Topic: Computer Technician Services
EQ: "How can a Computer Technician best provide service to a small business?"

Thursday, April 24, 2014

Blog 19: Independent Component 2

Content:

LITERAL
(a) I, student name, affirm that I completed my independent component which represents 30 hours of work.

(b) A+ Certification Guide by Mike Meyers
Implementing Virus Scanning in Computer Networks by Umakant Mishra
The Evolution of Malware and the Threat Landscape - A 10 year review by the Microsoft Corporation
How serious a threat are computer Viruses? by Reid Goldsborough

(c) ------>

(d) Explanation of what you completed.
Basically what I ended up doing for my IC2 is that I created a interactive guide, to how maintain a computer secure from viruses and any other malware. Also how to disinfect a computer infected with a virus. I briefly covered some background information of the hardware and then went in more detail when it came to the viruses. I talked about the methods that can be used to prevent or cleanse a computer from a virus and which ones work best for a certain situation for example a computer network set up.

INTERPRETIVE
The significant parts of is is basically the research I had to do. I needed to make sure all the information was correct before I went on to write it and applying the knowledge to specific scenarios. I had to make sure the information I was using was up-to-date also. Since this is about computers, anything before 2008 will be really sketchy. Luckily the majority of the information I got came from a source published in 2012. But for the 30 hours, I don't know if you, the reader of this blog, has worked with Flash, but it is very tedious and frustrating at times, with the frames and the precision. Eventually an animation will glitch out. Though this did help me though, I would call it indirect hand-on. Since I had to deal with where all the information was going, where it belongs, how it makes most sense to list it. It required me to read the information over a lot, helping me get the information stuck in my head. I've linked the final product below.
Once I got the design and layout.

Simple coding at the bottom, very exciting.

Typing out some info.
More easy coding, decided to go with a simple white gradient background too. It matches the website where put it up at.
 FINAL PRODUCT HERE!!!!:
http://justdont1.wix.com/university#!computer-security/c1l3r
EDIT (4/25/2014 7:58PM): Domain for the website was updated, here is the updated link:
http://www.learningsphere.org/#!computer-security/c1l3r

APPLIED
My independent Component 2 helped me answer my Essential Question because instead of just researching, I was required to apply information that I found in research into real life. Visualizing the dilemma and how it can be solved. I lead me to further research I have yet to do and a deeper understanding of my topic. It helped me realize that security is the bottom line for most things, especially businesses because they don't want to get their money stolen, making me decide that this just might be my best answer.

No comments:

Post a Comment