Apps that I like!

 

Discord- Discord is a very popular app that is made for creating ways to communicate with people that share similar interests with you (source). Its layout is also very economical, allowing for ease of use and the ability to switch between 3 lighting settings Light, Dark, and Midnight mode makes it very comfortable (source). Most of the selected audience for this app are teens to adults so they can reach out to others with similar interests. 

 

And Discord collects money from fancy subscription based services that allows users to upload large files and also adds more customization features (source1-source2)and as of recently also profile customization features for a small fee so It doesn’t force ads unto you. Making this Free chat app incredibly good and nice to use. 

 

Tik tok-Tik tok is an incredibly popular social media app that had one of the largest impacts on humanity but not a good one. Tik tok was a  simple video sharing app that was made for short form videos. It made a large number of people have some “mental issues” like Adhd. though These problems didn’t stop teenagers from using this app                           (me included) it influenced teens to have shorter memory spans.

 

Tik tok’s advertisements are made through ads mostly (source)  also light shopping also through the same app making a little extra money for them but most of their cash is made out of their advertisements. Some advice I could give is to only like the posts you enjoy because if you like every single post the algorithm will send random posts. 

 

Cloud services? Safe?

The questions I am going to answers for Gmail & Dropbox

  • Would this application/system work as well NOT in the cloud?
  • What are the advantages to having this system on a distributed network?
  • Do you have any security or privacy concerns when using this system?
  • Anything else you’d like to share about cloud services.

Cloud Application 1: Gmail

is a free web-based email service that provides users with 15 GB of storage for messages and the ability to search for specific messages. So I don’t think Gmail would work well off the cloud because it requires the ability to talk to other people online so it requires the cloud. It allows for communication over the internet so it is technically a distributed network. Gmail is normally very safe unless you open up an untrustworthy file. The only thing that is concerning about Gmail is it can carry viruses, But even then it is rare that it carries viruses.

Cloud Application 2: Drop box

a cloud storage solution, equipped with features to help you save time, improve your productivity, and collaborate with others. So like Gmail I don’t think Drop box would work well off the cloud because it is built off of the cloud storage system. Because the drop box is on a network you can access your files from anywhere you want. There really is no real threat to using Drop box because no one can drop things into your dropbox without you knowing. So you are completely safe while using this app!

Social media? how about NUMBERS!

1. What were the top three social media sites, in terms of traffic, in 22-23?

The three most popular social medias of the last few years were

Facebook had 3.07 billion active users last year in first place

Youtube had the second highest with 2.5 billion active users

Instagram is third place with 2 billion users

info

2. How does each social media site work? and why do people use it.

Facebook is a social media platform that is made to connect people to each other creating communities facebook is also made to organize community events on about any topic. Created in 2006 it has expanded to approximate 1 billion users worldwide (information)

Youtube is a free video sharing website  where you can create and watch videos for free made by the community and most people. Created in 2005 it has expanded to have an approximate 6 billion hours every month. (information)

Instagram is a photo sharing app even though it is incredibly popular it is mainly used for sharing photos and videos with your friends. Created in 2010 it has grown to have a community of over 2 billion users (information)

3. What are “demographics” and why is it important in social media?

The main demographic of facebook is approximately 25-35 years old while youtube’s demographic is mostly Gen-Z and instagram is mostly 30-49 years old.

4. demographics that stand out among the three social media sites I listed

The demographic that stood out the most to me were Gen-Z with youtube because unlike everyone else the youtube didn’t give an age demographic and instead said the generation instead of the actual age.

5. On average, how much time do users spend on each social media site?

Avg Facebook time spent: 33 minutes per day (source)

Avg Youtube time spent: 45 minutes per day (source)

Avg Instagram time spent: 29 minutes per day (source)

6. Which of the three social media networks is growing the fastest?

Shockingly the fastest growing social media platform isn’t youtube but instead instagram. I don’t quite understand how but ya know good for them 😀

7. How are the majority of visitors accessing these three sites?

Mobile devices

Hacking?

A case of bad behavior on the internet is called hacking which is the gaining of unauthorized access to data in a system or computer. Which is Illegal and can lead to criminal charges when a hacker accesses someone else’s computer system without consent. For example, a hacker may use a phishing scam to install malware on a computer network.

They may also install programs, allowing them to commit identity theft or steal confidential information. Also it may result in a felony or misdemeanor. Because It is an invasion of privacy. A very interesting case is one called DigiNotar.

On 3 September 2011, after it had become clear that a security breach had resulted in the frauds issuing of certificates, the Dutch government took over operational management of DigiNotar’s systems That same month, the company was declared bankrupt. An investigation into the hacking by Dutch-government appointed Fox-IT consultancy identified 300,000 Gmail users as the main target of the hack, and suspected that the Iranian government was behind the hack. While nobody has been charged with the break-in, cryptographer Bruce Schneier says the attack may have been “either the work of the NSA, or exploited by the NSA.” But the hack has also been claimed by the so-called Comodohacker, allegedly a 21-year-old Iranian student, who also claimed to have hacked four other certificate authorities, including Comodo, a claim found plausible by F-Secure, although not fully explaining how it led to the subsequent “wide scale interception of Iranian citizens”.

In summary on 3 September 2011 a security breach resulted in the frauds issuing of certificates, the Dutch government took over operational management of DigiNotar’s systems That same month, the company was declared bankrupt. An investigation into the hacking by Dutch-government appointed Fox-IT consultancy identified 300,000 Gmail users as the main target of the hack after the investigation was claimed by the so-called Comodohacker, allegedly a 21-year-old Iranian student. Shockingly enough the 21 year old iranian didn’t face any repercussions for his actions though normally there would be repercussions for hacking a bank.

Which I might add is Illegal and can lead to criminal charges normally but for some reason the 21 year old student didn’t get arrested from the E-crimes that he committed especially after the government. This case is quite famous due to the fact that it was a hack against an actual bank and no repercussions were done against the 12 year old.

Malware and Viruses <:O

1: know your enemy: there are many dangers on the world wide web. Not only concerning you but organizations also! The main source of these dangers are Malware aka Malicious software. It is a type of virus that aims directly at your computer that is meant to steal valuable data or entirely corrupt your device, so let’s learn some versions of malware and how to detect them.

  • The virus: the most common type of Malware mostly attached to a document or file that can support macros to execute and spread to your computer. It is designed to tamper with your computer and tamper with operations. They can cause operational issues and data loss. You can mostly prevent it by not downloading any suspicious links from unknown / untrusted sources or just a antivirus would work wonders
  • Worms: a type of malware software that rapidly spreads to any device within the network. worms do not need to use host programs to spread. A worm infects a device through a downloaded file or a network connection before it multiplies and spreads at a quick rate. Like viruses, worms can severely disrupt the operations of a device and cause data loss. Antiviruses work for this also!
  • Trojan: these are hidden as helpful programs. But once the user downloads it, the Trojan virus can gain access to personal data and then change, block, or just straight up remove the data! This can be extremely harmful to the performance of the device. Unlike normal viruses, Trojan viruses are not designed to self-replicate. A famous Virus is the “you are an idiot Trojan” whenever you tried to close it, it would instead pop up with a message stating that “you are an idiot”
  • Ransomware: A type of malware that gains access to sensitive information within a system, encodes that information so that the user cannot access it, and then demands a financial payout for the data to be released. Ransomware is commonly part of a phishing scam. By clicking a disguised link, the user downloads the ransomware. You can mostly prevent it by not downloading any suspicious links from unknown / untrusted sources
  • Spyware: Not only is there a spy in our base there is one on our computer also! Spyware is malicious software that runs secretly on a computer and reports back to a remote user. Rather than simply disrupting a device’s operations, spyware targets sensitive information and can grant remote access to predators. Spyware is often used to steal financial or personal information.

(Malware information)

2:know yourself!: Processes, systems and functions can be exploited by viruses and general malware but how can it be exploited and how can it be used against you? Let’s go over them.

  • Email: Viruses can get into your computers through emails using suspicious links and files sent through unscrupulous means when you open an attachment or click a link contained in an email message. If your email client allows scripting, then it is possible to get a virus by simply opening a message. It’s best to limit what HTML is available in your email messages.
  • Gaming: Viruses can also get in though out of date software it is one of the main entry points for malware. That’s how malicious programs can find their way into your system. Gamers tend to have many helping programs and apps installed meaning that they will have a higher chance of getting malware. Just make sure to trust the websites you download things from
  • Word processing: Yes, it is possible to get a virus by simply opening an infected Word file. Viruses can be embedded within the document or exploit vulnerabilities in the word processing software to execute malicious code. Just make sure to trust the documents that you open and you should be fine
  • Video editors: While a video file itself isn’t typically considered a direct carrier of a virus, malware can potentially be embedded within a seemingly normal video file, allowing it to infect a computer when the video is opened in a vulnerable video editing software especially if the user downloads the video from an untrusted source. So just make sure to trust the website like everything else!
  • Website: Visiting infected websites can expose your computer to viruses. These websites may contain malicious code, such as JavaScript, that can exploit vulnerabilities in your web browser or operating system. Also this can occur when malicious code is automatically downloaded to your computer without your knowledge or consent.

3: Develop your strategy: so how do we stop these malware from getting into our computers? Let me recommend some ways that you could prevent malware

  • Keep Your Software Up-to-Date: Keep updating often because they  include security patches that address issues that malware can exploit. Ensure your operating system, antivirus software, and other applications are always running the latest versions.
  • Use a Reputable Antivirus Software: A good antivirus program can detect and remove most of the malware before it causes damage. Choose a reputable antivirus software and keep it updated. Just to be safe
  • Be Cautious of Suspicious Emails and Links: Avoid clicking on links or opening attachments from untrustworthy sources. And be wary of suspicious emails
  • Verify Website Authenticity: Check trustworthiness before entering personal information, and make sure that you’re on a legitimate website. Look for signs of a secure connection and verify the website’s URL.
  • Use Strong, Unique Passwords: Avoid using the same password for multiple accounts. Create strong passwords with a combination of uppercase and lowercase letters, numbers, and symbols. Consider using a password manager to help you manage your passwords securely. So that if you pick up a ransomware it can only be one single password that is held for ransom hopefully

(prevent malware information)

Photoshop opinons

Photoshop Tutorial – Photo Manipulation In photoshop

This tutorial is very fast and gets into the main topic quickly. and because it is under a minute it dosn’t really take any time to figure out how they explain how to do it.

Dripping Effect – Photoshop editing tutorial

The music is a little irritating. It shows exactly what you have to do and exactly what you have to click. It’s a little longer but the process is longer.

Neon light effect photoshop tutorial

This one is probably the most interesting one out of the bunch instead its an edit making a vfx

Most of the tutorials were quite old. The oldest one which was the neon light effect tutorial that was 3 years ago so it isn’t very recent. But even though that it wasn’t particularly recent the menu and all of the options looked the same and from my experience looks remotely the same

They aren’t quite authority but they still have quite a online following. Which makes them a bit more convincing but because of the fact that they don’t show where they found their information which is a bit concerning but all in all they show that they know what they are doing so even though they arn’t authoritative figures they still host convincing tutorials so they are believing enough.

There arn’t really any gatekeeping methods on youtube besides having to wait for a 30 second ad which is really the only real gatekeeping method for one of the largest sources of information on the internet.

But because of the fact that youtube has some content control in the form of its algorithm allowing a like system and a dislike system. To control how fast the system promotes the videos so it is quite reliable. Also incredibly easy to digest because of the shorter form of videos  also because of the step by step procedure that makes it better and easier to follow.

I would most definitely use this platform in the future for the simple fact that it is very easy to find information and how simple the information is to digest off youtube.

Cms Vs Html

What is a”content management system.” and Is it just for websites? Content management system or CMS for short is a web application or software that manages digital content, allowing multiple contributors to create, edit and publish from a single dashboard.  (Information taken from optimizly.com) but put in simpler terms  it is an app or website that manages digital content while still allowing its users to publish content on its website/app.

Let’s  Compare and contrast building a website using a CMS and coding a website by hand using HTML/CSS. Shall we? Let’s start with CMS. Some of the pros of coding a website using CMS is good security, customization options, Easy collaboration management, and pretty cost effective. Meanwhile the cons of making a CMS website are not as severe as the positives. There is a learning curve, security vulnerabilities, dependency on third party plugins, and performance issues. Html on the other hand has almost completely different pros and cons to CMS.

Html is very convenient, easy to learn, and cost effective. Html’s negatives are also different but not that bad compared to the positives. It is static and that is the most major downside and also weak security. That means data breaches and hackers can easily access the HTML websites data. So I would say personally that CMS is better for web development because of the customization and security of data

Now you may wonder how CMSs impact the web design industry? CMS makes it easy to update your website without having to research advanced technical skills and many web designers use it without the project managers support.

Interesting information from the web!

1. Most people access the internet from 95.5 percent of global users from mobile devices and 93.7 percent report doing most of them searching on the smart phones and other mobile devices while only 62.2 percent of internet searchers use desktops or laptops to browse the internet. information grabbed from (statista.com)

2 . The world wide web is a system of information system that enables users to contact and exchange information over the internet made by Tim Berners lee and it was made up of URL (uniform resource locator), which is the addressing scheme to find a document; HTTP (hypertext transfer protocol), which connects computers together; and HTML (hypertext markup language), which formats pages containing hypertext links. Information grabbed from (artandculture.com)

3. Sir Tim Berners-Lee invented the World Wide Web in 1989. he is the founder of the internet as we know it also He wrote the first web client and server in 1990 which is quite impressive. Information grabbed from (w3.org)

4. Blogs are a type of regularly updated websites that provide insight into a certain topic. A blog is a combined version of the words “web” and “log.” in the start, blogs were simply an journal where people could write about their daily lives on the web. Information grabbed from (Wix.com)

5. An responsive Web design is a approach that suggests that design and development should respond to the user’s behavior and environment based on screen size, platform and orientation. It is a mix of flexible grids and layouts, images and intelligent use of media queries. the website should automatically switch to accommodate for resolution, image size and scripting abilities if a responsive web design is worked into the website. Info grabbed from (Smashingmagazine.com)

6. Responsive web design is so simple because it makes websites faster, more accessible, and easier to navigate. It also makes signifyingly it easier for users to find the information they are looking for and makes them stay on your site for longer periods. Information grabbed from (searchenginejournal.com)

7. Seo stands for search engine optimization which is the process of getting traffic from free, organic, editorial, or natural search results in search engines it is made for making your website at the top of the search engine. Info grabbed from (digitalmarketinginstitute.com)

8. Dynamic content is defined as digital or online content that changes based on data, user behavior and preferences. This can be anything from text, audio, video or format content! (spicecontent.com)

9. While there are hundreds of types of CMS platforms each with their own unique functionality, some of the best and most popular CMS providers are: WordPress. Drupal. Optimizely CMS. and I personally use WordPress obviously. Information grabbed from (optimizely.com)

10. a YouTube channel can be a great way to share your ideas, talents, or knowledge with the world and interests. Also, it is very simple and quite fun because you get to make content that people will actually enjoy and over stuff that you find interesting also kind of like a blog! Information grabbed from (ericjkuhns.com)

This is kinda a funny blog :D

So hi! this is my first blog post becouse I am not quite sure what I have to do to be honest with my first post so I’ll just put a introduction here. Hi! I am Noah! and I am a highschooler doing college courses and enjoy a lot of movies and other geeky stuff. nothing too crazy though :D. I hope you’ll enjoy looking though my blog

It will slowly fill out over time for now it is empyty

Hello world!

Welcome to your brand new blog at Central Ohio Technical College Sites.

To get started, simply log in, edit or delete this post and check out all the other options available to you.

For assistance, visit our comprehensive support site, check out our Edublogs User Guide guide or stop by The Edublogs Forums to chat with other edubloggers.

You can also subscribe to our brilliant free publication, The Edublogger, which is jammed with helpful tips, ideas and more.