Thursday, November 28, 2024

Blog #10-Using HTML to Create a Website

file:///C:/Users/Shannon%20Moffat/Downloads/SandwichesWebsite.html

I started creating a web page using HTML for the first time by following the instructions in my take-home assignment. Initially, I was able to follow the steps and learned how to open a webpage's source code by right-clicking and selecting "View Source." However, I couldn’t figure out how to close it until I used ChatGPT and did some research, discovering that Ctrl + U opens the source page and Ctrl + W closes it. I’m still unsure how to access or close source view directly in the browser, so if anyone knows, let me know.

To begin my web page, I used the opening <html> and closing </html> tags, which tell the browser I’m using HTML. Setting the page title was confusing because the instructions didn’t clearly explain it, and I couldn’t see the title I wrote which was "Sandwiches". I’ll need to work on that.

For the <body> section, I styled the background color as purple using <body style="background-color: purple;">, and that worked. However, I was unsure if I needed another <body> tag because the example included it, even though it didn’t seem necessary.

One thing that worked well was adding scrolling text using the <marquee> tag with the words "They are yummy," which scrolled across the purple background. However, I ran into issues when adding an image. I copied a URL from a Google search for a sandwich vector image and inserted it into the <img> tag. Unfortunately, the image appeared as a tiny square in the top-left corner instead of being large, as I intended.

Overall, I’m learning, but I still have questions about some aspects of HTML and need to refine my skills.

Extra Note: So I had attached the webpage to this blog but each time I open it, it shows that it's blocked. I would take more time to work on this but I have so many other assignments that I have to leave it as is. This assignment challenged me and I was glad that I got it to work somewhat. I would push myself to improve it since my last update in class but I didn't feel I could take the time. 

Friday, November 22, 2024

Cybercrime-Blog # 9

Hello! This is a much more positive blog than the one before this :) Here are the types of cyber crime that I have been a victim of: 

 Phishing

  • Definition: A cyberattack where an attacker pretends to be a trustworthy entity to trick individuals into providing sensitive information.
  • Example: Receiving an email that appears to be from your bank, asking you to verify your account by clicking on a fraudulent link.
This happens to me constantly through both email and text. I am usually able to spot these phishing attacks but I have fallen for them in the past. There was a Costco email that I got and it looked real. They told me that I had won some sort of free gift and I ended up being taken to some page where they were offering other discounted things. I thought it would be a nice thing for mew to be able to give my husband what looked like some wireless headphones. Turns out this whole thing was a scam and I had to call my bank, or either they noticed it and sent me some alert and whatever but I ended up having to go into the bank dispute the charges which they did give back to me, and made me a new debit card too.

Adware

  • Definition: Software that automatically displays or downloads advertisements, often without the user's consent.
  • Example: A browser extension that bombards users with pop-up ads after being installed.
I hate adware! Its everywhere. Now I know what its called. Thank you!

Cyberbullying

  • Definition: The use of electronic communication to harass, threaten, or intimidate someone.
  • Example: Sending threatening messages or posting hurtful comments about someone on social media.
Yes. I was in a bad relationship and my ex-boyfriend tried to take over my Facebook account and hacked my email, but I got all of it back because I was quicker and smarter than him. 

 Data Breach

  • Definition: An incident where sensitive, protected, or confidential data is accessed or disclosed without authorization.
  • Example: The Equifax data breach in 2017 exposed the personal information of 147 million individuals.
Man.....too many to count. I've had this happen at least 6 times where they send you letters in the mail and give you that credit monitoring service for a year. I just got another one in the mail last month from some healthcare company that was hacked.....

This stuff is crazy and I can't believe there are no laws against this but then, again, what can people who aren't able to catch these guys do? We need a cyber security team. Trump needs to get one of those if he hasn't already. Ah. Found it:

The Cybersecurity and Infrastructure Security Agency (CISA) is a U.S. federal agency under the Department of Homeland Security (DHS), established to enhance national cybersecurity and protect critical infrastructure. CISA was created in November 2018, when the DHS elevated its cybersecurity and infrastructure protection functions into a standalone agency. This move acknowledged the growing importance of cybersecurity to national security. With the increasing sophistication of cyber threats and reliance on digital infrastructure, CISA plays a pivotal role in safeguarding essential systems from potential attacks. Its partnerships with both government and private sectors ensure a comprehensive approach to national cybersecurity challenges.

The article https://www.forbes.com/sites/chuckbrooks/2024/11/18/5-cybersecurity-priorities-for-the-trump-administration/ outlines the top five cybersecurity priorities for the Trump Administration's second term, emphasizing the pivotal role of the Cybersecurity and Infrastructure Security Agency (CISA). Here's a summary:

  1. Protecting Critical Infrastructure
    Safeguarding vital physical and digital systems essential for national security and economic stability remains a top priority.

  2. Interagency and Public-Private Cooperation
    Collaborative efforts among government agencies and private entities are essential for effective cybersecurity measures and information sharing.

  3. Building on Government Cyber Risk Management Strategies
    Leveraging frameworks like "Zero Trust" and "Security by Design" to mitigate vulnerabilities and enhance security across government systems.

  4. Addressing Emerging Technologies
    Preparing for the dual impact of advancements like AI and quantum computing, which present new opportunities and security challenges.

  5. Ensuring the Cybersecurity of Space Systems
    With increasing dependence on satellites, securing space-based assets has become crucial for communication, navigation, and defense.


Sources: 

Brooks, C. (2024, November 18). 5 Cybersecurity priorities for the Trump administration. Forbes. https://www.forbes.com/sites/chuckbrooks/2024/11/18/5-cybersecurity-priorities-for-the-trump-administration/

ChatGPT

Thursday, November 21, 2024

Artificial Intelligence, Machine Learning & Convergence-Blog # 8


Trigger warning and or warning of aggressive and frustrated speech with strong language, discussion drugs, abuse, and dark matter: I am honestly not excited about A.I. Honestly, its hard enough for me to have made the comeback in my life that I have and then have to deal with this younger generation who are so sensitive to any words that aren't politically correct. I feel like I have to censor myself more than I want to, or than is healthy for me in my recovery. But coming back to college after everything that I have gone through is hard as hell and I am tired of constantly worrying about weather or not what I say is going to offend somebody else. Well honestly, fuck that! I don't care!!!!!!! And A.I. can suck it. I hate A.I. except when it helps me do my homework. But here's some answers for this blog. I had to do some research honestly to think about how this life-robbing technology is going to ruin everything. Que insane laugh! Ok, end of vent. Professor Andrew Fry, you said that we could say whatever we want on here and get credit. So I better get credit for this. Be nice and say please Shannon. Okay, Please. Thank you Shannon. Wow this chick….Okay so Robotic Process Automation (RPA): Software bots that handle repetitive tasks like data entry, saving time and money while allowing employees to focus on more meaningful work. Humanoid Robots: Robots that look and act like humans. They’re being used in areas like customer service, healthcare, and education to improve interactions and efficiency. Data entry clerks: Replaced by RPA tools that handle data workflows. Customer service representatives: Replaced by AI-powered chatbots and virtual assistants. Financial analysts and bookkeepers: Replaced by AI systems for financial forecasting and reporting. Factory and warehouse workers: Automated through robotics and intelligent systems. Basic coding roles: Simplified by AI that can write and debug code. Fun stuff! Closer to the end of days when Jesus comes. Do you know him???? By the way, demons are real. I have been choked and tormented by them for years when I first got clean. In my bed at night. Tell that to SOME of the Gen Z kids who live in little bubbles of la la land and see if they can hang. Then God rescued me from an abusive relationship with a drug-addicted narcissist  who used to hold me hostage while he dug through dumpsters to find shit to pawn for his dope habit. It was fun HAAAAA. God started to radically pursue me, showed me angels in jail and and fix my life October 11, 2017.

  • Sorry if I offended anyone which I know I did. I needed to just speak my mind and test the waters to see if it's ok to say things that are controversial and weather or not sombody is going to be freaked out and or think I'm crazy. Can't I just be human and sometimes say things that are wild?


Wednesday, November 13, 2024

Dot.com to Dot.bomb-Blog #7

In class last week, we discussed the Dot.com Boom and subsequent Bust from the 1990s, a pivotal period in the tech industry that was characterized by explosive growth, particularly between 1993 and 2000, as the internet became more accessible to the general public. Companies quickly recognized the enormous potential of the web for business, leading to the creation of countless startups. One key factor in this boom was the rise of early internet services like Prodigy, CompuServe, Genie, AOL, and Delphi which were initially popular for connecting users online. 

I remember going over to my friend Melissa's house in the late 1990's as a highschooler and hearing her Dad talking about Prodigy. I didn't understand what it was back then but through overhearing his conversations, I knew it was important. I have to assume that my parents were using the internet around that also but in my house it didn't seem to be talked about a lot. I wasn't really that clued in at that age as to what was going on in the world. 

The Dot.com Boom was basically a time of rapid expansion and speculation in the tech and internet industries where people believed the internet could change the way we do business, communicate, and live and between the mid-1990s and 2000, hundreds of new companies popped up, many of them trying to build websites and services that would take advantage of the growing internet. Investors were eager to get in on the action and put billions of dollars into these companies, hoping the internet would create a whole new economy. It was a time of big bets on a new, exciting future. However, many internet companies were valued much higher than they were actually worth, with little to no profits or solid business plans. Investors believed that if these companies could just grab enough market share, they’d eventually make money. This created a stock market frenzy, where companies were valued based on hype rather than real success, and growth was not sustainable. The Dot.com Bust that followed was a wake-up call for many and hundreds of overvalued companies went bankrupt because their business models didn’t work, they spent too much, and they didn’t know how to make money. The excitement of the boom quickly turned into widespread layoffs and a loss of investor confidence. One example from class was Infospace being valued at more than Boeing. In hindsight, the Dot.com Boom showed how unrealistic optimism can lead to rapid growth followed by a painful crash. It highlighted the importance of strong business plans, long-term thinking, and being careful about speculative investments. I find it interesting that some companies like Amazon survived the Dot.com bust and now they dominate e-commerce.


Sunday, November 3, 2024

Startup.com-Blog #6

 


Over the weekend, I watched Startup.com, a 2001 documentary that tells the story of the rise and fall of GovWorks.com. It begins with a college graduation scene before diving into the background of the co-founders, Tom Herman and Kaleil Isaza Tuzman, who met in high school. The film follows Kaleil as he takes the bold step of leaving his job at Goldman Sachs to start the company with Tom. By May 1999, they had built a team of just eight employees, setting the stage setting the stage for their ambitious venture, which aimed to enable citizens to pay traffic tickets, parking fines, and other municipal fees online.

We see the co-founders pitching their idea to executives in Silicon Valley and San Francisco, showcasing their determination to secure a major contract. They even hire legal counsel to help protect their idea, which is a smart move in such a competitive space. They score a $10 million deal in Boston, and the company grows to 233 employees by May 2000.

Before landing an $18.5 million contract with New York City, GovWorks had already reached a significant milestone by raising $60 million in funding. This showed how much confidence investors had in their vision and fueled their rapid growth. With that backing, they quickly expanded and secured deals with 45 cities, including some international partners.

However, despite these successes, the company’s run was short-lived, lasting only from May 1999 to December 2000. The documentary highlights the internal struggles that came with their achievements, from conflicts between partners to the strain that money put on their friendship.

One particularly dramatic moment occurs when their office is broken into, leading to the theft of Kaleil’s computer and crucial legal documents—raising suspicions of corporate espionage. On top of that, they face tough competition from companies like EZGov, which has more advanced technology. As financial pressures escalate, Kaleil is forced to make the difficult decision to fire Tom, which marks a breaking point for GovWorks. However, this setback leads them to launch a new startup aimed at helping struggling dot-coms. Overall, the film offers a gripping look at the highs and lows of startup life, showcasing how ambition, competition, and friendship can collide under intense pressure.

Saturday, November 2, 2024

Guest Speaker Erik Hanberg-Blog #5


On Wednesday, October 30th, our class welcomed guest speaker Erik Hanberg, a talented writer and entrepreneur. Erik has self-published several books on focused topics such as nonprofit boards and fundraising. In addition to writing, he has developed websites for his projects and managed arts organizations, including the Grand Cinema in Tacoma. Through these experiences, he has gained valuable insights into leadership, teamwork, and creative problem-solving that he shared with us.

During his talk, Erik explained how technology has opened up new doors for independent authors and business owners. He highlighted how platforms like Amazon Prime and self-publishing sites make it much easier for anyone to publish and sell their books without the need for a big publisher or significant printing costs. With print-on-demand technology, books are only printed when someone orders them, which helps save money and storage space.

Erik also noted how Amazon has improved the discoverability of self-published books, making it easier for readers to find new authors. This change has allowed many writers to reach a wider audience than ever before.

He further discussed the increasing role of AI in writing. While some authors use AI tools to generate ideas or even write entire stories, Erik prefers to rely on his own creativity. He believes that while AI-generated content is improving, it still lacks the depth and emotional richness that human writing can offer. As AI continues to develop, it challenges us to rethink what storytelling and authorship truly mean.

Erik emphasized how vital it is for writers to keep a personal touch in their work. He encouraged authors to discover and cultivate their unique voices instead of allowing AI to dominate their creative processes. The key challenge is to leverage technology as a supportive tool while keeping human creativity at the forefront of storytelling.

Wednesday, October 23, 2024

Virtual Scavenger Hunt-Blog #4

Today in class, Professor Andrew Fry grouped us into teams of two and gave us a virtual scavenger hunt. My partner and I were able to get an answer for every one. We each tackled the list of 18 items from opposite ends and worked our way to the middle. I was working fast, scrambling to come up with answers because I wanted to win that Anthem coffee gift card. 

I mostly used ChatGPT for each of my questions because I wouldn’t have been able to do it as fast otherwise. ChatGPT pulls information from several different websites, so I think it is a better search engine than Google. My teammate and I worked together to format the document so it was not as messy. I was amazed that I could actually get a full 5day travel itinerary for a family staying at the Disney Aulani Resort. ChatGPT had it covered.

I had no idea what a Tag Cloud was until today but ChatGPT easily generated one for Andrew Fry. It came out looking pretty good too. Now I’ll be able to call on that knowledge in the future when I need a tag cloud.

I wanted to make sure that I answered as many questions as possible so I didn’t spend too much time on each of them. This assignment although fun, was a little harder than I expected it to be but I was really glad that we answered all of them. I need six more words to get to 250, lol. Done. 

Blog #10-Using HTML to Create a Website

file:///C:/Users/Shannon%20Moffat/Downloads/SandwichesWebsite.html I started creating a web page using HTML for the first time by following ...