I still hate it.
Lionel's Senior Blog
Topic: Computer Technician Services
EQ: "How can a Computer Technician best provide service to a small business?"
Wednesday, May 20, 2015
Thursday, May 29, 2014
Senior Project Reflection
(1) Positive Statement
What are you most proud of in your Block Presentation and/or your senior project? Why?
-I actually had no trouble regarding presentation, I also felt that actually bringing in my own computer and open it up for everyone to see really hooked some of the audience and peaked their interest and curiosity. I am not sure if I kept them in that state but I was satisfied on how I was able to start it off like that.
(2) Questions to Consider
a. What assessment would you give yourself on your Block Presentation (self-assessment)?
AE >>P<< AP CR NC
b. What assessment would you give yourself on your overall senior project (self-assessment)?
AE >>P<< AP CR NC
(3) What worked for you in your senior project?
The research process actually taught me a lot. Beforehand, all of the research I would gather for anything it will always be crap articles written by people who don't have the qualifications to write that sort of thing. But having the standards of what is considered a reliable source, it helped me determine what I should use and I shouldn't.
(4) (What didn't work) If you had a time machine, what would have you done differently to improve your senior project if you could go back in time?
I thought that the senior project sucked because I wasn't totally into my topic, but in reality it was me not maximizing the opportunities to actually do something enjoyable. If I had a time machine, I would go back and redo my projects, independent component, in a more enjoyable manner so I will find more value in it.
(5) Finding Value
How has the senior project been helpful to you in your future endeavors? Be specific and use examples.
What are you most proud of in your Block Presentation and/or your senior project? Why?
-I actually had no trouble regarding presentation, I also felt that actually bringing in my own computer and open it up for everyone to see really hooked some of the audience and peaked their interest and curiosity. I am not sure if I kept them in that state but I was satisfied on how I was able to start it off like that.
(2) Questions to Consider
a. What assessment would you give yourself on your Block Presentation (self-assessment)?
AE >>P<< AP CR NC
b. What assessment would you give yourself on your overall senior project (self-assessment)?
AE >>P<< AP CR NC
(3) What worked for you in your senior project?
The research process actually taught me a lot. Beforehand, all of the research I would gather for anything it will always be crap articles written by people who don't have the qualifications to write that sort of thing. But having the standards of what is considered a reliable source, it helped me determine what I should use and I shouldn't.
(4) (What didn't work) If you had a time machine, what would have you done differently to improve your senior project if you could go back in time?
I thought that the senior project sucked because I wasn't totally into my topic, but in reality it was me not maximizing the opportunities to actually do something enjoyable. If I had a time machine, I would go back and redo my projects, independent component, in a more enjoyable manner so I will find more value in it.
(5) Finding Value
How has the senior project been helpful to you in your future endeavors? Be specific and use examples.
Well I used the senior project as a career exploration sort of it. It really allowed me to explore one of the fields I am considering going into, because I am still unsure on what I want to do with my life. In the time where I have to make a decision, I can now logically decide with experience as justification.
Monday, May 12, 2014
Blog 21: Mentorship
Literal
-Mentorship Log
-Tomas A. @ TnR Environmental
Interpretive
What is the most important thing you gained from this experience? Why?
Applied
How has what you’ve done helped you to answer your EQ? Please explain.
- The mentorship itself did not really provide me the answers to my essential question but it did open the doors and lead me to the pathway to the answers that I choose. A lot of my work required me to work with hardware. Including the CPU, Motherboard, RAM, and so on. I knew that ESD was a problem with computers I did not know how big of a problem though. All I knew is that I have to touch something metal before handling the insides. So I conducted research which lead to my second answer with a similar situation happening with my third answer regarding security.
-Tomas A. @ TnR Environmental
Interpretive
What is the most important thing you gained from this experience? Why?
- Well, the most important thing I have gained of this experience would have to be, maybe the development of my own skills as a computer technician, or just as a person in general. I've learned that to be a computer technician, I need to be patient with myself, the machine, and the people surrounding me. In a situation where I was in a rush, which was many times, and I couldn't do anything about it, it was best to just remain patient and the person I was helping will also remain patient.
Applied
How has what you’ve done helped you to answer your EQ? Please explain.
- The mentorship itself did not really provide me the answers to my essential question but it did open the doors and lead me to the pathway to the answers that I choose. A lot of my work required me to work with hardware. Including the CPU, Motherboard, RAM, and so on. I knew that ESD was a problem with computers I did not know how big of a problem though. All I knew is that I have to touch something metal before handling the insides. So I conducted research which lead to my second answer with a similar situation happening with my third answer regarding security.
Monday, April 28, 2014
Blog 20: Exit Interview
(1) What is your essential question and answers? What is your best answer and why?
- My essential question is "How can a computer technician best provide service to a small business?" and the three answers that I found made sense the most are 1) Keeping up to date on current technology through the incentive of certificates, 2) Taking proper protocol when handling the hardware of a computer, and 3) Develop virus defense skills to keep a small business safe from theft. Out of all of these answers, I feel that Answer #2, taking proper protocol when handling the hardware of a computer. The reason why is fairly simple, the job of a computer technician is to assist people that have issues with their computers. Without taking proper precautions, the computer technician may just end up causing more damage. The greatest threat being ESD. Most hardware run at 1-5 V of energy, releasing a static shock of about fifteen. which you can't even feel, will still damage the component and will slowly decay over time.
(2) What process did you take to arrive at this answer?
- It all began with my first interview with Michael Kunz, a technician manager at Orange County Children's Hospital. In my previous research I read on certificates such as the A+, but took them not so seriously since the source of which I was reading about it is not so reliable. Though, I decided to ask him about it either way, or at least tried. In the answer before the next intended question where I mentioned the A+, he mentioned it himself and lend me some books that serve as "study guides" for the A+.
I read these books and eventually I got to the section about safety. It didn't go into great detail but it did spark my interest. From there I began to research more on it and decided it was worthy and important enough to be an answer on it's own.
(3) What problems did you face? How did you resolve them?
- Finding a third answer I felt was very difficult. Creating a first and second answer is fairly easy since they are both usually the result of easily found research. Reaching to the point where I had to pick a third answer felt as if I was scraping the bottom of the barrel, and yet found nothing. I looked back at the book where I got my second answer and looked through it, trying to find something that is a common issue relatable to everyone. There's where I got my third.
(4) What are the two most significant sources you used to answer your essential question and why?
- My essential question is "How can a computer technician best provide service to a small business?" and the three answers that I found made sense the most are 1) Keeping up to date on current technology through the incentive of certificates, 2) Taking proper protocol when handling the hardware of a computer, and 3) Develop virus defense skills to keep a small business safe from theft. Out of all of these answers, I feel that Answer #2, taking proper protocol when handling the hardware of a computer. The reason why is fairly simple, the job of a computer technician is to assist people that have issues with their computers. Without taking proper precautions, the computer technician may just end up causing more damage. The greatest threat being ESD. Most hardware run at 1-5 V of energy, releasing a static shock of about fifteen. which you can't even feel, will still damage the component and will slowly decay over time.
(2) What process did you take to arrive at this answer?
- It all began with my first interview with Michael Kunz, a technician manager at Orange County Children's Hospital. In my previous research I read on certificates such as the A+, but took them not so seriously since the source of which I was reading about it is not so reliable. Though, I decided to ask him about it either way, or at least tried. In the answer before the next intended question where I mentioned the A+, he mentioned it himself and lend me some books that serve as "study guides" for the A+.
I read these books and eventually I got to the section about safety. It didn't go into great detail but it did spark my interest. From there I began to research more on it and decided it was worthy and important enough to be an answer on it's own.
(3) What problems did you face? How did you resolve them?
- Finding a third answer I felt was very difficult. Creating a first and second answer is fairly easy since they are both usually the result of easily found research. Reaching to the point where I had to pick a third answer felt as if I was scraping the bottom of the barrel, and yet found nothing. I looked back at the book where I got my second answer and looked through it, trying to find something that is a common issue relatable to everyone. There's where I got my third.
(4) What are the two most significant sources you used to answer your essential question and why?
- Interview #1 w/ Michael Kunz
- As I mentioned earlier this is where it began. In the interview Michael Kunz mentioned certifications, such as the A+, to be used as incentives. This lead me into my first answer with confidence and basically opened the doors for my two other answers.
- CompTIA A+ Certification All-in-One Exam Guide, 8th Ed. by Mike Meyers
- After the first interview, I got a hold of this book to use as research for my first answer, as the A+ is used an an incentive. Thought there were sections of the book that I considered to be good answers on their own and done further research on which are the safety protocols from my answer two, and security protocol from my answer three.
Thursday, April 24, 2014
Blog 19: Independent Component 2
Content:
LITERAL
(a) I, student name, affirm that I completed my independent component which represents 30 hours of work.
(b) A+ Certification Guide by Mike Meyers
(c) ------>
(d) Explanation of what you completed.
Basically what I ended up doing for my IC2 is that I created a interactive guide, to how maintain a computer secure from viruses and any other malware. Also how to disinfect a computer infected with a virus. I briefly covered some background information of the hardware and then went in more detail when it came to the viruses. I talked about the methods that can be used to prevent or cleanse a computer from a virus and which ones work best for a certain situation for example a computer network set up.
INTERPRETIVE
The significant parts of is is basically the research I had to do. I needed to make sure all the information was correct before I went on to write it and applying the knowledge to specific scenarios. I had to make sure the information I was using was up-to-date also. Since this is about computers, anything before 2008 will be really sketchy. Luckily the majority of the information I got came from a source published in 2012. But for the 30 hours, I don't know if you, the reader of this blog, has worked with Flash, but it is very tedious and frustrating at times, with the frames and the precision. Eventually an animation will glitch out. Though this did help me though, I would call it indirect hand-on. Since I had to deal with where all the information was going, where it belongs, how it makes most sense to list it. It required me to read the information over a lot, helping me get the information stuck in my head. I've linked the final product below.
http://justdont1.wix.com/university#!computer-security/c1l3r
EDIT (4/25/2014 7:58PM): Domain for the website was updated, here is the updated link:
http://www.learningsphere.org/#!computer-security/c1l3r
APPLIED
My independent Component 2 helped me answer my Essential Question because instead of just researching, I was required to apply information that I found in research into real life. Visualizing the dilemma and how it can be solved. I lead me to further research I have yet to do and a deeper understanding of my topic. It helped me realize that security is the bottom line for most things, especially businesses because they don't want to get their money stolen, making me decide that this just might be my best answer.
LITERAL
(a) I, student name, affirm that I completed my independent component which represents 30 hours of work.
(b) A+ Certification Guide by Mike Meyers
Implementing Virus Scanning in Computer Networks by Umakant Mishra
The Evolution of Malware and the Threat Landscape - A 10 year review by the Microsoft Corporation
How serious a threat are computer Viruses? by Reid Goldsborough
(c) ------>
(d) Explanation of what you completed.
Basically what I ended up doing for my IC2 is that I created a interactive guide, to how maintain a computer secure from viruses and any other malware. Also how to disinfect a computer infected with a virus. I briefly covered some background information of the hardware and then went in more detail when it came to the viruses. I talked about the methods that can be used to prevent or cleanse a computer from a virus and which ones work best for a certain situation for example a computer network set up.
INTERPRETIVE
The significant parts of is is basically the research I had to do. I needed to make sure all the information was correct before I went on to write it and applying the knowledge to specific scenarios. I had to make sure the information I was using was up-to-date also. Since this is about computers, anything before 2008 will be really sketchy. Luckily the majority of the information I got came from a source published in 2012. But for the 30 hours, I don't know if you, the reader of this blog, has worked with Flash, but it is very tedious and frustrating at times, with the frames and the precision. Eventually an animation will glitch out. Though this did help me though, I would call it indirect hand-on. Since I had to deal with where all the information was going, where it belongs, how it makes most sense to list it. It required me to read the information over a lot, helping me get the information stuck in my head. I've linked the final product below.
Once I got the design and layout. |
Simple coding at the bottom, very exciting. |
Typing out some info. |
More easy coding, decided to go with a simple white gradient background too. It matches the website where put it up at. |
FINAL PRODUCT HERE!!!!:
EDIT (4/25/2014 7:58PM): Domain for the website was updated, here is the updated link:
http://www.learningsphere.org/#!computer-security/c1l3r
APPLIED
My independent Component 2 helped me answer my Essential Question because instead of just researching, I was required to apply information that I found in research into real life. Visualizing the dilemma and how it can be solved. I lead me to further research I have yet to do and a deeper understanding of my topic. It helped me realize that security is the bottom line for most things, especially businesses because they don't want to get their money stolen, making me decide that this just might be my best answer.
Thursday, April 10, 2014
Blog 15: Independent Component 2 Approval
Content:
1. Describe in detail what you plan to do for your 30 hours.
- For my Independent Component 2, I would be creating a digital handbook, more of a guide, in establishing a good, and secure virus protection system for small businesses in all different set ups. I would include, singular computer and computers connected to a network. What to do if there's already an infection. Basically all the help you could need in dealing or preventing malware.
2. Discuss how or what you will do to meet the expectation of showing 30 hours of evidence.
- First off, to create this guide, I would need to conduct some deep research using quality sources. As I do this I would take notes of everything that will be going into the guide. Afterwards I will begin to create the guide itself. I plan to make it interactive, so the use of it will be smooth and simple. As I do this part, I will take screenshots and some video showing the process of me making it. The final product will also serve as evidence.
3. And explain how what you will be doing will help you explore your topic in more depth.
- I thought that I will be a good idea to create this guide to teach myself on how to set it up, and along in the process learn about the different ways to set it up. The benefits and problems with each ones. Generally which set up is best for which style business. This will also tech me about all the various characteristics of the most common viruses because in order to get rid of viruses, first you must identify it and find patterns in the system such as errors when a certain program is triggered.
Wednesday, March 26, 2014
Blog 18: Third Answer
"How can a computer technician best provide service to a small business?
_________________
Answer #3: A Computer Technician can provide good service to a small business if they know all the safety measures
________________
Static electricity is the leading cause to computer failures or "deaths".
ESD, or electro static discharge can be prevented by grounding yourself with an anti-static strap or by simply touching the case before handling the inside.
Any type of magnetic field should be kept away from the computer, and any tools should be "demagnetized".
________________
http://ecmweb.com/content/electrostatic-discharge-causes-effects-and-solutions
CompTIA A+ Certification All-in-One Exam Guide, 8th Ed.(Exams 220-801 & 220-802)
________________
If a computer technician were to learn the proper safety measures to keep a computer safe from harm, it would assure the their customer that there will be no risk and the only possible outcome will be a positive one.
Subscribe to:
Posts (Atom)