HomeExcept, where I learned very important skills for developing software.</p>
<h3>The Importance of Networking</h3>
<p>Networking is the act of getting to know people in your line of work, and it is a critical skill for all professions. To remain current, people in the IT branch should look at the skills employers are seeking and the preferred skills in their field. After identifying the most important skills to acquire, plan how to obtain them through online tutorials, workshops, classes, and volunteering. Networking is crucial to my career field because the ideas and skills it teaches will help me stay relevant.</p>
<p>Networking plays a significant role in job searches; in 2016, 70% of people were hired at a company based on connections within the organization. Building your personal network can be done by meeting new people, attending meetings and events, and joining online networks on websites such as LinkedIn, where users in the same field can interact.</p>
<h3>HomeExcept</h3>
<p>On Friday, January 18, 2019, I attended an event called ‘Customer Focused Design: The Story of HomeExcept,’ where Juliana Kroscen, a UX/UI Designer at HomeExcept, spoke about creating an app for users. This event was recommended to me by one of my teachers due to my interest in programming. HomeExcept allows the user to monitor a dwelling or business without the use of a camera, using sensors to detect activity in the home. This app is popular with grown adults who want to monitor their parents' well-being. Learning about the process of how HomeExcept creates an app and a product for their market was very useful.</p>
<p>Some of the steps HomeExcept took to create a market-focused product/app are:</p>
<ul>
<li><strong>Privacy:</strong> This product allows the user to monitor a room/building without the use of cameras, ensuring the privacy of the people inside the monitored space.</li>
<li><strong>Ease of Use:</strong> HomeExcept simplified its app, making it easy to use, focusing on what users really needed.</li>
<li><strong>User Persona:</strong> Creating a specific type of person who would use the product and evaluating how useful the product would be to them.</li>
<li><strong>Pencil before Pixels before Development:</strong> Before creating something digitally, it is essential to sketch it out. Before development, creating a digital prototype and gathering user feedback is crucial to saving costs.</li>
<li><strong>Prototyping:</strong> HomeExcept uses Invision, a prototype tool, to create clickable prototypes for their app.</li>
</ul>
<p>Reflecting on what I have learned, networking is an immensely important asset to have. By having an actual industry app designer visit NSCC, I was able to gain perspective on what is involved in designing software, whereas before, I was only able to see the process as a software developer. Now I can understand all the ups and downs one must take when creating software.</p>
Volunteer Work at a Technology Repair Company for Field Experience
From June 23, 2019, to August 04, 2019, I volunteered at a technology repair company named "Ram Computers", where I completed the following tasks:
Posted At: 2019-08-22 04:00:00
Edited At: 2024-02-14 20:10:25
<p>From June 23, 2019, to August 04, 2019, I volunteered at a technology repair company named "Ram Computers", where I completed the following tasks:</p>
<ul>
<li>Set-up Routers.</li>
<li>Clean computers of any potential viruses / malware / spyware / cookies.</li>
<li>Set-up and manage a Facebook page for a multitude of events.</li>
<li>Build a professional website with the following features: Shop Inventory, Contact, and Collapsible Common Questions.</li>
</ul>
<p>My experience at Ram Computers provided valuable field experience in technology repair and allowed me to contribute to various tasks, including router setups, computer maintenance, social media management, and website development. These hands-on experiences further enriched my skills and knowledge in the technology field.</p>
Skills Inventory: Excel
My research on Excel is now completed. Upon finalizing my goal, I realized that my research study has not only helped me understand Excel better but has also given me practical industry skills.
Posted At: 2019-04-14 04:00:00
Edited At: 2024-02-14 20:12:35
<li><strong>Ability to use concepts across different disciplines:</strong> I am able to apply skills and knowledge from the past in new situations. I was able to utilize my programming skills when creating Excel spreadsheets during a project.</li>
<li><strong>Present data in a variety of formats and platforms:</strong> During a long-term project, I practiced data presenting skills by locating, gathering, and organizing information using a variety of technology.</li>
<li><strong>Research:</strong> I was able to research topics with an extensive range of sources with consistent and proper citations.</li>
<li><strong>Organization:</strong> I have strong organizational skills, as seen in my case studies. When creating my case studies, I had the ability to multitask and prioritize my workload, I was detail-oriented, and driven to achieve positive results.</li>
<li><strong>Self Management:</strong> I have practiced self-management skills, I was able to assess, weight, and manage risk during a long-term project.</li>
<li><strong>Time Management:</strong> Previously, I have practiced time management skills during a long-term project by setting time-bound goals, identifying strategies, and acting.</li>
<li><strong>Identify the root cause of a problem:</strong> I have practiced problem-solving skills during a long-term project. When I would receive unwanted outcomes, I assessed the situation, drawn the solution, tested and lastly, I would troubleshoot methods based on logic.</li>
<li><strong>Structure and Organize data:</strong> I was able to create Excel sheets that follow development processes, usability, and adhere to current industry standards. When I was creating my case studies, researching how to properly layout a document was very important to my success.</li>
<li><strong>Independence:</strong> I am able to work independently on projects. I have practiced independence skills during a long-term project where working alone was very important for my success.</li>
<li><strong>Communicate:</strong> In the past, when working on a product, I always make sure to ask questions to understand how others would like that product to look and function well.</li>
</ul>
<p>View some examples of Excel projects I've created <a href="http://dianah.infinityfreeapp.com/project_details.php?id=39">here</a>.</p>
How to be Articulate; Interpersonal Communication
There are three major steps in being articulate, these are; sounding more intelligent, be more well-spoken and going the extra mile...
Posted At: 2019-10-02 04:00:00
Edited At: 2024-02-14 20:17:44
<p>There are three major steps in being articulate, these are; sounding more intelligent, be more well-spoken and going the extra mile.</p>
<h3>Be Informed</h3>
<ol>
<li><strong>Expatiate:</strong> Know about the subject matter of which you are explaining. If you are not well-versed in the subject matter, make sure to let others talk.</li>
<li><strong>Learn about alternate perspectives:</strong> When researching topics, it is good practice to understand where other theories and thought processes come from. Learning about other perspectives is great; you can be prepared for counter-arguments.</li>
<li><strong>Speak with passion:</strong> Have a desire to add something to a conversation.</li>
<li><strong>Speak carefully:</strong> Think about what you will say before you say it. Pausing can be a great tool in conveying a message, making the presenter seem more thoughtful and intelligent.</li>
<li><strong>Expand your vocabulary:</strong> This creates color in your speech. If you do not understand a word, make sure to research its meaning.</li>
<li><strong>Do not use slang:</strong> Speak in full sentences and do not use contractions.</li>
<li><strong>Use correct grammar:</strong> Example: do not use double negatives.</li>
<li><strong>Confidence:</strong> Accomplished by making eye contact, believing in your words, and speaking loud enough for people to understand you.</li>
<li><strong>Improve posture:</strong> Try not to hunch over. While talking, do not cross your arms over your chest or put your hands in your pockets.</li>
<li><strong>Be prepared:</strong> Prepare and rehearse what you will say. Study the presentation to a point where you can change it if needed.</li>
</ol>
<h3>Be Well-Spoken</h3>
<ol>
<li><strong>Be concise:</strong> Be specific about what point you are trying to make.</li>
<li><strong>Avoid verbal pauses:</strong> Verbal pauses detract from the presentation flow.</li>
<li><strong>Speak more slowly:</strong> This is beneficial when getting a message across to the audience. Speaking slowly shows that you are thinking about what you have to say and makes it clear to the audience.</li>
<li><strong>Use your hands:</strong> Use hands to direct your audience, like a maestro in a band. Talking with hands can add confidence to what you say.</li>
<li><strong>Limit distractions:</strong> Keep your phone on silent and stay in the moment, so you will not lose your train of thought.</li>
</ol>
<h3>Going the Extra Mile</h3>
<ol>
<li><strong>Expand your knowledge:</strong> Watch the news and read more books (both fiction and non-fiction).</li>
<li><strong>Learn about your Audience:</strong> To know your audience is important, so you can adjust your vocabulary and references accordingly.</li>
<li><strong>Tell a Story:</strong> Stories are a comfortable way to get a point across.</li>
<li><strong>Get Inspired by Others:</strong> Watch speeches and take notes.</li>
<li><strong>Make your Content more Interesting:</strong> Include stories and engage listeners.</li>
<li><strong>Join a Public Speaking Club:</strong> Surround yourself with people that have the same goals as you.</li>
</ol>
Skills Inventory: Updated 10.11.2019
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 18Posted At: 2019-10-11 04:00:00
Edited At: 2024-02-14 20:20:40
<p><strong>Information Technology Skills:</strong></p>
<p><strong>Software Development Skills:</strong></p>
<ul>
<li>Over two years of experience working with Python and Java languages.</li>
<li>Conceptualize, develop, and test Android applications.</li>
<li>Practical experience programming in C++ and C#.</li>
<li>Capable of creating UML diagrams based on customer needs and process flows.</li>
</ul>
<p><strong>Database Skills:</strong></p>
<ul>
<li>Design and build database management systems with MySQL.</li>
<li>Strong understanding of source versioning tool, Git.</li>
<li>Observe and update data using the appropriate technology.</li>
</ul>
<p><strong>Website Development Skills:</strong></p>
<ul>
<li>Essential skills to develop and maintain a website.</li>
<li>Two years of experience working with HTML and CSS languages.</li>
</ul>
<p><strong>Networking Skills:</strong></p>
<ul>
<li>Build Local Area Networks.</li>
<li>Manage server virtualization with cloud services.</li>
</ul>
<p><strong>Other IT Related Skills:</strong></p>
<ul>
<li>Use a range of software technologies (e.g., Outlook, MS Word, Excel).</li>
<li>Two years of experience working with Linux and Windows operating systems.</li>
<li>Develop and maintain documentation appropriate for entry-level Information Technology professionals.</li>
</ul>
<p><strong>Miscellaneous Skills:</strong></p>
<ul>
<li>WHMIS and OHS certificate.</li>
<li>Demonstrate interest, effort, and attention to detail.</li>
<li>Committed to assisting others.</li>
<li>Assess a situation and identify the root cause of its problem.</li>
<li>Work independently or as part of a team.</li>
<li>Continuously monitor the success of a project or task and identify ways to improve.</li>
</ul>
Building Subnets
Subnetting is a big help when companies are wishing to relieve congestion on their network.
Posted At: 2019-05-24 04:00:00
Edited At: 2024-02-14 20:45:54
<p>Subnetting is a big help when companies are wishing to relieve congestion on their network.</p>
<p>As an administrator, once you are given an IP address and subnet mask, you will be able to calculate information about the subnet.</p>
<h3>Creating Subnets</h3>
<p><strong>Typically Addressing Information Required for Network Devices</strong></p>
<p>The four pieces of addressing information that are typically required by every network device are the IP address, DNS address, gateway address, and network mask information.</p>
<p><strong>Purpose of the Network Masks</strong></p>
<p>The network mask identifies the range of IP addresses that can be used in a network. The network mask also works with an IP address to determine whether a packet should be sent locally or remotely, by using a bitwise AND operation.</p>
<!-- Continue with the content ... -->
<h3>Subnetting Examples</h3>
<!-- Include content for subnetting examples -->
Address Resolution Protocol
The purpose of this simulation exercise is to show how the ARP protocol interacts with devices in a network, and how ARP ensures that network devices are able to get information delivered on local LANs. This exercise also goes over how this service can be
Posted At: 2019-01-09 05:00:00
Edited At: 2024-02-14 20:55:55
<ul>
<li>Delete static ARP entries in Windows Command Line</li>
<li>Issue an ARP command that will display all entries in the local ARP cache.</li>
<li>Issue a command to delete one of the ARP entries above.</li>
<li>Issue a command to delete all ARP cache entries.</li>
<li>View the ARP cache.</li>
<li>Add a static ARP entry for the network gateway using the entry you recorded above.</li>
<li>Flush the cache again.</li>
</ul>
<p>Now the static entries are deleted. Previously, flushing the ARP cache did not delete static entries, but now with the newest version of Windows 10, deleting the cache does delete the static entries as well. Here is a list of the commands used above:</p>
<table>
<tr><th>Command</th><th>Description</th></tr>
<tr><td>arp -a</td><td>Displays ARP cache</td></tr>
<tr><td>arp -d [IP address]</td><td>Deletes one entry</td></tr>
<tr><td>arp -d *</td><td>Deletes all cache entries</td></tr>
<tr><td>netsh interface ip delete arpcache</td><td>Displays ARP cache</td></tr>
<tr><td>arp -a</td><td>Creates a static entry</td></tr>
<tr><td>arp -s [IP address] [MAC Address (-) ]</td><td>Deletes all cache entries</td></tr>
</table>
<h3>How do different ARP Entries "Age Out"?</h3>
<p>A device's ARP cache will hold both static and dynamic ARP entries. A Static ARP entry is a permanent entry in your ARP cache that can be managed in Windows Command Prompt (Run as Administrator), where an Administrator can manually bind an IP address with a MAC address.</p>
<span> More content... </span>
<h3>Countering ARP Spoofing</h3>
<p>A possible layer of protection from ARP spoofing is offered by manually inputting static ARP entries. Manually inputting static entries creates a permanent entry in a device's ARP cache, that can help add a layer of protection from ARP spoofing. Another layer of protection against ARP spoofing is via a VPN. A VPN encrypts any online data that goes through it, to prevent hacks such as ARP spoofing.</p>
Navigating the Cybersecurity Landscape: Insights and Practices
Posted At: 2023-07-07 04:00:00
Edited At: 2024-02-14 21:38:32
<h3>CIA Triangle: Safeguarding Data</h3>
<p>The CIA triangle encapsulates the core tenets of confidentiality, integrity, and availability. These principles form the bedrock of secure data management, ensuring that information is kept confidential, accurate, and accessible as needed.</p>
<h3>Defense in Depth: Layered Security Strategies</h3>
<p>Defense in Depth introduces a multi-layered approach to security. Beyond the foundational computer security, pillars such as Data Security and Network Security play crucial roles. This layered strategy aims to fortify defenses against diverse cyber threats.</p>
<h3>Human Element: Impact on Cybersecurity</h3>
<p>One recurring theme is the human factor and its significant role in cybersecurity. The video "What is your Password?" underscores the vulnerability arising from users' lack of awareness. Education and awareness initiatives become pivotal in addressing this potential weak link.</p>
<h3>Penetration Testing: Ensuring Security</h3>
<p>Penetration testing is a proactive measure to identify system vulnerabilities. Key elements include robust contracts that protect both the client and the analyst, and comprehensive reports that provide insights into vulnerabilities, empowering clients to enhance their security posture.</p>
<h3>Port Scanning: Unveiling Weaknesses</h3>
<p>Port scanning is a critical component of penetration testing, revealing open ports and services. While ethical hackers leverage this for system fortification, malicious actors exploit it for unauthorized access. Securing these entry points becomes paramount.</p>
<h3>Web Defacement: Unauthorized Alterations</h3>
<p>Web defacement involves unauthorized modifications to a website's content or appearance. The frequency of web servers being defaced is a stark reality, emphasizing the need for robust cybersecurity measures.</p>
<h3>Reconnaissance and Scanning: Enhancing Understanding</h3>
<p>Exercises in reconnaissance involve utilizing various tools like Google advanced searches, Wayback Machine, Netcraft, telnet, and Shodan.io. Scanning with Nmap unveils live hosts, operating systems, and services, providing practical insights into cybersecurity practices.</p>
<h3>Conclusion</h3>
<p>As we navigate the cybersecurity landscape, the insights gained from these exercises lay a strong foundation for implementing robust security measures. Stay tuned for more explorations into the evolving world of cybersecurity practices.</p>
NAT
NAT or Network Address Translation was designed to prolong the use of IPV4 and delay the adoption of IPV6. NAT prolongs the use of IPV4 by translating multiple network addresses in a local network to one public network address. Without NAT, large corporat
Posted At: 2018-11-26 05:00:00
Edited At: 2024-02-14 21:00:01
<p>NAT operates by translating the destination IP and port address going
out of a network and retranslates it coming back. NAT is able to send
information back to the proper devices by keeping a table internally, that
keeps track of what ports and what addresses are sending information.</p>
<h3>Example Steps:</h3>
<ol>
<li>When a private machine wishes to access a webpage. The device
will send a request to the webserver.</li>
<li>On the way to the web server, the request is sent to the gateway,
NAT will translate the source IP Address and source port number.
The IP Address will change to its gateway address and the port
address as a unique number that will be stored in a NAT table.</li>
<li>The packet will now be sent to the webserver.</li>
<li>The web server will send the webpage back to the gateway.</li>
<li>The gateway looks at its NAT table and translates information
back.</li>
<li>The packets will be sent to the receiving device.</li>
</ol>
</div>
Navigating Network Protocols: Insights and Practical Analysis
Posted At: 2024-07-10 04:00:00
Edited At: 2024-02-14 21:38:59
<h3>1. TCP vs. UDP: Distinctive Communication Approaches</h3>
<p>TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) differ in their communication approaches. While TCP offers reliable, connection-oriented communication, UDP provides a more straightforward, connectionless approach without error checking or flow control.</p>
<h3>2. TCP/IP Model: Structuring Network Communication</h3>
<p>The TCP/IP model, comprising the Application Layer, Transport Layer, Internet Layer, and Network Interface Layer, serves as a structured framework for comprehending the intricacies of network communication.</p>
<h3>3. Wireshark: Unveiling Network Traffic Dynamics</h3>
<p>Wireshark stands out as a powerful packet sniffer, enabling real-time analysis of network activities. The tool reveals insights into HTTP and FTP traffic, emphasizing the significance of secure data transmission practices, especially in the context of clear-text protocols.</p>
<h3>4. IP and TCP Protocols: Core Functions</h3>
<p>The Internet Protocol (IP) plays a pivotal role in addressing and routing data packets across networks. Simultaneously, the Transmission Control Protocol (TCP) ensures reliable, connection-oriented communication through handshakes and acknowledgment flags.</p>
<h3>5. Sockets: Bridging Computer Nodes</h3>
<p>Sockets, formed by port numbers and IP addresses, facilitate communication between computer nodes. They allow applications on different devices to establish communication by specifying destination IP addresses and port numbers.</p>
<h3>6. Network ID (NID) and Host ID (HID) in IP Addresses</h3>
<p>Breaking down IP addresses, the Network ID (NID) encompasses the first 16 bits, while the Host ID (HID) identifies the specific device within the network.</p>
<!-- Include the rest of the points similarly -->
<h3>15. ARP Protocol: Resolving IP to MAC</h3>
<p>The Address Resolution Protocol (ARP) plays a crucial role in resolving IP addresses to corresponding MAC addresses on a local network.</p>
Safeguarding Digital Communication: An In-Depth Exploration of Encryption and Cybersecurity Practices
Posted At: 2023-07-16 04:00:00
Edited At: 2024-02-14 21:39:19
<h3>1. Encryption Fundamentals:</h3>
<p>At the heart of cybersecurity lies encryption, a powerful technique that transforms readable data (plaintext) into an unintelligible format (ciphertext). Employing intricate algorithms and cryptographic keys, encryption stands as the bedrock for ensuring data confidentiality and shielding sensitive information from unauthorized access.</p>
<h3>2. Symmetric vs. Asymmetric Encryption:</h3>
<p>Diving deeper, the distinction between symmetric and asymmetric encryption becomes apparent. Symmetric encryption hinges on a single shared key for both encryption and decryption, offering speed but necessitating secure key distribution. In contrast, asymmetric encryption introduces a pair of keys – a public key for encryption and a private key for decryption – fostering a more secure key management process at the expense of speed.</p>
<!-- Include the rest of the points similarly -->
<h3>7. Challenges and PKI Protection:</h3>
<p>The potential creation of false certificates poses a significant threat to cybersecurity. In instances of certificate forgery, browsers display security warnings. To counteract this threat, Public Key Infrastructure (PKI) emerges as a safeguard, ensuring the authenticity of certificates through digital signatures from trusted certificate authorities. The browser's verification of these digital signatures provides a robust defense against fraudulent certificates.</p>
<p>In summation, this in-depth exploration underscores the critical role of encryption and related practices in fortifying digital communication. By unraveling the intricacies of these concepts, individuals and organizations are equipped to navigate the complexities of the cybersecurity landscape, fostering a resilient and secure online environment.</p>
Unraveling the Depths of Cybersecurity: A Journey through Network Protocols, Exploits, and SQL Injection
Posted At: 2023-07-20 04:00:00
Edited At: 2024-02-14 21:39:29
<h3>Navigating Network Protocols: Insights and Practical Analysis</h3>
<p>Understanding network protocols is the cornerstone of effective data communication. From the distinctive approaches of TCP and UDP to the structured framework of the TCP/IP model, this section unveils the dynamics of communication in the digital realm. Wireshark, a powerful packet sniffer, takes center stage, revealing the significance of secure data transmission practices, especially in clear-text protocols.</p>
<!-- Include the rest of the sections similarly -->
<h3>Conclusion: Empowering Cybersecurity Enthusiasts</h3>
<p>As we conclude this journey through network protocols, exploits, and database vulnerabilities, it is evident that cybersecurity is a multifaceted field. Empowering enthusiasts to navigate this landscape, the blog encourages continuous learning, hands-on practice, and a vigilant approach to securing digital ecosystems. Whether you are a beginner or a seasoned professional, the quest for knowledge and mastery in cybersecurity is a never-ending expedition.</p>
Mastering Linux Security: Permissions, Scans, and SSH Exploits
Posted At: 2023-07-24 04:00:00
Edited At: 2024-02-14 21:39:42
<h3>Demystifying Linux Permissions: A Closer Look at chmod</h3>
<p>The blog commences with a dive into Linux file permissions, dissecting the intricacies of the chmod command with a numerical representation (754). Readers gain insights into the permission sets for owners, group members, and all users, ensuring a comprehensive understanding of access control in Linux.</p>
<!-- Include the rest of the sections similarly -->
<h3>Conclusion: Elevating Linux Security Proficiency</h3>
<p>As we conclude this exploration of Linux security fundamentals and practical exercises, the blog emphasizes the importance of continuous learning and hands-on practice. Armed with insights into permissions, password security, SSH best practices, and vulnerability scanning, readers are empowered to navigate the intricate landscape of Linux security with confidence and proficiency. Whether you are a novice or an experienced cybersecurity enthusiast, the quest for mastering Linux security is an ongoing journey of discovery and empowerment.</p>
Unraveling the World of Web Application Security: SQL Injection, XSS, and CSRF
Posted At: 2023-07-30 04:00:00
Edited At: 2024-02-14 21:39:57
<h3>Understanding SQL Injection (SQLi)</h3>
<p>SQLi is a powerful attack vector where attackers exploit vulnerabilities in a web application's input fields to inject malicious SQL code. By inserting single quotes ('), attackers can manipulate SQL queries, gaining unauthorized access to databases, potentially compromising sensitive information or altering data. The blog explores SQLi techniques, such as Union-based attacks, and provides insights into how attackers can exploit these vulnerabilities to gain unauthorized access.</p>
<!-- Include the rest of the sections similarly -->
<h3>The Art of Shell Access: Bind Shell vs. Reverse Shell</h3>
<p>The post concludes by unraveling the nuances of shell access in SQLi scenarios. It distinguishes between bind shells and reverse shells, explaining how each connection type works. A practical example involving PowerShell and netcat showcases the power of these connections, enabling attackers to execute commands on the target system.</p>
<p>In the realm of web application security, knowledge is the key to defense. This blog post equips readers with insights into common vulnerabilities and potential exploits, empowering them to adopt proactive measures to secure their web applications against emerging cyber threats.</p>
Blackjack
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 18Posted At: 2019-01-23 05:00:00
Edited At: 2024-02-14 21:57:09
<p>When playing Blackjack, the hand that's value is as close to 21 as possible without going over wins. To ‘hit’ is to ask for another card for your hand and to ‘stand’ is to end your turn.</p>
<h2>total(hand)</h2>
<p>Computes the value of a given blackjack hand.</p>
<pre>
<code>
def total(hand):
'compute the total of a blackjack hand'
values = {'2':2, '3':3, '4':4, '5':5, '6':6, '7':7, '8':8, '9':9, '1':10, 'J':10, 'Q':10, 'K':10, 'A':11}
result = 0
numAces = 0
for card in hand: # find number of Aces in hand
result += values[card[0]]
if card[0] == 'A':
numAces += 1
# hand now has a value where every ace is 11
# if value > 21 then reduce first ace by 10
# to have value of 1. Repeat until value < 21
while result > 21 and numAces > 0:
result -= 10
numAces -= 1
return result
</code>
</pre>
<h2>shuffleDeck()</h2>
<p>Creates a deck of cards that is shuffled.</p>
<pre>
<code>
def shuffleDeck():
'create a random deck of 52 cards'
import random
# suits is a set of 4 Unicode symbols for suits
suits = {'u2660', 'u2661', 'u2662', 'u2663'}
ranks = {'2','3','4','5','6','7','8','9','10','J','Q','K','A'}
deck = []
# create deck of 52 cards
for suit in suits: # deck of 52 cards that contains ranks and suits
for rank in ranks:
deck.append(rank + suit) # put rank & suit together
random.shuffle(deck) # shuffle the deck and return
return deck
</code>
</pre>
Mastermind
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 18Posted At: 2018-12-28 05:00:00
Edited At: 2024-02-14 22:04:20
<h2>guessInput(self) - Retrieve user input in the form of a 4-digit integer.</h2>
<pre>
<code>
def guessInput(self):
'Retrieve user input in the form of a 4-digit integer'
while True:
guess=(input('Enter your guess: '))
if (isinstance(guess, int)) or (len(str(guess)) != self.width):
self.whtType()
else:
listGuess = [int(x) for x in str(guess)]
return listGuess
</code>
</pre>
<h2>blackBox(self, guess) - Compares two lists and finds if the index and value are the same for each value.</h2>
<pre>
<code>
def blackBox(self, guess): #works
'''
Compares two lists and finds if the index and value are the same for each value
:param guess: a list of 4 numbers
:return: updated list of elements, with matching elements from guess being replaced with u"u25A0"
'''
for i in range(len(guess)):
if self.key[i] == guess[i]:
guess[i]=u"u25A0"
return guess
</code>
</pre>
<h2>whiteBox(self, guess) - Compares two lists and finds if any values are the same.</h2>
<pre>
<code>
def whiteBox(self, guess):
'''
Compares two lists and finds if values are the same
:param guess: a list of 4 numbers
:return: updated list of elements, with matching elements from guess being replaced with u"u25A0"
'''
for i in self.key:
if i in guess:
newguess= guess.index(i)
guess[newguess]=u"u25A1"
return guess
</code>
</pre>
Microsoft Excel Projects
The following mockup case studies demonstrate my knowledge and experience utilizing Microsoft Excel.
Posted At: 2019-04-30 04:00:00
Edited At: 2019-04-30 04:00:00
<p>This compilation delves into a practical exploration of Microsoft Excel, showcasing the depth of skills and versatility in their application...</p>
<h2>Introduction</h2>
<p>In the realm of professional proficiency, Microsoft Excel stands out as a ubiquitous tool, fostering efficiency and data management across various domains...</p>
<h2>Case 1: Flight Capacity</h2>
<p>Blue Skies Airline seeks an efficient Excel spreadsheet for tracking daily flight statistics. The spreadsheet includes features such as passenger count, averages, rounded averages, medians, least and most full flights, and the number of flights per day...</p>
<img src="images/blogs/image2.png" alt="Case Study 1: Flight Capacity">
<h2>Case Study 2: Grade Book</h2>
<p>A professor managing CS 101 uses an Excel grade book to track student performance. This case study involves determining pass/fail criteria, calculating percentage and letter grades, and presenting course statistics...</p>
<img src="images/blogs/image3.png" alt="Case Study 2: Grade Book">
<h2>Case Study 3: Products</h2>
<p>A business owner needs an Excel spreadsheet to visualize stock and earnings each quarter. The Products_DataSet sheet imports data and adds calculated columns, while the Sales_Summary sheet provides a pivot table summary...</p>
<img src="images/blogs/image4.png" alt="Case Study 3: Products">
<h2>Case Study 4: Check Book</h2>
<p>A university student utilizes Excel to track earnings and expenses over time. The BUDGET_SUMMARY sheet summarizes financial data, and the WHAT-IF_GOAL SEEK sheet assists in calculating a loan...</p>
<img src="images/blogs/image5.png" alt="Case Study 4: Check Book">
<h2>Extra: Notes</h2>
<p>A supplementary Notes file provides practical examples for VLOOKUP/HLOOKUP and demonstrates the usage of graphs, trendlines, and sparklines in Excel...</p>
<img src="images/blogs/image6.png" alt="Extra: Notes">
<h2>Conclusion</h2>
<p>As we conclude this compilation, it becomes evident that Excel proficiency transcends the boundaries of spreadsheet software. The showcased case studies exemplify a nuanced understanding of Excel's capabilities, incorporating not only fundamental features but also advanced functions and features crucial for complex real-world applications.</p>
<p>Whether it be in the aviation industry, education sector, business management, or personal finance, Excel emerges as a versatile ally, streamlining processes and providing insightful data analysis. This document stands as a testament to the practical utility of Excel skills and the adaptability required to navigate diverse professional landscapes.</p>
<p>As we navigate the ever-evolving terrain of professional requirements, the showcased Excel skills serve as valuable assets, contributing to efficiency, accuracy, and informed decision-making. In a world where data-driven insights are paramount, mastering Excel is not just a skill but a strategic advantage for professionals in various fields.</p>
<p>May this compilation inspire further exploration and mastery of Excel, unlocking new possibilities for efficient data management and analysis in the dynamic landscape of modern professions.</p>
Card Dealer
This module will deal 5 cards from a string representing a deck. After dealing 5 cards from the deck those cards will be removed. This module will return a hand of 5 cards. This program will run 8 times, continuously updating the list of cards. If
Posted At: 2019-03-02 05:00:00
Edited At: 2019-03-02 05:00:00
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22Password Checker and Directory Printer
Here are a few sample projects I have created using Linux Script.
Posted At: 2019-04-11 04:00:00
Edited At: 2019-04-11 04:00:00
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22