Bio

Bio

Hello my name is Oluwadara you can call me Dara for short I study IT at Penn state with the design and development option challenging but rewarding, In this final project I will have a brief summary of everything I learnt in IST 110 I will do  that in form of lessons ( Chapter 1 – 13)

 

Lesson 13

I’ve seen how e-commerce has revolutionized the business landscape, with behemoths like Amazon and eBay redefining traditional transactions. My preferred B2C site, Amazon, began in 1994 as a book seller and has since grown to offer a wide range of goods. Regarding business-to-consumer (C2C) transactions, eBay, which debuted in 1995, transformed online bidding and direct sales, and Craigslist transformed classified ads into a flourishing C2C e-commerce network.

When I consider how Alibaba changed from being a B2B connector in 1999 to combining C2C and B2C models, I see how dynamic digital commerce is. I’ve also been interested in cloud computing because of the way that IaaS and PaaS models are changing how companies access and use computer resources. I’ve embraced telecommuting, which has changed the workplace and allowed me to contribute from a distance.

Examining the contrast between outsourcing and in-house operations, I’ve learned to value the efficiency and flexibility that each strategy provides. The community-driven work dynamics of crowdsourcing have captivated me, and crowdfunding has demonstrated the power of small, individual contributions made by many.

I’ve learned about copyrights, trademarks, patents, and fair use while navigating the complexities of intellectual property; these are crucial components for protecting the products of human creativity. The many facets of business issues highlight how dynamic and ever-changing modern commerce is, which has shaped my perspective on and interactions with the business world.

 

Ecommerce Shopping Infographics

 

For this I struggled with the final project a lot made a lot of mistakes. I will say  I had a hard time understanding it  but now I will say I understand it a little better. Over these past couple of days I have been able to put more effort into my projects.

 

Links to Group Homework

https://sites.psu.edu/dara/files/2023/12/LO13.docx

 

Lesson 12

Investigating social issues, I discover that there are significant differences in the digital environment.

The term “digital divide” refers to the disparities in access to technology, highlighting glaring discrepancies in the availability of digital resources like PCs, smartphones, and Internet connectivity.

Exploring the world of cybercrime, I come across a variety of crimes, such as using malicious software (malware), identity theft, fraud, data breaches, trafficking, and extortion. These crimes include threats of financial gain, illegal transactions, and compromise of personal information.

When someone intentionally uses electronic technology to repeatedly harm or intimidate others, often while hiding their identity, it becomes a prominent issue known as cyberbullying.

I had to do a cyber crime assignment I used the case Jordan DeMay to highlight the case of Cyber bullying sexual extortion. I gave an insight into how scammers operate.

 

Link to Homework

https://sites.psu.edu/dara/files/2023/12/For-this-write-up-I-want-to-go-with-the-second-option.docx

Lesson 11

I’ve learned through researching digital privacy that people unintentionally leave behind evidence of their online activity. Images with metadata, such as location or authorship, are stored in formats like EXIF.

The reality of data mining defies the idea of online anonymity. Methods such as data mining examine locations, facial features, language usage, and other aspects to match and identify distinct individuals.

The necessity of encryption is highlighted by the possibility of eavesdropping. By converting plaintext into ciphertext, encryption acts as a barrier to prevent unwanted access. Cryptographic keys are used to perform encryption, which is a common feature of communication protocols.

Phishing is an emerging threat that involves unsuspecting users being tricked into believing they are legitimate entities through emails, with the goal of obtaining sensitive information. These insights underscore the need for vigilance in the digital landscape, emphasizing the importance of privacy-conscious practices.

What is data encryption

Group Discussion :

I find that the dynamic relationship between privacy and database technology is complex and constantly changing. Privacy norms are being impacted by cultural shifts, especially among younger generations who are used to sharing on social media, and advanced databases are adding complexity.

Acquisti and Grossman’s research highlights a propensity to ignore long-term privacy implications when making online purchases, which raises questions about the extensive storage and processing of personal data by powerful database systems.

Cases from the real world, such as the Cambridge Analytica affair, underscore the fine line that separates privacy invasion from personalized services. This highlights the dual nature of database technology, which increases productivity but raises issues with consent, security, and unanticipated consequences.

Imaginary situations, particularly regular access to private medical records for research purposes, raise moral questions about data ownership, consent, and potential discrimination based on personal health information.

Legal and ethical frameworks must change in tandem with database technologies in order to be navigated responsibly. The need to protect individuals’ right to privacy in the digital age is becoming increasingly apparent, as evidenced by laws such as the General Data Protection Regulation (GDPR).

 

Link to  homework

https://sites.psu.edu/dara/files/2023/12/LO11.docx

 

Lesson 10

As I’ve been researching digital security, I’ve learned a lot of things, starting with the fundamentals. Protecting against security breaches, hacks, and vulnerabilities is a crucial aspect of computer security, as it helps to prevent unauthorized access. Maintaining the integrity of computer systems requires an understanding of how important it is to fix security flaws.

Malware and computer viruses are major threats because malware includes a variety of malicious software types and viruses spread unauthorized programs. While known viruses can be found and disabled by antivirus software, other threats to be aware of include spam and denial-of-service attacks.

Knowing the subtleties of account security, like encryption and two-step verification, has made it clear how crucial it is to protect personal data. An additional layer of security is provided by two-step verification, and secure communication is ensured by encryption, which turns messages into unreadable forms.

The need for caution is highlighted by the frequency of online frauds, such as phishing and sophisticated schemes like the 419 scam or Craigslist scams. Understanding and avoiding these types of scams are essential elements of online safety.

Through the use of encryption and decryption techniques, cryptography is essential to the security of digital communication. Different strategies are provided by symmetric-key and public-key cryptography, each with a unique set of benefits and uses.

Digital certificates offer a safe way to exchange data over the internet. They are controlled by certificate authorities inside the public key infrastructure (PKI). PKIs create trust frameworks that let parties verify the authenticity of digital certificates and public keys.

 

A serious danger, denial of service attacks bombard the server of a target website with a large number of requests for access. Attacks that use multiple computers to cause a denial of service (DDoS) increase the impact of the attack.

To sum up, my research on security has shown how complex it can be to protect digital systems, requiring the use of technologies such as digital certificates, cryptography, and antivirus software. It has also highlighted the significance of user awareness in thwarting phishing and other online scams.

 

Group Project : We talked about various kinds of scams, how to identiffy scams and how to prevent it.

 

 

Link to Group homework

https://sites.psu.edu/dara/files/2023/12/group-5-infographic-image-1.png

Lesson 9

During my investigation into the Internet and Web, I explored basic ideas like IP addresses, domain names, Internet fundamentals, and web search engines. With the help of routers and ISPs, the Internet—a massive network of linked computers—runs on protocols like IP and TCP/IP for communication.

It is essential to comprehend IP addresses, whether they are expressed as domain names or numbers. Given that IPv4 and IPv6 offer distinct address formats, DNS servers are essential to the process of translating domain names to IP addresses. This addressing system becomes more complicated due to the distinction between static and dynamic IP addresses.

The use of domain names and URLs enhances navigability for users. IP addresses and domain names are managed by ICANN, while registrars hold domain name reserves. The web is arranged according to a hierarchy of top-level and second-level domains, but cybersquatting raises moral questions.

Web navigation requires an understanding of URLs, HTTP, and HTTPS. Browsers, the HTTP protocol, and HTML files were all introduced with the creation of the World Wide Web. Hypertext markup language files are created and transferred, and their locations are indicated by URLs. This is the foundation of the web. Secure data transfers are ensured by the widespread use of HTTPS.

Information retrieval is made easier by web search engines like Google, Yahoo!, and Bing. To deliver pertinent results, these engines use web crawlers, indexing, and matching criteria. Excluding terms or using quotes are examples of advanced search tips that improve search accuracy.

Modulation, modems, routers, Ethernet, and Wi-Fi routers all help with data transmission in home networking. Wi-Fi, which allows for short-range wireless communication, is governed by the IEEE 802.11 standard. Hotspots are Wi-Fi networks that are open to the public and increase connectivity.

Dispersed cells, each served by cell towers or base stations, are the building blocks of cellular networks. When a device switches between cells, switching or handover takes place. Antennas on devices can be momentarily disabled by setting them to airplane mode, which can be helpful. The idea of “the last mile” symbolizes the difficulties in offering customers high-speed service.

Selecting a web host, using masked or forwarding forwarding, and knowing HTML are all necessary steps in setting up a website. Links and formatting are defined by tags in the textual language HTML. Users can navigate through links on web pages by using web browsers that interpret HTML files.

With CSS, HTML can be enhanced by making style changes to fonts and colors. Programming language JavaScript adds interactive elements to websites. JavaScript functions react to user input such as button clicks and are integrated into HTML files via script tags.

For our Homewroks we had to do do some homeworks in HTML and java script. it was good for me becasue I have experience in that area I have certification in fullstack web development. So it was a great experince.

 

 

In conclusion, my exploration of the Internet and Web revealed a complicated web of technologies, addressing schemes, protocols, and domain management. Getting around this digital environment requires knowing the basics, making good use of search engines, and using tools for building and improving websites.

 

Links to Homeworks

https://sites.psu.edu/dara/files/2023/12/L09-1.docx

Lesson 8

Lesson 8 has a lot to talk about but I will keep it short. I investigated a range of platforms and tools for communication as I dove into the world of applications. I learned the nuances of the SMTP and IMAP protocols, email fields like cc and bcc, and the importance of subjects, replies, and forwards by starting with email basics. Comprehending these subtleties improved my ability to handle electronic correspondence efficiently.

Next, I explored the realm of text messaging, including SMS, SMSC, and MMS, learning about the workings of short messages and multimedia messaging on mobile devices.

My exploration of blogs exposed me to the vibrant world of creating content for the internet. My knowledge of the blogosphere has grown as a result of learning about well-known bloggers like Dooce, Kottke, and LifeHacker as well as blogging platforms like WordPress and Blogger.

Wikipedia’s crowdsourced content development intrigued me as a collaborative encyclopedia. Wikis and crowdsourcing in the information creation process posed a challenge to conventional ideas of authorship.

Apps for audio and video players have shed light on the technical aspects of handling audio and video. My understanding of the use of digital media has been enhanced by my understanding of file formats such as MP3, AVI, and MP4, as well as the function of players such as iTunes and VLC.

I ventured into the world of social networking and looked at how Friendster, MySpace, and finally Facebook and Twitter evolved to become so dominant. Understanding the importance of hashtags and professional networking sites like LinkedIn deepened my understanding of online social networks.

 

What is software as a service (SaaS)?

Cloud Computing Applications, which introduced Software as a Service (SaaS), cloud computing, and the ease of cloud storage, brought the chapter to a close. The usefulness of cloud-based solutions was highlighted by the significance of backups in preventing data loss. All in all, this investigation increased my knowledge of various digital tools for collaboration and communication.

 

 

 

OSINT GROUP PROJECT

The concept of Open Source Intelligence (OSINT) is presented in the assigned reading, with a focus on its importance in the collection and analysis of data from publicly available sources. A number of topics are covered in the conversation, such as the value of lifelong learning, methods, use cases, and ethical issues.

Apart from the assigned literature, I also looked into another source that concentrated on the use of OSINT in cybersecurity. According to this source, OSINT is an important instrument for keeping an eye on online activity, spotting possible threats, and guaranteeing the security of digital assets.

My internal thoughts demonstrate how flexible and effective OSINT is at gathering real-time insights from a variety of domains. In the digital age, OSINT is an invaluable instrument for problem-solving and decision-making due to the deluge of publicly accessible information.

The ethical aspect of OSINT, which emphasizes the responsible and private-conscious use of information, is an important lesson to learn. In an era where personal information is readily accessible, striking a balance between the acquisition of insightful data and the preservation of individuals’ privacy is imperative.

Given its moral implementation, OSINT is advantageous to businesses, law enforcement, media, academics, and other stakeholders, providing insightful information and a thorough grasp of a wide range of topics.

Going on to Part B, the overview of online searching emphasizes how crucial it is to specify research objectives precisely, select relevant search engines, and use operators to fine-tune results. Reputation management, background checks, and looking into recent incidents are some examples of applications.

Analyzing social media involves keeping an eye on a variety of platforms to spot trends and insights. Crucial actions consist of selecting pertinent platforms, employing tools for monitoring, and analyzing user interactions. Applications vary from analyzing public opinion to looking into people’s or companies’ social media activity.

As mentioned, domain research entails finding out about the domain, owner, and associated resources of a website. Using domain lookup tools, reviewing website content, and making use of online archives are essential steps. Applications include verifying the authenticity of websites, gathering data on threat actors, and examining the digital strategies employed by competitors.

The three techniques—domain research, social media analysis, and internet searching—are essential to OSINT and give practitioners extensive data for a range of uses.

 

LINKS TO GROUP PROJECT

https://sites.psu.edu/dara/files/2023/12/LO8.docx

Lesson 7

As I read through Chapter 7 on Data Organization, I learned about the fundamentals of spreadsheet programs and became more aware of how they are used to represent and compute data. Comprehending spreadsheets’ cells, formulas, and functions helped me to see how flexible they are for manipulating data.

My introduction to the concepts of data and information came from database fundamentals, which also stressed the significance of effective data organization for meaningful information retrieval. It became evident how important a Database Management System (DBMS) is to the creation, upkeep, and use of databases. Along with the importance of SQL and MySQL, I also learned about relational, multidimensional, and object-oriented databases.

Troubleshooting techniques were introduced as a methodical way to find and fix issues in different systems. They were based on tests and hypotheses. The logic of troubleshooting offered an organized framework for problem-solving by highlighting the significance of well-defined hypotheses and test procedures.

The notion of hierarchical hypotheses was fascinating because it presented the notion that an object can be divided into smaller objects, similar to how a binary search divides items to facilitate more effective problem-solving. In general, this chapter deepened my understanding of databases, data organization, and troubleshooting techniques.

 

For our personal homework we had to  write a SQL code I was able to use the SELECT function I personally like coding in SQL as well it is a  little challenging but I find it rewarding. Also we  had CODIS case I did not do too well In that due the fact that I had limited understanding of the subject, Overall SQL is something I enjoy

 

LINKS TO HOMEWORKS

https://sites.psu.edu/dara/files/2023/12/LO7.docx

 

Lesson 6

I learned about the development of programming from machine language to high-level languages as I read through Chapter 6 on Programming Languages. Machine language was based on transistors, which were switches that controlled electrical flow and were composed of 0s and 1s. An assembler translated assembly language, which was introduced as a human-readable representation of machine language, into machine language.

High-level languages such as Fortran were a big step forward in terms of increasing programmer productivity. Python is a popular high-level language these days, and its potent data-processing capabilities and ease of learning drew my attention. Python for loops, variables, and comments became commonplace.

The chapter also examined intellectual property licensing, including the MIT license, copyleft, GNU GPL, and Creative Commons licenses. My knowledge was deepened by realizing the effects of public domain and the difficulties presented by file sharing and piracy.

Basic debugging methods were presented, including debug output statements and visual inspection. I came to understand that resolving problems, sometimes referred to as bugs, is an essential step in the programming process. This chapter gave a thorough rundown of programming, covering everything from the foundations to licensing and debugging methods.

In this lesson we had a discussion about fundamental differences in various languages like Machine Assembly and High level. I was able to learn a lot from my peers. Most importantly I enjoyed the lab, Phyton is my favorite language

 

LINKS TO HOMEWORKS

https://sites.psu.edu/dara/files/2023/12/LO6.docx

 

Lesson 5

I delved into the basic ideas when I examined operating systems in Chapter 5. An operating system (OS) facilitates work and ensures portability between computers by acting as an interface between applications and hardware. The OS organizes files, folders, and applications; graphical user interfaces (GUIs) such as Windows Explorer or Finder help with organization.

Exercisable files, media files, and common file types like PDFs and Microsoft Office documents were introduced. Multiple applications can run simultaneously for a better user experience thanks to operating systems’ multitasking and multi-user features. The way device drivers interface with hardware is essential to the operation of the operating system.

I gained knowledge of a wide range of operating systems, each with its own development and history, including Unix, MS DOS, Linux, Windows, macOS, iOS, and Android. The histories of Apple Computer and Microsoft, including the development of Mac OS and MS-DOS, shed light on the early years of personal computing.

Understanding tools like Activity Monitor, Task Manager, or top for tracking CPU and memory usage is essential to being a competent OS user. Secure and effective computing is facilitated by ideas like processes, memory leaks, backups, and automated backup systems. Furthermore, the significance of device drivers in facilitating hardware interaction was emphasized.

 

 

In this lesson we had a discussion about a break up letter to our favorite OS. Mine was Microsoft. I  grew up using it even from a programming stand point it is great to use. The most iconic thing is the windows back ground image . However it has it short comings I has able to highlight it in my discussions. The number problem is the constant software updates. Also I talked about my plans for the final Projects which I said I was going to use Adobe express but I had to change that to wordpress it  better suits my needs. i went into clear details with my plan.

 

LINKS TO HOMEWORKS

https://sites.psu.edu/dara/files/2023/12/LO5.docx