Skip to main content

Posts

MATC Event Planner Project

In my IT Project management class I had to work with team mates to create a project that we could essentially propose in the real world. The project we created was an event planner that MATC organizations could use to create events, since there is no streamlined system in place today. During this process I learned the different methodologies that people can use to create and successfully develop a project. The time I spent in creating and working with my team in this project has taught me the importance of planning a project instead of jumping into it right away.    Here is the link to my final project's proposal document:  Project Proposal Project Presentation
Recent posts

Writing A Good Query

When it comes to reading code no body will like to read a wall of text specially in programming. Some of the best practices to make query code readable, as well as easier to understand, is to follow clean formatting rules throughout your SQL query. Some good practices to write a good query is:  - Use comments to describe what SQL does. If you’re modifying existing SQL, add the author’s name, the date, describe the modifications, and avoid questions. Don’t overdo it and comment on the obvious - Put each major SQL statement on a new line - Use CamelCase capitalization and do not separate name parts with underscores: TableName, instead of Table_name, or use lower case and underscores to separate name parts: table_name - Set standard abbreviations for frequently used objects, such as tbl for tables, or sp for stored procedures - Use single quotation for characters, strings, binary and Unicode – - Use indenting to align wrapped long lines - Use parentheses in complex mathemati

Importance of Database Security

Database security is highly important because it prevents data loss, leakage, or unauthorized access to sensitive data. A few of many ways to secure a database is by making sure the hosting machine is housed, secured, locked and monitored to prevent unauthorized entry, access or theft. Apart from physical security the database should have firewalls implemented with default rules to deny all traffic, only opened to specific applications or web servers. User database roles and management is another security need of a database system. This implements access to only authorized users, and minimal permissions are given to each job function. Database backup and recovery is another important piece of database security. This prevents data loss keeping a copy of the database when in need. Keeping backup and recovery procedures documented and periodically is a good practice. Another security need of a database is encryption and key management,  allowing data to be encrypted during transmission

Your Online Life, Permanent As a Tattoo

View TED Talk Link Watching this TED talk titled “Your Online Life, Permanent As a tattoo” talks about how the use of social media can be the same as having a personal tattoo. Juan Enriquez, the main speaker, begins the presentation by using visual pictures of what tattoos can represent in a person's life. Using pictures, he shows the audience that tattoos can be beautiful, intriguing, intimate and also builds humor by stating that they can be mistakes. After showing the audience these different types of tattoos, he starts to question them about what if social sites and services were to become personal tattoos. At this point he begins to add more information on how the way we express ourselves on  social media can impact and create our  “Electronic Tattoo”. Juan states how difficult it is to get away from our electronic tattoos, since forms of technology, like facial recognition are getting better and better at recognizing people's faces. He adds up that if someone

The importance of sharing data between functions/methods, and their scope.

It is important that functions/methods share data between a class because in programming you will be having a lot of methods that will need to share data to function correctly. For example, if you had to calculate different types of data with equations, you would have the calculations being done in one method then transfer only the calculated data to a display method. If data isn't shared between these two classes then only the calculation method will have the data, and no other methods can access it, making it difficult to use that data to perform more tasks. The scope refers to the portion of the program a variable is visible, as well as where it can only be used. It is referred to where a variable can be read from and/or written to, in other words where the variable lives. Visibility compared to scope is where the variables can be used and shared. We can set where a variable can be accessed with three different options, public, private and protected. This is important becau

WHILE and IF statements

A while loop statement will repeatedly execute a statement as long as the given condition is true. If the while loop's condition is set to true then the program will go into the loop, and will keep looping as long as that condition remains true. For example: int score = 15; while (score  <  20)       {             Console.WriteLine("value of score: {0}"), score;              score++;        }        Console.ReadLine(); In this example the program will go into the loop for as long as the value of score is less than 20. Once it's in the loop it will increment the value of score by one, then it will check if a is still less than 20. Once the value of score reaches 20, it will no longer go into the loop as the condition will no longer be true. A IF statement on the other hand can be a bit similar to a while statement, as it will check the condition at first, and if it's true it will execute the block of code inside of it. IF the condition is

How variables and properties work/compare.

Variables are storage locations that data can be stored in. They are are a way of naming data locations that can be later on used in the program. Variables generally have four attributes: an identifier, data location, type and value.  We have used variables in most of our programs in class, for example, storing names as strings and numbers as doubles/ints. Properties on the other hand can be looked as a special type of method that exposes a variable. A property can have can have a Get procedure (read only), a Set procedure (write only), or both (read-write). Properties are effective in a way that they have access to private data inside of a class, and can manipulate the data as it enters or leaves the class. Variables and properties are both important in programming because they help store and manipulate data. Variables can be used to store and protect important user data inside of classes, and the property of those variables help manage what data is only going out into outside cl