WK 13

  1. Explain the tech; what is it, how does it work, what hardware, software, and network does it need?

The technology that I chose to research is 3D printing; 3D printing is exactly how it sounds. It is a way of printing something in 3-dimensional form rather than the traditional way of printing on a flat sheet of paper. It works through a CAD program where the design is created and then it is sent to a slicing software that converts the 3D model into something that a 3D printer can easily understand. https://ultimaker.com/learn/what-software-to-use-for-3d-printing

  1. Is it currently available to the public? Yes, the software is available to anyone who is willing to purchase the hardware and software.
  1. Who (or what) invented or pioneered the technology? This technology was created by Charles Hull and was first used in the 1980s. https://www.pcmag.com/news/3d-printing-what-you-need-to-know
  2. What “problem” does it solve for its users? It allows people to have a tangible 3-dimensional prototype to observe.
  3. Are there any potential drawbacks or dangers of using the tech? Drawbacks may be that that the programs are expensive and that the programs may be complex to new users.
  4. Offer one example of how widespread adoption of this technology might impact society. An example of this could be in a logo for a store sign. If it is printed using 3-D technology. The sign is ready to use and can have unique design attributes due to how it was created. Additionally, 3D printing is used in medical, construction, fashion, and environmental fields.

https://ultimaker.com/learn/is-3d-printing-the-future-for-your-industry?utm_campaign=2021_Alwayson_srengineer_traffic_see_US_UK_AU-DSA&utm_source=google&utm_medium=cpc&gclid=Cj0KCQiA-eeMBhCpARIsAAZfxZAt38DAMrwqFbeMvEVoDye94xlnzuAzg3WKm4FW2XZVeg1GTwx21GYaAvEbEALw

WK 12

Instagram is an app that is used to edit and share photos and videos. Instagram is widely used among celebrities, and a lot of celebrities have a large number of followers on Instagram. Although some users use Instagram to promote their brand or to interact with other Instagram users many people use the app and only share photos with friends. The main demographic for Instagram is ages 18-29, 59% of people within this age group have an Instagram account, 33% of people in the 30-49 year old age group have an Instagram account. Additionally, 68% of Instagram users are female.

 

https://info.lse.ac.uk/staff/divisions/communications-division/digital-communications-team/assets/documents/guides/A-Guide-To-Social-Media-Platforms-and-Demographics.pdf

https://www.businessinsider.com/what-is-instagram-how-to-use-guide

 

Another app that is widely used is the Tik Tok app. Tik Tok is a platform where users can share or view short videos on various topics. The videos are often funny or entertaining and usually only last about 15 seconds. Tik Tok is one of the fastest growing apps as far as accumulating new users. The main demographic for Tik Tok is ages 16-24 (Gen Z) making up 60% of users. 26% percent are ages 25-44; and 60% of the demographic are female.

https://influencermarketinghub.com/what-is-tiktok

TikTok Statistics – Everything You Need to Know [May 2024 Update]

 

WK 10

  • Would this application/system work as well NOT in the cloud?
  • What are the advantages to having this system on a distributed network?
  • Do you have any security or privacy concerns when using this system?
  • Anything else you’d like to share about cloud services.

2 cloud-based systems that I use are Adobe Creative Cloud and Google Cloud. I think both are capable of working well outside of the cloud. However, the cloud offers advanced technology that can in many instances be very useful.

The advantages to having these programs on a distributed network are that information can be stored and shared within the network with ease. The cloud uses off-site systems to assist computers in storing & managing information. If work is stored within the cloud it doesn’t take up space on your computer’s hard drive. Another advantage to cloud computing is that a network can collaborate easily due to ease of access to shared files.

What is Cloud Computing?

There may be security concerns anytime something is shared within a network cloud since it is connected with the internet. In some instances, it may be better to save work on your desktop or a flash drive instead of storing it in a cloud system.

Cloud services are handy and make storing information and sending information easy and accessible.

WK 9

  1. What were the top three social media sites, in terms of traffic, in 2020? List them in order of popularity.
    The top 3 social media sites listed in order are 1.) Facebook, 2.)YouTube, and 3)WhatsApp.
  2. Provide a brief summary of how each social media site works and why people use it. 

Facebook is a social media platform where people can add friends and post information that they wish to share with their friends, in addition to sharing facebook users can communicate with people that they may not have been able to connect with otherwise. Youtube is a platform where users can upload or view videos on a wide variety of topics, a lot of people use youtube to start their own channel and to publish their own unique content. WhatsApp is owned by Facebook, but it is specifically used so users can send voice messages, make video calls, or voice calls, in addition to these features text messages can be sent through the app.

  1. What are “demographics” and why is it important in social media?

Demographics are specific groups within a larger group. 6 types of demographics include (age, gender, occupation, income, family status, education). It is a factor in social media because these sites often tweak their advertisements/marketing to fit what is being marketed toward your demographic.

  1. Explain any demographics that stand out among the three social media sites you listed above. (More popular with a specific age group, are majority of users male or female, married or single, employees or self-employed, etc.)

Facebook is most popular with millennials, about 7 out of 10 adults use Facebook. There are more men on Facebook than women by about 10 percent. YouTube is popular with all age groups, however, it is slightly more popular with users 35 and under. WhatsApp is most popular with people ages 26-35, about 27% of this demographic uses WhatsApp. Close to 20% of ages 19-25, and ages 36-45 use WhatsApp.

  1. On average, how much time do users spend on each social media site during a day, week, or month? Provide a resource that supports your answer.

On average most people spend 58 minutes a day on Facebook, youtube an average of 40 minutes a day, and Whatsapp an average of 28.4 minutes a day.

  1. Which of the three social media networks is growing the fastest? Why do you think that is?

The three social media sites that are growing the fastest are Facebook, youtube, and WhatsApp. These are the same three that get the most traffic. I think the reasoning for Facebook and WhatsApp is growing rapidly is because it allows people to connect with a lot of other people easily (sometimes people they may have lost touch with otherwise). I think youtube is growing because it is can be entertaining but also can be educational and interesting.

  1. How are the majority of visitors accessing these three sites (computer, mobile device, tablet)?
    The majority of people that use all 3 apps (Facebook, youtube, WhatsApp) use their mobile devices to access these sites.

 

 

https://www.dreamgrow.com/top-15-most-popular-social-networking-sites/

https://www.omnicoreagency.com/facebook-statistics/

https://blog.hootsuite.com/youtube-stats-marketers/

https://www.statista.com/statistics/814649/whatsapp-users-in-the-united-states-by-age/

https://www.forbes.com/sites/petersuciu/2021/06/24/americans-spent-more-than-1300-hours-on-social-media/?sh=6f7168c32547

https://techjury.net/blog/time-spent-on-social-media/#gref

 

WK 8

An example of bad online behavior occurred in 2013 when Target Corporation was the target of a data breach. The data breach impacted 41 million accounts. The cyber attackers responsible for the data breach stole information through a 3rd party vendor. With the information that they stole from the 3rd party vendor, they were able to gain access to a customer service database. Once they gained access, they installed malware on the system. As a result, names, telephone numbers, email addresses, credit card numbers, verification codes and other private data became exposed. After the security breach, Target offered customers free credit monitoring services. In addition to credit monitoring, they agreed to pay up to 10K to customers with evidence of financial loss as a result of the data breach. Target was part of a 10-million-dollar lawsuit and has paid 18.5 million in damages. To prevent another data breach from occurring they implemented an independent security expert, maintain data security software on their companies’ network, keep cardholder data on a separate network, change passwords frequently, and require 2-factor authentication. The data breach affected the company’s reputation, the following year sales were down 40 percent according to a New York Times article. The hacker responsible for creating the software used in the Target Breach was sentenced to 14 years in prison.

If I had my own business, I would implement the security measures that Target adopted after the breach, I would have two-factor authentication, frequent password changes, sensitive information stored on a different network, and the best security software that I could get.

 

https://www.usatoday.com/story/money/2017/05/23/target-pay-185m-2013-data-breach-affected-consumers/102063932/

https://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html

https://www.washingtonpost.com/local/public-safety/hacker-linked-to-target-data-breach-gets-14-years-in-prison/2018/09/21/839fd6b0-bd17-11e8-b7d2-0773aa1e33da_story.html

WK 7 Midterm

  • Know your enemy: As of Summer 2020, what are 5 sources/types of potential digital threats to your organization. Examples include external malicious actors or internal human error. Provide a thorough description and examples; be specific

Digital threats that the company should be aware of are 1.) Phishing: this is when digital threats try to trick users into sharing personal information. 2.) Ransomware, this is malware that encrypts files and locks users out of their connection, it holds the information ransom and asks for a fee. 3.) Malware; this specifically infects computer systems and steals account information with the intent of stealing money from the account. 4.) Outdated software: this can be a threat because if the software doesn’t have the updates and firewall that it needs it can be susceptible to digital threats.5.) Password theft: the company should change passwords frequently and make the password something that wouldn’t be easy to guess containing (numbers,symbols,caps,etc). The company should require two factor authentication.

 

  • Know yourself: Identify at least 5 digital processes, systems, and/or functions your company has in place. Importantly, address how could those be exploited or manipulated in order to gain access to valuable corporate or customer data?

One process the company has in place is data encryption for important documents and information that is stored within company computers. Additionally, the company educates the employees on internet safety by informing employees to exercise caution when opening emails or clicking links within emails. If something seems questionable it is always best to call the person to verify that they were the one that actually sent the email before opening it. Thirdly the company will have anti-malware software on all of their computers to detect viruses and to identify potential threats.  Another way to protect the company would be to lock the wireless network, which would allow only employees to use the network, anyone outside of the company would not be able to connect to company Wi-Fi. Lastly, another strategy that the company would use would be to limit user accounts, only specific people would be allowed to manage the IT information.

  • Develop your strategy: As the chief technology executive, make 5 recommendations that your company should adopt to be more safe, secure, and reliable. Again, consider hardware, software, networks, and human policies and procedures. (e.g., appropriate use policy on corporate computers; firewall; SSL/web encryption; backup/retention)

The company strategy to protect the company’s digital information would be to have strong passwords with two-factor authentication. Locked wifi: for internal users only. Limited access to IT information, only people with IT training and the company leads would have access to that information. The company would have strong anti-virus protection with up-to-date software and computers. Additionally, the company would train employees on internet safety and how to exercise caution when clicking on links or opening emails. The company would have important data encrypted, and they would have information on a backup system to be safe.

 

https://fraudwatch.com/5-common-digital-threats-how-to-mitigate-defend-prevent/

https://www.executech.com/insight/top-15-types-of-cybersecurity-attacks-how-to-prevent-them/

https://www.iberiabank.com/business/business-resource-center/protect-online-threats/

 

WK 6 Assignment

Creating and Applying Master Pages in InDesign Tutorial: Published May 6, 2015

https://www.youtube.com/watch?v=40Vsy56ytaE
This youtube video that I found is from 6 years ago. It was posted by a channel called Good Creative Academy. The gatekeeping method for this type of information would be up to the viewer, the viewer would need to determine whether this video is relevant and worthy of their time. Unless the channel or contributor deletes the video it will remain available to the public. The person speaking in the video seems knowledgeable and easy to follow. However, since design programs are continually updating and offering new or different features, I feel that it would be better to find a video that is more recent.

11 inspiring graphic design trends for 2021

https://99designs.com/blog/trends/graphic-design-trends/
This information was posted last year. It doesn’t specify a date that it was posted however, the title states that it is discussing and presenting visual examples of design trends for 2021. The article was posted by a website called 99 designs. It is presented in a manner that looks in-depth and like it was posted by someone that is in the design industry. The website is hosted by Vistaprint. The gatekeeping takes place within the team that runs the website, it looks like the website is ran by individuals that keep a close tab on what is going on in the design world. The information was easy to follow each design topic had a header with photographs and clear descriptions. This is a website that I would trust getting information from because of how detailed and well presented the information is.

The Rise Of Design Thinking As A Problem Solving Strategy

https://www.smashingmagazine.com/2021/06/design-thinking-problem-solving-strategy/
The third website that I looked at was an article on smashingmagazines.com. The article was posted in 2021 and was written by an established UX designer named Josh Singer. I trust his advice because the website consists of contributions of people that have been in the design field for quite a while. The site has established a dedicated following, having 190,000 followers. The gatekeeping takes place by whoever runs the website, I imagine the articles and contributors probably have to be reviewed before being published. The information is thorough and the writer states that he has 20 years of experience in educational technology. He goes on to describe Design Thinking, this is a resource that I feel would be useful in the future. It is helpful to know about his design thinking process and other designers’ perspectives.

WK 5 Content Management Assignment

A content management system is computer software that allows the user/or a company to easily build, modify and create digital content. Content management systems are used mostly to build and manage websites, but they are also used for blogs and other digital content.

The benefits of HTML are that you can build the website exactly to your liking rather than using a template and HTML is more secure.  A drawback to HTML is that is more time-consuming than CMS, additionally, if the website has many contributors, they might not all know HTML, and CMS format may be the better option. The benefit of CMS is that is more user-friendly, and you can log in to the admin from any computer. CMS be launched more quickly, and it offers templates and plugins. However, CMS isn’t as secure and it doesn’t allow for as much customization as HTML. If the person or the company is able to hire a professional web designer, it would benefit them because a custom web design from a talented web designer stands out and goes above and beyond a CMS website. The CMS websites are built with pre-sets and templates whereas the HTML is built with more creative freedom and with additional detail that the CMS site doesn’t offer.

CMS has impacted the web design profession because rather than hiring a web designer, it has become common for companies and individuals to use CMS instead because of its ease of use.

https://www.coredna.com/blogs/cms-vs-html

 

WK3 Research Assignment

Today, do more people access the web using computers or mobile devices? Provide a resource that supports your answer. 

According to an article published in 2021, 48.88% of internet traffic is desktop and 47.59% of internet traffic is mobile.   https://techjury.net/blog/mobile-vs-desktop-usage/#gref

Who controls the World Wide Web? What is it made up of?

The web is controlled by contributors from all over the world and is controlled by no one and everyone. Each person who contributes controls their corner of the web. The internet is a network of networks.  The web is made up of a URL (uniform resource locator; an http (which connects computers together); and an html (this formats pages that contain hypertext links.)

https://www.elitegroup.com/news-and-insights/who-owns-the-internet/

Who is Tim Berners Lee? What is he best known for?

Tim Berners Lee is the person who made the world wide web possible, he came up with the concept of combining hypertext with the internet.

What is a blog? What is it used for?

A blog is a website the consists mostly of written content. Blogs are used for multiple purposes including sharing stories on topics such as (life experiences, hobbies); promoting business; connecting with like-minded people, etc.

How to Start A Blog in 2024Create a Blog in 20 Minutes

What is a “responsive” website design? 

A responsive website design is when the website is designed to fit and function properly on any device that it is accessed on. Whether it is mobile, tablet, desktop, etc.

https://www.smashingmagazine.com/2011/01/guidelines-for-responsive-web-design/

Why are “responsive” website designs necessary? 

Responsive website designs are necessary because of the array of devices that are used. It is important that the website works easily and effectively on all devices.

 What is SEO, and why should website owners/managers be concerned with SEO?

SEO stands for search engine optimization; website owners and managers should use SEO because it increases a websites visibility.

What is dynamic content? 

Dynamic content is web content that changes based on the users’ preferences, behavior, and interests.

https://www.omniconvert.com/what-is/dynamic-content/

What is a content management system? You work with one, what is its name?

A content management system is a platform that allows users to edit, create, collaborate, store, and publish digital content. The content management platform that we use for this course is Word Press.

https://searchcontentmanagement.techtarget.com/definition/content-management-system-CMS

What is a youtube channel? Who might want to start one?

A youtube channel is a user’s personal presence on you tube. You tube channel possibilities are endless, people can use you tube to share skillsets, to share vlogs, some members build a following and are able to make a career off of sharing videos.

 

 

 

 

 

 

 

 

 

 

 

 

Hello world!

Welcome to your brand new blog at Central Ohio Technical College Sites.

To get started, simply log in, edit or delete this post and check out all the other options available to you.

For assistance, visit our comprehensive support site, check out our Edublogs User Guide guide or stop by The Edublogs Forums to chat with other edubloggers.

You can also subscribe to our brilliant free publication, The Edublogger, which is jammed with helpful tips, ideas and more.