Skip to main content

 Application Uses and Reflection

There are different applications that I use daily for work and school. Each application has its unique purpose and functionality. Although they can be used interchangeably some projects require a specific application to accomplish a certain outcome. The word processor application is great when I need to write professionally or a proper paper for academic purposes. The grammar check that comes built-in makes it so that there are fewer errors in my writing. The spreadsheet application has great features like organizing data as well as making visuals for that data. Being able to see the data in a chart really helps put that into a better perspective for some. The spreadsheet application is one that I thoroughly like to use for work and school purposes. The presentation application does have its uses and although I do not use it much except for school it does make it easy to present certain projects better with visuals that would otherwise just be words. Having the ability to add visual aids can help drive the point that you are trying to make better than just data or words on a screen. The database application is the one that I use least because there are no applicable features we use at work or school. Although I do not use these applications myself, I have seen them used by friends as well as coworkers and it does make their job easier. As I keep growing my knowledge in the information technology world I am sure I will run into more of these applications and I will have to be proficient in them.

           The application that I enjoy using and believe has the best use for me is the spreadsheet application. I have learned to use it more efficiently since my statistics class because of the formulas we had to utilize. Putting my day on it and calculating the time I spend doing each activity was uncomplicated. The spreadsheet does a lot more than just organize data; it also allows you to use formulas to make sense of the data and make charts to visually see that data in action like mentioned by Vahid & Lysecky (2017). I use the spreadsheet application at work to store data of fiber that is run throughout the city and can color coordinate it as well. I will continue to use the spreadsheet application when I can because of how versatile it is.

 

References

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

Comments

Popular posts from this blog

  Network Security Connection             Network security is very important in today’s world, and it will continue to be an essential part of the future of the cyber world. With each new technological advancement, there is a threat that arises that is set in motion to try and exploit that new technology. From the dawn of the first home computers, some seek to use those same systems with malicious intent. Cybercrime is the fastest-growing form of criminal activity (Vahid & Lysecky, 2017). The growing rate of cybercrime means there must be people at the forefront trying to protect against it and it starts with protecting networks as well as devices that are in use. Network security is a cornerstone to any computer database and this security needs to stay prepared for any cyber threat that will try to take advantage of its users.            Having a reliable network requir...
Information Highway  Sending and receiving information on the internet does have its snags at times and having ways to help determine what causes them can help make that information travel better. I have used ping and traceroute extensively due to my line of work. I work for an internet service provider and running ping tests can come in handy when a customer is experiencing slow internet speeds. When you run a ping test to a certain destination you are sending packets to that place and awaiting a response. This can help determine if the line of communication to that destination is a clear one and if there isn’t a clear route for that packet it can be lost. If the packet of information doesn’t make it to its destination it could be resent causing a slight delay to that information. Traceroute is used to see the number of places a packet must hit before reaching its destination. Each server it hits is marked down along with the amount of time it took to reach that server. I did a ...
 Network Security      There are several security threats to those that jump on any network even when it isn’t connected to the internet. The number of computing devices out there can all be targeted and if these threats are not checked the damage can be very costly. The threats to one’s network, devices, and even information come in many forms. These threats are serious but there are a few tried and true methods to help avert them. This paper will cover two specific threats in detail as well as outline some protective measures to help.            One of the threats that are very popular in the cyberworld is called phishing. Phishing is a scam that runs on the internet to try to exploit a user’s sensitive information (Vahid & Lysecky, 2017). These types of threats are mainly targeted at a specific user of a device that can connect to a network or internet. Once a breach has happened the user’s information can be...