Sunday, February 18, 2024

Learning About Careers in Computer Programming

    Being a computer science major, the video from section 2.7.9 gave me a great amount of information about some of the careers that focus on programming and software development. It would be wise of me to learn about the career paths that relate to my major so that I can eventually pursue one of them.

    This video gives information about application developers, web developers, quality assurance (QA) engineers, and database programmers. Each career has their own disciplines, but I found the most interest in web development. They create websites and other things accessible through the Internet. They are also highly developed in programming, which I also find interest in. I took CIT129 last term, which taught me the basic of programming in Python. Being given a task, figuring out how to execute the task, solving the mistakes I made in my code, and the satisfaction of finally making my code work gave me enjoyment.

    After gaining a quick glance at some of the most common careers in programming and web development, I begin to think about my long-term goals that circulate around my interests and my strengths.

Friday, February 2, 2024

Is Internet Privacy Really Private?

    I read 1.3.5  from Chapter 1 of my TestOut Office Pro, which covered the topic of Internet privacy and how the information we give out can be taken advantage of. A lot of people, including myself, can get a little too easygoing when it comes to Internet privacy. Not to mention the Terms of Use part, which I bet almost everyone ignores. Some people don't realize that no an app or website is truly free. Websites such as Facebook and Google extract our metadata (information about information) to either use for advertising purposes or to sell it to other companies. Another example would be posting on a private account, which isn't truly private as it is still available to third-party users.

    Also section also talks about how to handle company devices. It should be known that company devices (prominently computers) and the network infrastructure are owned by the company and can therefore access whatever a user does on their device. Thus companies have an Acceptable Use Policy on their devices to prevent their employees from doing the wrong things with their devices. But even if you're not doing anything wrong, companies can still access stored data when doing things such as sending a private email.

    In order to hide as much information as possible, it would be wise to incorporate fully reading the Terms of Use and Acceptance Use Policy, creating strong passwords, never using public Wi-Fi while purchasing online, and most importantly have a good digital footprint. After reading about this, I'll be sure to refrain from giving too much information while I'm on the Internet.