Posts

Showing posts from November, 2022

Week 12, Securing Computers/ Operational Procedures.

Image
       This week I learned how to secure computers and operational procedures through chapters 27 and 28. It is essential to protect data from cyber-attacks and system failure. The first chapter described common threats to computers and data, such as unauthorized access, social engineering, denial of service, data distribution- accidental or deliberate, administrative access, hardware failure, physical theft, malware, and environmental threats. It also explained key security concepts and technologies and detailed how to protect computers from network threats. From chapter 28, I learned documentation best practices, managing change management processes and implementation, and disaster prevention and recovery.   Finally, it discussed the difference between cloud storage and local storage. Overall it was an outstanding learning experience.      The weekly blogging was a new experience, and I like blogging for future courses because it summarises week...

Week 11, Printers and Multifunction Devices.

Image
  This week I learned about printers and multifunction devices through chapter 26. It explained current printers and multifunction device technologies such as all one printer/scanner/fax machine/copier/iPhone docks, impact printers, inkjet printers, dye-Sublimation printers, thermal printers, laser printers, and 3-D printers. In addition, the chapter provides an overview of the different printer’s printing processes, components, and default techniques. It helped me to understand the installation of local and network printers, configure the print setting, optimize print performance, managing publicly shared network devices with network security and data privacy. Finally, it explained the common issues of different printers and troubleshooting techniques. Overall it was a great learning process.      

Week 10, Understanding Mobile Devices / Care and Feeding of Mobile Devices

Image
  In week 10, the topics were mobile devices and the care and feeding of mobile devices through chapters 24 and 25. The first chapter explained the different mobile devices such as smartphones, tablets, E-readers, smartwatches, and fitness monitors, their features, and their capabilities. The chapter described the characteristics of major mobile operating systems, Apple iOS, and Google Android. It also explained configuring mobile devices and installing and configuring mobile applications. The second chapter describes troubleshooting common mobile device issues, application issues, and how to secure and configure mobile devices. The weekly discussion was about mobile operating systems, mainly Apple iOS and Google Android. Apple iOS is a closed secure mobile operating system that is compatible only with Apple devices. Android is an open-source mobile operating system, and it is compatible with different manufacturers’ mobile devices. Overall it was a wonderful learning experience...