Posts

Explore Task Progress

Today I am going to work on the citations in my write up as well as continue to find images and videos for my artifact. I found some images and video clips yesterday but today I hope to find some more as well as better/more detailed ones.

Explore Task Progress

December 12, 2019

Today I am going to find pictures and video clips for my artifact. I am also going to plan out what I want to say in my artifact and make sure that I cover all parts that are asked of me.

Explore Task Progress

On Friday, I continued on my written response for my explore task. I also met with you about my practice explore task to make sure that the points I got off on that one don't happen on this one. Today I am hoping to finish my written response or get very close to done with it and then start adding in my sources and the citations in the written response that associate with the source number.

Explore Task Progress

December 6th, 2019

Yesterday, the first working day for the final explore task, I focused on finding reliable sources that had good information on my topic which is Spotify. I found one source for every category the explore task looks for such as the beneficial and harmful effects, purpose, function and more. Once I found the sources I felt were good and would help me successfully complete the explore task, I started on my write-up. The write-up questions I started on was 2a and 2c. Today, the second day of working on the final explore task, I plan to continue on my write-up and I hope to get close to finishing it.

Ethical Data Collection

The issue I chose from the first article I read is privacy and confidentiality. I think that privacy and confidentiality are the most important consideration when talking about ethical data collection for many reasons. Privacy refers to the right of an individual to keep his or her information of whatever kind private. Confidentiality, on the other hand, refers to the duty of anyone entrusted with health information to keep that information of any kind private. When it comes to the privacy and confidentiality of ethical data collection, there are often times issues with respecting someone's privacy and confidentiality. I feel that this is most important because the world we live in today revolves around technology. With that technology comes all different types of data. This can range from our music and text messages to health information. No matter what it is out there, I feel that it should all be protected and private from others unless given consent by the "owner" to…

Submarine Cables

December 4th, 2019 
1. The idea that sharks biting cables is a problem is all a myth. Studies show that sharks have bitten cables in the past, but never has that caused any problems with the cables. In fact, in a study from 2007 to 2014, fish bites including shark bites accounted for zero cable faults.  2. Besides cables just breaking, there are many other reasons or factors of why cables can break. Accidents such as fishing vessels and ships dragging anchors cause two-thirds of all cable faults. Environmental factors such as earthquakes can also cause cable faults in the ocean.
3. Everyone on the North American server and other continents servers use submarine cables. There are also specific people that use submarine cables, these include Telecom carriers, mobile operators, multinational corporations, governments, content providers, and research institutions. 
4. These cables are as wide as a garden hose. The filaments that carry the light within the overall cable are extremely small and…

IP Addresses and DNS

1. A protocol is a standard set of rules that allow electronic devices to communicate with each other.
2. An Internet Protocol (IP) address is a numerical label assigned to each device connected to a computer to use the Internet Protocol for communication. An IP address has two main functions. These functions are to host or network interface identification and location addressing.
3. These are organized by first identifying the network (IPv4) and then it identifies the host (IPv6).
4. The IPv4 address is made up of 32 bits which is 4 bytes.
5. Because of the 32 bits the IPv4 has, that means there are 4,294,967,296 addresses. 
6. The difference between IPv4 and IPv6 is that IPv4 uses only 32 binary bits while IPv6 uses 128 binary bits. IPv6 also identifies an endpoint device using internet protocol version 6 and IPv4 identifies an endpoint but using internet protocol version 4. 
7. IPv6 is the solution to accommodate the increased demand by providing a much larger address space along with im…