About

Sunday, September 24, 2023



Post #7 - Tech Topic Connection (Web/Mobile Apps)

Computer science and information technology are used in the development of mobile apps. To produce practical and user-friendly applications for mobile devices, app developers rely on their expertise in software development, operating systems, programming languages, and numerous IT-related fields. Anyone involved in the creation of mobile apps must have a solid understanding of the history of computing as well as the underlying ideas behind how computers work.
              Writing code, creating user interfaces, and debugging are all essential computer science skills that are used while creating mobile apps. It is essential to guarantee both the app's functionality and user data security. An important field of IT and computer science is cybersecurity, and this involves cybersecurity-related ideas.
              The primary hardware elements and features of a contemporary computer system are utilized in a variety of ways by mobile apps. Mobile devices have their own distinct hardware design, but they also share many fundamental parts and capabilities with conventional computers. An example of this is a Central Processing Unit (CPU). The CPU is used by mobile apps to run code and carry out calculations.
              The ideal programming language for creating mobile apps depends on the project's requirements and target platform. JavaScript combined with React Native is the most widely used programming language for cross-platform projects. Java or Kotlin are suggested for apps designed specifically for Android. Swift is the primary interpreted programming language for creating iOS apps. TechAhead. (2023) 

The necessary resources, tools, and environments are made available by application software for the development, testing, and upkeep of mobile apps. It equips programmers to create feature-dense, approachable, and useful apps that work on a variety of platforms and gadgets, adding to the ever-expanding ecosystem of mobile applications.
              Choosing a database for the development of a mobile application requires selection criteria that consider the data that will be collected, the type of data, the storage needs of the application, and the type of databases that are most compatible with the previous specifications. This is like managing a data science project. It's crucial to have a database that can accommodate a variety of data types because you can be working with documents, text, or even photos. Day, F. (2023)

Mobile apps should consider the numerous network connections that are accessible to them, including Bluetooth, Wi-Fi, and cellular data. They need to adjust to various network setups and connection capacities, optimizing data usage and app functionality as necessary. Load balancing strategies can help apps with high traffic counts distribute requests evenly across different servers. As a result, server overload is reduced, and stable performance is guaranteed.
              Mobile apps must make effective use of bandwidth, especially those that use real-time data streaming or video content. Effective bandwidth management reduces data congestion and enhances app responsiveness. The ability to offer offline access to app functionality and data is part of network administration. When a connection is available, mobile apps must sync data and gracefully manage offline situations.

To encrypt data being transported across networks and shield it from interception and manipulation, mobile apps need to utilize secure communication protocols (such as HTTPS). App permissions, where apps ask for access to specific device functionalities (location or camera), are also subject to network security. Users' privacy is protected by making sure that programs only ask for permissions that are essential.

In conclusion, creating mobile apps is a complicated and diverse process that incorporates a variety of computer science and IT topics. To produce functional, safe, and user-friendly applications, app developers must cross a varied array of abilities and expertise, ranging from coding and user interface design to network architecture and security. Anyone working in this dynamic industry must have a solid understanding of the history of computing as well as the fundamental ideas that underpin both hardware and software components. The partnership between computer science and information technology will also continue to be at the forefront as the ecosystem for mobile applications grows, ensuring that mobile apps will continue to be effective and inventive in fulfilling consumers' changing needs. 

References

Top 5 programming languages for Mobile App Development. TechAhead. (2023, June 3). https://www.techaheadcorp.com/blog/top-5-programming-languages-mobile-app-development/#:~:text=The%20best%20programming%20language%20for%20mobile%20app%20development%20depends%20on,Java%20or%20Kotlin%20are%20recommended.

Day, F. (2023, September 19). Top 5 databases for mobile applications. Classes Near Me Blog. https://www.nobledesktop.com/classes-near-me/blog/top-databases-for-mobile-applications




Post #6 - Network Security

Digital technology is widely used by both individuals and companies for communication, data storage, financial transactions, and other purposes. Threats and vulnerabilities that could jeopardize sensitive information and impair crucial systems are evolving along with technology. The security of your information and systems is crucial, whether you're a private person protecting your personal information or a major organization protecting significant assets.

Computer viruses are designed to interfere with systems. When a file is opened, computer viruses often attach to an executable host file, causing their viral coding to run. The associated software or document subsequently spreads the code via networks, disks, file-sharing applications, or corrupted email attachments. Fortinet. (n.d.)

Computers become vulnerable to viruses when operating systems and applications are not updated on a regular basis. Numerous viruses target obsolete software that has known flaws. Adware or unwanted programs may be the cause of unexpected pop-up adverts or windows that appear when using other software or while browsing the internet. A virus may leave you prone to data loss and identity theft.

Install trusted antivirus and anti-malware software on your computer to shield it against viruses. To make sure it can identify and get rid of the most recent dangers, keep it updated frequently. Also, never open email attachments from senders you don't know. If the email sounds dubious or requests that you enable macros, exercise extra caution.

Phishing is a form of social engineering assault that is frequently employed to obtain user information, such as login credentials and credit card details. It happens when an attacker deceives a victim into opening an email, instant message, or text message by disguising themselves as a reliable source. Imperva (2020) A computer is vulnerable to phishing attacks primarily because these attacks rely on social engineering and human psychology rather than technical flaws in the machine itself.

Human error and curiosity are the main targets of phishing. If they let their guard down for a second or fail to detect the telltale signals of a phishing effort, even cautious people occasionally fall prey to a well-planned phishing attack. To get people to act quickly, phishing messages frequently evoke a sense of urgency or terror. For instance, a message can threaten to suspend an account or warn of a security violation, pressing the user to act without hesitation.

Users must be cautious, practice good email and internet hygiene, and be aware of the typical phishers' tricks to reduce their susceptibility to phishing attempts. In addition to adopting security features like email filtering, use two-factor authentication (2FA), and up-to-date antivirus software to create an additional layer of defense. Also, education and awareness are crucial tools in the fight against phishing.

References

CyberGlossary guide and definitions | Fortinet. (n.d.). https://www.fortinet.com/resources/cyberglossary

What is phishing: Attack Techniques & Scam examples: Imperva. Learning Center. (2020, June 17). https://www.imperva.com/learn/application-security/phishing-attack-scam/#:~:text=Phishing%20is%20a%20type%20of,instant%20message%2C%20or%20text%20message.



Post #5 - Computers in the Workplace

My industry of choice for this week’s discussion is the United States Military. To improve the success and capacities of the armed forces, computers play a significant role.

Countless amounts of information necessary for military operations are gathered, processed, stored, and distributed via computers. This contains information on the whereabouts of the adversary, intelligence reports, logistical data, and more.

To provide accurate location monitoring, route planning, and targeting, computers are integrated into GPS and navigation systems.

Computers are necessary for both executing cyber operations and protecting against cyber threats. They are essential in defending military networks and carrying out cyberattacks when needed.

On the battlefield and in military hospitals, computers help manage medical records, perform tests, and direct medical procedures.

For military personnel to carry out their jobs in a technologically enhanced and data-driven military environment, computer literacy is essential. It helps to protect sensitive data and systems from online threats while improving communication, decision-making, and overall operational readiness.

Also, many tech programs and platforms in the military are outdated, if we have folks that can enhance and improve our dated tech processes, then hopefully we can save time and become more efficient.

I predict that the military will experience major improvements in computer hardware, operating systems, and networking over the next ten years. These advancements will influence a number of military operations, including communication, cybersecurity, data analysis, autonomy, and more, ultimately improving the efficiency and adaptability of armed forces. They will, however, also pose further difficulties in terms of security and flexibility in the face of shifting technological environments.

Certain repetitive and routine operations may be replaced by automation and improved technology, which could result in job displacement. This is especially true for tasks that follow simple rules or require human work.


Post #4 - Traveling Through a Network

Google.com

C:\Users\tyler>ping google.com

Pinging google.com [2607:f8b0:400f:804::200e] with 32 bytes of data:

Reply from 2607:f8b0:400f:804::200e: time=20ms

Reply from 2607:f8b0:400f:804::200e: time=20ms

Reply from 2607:f8b0:400f:804::200e: time=27ms

Reply from 2607:f8b0:400f:804::200e: time=20ms

Ping statistics for 2607:f8b0:400f:804::200e:

Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 20ms, Maximum = 27ms, Average = 21ms

Kmart.Com.au

C:\Users\tyler>ping kmart.com.au

Pinging kmart.com.au [103.28.250.204] with 32 bytes of data:

Reply from 103.28.250.204: bytes=32 time=229ms TTL=43

Reply from 103.28.250.204: bytes=32 time=309ms TTL=43

Reply from 103.28.250.204: bytes=32 time=325ms TTL=43

Reply from 103.28.250.204: bytes=32 time=327ms TTL=43

Ping statistics for 103.28.250.204:

Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 229ms, Maximum = 327ms, Average = 297ms

Amazon.co.jp

C:\Users\tyler>ping amazon.co.jp

Pinging amazon.co.jp [52.119.164.121] with 32 bytes of data:

Reply from 52.119.164.121: bytes=32 time=50ms TTL=225

Reply from 52.119.164.121: bytes=32 time=56ms TTL=225

Reply from 52.119.164.121: bytes=32 time=50ms TTL=225

Reply from 52.119.164.121: bytes=32 time=54ms TTL=225

Ping statistics for 52.119.164.121:

Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 50ms, Maximum = 56ms, Average = 52ms



Traceroute Activity



Google.Com

C:\Users\tyler>tracert google.com

Tracing route to google.com [2607:f8b0:400f:807::200e]

over a maximum of 30 hops:

1 4 ms 1 ms 1 ms 2601:8c0:d02:2f00:fa8b:37ff:febd:1422

2 14 ms 9 ms 50 ms 2001:558:1024:74::3

3 51 ms 49 ms 48 ms po-313-442-rur202.albuquerque.nm.albuq.comcast.net [2001:558:42:9c::1]

4 51 ms 49 ms 49 ms po-2-rur201.albuquerque.nm.albuq.comcast.net [2001:558:40:5d::1]

5 54 ms 54 ms 56 ms po-200-xar01.albuquerque.nm.albuq.comcast.net [2001:558:40:21::1]

6 * 12 ms * be-306-arsc1.albuquerque.nm.albuq.comcast.net [2001:558:40:26::1]

7 20 ms 65 ms 57 ms be-36821-cs02.1601milehigh.co.ibone.comcast.net [2001:558:3:305::1]

8 87 ms 56 ms 62 ms be-1214-cr14.1601milehigh.co.ibone.comcast.net [2001:558:3:1dd::2]

9 60 ms 58 ms 59 ms be-303-cr14.champa.co.ibone.comcast.net [2001:558:3:1c2::1]

10 59 ms 61 ms 58 ms be-1214-cs02.champa.co.ibone.comcast.net [2001:558:3:17d::1]

11 58 ms 59 ms 57 ms be-3211-pe11.910fifteenth.co.ibone.comcast.net [2001:558:3:5d::2]

12 * * * Request timed out.

13 21 ms 58 ms 57 ms 2607:f8b0:82bc::1

14 22 ms 59 ms 59 ms 2001:4860:0:1::5804

15 60 ms 57 ms 75 ms 2001:4860:0:122e::a

16 65 ms 57 ms 76 ms 2001:4860:0:134d::1

17 58 ms 56 ms 57 ms 2001:4860:0:1::5835

18 57 ms 28 ms 17 ms den16s09-in-x0e.1e100.net [2607:f8b0:400f:807::200e]

Trace complete.



Kmart.Com.Au

C:\Users\tyler>tracert kmart.com.au

Tracing route to kmart.com.au [103.28.251.204]

over a maximum of 30 hops:

1 3 ms 1 ms 1 ms 192.168.0.1

2 21 ms 9 ms 12 ms 100.92.206.131

3 14 ms 10 ms 11 ms 96.216.145.101

4 10 ms 10 ms 11 ms 68.86.182.121

5 12 ms 13 ms 10 ms po-200-xar01.albuquerque.nm.albuq.comcast.net [68.85.65.89]

6 14 ms 12 ms 11 ms 96.108.43.101

7 23 ms * 25 ms be-36811-cs01.1601milehigh.co.ibone.comcast.net [96.110.44.17]

8 23 ms 20 ms 18 ms be-1114-cr14.1601milehigh.co.ibone.comcast.net [96.110.39.114]

9 23 ms 19 ms 19 ms be-302-cr14.champa.co.ibone.comcast.net [96.110.39.5]

10 23 ms 26 ms 19 ms be-1314-cs03.champa.co.ibone.comcast.net [96.110.37.249]

11 23 ms 19 ms 19 ms be-1312-cr12.champa.co.ibone.comcast.net [96.110.37.218]

12 41 ms 43 ms 41 ms be-301-cr11.sunnyvale.ca.ibone.comcast.net [96.110.39.18]

13 42 ms 43 ms 41 ms be-1411-cs04.sunnyvale.ca.ibone.comcast.net [96.110.46.37]

14 45 ms 43 ms 43 ms be-3402-pe02.529bryant.ca.ibone.comcast.net [96.110.41.222]

15 43 ms 50 ms 43 ms 75.149.231.242

16 45 ms 43 ms 42 ms 203.208.172.233

17 247 ms 305 ms 315 ms 203.208.152.213

18 207 ms 290 ms 305 ms 203.208.166.206

19 276 ms 307 ms 303 ms 203.208.166.241

20 214 ms 280 ms 303 ms 203.208.152.1

21 294 ms 305 ms 305 ms 203.208.158.189

22 249 ms 305 ms 306 ms 203.208.182.249

23 263 ms 257 ms 252 ms 203.208.172.174

24 306 ms 220 ms 286 ms 203.208.174.66

25 228 ms 304 ms 305 ms 103.28.251.204.ip.incapdns.net [103.28.251.204]

Trace complete.



Amazon.co.jp

C:\Users\tyler>tracert amazon.co.jp

Tracing route to amazon.co.jp [52.119.164.121]

over a maximum of 30 hops:

1 1 ms 1 ms 1 ms 192.168.0.1

2 10 ms 10 ms 12 ms 100.92.206.131

3 11 ms 10 ms 10 ms 96.216.145.101

4 22 ms 10 ms 11 ms 68.86.182.121

5 12 ms 10 ms 12 ms po-200-xar01.albuquerque.nm.albuq.comcast.net [68.85.65.89]

6 14 ms 43 ms 11 ms 96.108.43.101

7 20 ms 18 ms 22 ms be-36821-cs02.1601milehigh.co.ibone.comcast.net [96.110.44.21]

8 20 ms 18 ms 19 ms be-1214-cr14.1601milehigh.co.ibone.comcast.net [96.110.39.118]

9 23 ms 20 ms 18 ms be-304-cr14.champa.co.ibone.comcast.net [96.110.39.13]

10 21 ms 19 ms 21 ms be-1414-cs04.champa.co.ibone.comcast.net [96.110.37.253]

11 22 ms 19 ms 19 ms be-3412-pe12.910fifteenth.co.ibone.comcast.net [96.110.33.142]

12 * * * Request timed out.

13 * * * Request timed out.

14 * * * Request timed out.

15 * * * Request timed out.

16 38 ms 26 ms 25 ms 52.93.74.95

17 * * * Request timed out.

18 * * * Request timed out.

19 * * * Request timed out.

20 * * * Request timed out.

21 * * * Request timed out.

22 * * * Request timed out.

23 * * * Request timed out.

24 53 ms 52 ms 59 ms 108.166.232.57

25 59 ms 52 ms 50 ms 108.166.232.57

26 * * * Request timed out.

27 * * * Request timed out.

28 * * * Request timed out.

29 * * * Request timed out.

30 * * * Request timed out.

Trace complete.



Traveling Through a Network Reflection 

Network diagnostic tools that assist you in understanding how packets move via a network include the ping and traceroute commands. They are very helpful for diagnosing network connectivity issues and finding routing or latency issues. Here is a quick explanation of how these commands function:

Ping is a straightforward command used to determine whether a host on an Internet Protocol (IP) network can be reached. Hosts are often servers or other computers.

Your computer transmits a series of tiny data packets to the target host when you issue the ping command with the target host's IP address or domain name.

The host will receive these packets and send back corresponding packets to your computer if it is reachable and responsive.

A packet's round-trip time—the amount of time it takes to go from your computer to the target host and back—is measured and reported by the ping command. This transit delay is often referred to as "ping latency."

With the aid of the more sophisticated network diagnostic program traceroute, you can see the route that packets take as they travel from your computer to a destination host.

Your computer sends a series of packets in the direction of the destination when you run the traceroute command with the IP address or domain name of a target host.

The value of each processed packet is decreased by each router or other network device between your computer and the destination.

When a packet hits zero, the router discards it and returns to your computer a Time Exceeded notification.

Traceroute can identify the path that packets cross as well as the IP addresses of the intermediary routers or hops by examining these Time Exceeded notifications.

Using traceroute, you can see the network path and any potential bottlenecks by viewing the list of hops along with their IP addresses and round-trip times.

Ping and traceroute aid in locating reachability, network, and routing concerns. It's critical to take into account variables like host availability, network congestion, security settings, and router behavior while experiencing timeouts or failures in order to identify the underlying reason for connectivity problems.

 Post #3 - Documenting a Day


Software applications are crucial in the constantly changing world of modern technology since they make a variety of jobs and procedures possible. It becomes clear that each of these categories of applications—word processors, spreadsheets, and presentation software—serves a different purpose. This essay compares different applications by examining their individual benefits and drawbacks, highlighting the best program for recording daily information and providing more examples of when each application type is helpful. By looking at these software tools, we can see how adaptable and useful they are in a variety of situations, which highlights how important they are in the current digital era.

First, let’s compare the functions of word processors, spreadsheets, and presentations. The main purpose of word processors is to create and modify text-based documents. Essays, reports, letters, and other types of text-based content are among its strengths. Spreadsheets are tools for managing, analyzing, and calculating data. They are perfect for processing numerical data, carrying out calculations, and tabulating data. Presentation software is made for developing multimedia and graphic presentations. It places a strong emphasis on visual components like presentations, graphics, and animations.

Next, let’s discuss the advantages and disadvantages of each application. Word processors are simple to use and require little training, making them available to a variety of consumers. Complex calculations and data handling are not intended uses for word processors. Basic tables can be handled, but extensive numerical data analysis cannot.

Spreadsheets work well for tasks like financial analysis, budgeting, and inventory management. They are great tools for organizing, analyzing, and modifying data. However, for new users, spreadsheets can be challenging, especially when utilizing sophisticated formulas and functions.

The ability of presentation software to produce aesthetically beautiful and interesting slideshows makes it excellent for capturing the audience's attention during presentations. Even though they can contain text, they are not made to produce extensive texts like reports or articles.

The application software that I feel was most appropriate for documenting information about my day was the word processor application. MS Word allows you to generate documents quickly, accurately, and professionally. Sharma et al. (2023) Word processor also allows the ability to include data and pictures if desired to do so.

Other scenarios where word processor, spreadsheet, and presentation would come in handy include but are not limited to:

Word processor: For uniformity in your company's communications, you can create templates for different document kinds including letters, newsletters, and reports.

Spreadsheet: Spreadsheets are most frequently used to store and arrange data, such as accounting, payroll, and revenue data. With the use of spreadsheets, the user can compute the data and create graphs and charts. PerfectXL. (2021)

Presentation: To produce interesting classes, seminars, and instructional materials, teachers and educators frequently utilize PowerPoint. It aids in providing organized and aesthetically pleasing information.

Software programs enable a wide range of operations and procedures, making them important in our quickly changing technological landscape. This essay has highlighted the distinctive features of word processors, spreadsheets, and presentation software programs, each of which serves a specific function in the current digital world. We have highlighted these applications' flexibility to diverse situations by contrasting them and revealing each one's unique advantages and disadvantages.

References

Sharma, V. K., Clark, D. J., Kaylee, Info, G. M., Hernandez, R., Tgun, Sumaila, M., Brown, C., S, T., Payn6, H. Y., 18, V. K. S. J., & * N. (2023, September 2). Top 10 most powerful uses of Microsoft word |. Klient Solutech. https://klientsolutech.com/top-10-most-powerful-uses-of-microsoft-word/

What is a spreadsheet // Excel Glossary // perfectxl. PerfectXL. (2021, April 23). https://www.perfectxl.com/excel-glossary/what-is-a-spreadsheet/#:~:text=The%20most%20common%20reason%20to,to%20produce%20graphs%20and%20charts.

 Post #2 - Web/Mobile App Critique


I’m going to write a review of the mobile app “Spotify”. I use this app every day, multiple times a day and I consider myself very familiar with its platform.

image.png



Spotify is a well-known digital music streaming service. Its users have access to a huge library of songs, podcasts, and other audio files. It was established in Sweden in 2006 and has since grown to become one of the top music streaming services globally. BBC (2018)

One of the reasons I use Spotify is because of its user-friendly and accessible layout. Spotify has a simple, clear user interface that is painless to use. I can easily locate what I’m looking for thanks to the App’s prominent sections at the bottom, which are well-labeled and include “Home”, “Search”, and “Your Library”. At the top, there are icons displayed, these include a notification bell icon or “what's new” as Spotify likes to call it. Also, at the top, there's a clock with a dots icon, this is your recently played section. Then you have your traditional settings gear icon where you can access your account, languages, privacy, and audio settings.

I can rapidly search for artists, albums, songs, or playlists using Spotify's search feature. Finding content is also made simpler by the autosuggestions that are provided as you type.

image.png



To tailor the user experience, Spotify utilizes algorithms. It generates daily playlists like "Discover Weekly" and "Release Radar," which are customized to your musical preferences, depending on your listening history. Spotify also has a feature where you can listen to the “radio” based on an artist. For example, you can listen to “Post Malone” radio, and Spotify will generate songs based on Post Malone's style of music. This is similar to selecting genres. This leads us to my first recommendation for improvement: I would recommend that the algorithm be adjusted to randomize and pick different music. I use the app frequently in my day-to-day life and it seems like I keep hearing the same music repeatedly, even if I pick different playlists. I would prefer more variety as well.

The offline listening function on Spotify is simple to use. With only a few clicks, premium customers can download songs and podcasts for offline listening. This leads me to my second recommendation for improvement: The offline function is stellar if you’re in need of music somewhere with bad service, like driving, hiking, or on an airplane. However, it’s a bummer you must be a premium user to access this feature.

Spotify has applications for many different operating systems and browsers, including iOS, Android, Windows, and macOS. This allows users access to their music library from their favorite devices since it provides a consistent user experience across different platforms. Also, Spotify connects with social media sites, so you can share your playlists, favorite songs, and other activities with friends and followers.

image.png



Spotify provides a 30-day free trial for those interested in trying out the premium features, and it’s simple to upgrade to a premium subscription or manage your account settings. The premium subscription costs 9.99 per month (same as Apple Music).

My final recommendation for improvement circles back to the offline music feature. It’s a great feature, but it takes up a lot of valuable gigabytes on your device. If there was a way to download music from Spotify without taking up so much storage, the offline feature would be even better.

All-in-all, Spotify has excellent usability, simple design, and great features. I’d recommend this music platform to anybody.

image.png

 



References:

BBC. (2018a, March 1). How spotify came to be worth billions. BBC News. https://www.bbc.com/news/newsbeat-43240886Links to an external site.
Post #1-Programming Languages

In this assignment, I embarked on an exploration of computational thinking through the utilization of Scratch, an intuitive drag-and-drop block programming language. By immersing myself in this creative process, I had the opportunity to craft a concise program using Scratch's versatile features, including motion, visual aesthetics, audio integration, and control mechanisms. The goal was to assemble a program comprising a minimum of 30 blocks, showcasing my aptitude for orchestrating diverse elements seamlessly. Through this endeavor, I gained hands-on experience in coding but also cultivated a foundational understanding of logical thinking in the realm of computation.

            Building a program using Scratch was slightly difficult for me. This is my first time creating something like this and I wasn’t sure where to begin. I used the tutorial videos Scratch provided to help get me started. Once I understood what was expected of me, things started to go a little smoother. However, programming in Scratch was very user-friendly and easier to understand compared to machine language, assembly language, and high-level languages, such as Python.

            To me, Scratch is all about experimentation and creativity. You can explore various blocks, create animations, add sound effects, and even incorporate conditional statements for more advanced behaviors. As I become more familiar with Scratch, I can challenge myself to create more complex and interactive projects.

            Machine Language, Assemble Language, High-Level Language, and Scratch provide extremely distinct functions and meet very diverse needs and skill levels. While machine language allows complete control over hardware, it requires deep technical expertise and lacks the user-friendliness of languages like Scratch. It is meant for novices and places an emphasis on creativity and interactive projects.

            Assembly Language uses distinct skill sets and objectives. It allows tighter control over hardware but requires more technical expertise and is better suited for system-level programming or performance-critical applications.

Python is an object-oriented, dynamically semantic, high-level, interpreted programming language. Rapid Application Development and its use as a scripting or glue language to bring existing components together find its high-level built-in data structures, coupled with dynamic type and dynamic binding, to be particularly appealing. Python.org. (n.d.). I found Scratch (block-based) to be the most user-friendly programming language.

Due to the constrained resources of embedded systems, where computers are built into hardware like microcontrollers, machine language may be required to enhance performance and memory utilization. Programmers may manually optimize algorithms for speed or memory utilization in performance-critical code portions by using assembly language and their understanding of the hardware's instruction set. Writer et al. (2023)

The programming language that I think is most popular is Python. Python is known for its readability and versatility. Since Python can be used in so many ways, it appeals to many different programmers.

            In conclusion, Scratch, a user-friendly block programming language, has given me a unique opportunity to delve into the creative process of coding. I was able to demonstrate my talent for blending many parts in a program using Scratch's wide range of features, from motion and aesthetics to audio integration and control techniques. Through this training, I was able to improve my practical coding skills as well as my understanding of logical reasoning in the context of computation.

Link to Scratch Project: https://scratch.mit.edu/projects/886877226

References:

What is python? executive summary. Python.org. (n.d.). https://www.python.org/doc/essays/blurb/

(Writer et al., 2023) Machine language vs. assembly language: Spiceworks. Spiceworks. https://www.spiceworks.com/tech/tech-general/articles/machine-vs-assembly-language/#:~:text=Takeaway,human%2Dreadable%20machine%20language%20representation