Topic: Computer Technician Services
EQ: "How can a Computer Technician best provide service to a small business?"

Monday, April 28, 2014

Blog 20: Exit Interview

(1) What is your essential question and answers? What is your best answer and why?
- My essential question is "How can a computer technician best provide service to a small business?" and the three answers that I found made sense the most are 1) Keeping up to date on current technology through the incentive of certificates, 2) Taking proper protocol when handling the hardware of a computer, and 3) Develop virus defense skills to keep a small business safe from theft. Out of all of these answers, I feel that Answer #2, taking proper protocol when handling the hardware of a computer. The reason why is fairly simple, the job of a computer technician is to assist people that have issues with their computers. Without taking proper precautions, the computer technician may just end up causing more damage. The greatest threat being ESD. Most hardware run at 1-5 V of energy, releasing a static shock of about fifteen. which you can't even feel, will still damage the component and will slowly decay over time.

(2) What process did you take to arrive at this answer?
- It all began with my first interview with Michael Kunz, a technician manager at Orange County Children's Hospital. In my previous research I read on certificates such as the A+, but took them not so seriously since the source of which I was reading about it is not so reliable. Though, I decided to ask him about it either way, or at least tried. In the answer before the next intended question where I mentioned the A+, he mentioned it himself and lend me some books that serve as "study guides" for the A+.

I read these books and eventually I got to the section about safety. It didn't go into great detail but it did spark my interest. From there I began to research more on it and decided it was worthy and important enough to be an answer on it's own.

(3) What problems did you face? How did you resolve them?
- Finding a third answer I felt was very difficult. Creating a first and second answer is fairly easy since they are both usually the result of easily found research. Reaching to the point where I had to pick a third answer felt as if I was scraping the bottom of the barrel, and yet found nothing. I looked back at the book where I got my second answer and looked through it, trying to find something that is a common issue relatable to everyone. There's where I got my third.

(4) What are the two most significant sources you used to answer your essential question and why?

  1. Interview #1 w/ Michael Kunz
    • As I mentioned earlier this is where it began. In the interview Michael Kunz mentioned certifications, such as the A+, to be used as incentives. This lead me into my first answer with confidence and basically opened the doors for my two other answers. 
  2. CompTIA A+ Certification All-in-One Exam Guide, 8th Ed. by Mike Meyers
    • After the first interview, I got a hold of this book to use as research for my first answer, as the A+ is used an an incentive. Thought there were sections of the book that I considered to be good answers on their own and done further research on which are the safety protocols from my answer two, and security protocol from my answer three.

Thursday, April 24, 2014

Blog 19: Independent Component 2

Content:

LITERAL
(a) I, student name, affirm that I completed my independent component which represents 30 hours of work.

(b) A+ Certification Guide by Mike Meyers
Implementing Virus Scanning in Computer Networks by Umakant Mishra
The Evolution of Malware and the Threat Landscape - A 10 year review by the Microsoft Corporation
How serious a threat are computer Viruses? by Reid Goldsborough

(c) ------>

(d) Explanation of what you completed.
Basically what I ended up doing for my IC2 is that I created a interactive guide, to how maintain a computer secure from viruses and any other malware. Also how to disinfect a computer infected with a virus. I briefly covered some background information of the hardware and then went in more detail when it came to the viruses. I talked about the methods that can be used to prevent or cleanse a computer from a virus and which ones work best for a certain situation for example a computer network set up.

INTERPRETIVE
The significant parts of is is basically the research I had to do. I needed to make sure all the information was correct before I went on to write it and applying the knowledge to specific scenarios. I had to make sure the information I was using was up-to-date also. Since this is about computers, anything before 2008 will be really sketchy. Luckily the majority of the information I got came from a source published in 2012. But for the 30 hours, I don't know if you, the reader of this blog, has worked with Flash, but it is very tedious and frustrating at times, with the frames and the precision. Eventually an animation will glitch out. Though this did help me though, I would call it indirect hand-on. Since I had to deal with where all the information was going, where it belongs, how it makes most sense to list it. It required me to read the information over a lot, helping me get the information stuck in my head. I've linked the final product below.
Once I got the design and layout.

Simple coding at the bottom, very exciting.

Typing out some info.
More easy coding, decided to go with a simple white gradient background too. It matches the website where put it up at.
 FINAL PRODUCT HERE!!!!:
http://justdont1.wix.com/university#!computer-security/c1l3r
EDIT (4/25/2014 7:58PM): Domain for the website was updated, here is the updated link:
http://www.learningsphere.org/#!computer-security/c1l3r

APPLIED
My independent Component 2 helped me answer my Essential Question because instead of just researching, I was required to apply information that I found in research into real life. Visualizing the dilemma and how it can be solved. I lead me to further research I have yet to do and a deeper understanding of my topic. It helped me realize that security is the bottom line for most things, especially businesses because they don't want to get their money stolen, making me decide that this just might be my best answer.

Thursday, April 10, 2014

Blog 15: Independent Component 2 Approval


Content:

1. Describe in detail what you plan to do for your 30 hours.
- For my Independent Component 2, I would be creating a digital handbook, more of a guide, in establishing a good, and secure virus protection system for small businesses in all different set ups. I would include, singular computer and computers connected to a network. What to do if there's already an infection. Basically all the help you could need in dealing or preventing malware.

2. Discuss how or what you will do to meet the expectation of showing 30 hours of evidence.
- First off, to create this guide, I would need to conduct some deep research using quality sources. As I do this I would take notes of everything that will be going into the guide. Afterwards I will begin to create the guide itself. I plan to make it interactive, so the use of it will be smooth and simple. As I do this part, I will take screenshots and some video showing the process of me making it. The final product will also serve as evidence.

3. And explain how what you will be doing will help you explore your topic in more depth.
- I thought that I will be a good idea to create this guide to teach myself on how to set it up, and along in the process learn about the different ways to set it up. The benefits and problems with each ones. Generally which set up is best for which style business. This will also tech me about all the various characteristics of the most common viruses because in order to get rid of viruses, first you must identify it and find patterns in the system such as errors when a certain program is triggered.