L13: Business Issues
L13: Reflection
This lesson gave me a clearer view of how business, collaboration, and ownership function on the internet. I learned that businesses today often rely heavily on digital transactions, online storefronts, and remote communication tools to operate globally without needing a physical presence. It surprised me how much is handled behind the scenes through cloud computing — from storage and software to customer management systems.
I also explored how cloud applications like Google Docs and Microsoft 365 enable real-time collaboration, allowing people to work together from different parts of the world almost as if they were in the same room. This not only increases productivity but also creates new challenges around managing data and accountability.
Finally, I learned about the importance of ownership on the internet. Whether it’s writing, software, images, or music, digital creations are protected by copyright laws, meaning the original creator has legal rights unless they choose to share or license their work. This reinforced for me how important it is to respect the work others post online, and it made me think more carefully about my own digital footprint and creations.
L13: Enterprise Technology Integration
Company 1: IBM
Industry: Tech and Consulting
Technology Integration:
IBM shifted from hardware to focusing on AI, cloud computing, and data services. They use tools like Watson to handle everything from analytics to customer support.
Advancements in Operations:
Their cloud setup helps businesses run smoother and access data from anywhere, while Watson speeds up tasks like data analysis and decision-making.
Profit Impact:
IBM makes more money now through subscriptions and consulting services instead of just selling hardware, which gives them steady income.
Organizational Improvement:
They restructured into separate units like IBM Consulting, which helps them focus better and move faster on projects.
Overall Benefit:
Tech helped IBM go from a hardware company to a leader in AI and cloud services, keeping them competitive in today’s market.
Company 2: Walmart
Industry: Retail
Technology Integration:
Walmart uses tech like robots for inventory, self-checkout machines, and online delivery systems. They also use AI to track what customers like and need.
Advancements in Operations:
All that tech helps keep shelves stocked, speeds up checkout, and makes shopping easier both in-store and online.
Profit Impact:
Automation cuts down on labor and shipping costs, while online shopping brings in more sales, especially from people using Walmart+.
Organizational Improvement:
Walmart added more tech jobs and created a team focused on digital growth, so now their store operations and online systems work together.
Overall Benefit:
Tech made Walmart faster and more efficient, helping them keep up with online giants like Amazon.
Company 3: Delta Air Lines
Industry: Transportation
Technology Integration:
Delta uses mobile apps, biometric boarding, and predictive maintenance to improve how they run flights and help customers.
Advancements in Operations:
Predictive tools help prevent delays by spotting mechanical issues early, and their app makes it easy to check in or change flights on the go.
Profit Impact:
Fewer delays and better service mean more people fly with them again, and cutting maintenance surprises saves them a lot of money.
Organizational Improvement:
Delta encourages using tech at all levels—from the pilots to the support teams—so their whole system is more connected and efficient.
Overall Benefit:
Delta’s tech upgrades make flying smoother and cheaper to manage, which keeps both customers and the company happy.
L12: Societal Issues
L12: Reflection
This lesson made me realize that even though the internet has brought a lot of good, it’s also caused some serious problems. One of the biggest issues is how fast misinformation can spread. False news and rumors travel quicker online than ever before, and they can mess with people’s opinions and even affect things like elections.
We also talked about cyberbullying. Since people can hide behind a screen, they say things online that they probably wouldn’t say in person. It’s crazy how common online harassment has gotten.
Another thing that stood out to me was how much privacy is at risk. A lot of people, including myself sometimes, post personal stuff without thinking, and companies or hackers can take advantage of that. It made me more aware that I need to be a lot more careful about what I share online.
L12: Cybercrime Assignment
Rehabilitation Over Retribution
In today’s digital world, cyber-attacks are a growing threat, and this has raised the question of how we should punish cybercriminals. Some believe in retribution—punishment for the sake of justice. Others, like myself, argue for rehabilitation, which gives offenders the chance to reform and use their skills for good. Many cybercriminals are young and talented but make poor choices due to curiosity or peer pressure. With the right guidance, they can turn their skills around. Instead of locking them away, we should give them a path to make things right.
Marcus Hutchins is a perfect example. He once helped develop the Kronos banking malware but later became famous for stopping the global WannaCry ransomware attack in 2017. His actions saved countless systems. The court recognized that he had changed and sentenced him to time served and supervised release (Greenberg, 2020). That’s the power of rehabilitation—taking someone who caused harm and helping them become someone who prevents it.
Jonathan James, another young hacker, broke into NASA and Department of Defense systems as a teenager. Although he served a short sentence, the weight of continued suspicion and fear of prosecution drove him to suicide in 2008 (Poulsen, 2008). His case shows the mental toll retributive justice can have. Another hacker, Dylan Wheeler, also known as “Nebula1,” faced U.S. federal charges related to a hacking group that stole software from tech companies. Yet Wheeler later pivoted to work in security research, proving that with the right opportunity, change is possible (Cox, 2014).
Some people say being too lenient sends the wrong message, but rehabilitation doesn’t mean letting people off easy. It means holding them accountable while helping them change. With the right programs—like community service, education, and monitoring—we can reduce future crimes and even strengthen our defenses by turning hackers into protectors.
Cox, J. (2014, July 23). FBI’s most wanted hacker is actually a 20-year-old Australian stoner. Vice. https://www.vice.com/en/article/d7ygwz/the-fbi-is-after-a-20-year-old-australian-stoner-for-hacking
Greenberg, A. (2020, May 12). The confessions of Marcus Hutchins, the hacker who saved the internet. Wired. https://www.wired.com/story/confessions-marcus-hutchins-hacker-who-saved-the-internet/
Poulsen, K. (2008, May 18). Infamous teen hacker commits suicide. Wired. https://www.wired.com/2008/05/infamous-teen/
L11: Privacy
L11: Reflection
This lesson really made me think about how much important information is out there and how easy it can be for the wrong people to get it. Personal stuff like bank accounts, addresses, and even private conversations can be accessed if you’re not careful. A lot of times, people don’t even realize how much they’re giving away just by being online.
We also went over ways to protect personal information. Things like using strong passwords, setting up two-factor authentication, and being careful about what you share on social media are all simple but important steps. It made me realize that small habits, like checking privacy settings and not clicking on random links, can make a big difference in keeping my information safe.
L11: What do Companies Know About You
1.When you use apps like Facebook or Snapchat you give away your name, location history, address, birthday, family history and preferences. This create a metaphysical map of you.
2.Normal stuff like name, birthday, address, email.
3.I google myself and found my name, previous address, family connections, and phone number. I knew for a long time that my information is on the net and I’m fine with leaving it there cause it’s pretty old. Just my name give me everything.
4.No additional information mainly because since then I’ve stop using social media and I move around way too much to be tracked. Some of the information was false mainly due to aliases I’ve had in my life. I tried Whitepages and zabasearch. There are several paid subscriptions you can do to remove yourself from all the sites.
L11: Database Technology and Privacy Issues Discussion
When looking at privacy we can see attempts to balance the benefits and drawbacks of database technology with consumer privacy when we look at Europe General Data Protection Regulation, the California Consumer Privacy Act, Health Insurance Portability and Accountability Act (HIPAA), and Gramm-Leach-Bliley Act (GLBA). All of these regulations are mandating transparency and protection when it comes to consumer privacy. Privacy regulation, such as the European Union’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), represents attempts to balance the benefits of database technology with the need to protect personal privacy. These regulations mandate transparency in data collection and give individuals greater control over their personal information.
In the United States, privacy protection remains fragmented, with no comprehensive federal privacy law protecting consumers from commercial entities’ data practices. While private information is generally protected from government intrusion as a fundamental right, protection from commercial entities is not established as such. As Landau and Vargas Leon note in their Colorado Technology Law Journal article, “The Federal Trade Commission can act against industry unfair and deceptive practices, which can include use and abuse of private information, but its power and enforcement capability is limited” (Landau & Vargas Leon, 2023). Their research also highlights how federal laws have “largely ignored privacy protections for metadata and telemetry,” with only five states having enacted laws regulating non-content data use, primarily focusing on location information.
The authors advocate for a comprehensive federal privacy law in the United States that would establish baseline privacy protections for consumers across all sectors.Landau and Vargas suggest that this law should specifically address metadata and telemetry data collection, which are currently unregulated. Their proposed solution emphasizes that privacy regulations should be technology-neutral but be specific, focusing on how data is used rather than the specific technology collecting it. This approach would help regulations remain relevant as technologies evolve. This approach would in principle be similar to Europe GDPR and the USA should take note on how that law was implemented. In addition, Landau and Vargas Leon recommend creating stronger enforcement mechanisms with real consequences for violations, enhancing transparency requirements so consumers understand how their data is being used, and implementing data minimization principles to limit collection to what is necessary for specific purposes. The authors also stress the importance of international cooperation and harmonization of privacy standards, given the global nature of digital services and data flows.
Landau, S., & Vargas Leon, P. (2023). Location data, Dobbs, and the rule of law. Colorado Technology Law Journal, 21(2). https://ctlj.colorado.edu/wp-content/uploads/2023/09/LL-Final-08.02.2023.pdf
L10: The Internet and Web
L10: Reflection
This lesson helped me get a better idea of how computers actually talk to each other over networks and the internet. I used to think it was just magic, but now I know there’s a lot going on behind the scenes, like how data moves through routers, switches, and servers to get where it needs to go. One of the coolest parts was learning the basics of how websites are built and accessed. Setting up a site isn’t as complicated as I thought once you understand the structure. We also got a look at some basic coding and scripting, like using HTML to create pages and a little bit of CSS to style them. It made me realize that even a simple website needs a solid foundation of coding behind it.
L10: JavaScript


- I would guess the else if statement because it allows you to chain multiple conditions. All the conditions build on each other it really depends on the situation.
L10: HTML

L10: The Internet and Web Discussion
The internet is a worldwide interconnected system of computers, servers, and routers that communicate via established protocols such as ftp, http, smtp, etc. The internet began as a research project by Defense Advanced Research Projects Agency (DARPA). Its goal was to create a connection between two research universities in order to communicate. This project was named Advanced Research Project Agency Network (ARPANET). An early design consideration that is still present today is having a network that have multiple pathways to traverse the data. This allows for communications to continue in the event of a line being destroyed. This technique is known as a mesh network. As the internet took shape everything was text based and gradually as standards were put into place and ISP were brought in to not restrict their traffic the internet exploded. It was at this time in 1989 that Tim Berners-Lee conceived the idea to merge the all the technologies together to create a global system that is easy to use. The World Wide Web acts as an additional user-friendly layer to the data.
Today both the internet and the web are an integral part of our lives driving the many innovations and growths within societies. We communicate over this constantly, gather information, play games, and pay our bills. As the interconnectedness continue it spawned the Internet of Things (IoT). This idea is to have any electronic device be connected to the internet achieving seamless data transfer to facilitate a better experience. At the same time the standards which the web is built on have constantly evolved as better technology and solutions are adopted such as http being secured to https to better protect users. Security by design is being considered in every context.
L09: Security
L09: Reflection
This lesson showed me just how many ways people can break into computers and networks without permission. We talked about different types of unauthorized access like hacking, phishing, and malware. It was crazy to see how easy it can be if you’re not paying attention or if your defenses are weak.
L09: Infographic on a Security Concept

L08: Applications
L08: Reflection
We also explored different computer applications made specifically for the internet and phones, like social media apps, banking apps, and even cloud storage. It’s crazy how many parts of our lives are connected through apps now.
Another thing we went over was streaming apps. I didn’t realize how much variety there is — from Netflix and Spotify to smaller platforms that stream games or podcasts. Streaming is basically how people get most of their entertainmentnow. We also talked about open source information sites like Wikipedia. It made me think about how powerful it is to have a place where anyone can share knowledge, but also why it’s important to fact-check what you read.
L08: OSINT Powerpoint
L07: Data Organization
L07: Reflection
For presentations, it’s about making slides, adding text and images, and knowing how to keep things simple so the audience doesn’t get overloaded. Good design matters just as much as good information.
When it comes to databases, it’s about storing large amounts of information in a way that’s easy to find and update. Learning about tables, fields, and queries made me realize how important databases are for keeping businesses organized.
L07: SQL Statements






L07: Music Genome Project
Music Genome Project
The data is collected from every song entered into its database. The data is used to give a “personalized listening experience”.
what artist did you pick and what were the songs?
Seed Artist: Beethoven. Symphony No. 7. Allegretto.
Beethoven. Symphony No. 3. Eroica
Tchaikovsky. Swan lake.
IV. Allegro Con Fuoco
Beethoven. Egmont Overture.
What are the categories/musical style being used to classify the songs that were played?
Music Genre. Artist. Melody. Instruments. Lyrics. Vocal style.
What clues do these categories provide about the database structure being used?
Filter first by the music genre and then match by artist. Then similar classical music.
Do you like songs?
No. I only like the seed song I put in. I’m particular when it comes to classical music so I’m not surprised. I tend to like one or two songs from each artist rather than every song from a particular artist.
Would you put these songs together in a playlist?
No, I won’t.
L07: Cold Case
Cold Case
DNA sampling played a pivotal role in linking Dellando Recardo Campbell to the 2009 murder of Serika Dunkley Holness. ““The blood Dellando Campbell left behind at the 2009 crime scene was analyzed and entered into a national DNA database, where it waited four years for a match,” said U.S. Attorney Rod J. Rosenstein” (U.S. Attorney’s Office, District of Maryland, 2014). This match served as the key evidence in establishing that Campbell as the second participant to the crime. The DNA evidence was collected from two places: at a rural Maryland crime scene where the victim’s items had droplets of blood and in 2013, during an unrelated arrest in Lemoore, California police had collected a DNA sample from Campbell. These two pieces of DNA evidence ultimately linked him to the crime. DNA evidence of people not convicted of a crime should follow strict protocol in how long the DNA sample remains in the database and be properly expunged from the system after a predetermined period.
U.S. Attorney’s Office, District of Maryland. (2014, July 28). California man pleads guilty to Maryland murder solved by DNA [Press release]. U.S. Attorney’s Office, District of Maryland.
L06: Programming Languages
L06: Reflection
We started learning the basics of Python. I liked how simple and clean Python looks compared to other languages. The way it uses indentation instead of a bunch of brackets makes it easier to read and understand. Learning about variables, loops, and if-statements gave me a good starting point for writing small programs. I can see why Python is so popular, especially for people just getting into coding.
L06: Python Programming



#L06: Programming Language Discussion
Learning Curve: Reflect on the learning curves associated with these programming languages. Which language might be more challenging for beginners to grasp, and why? Share insights into the learning resources available for each type of language.
Machine language would be the most challenging to grasp for anyone the reason being that it’s written only in 0’s and 1’s. Even writing small statement like adding two numbers would require a lengthy string of 0’s and 1’s. From there assembly would be the next difficult to grasp due to needing a solid underlying knowledge of how computer operate. However, it does allow for some human readable code in its architecture such as MOV, ADD, SUB. There is a vast library of resources on this subject. Finally, the language I choose is Python as the syntax is relatively bare compared to Java and the language is very intuitive similar to how we would think. There is lots of resources on python from videos, books, classes, seminars, and java.docs the list goes on and on.
Abstraction Levels: Discuss the abstraction levels offered by each category of languages. How does each level of abstraction impact the ease of programming, code readability, and control over hardware resources?
The abstraction level for machine code is very little; you are directly mapping each binary to a function that the computer can directly interpret. This allows for a very granular access as everything is under the programmer control and could see use in embedded systems. Assembly offers better code visibility in interpreting what the code does quicker, however, still challenging to grasp. High-level languages such as Java offers a much more abstract way of programming from hiding complex implementation in favor of exposing only the necessary features of an object. This makes the code highly readable but makes it harder to control the hardware. An example of this is creating a mail system with Java. You can create a mail system template, reuse it, and repurpose it for a different type of mail system that follow the same design template.
L05: Operating Systems
L05: Reflection
This lesson gave me a better understanding of how operating systems actually work. I always knew they were important,but I didn’t really think about everything they handle behind the scenes — like managing files, running programs, and controlling hardware like printers and Wi-Fi. We also went over the most common operating systems, like Windows, macOS, Linux, Android, and iOS. It was interestingto see how each one is designed a little differently depending on whether it’s meant for computers, phones, or otherdevices. Knowing the differences makes it easier to figure out which system is better for certain tasks.
L05: Operating System Discussion
Dear Google Chrome,
I’m writing this with a heavy core and a cluttered cache because it’s time for us to disconnect. Your sleek chromium interface had me hooked. But lately, I’ve noticed you’re not the sleek partner you used to be—more like a bloated beast, hogging my precious memory and battery life.
Every time I glance at my battery, I’m reminded how I need to recharge my lap constantly. You’re at the top of my Task Manager, draining away my RAM. And let’s not even mention those pesky CVE alerts that I see every week. Privacy concerns? You backdoor everyone—I’ve had enough of feeling like my every click is being watched.
You were my go-to for quick searches and smooth browsing, but now it feels like I’m in a relationship with a vampire. Your bloodsucking fangs have me no more! So, as much as it pains me to say goodbye, I must reclaim my device’s freedom and my body.
Farewell, Chrome. May you find a niche where bloat is welcomed, and vulnerabilities are celebrated.
Sincerely,
Vampire Slayer
Why did you choose the particular operating system or application for your letter?
Over the years I’ve used Google Chrome extensively and as I’m got more familiar with computer, applications, and security I noticed Chrome always being pardon for better word “shitted” on. As I had to work different operating system with less memory capacity I finally noticed why. The way Chrome was built hogged up my RAM usage and drained my battery quickly. I deleted the browser this last semester and haven’t looked back.
What emotions did you feel while writing the letter?
Reminiscing about the good times and bad with Chrome just like a relationship. Happy, mad, outraged, sad, nonchalant.
How does this activity reflect the role that technology plays in our lives?
Plays a big role in your daily lives in how we get stuff done and how much we tolerate something, but as soon as something better comes we will drop it.
Did the process of writing the letter help you better understand your feelings toward the technology you interact with?
Not really. I’ve always had a love-hate relationship with technology. I love using it, but it also too convenient. We forgot how to do things we once knew. For instance who needs to know exactly where your destination is when you have Google Maps to tell you.
L05: Choose the Best OS
Operating Systems | |||
---|---|---|---|
Linux | Windows | MacOS | |
Very cheap | Wide commercial support | preferred in creative design industries | |
Big learning curve | Easy installation | High cost | |
Very little creative tools | Most familiar OS | User-friendly | |
Frequent updates & vulnerabilities |
Interior Design: MacOS is most appropriate here because of its excellent polished graphical interface and various creative tool tailored for artist.
Social Media Advertising: I would recommend Windows as its broad familiar appeal and cost effective is best here.
Nonprofit Social Service: Having worked in IT for a while, I would recommend Windows over Linux despite the higher cost, as Linux’s steep learning curve and setup requirements make it unsuitable for the traditional user without a dedicated IT support team.
L04-Hardware
L04: Reflection
This lesson helped me break down what’s actually inside a computer. We went over the major hardware components like the CPU, RAM, hard drive, motherboard, and power supply. It made me realize that every part has a specific job that keeps the whole system running. We also talked about the difference between hardware and software. Hardware is the physical stuff you can touch, while software is the programs and systems that tell the hardware what to do. Understanding the purpose of both helped mesee how they work together to make a computer function.
Hardware Lab
L04: Hardware Discussion
Key Component:
A computer is like a human body, with each part playing a crucial role in making everything run smoothly. The brain of the system is the CPU handling all the calculations. To keep things running quickly, RAM acts like short-term memory, temporarily storing active programs and data for easy access. For long-term storage, SSDs offer lightning-fast speed and sizeable storage. Holding everything together is the motherboard, which is like your circulatory system, which connects the CPU, memory, storage, and other parts so they can communicate. Similar to how mitochondria are the powerhouse of the cell, the power supply unit, supplies electricity to keep things running. Then, of course, there are input devices like keyboards and mice that let you interact with the system, and output devices like monitors. With all the components we have the modern day computer system.
Component Function
The CPU once the sole “brain” of a computer responsible for managing every task from calculations to graphics, has seen its role shift with the rise of specialized processors. Originally, the CPU handled everything from display rendering to complex computations, but with the advent of the GPU, display processing moved to a more specialized chip. GPUs, designed for handling thousands of simultaneous operations, became essential for tasks like gaming, video editing, and now artificial intelligence. As according to most experts—Moore Law is dead—and with it, the rapid onset of specialized chips such as the TPU. Developed specifically for machine learning tasks, the chip is taking over deep learning model training and inference operations. This shift means the CPU is no longer the sole powerhouse but instead serves as a coordinator, delegating intensive tasks to specialized units. As a result, modern computing is defined by a collaborative architecture where a variety of chips hold specialized task to handle of variety of information.