Isabelle Tubbs
Forum Replies Created
-
AuthorPosts
-
Isabelle Tubbs
ParticipantA computer’s expansion options can involve expansion cards for video, audio, peripheral interfaces, and storage. These cards must also be put into the right ports on the computer in order for them to work properly. These expansion options can help boost a computer’s functionality and overall use.
For video, a Video Graphics Array (VGA) or a Digital Visual Interface (DVI) can be used for computer displays. However, these standards are somewhat old, so HDMI can be used instead of DVI to connect to even more devices. A Display Port can be used for monitors with high resolution. With audio, it is important to plug in to the right ports using its color-coded system. If a user wants to connect speakers to play music or use a monitor at work, video and audio expansion are important.
Peripheral interfaces allow the computer to connect and interact with peripheral devices like mice, keyboards, etc. For example, PS/2 was used for keyboards and mice before USB was established, and RS-232 was used for mice, external modems, and more. Therefore, peripheral interfaces are important for users’ actions on their devices for tasks as simple as using a mouse to scroll down on a website page. For storage, Serial AT Attachments (SATA) can help the computer connect to optical drives, hard drives, and solid state drives. This allows a user’s computer to function using information it has stored on its drive, and it allows a user to have the computer storage to save photos or files.
Isabelle Tubbs
ParticipantAlthough read-only memory (ROM) and random access memory (RAM) have similar acronyms, they are separate components that store information. The main difference between read-only memory and random access memory is how the information is stored. Read-only memory is non-volatile, meaning that even if the computer’s power shuts down, the information will still be stored. Random access memory, on the other hand, will lose the information when the computer’s power shuts down, especially because it is a temporary storage space.
Another difference is the type of information RAM and ROM store. According to GeeksforGeeks, the information RAM stores is for the CPU to use right away, while the ROM contains information for storing code that operates the hardware on the device (2025, July 11). For example, ROM can include the instructions concerning the computer’s startup, motherboard, and loading of drivers for basic hardware. As a result, its tools are focused on different things. A computer’s RAM can be one of the many memory modules out there, while ROM can be BIOS (basic input/output system)/UEFI (unified extensible firmware interface).
References
GeeksforGeeks. (2025, July 11). Difference between RAM and ROM. https://www.geeksforgeeks.org/computer-science-fundamentals/difference-between-ram-and-rom/Isabelle Tubbs
ParticipantThe enemy tries to get at all of us, especially when we are walking in God’s calling for our lives. However, this devotional is a great reminder of who we should run to for help, guidance, and peace. God is there when we need help and/or feel drained. The Lord provided for David physically with the showbread and materially with the sword of Goliath. He also provided spiritually with the sword because it served as a reminder for David that God helped Him in the past, and God can do it again. David had faith that God would use him to slay Goliath because He used him to kill a lion and bear. In this, God wants him to have faith that He will help him through this persecution because He helped him slay Goliath. God is faithful and powerful, cares about David, and will fulfill His promises to him. This reminds us about God’s faithfulness and power in our own lives too. He cares about us and will fulfill His promises to us.
Isabelle Tubbs
ParticipantFirst, when troubleshooting a power supply unit, it is important to recognize what the problem is based on its symptoms. Symptoms can be a computer powering off or rebooting unexpectedly, failing to start, reporting memory errors, etc. It could even be a tangible problem; the system may be overheating, or the computer’s chassis gives an electric shock. Also, buzzing, BIOS beep codes, or other noises can be an indication.
Once it is confirmed that the power supply unit has some sort of issue, it can be helpful to test it to get more information about what is happening. The PSU can be tested using a multimeter or a power supply tester. Additionally, knowing how old the power supply unit is, whether it was handled roughly in the past, and any past electrical interference can give more information.
After figuring out what the issue is, the PSU may need to be replaced. This involves removing the old PSU and then putting in a new one using a screwdriver and the correct equipment to protect against electro-static discharges. Then, verifying that the new PSU is working correctly and documenting findings are the last few steps for troubleshooting the PSU.
Isabelle Tubbs
ParticipantHi, Carlos. I really like the analogy you gave about the motherboard and CPU. The motherboard and CPU are some of the key components of a computer, just like the nervous system and brain are key components of the human body. Also, they both work together in different but vital roles like the brain and nervous system do too. Great work on your post.
Isabelle Tubbs
ParticipantThe motherboard is essentially the main board that contains the system’s circuitry and connectors. It allows communication between different parts of a computer system. Because it contains such important components, it is one of the most valuable parts of a computer. For example, one component that the motherboard holds is the RAM slot. The RAM (Random Access Memory) slot allows the computer to have a place to store information.
Another component the motherboard gives space for is the CPU. As the central processing unit of the computer, this gives the computer its power and processing ability. The CPU acts upon the instructions it receives from the computer’s hardware and software, so its control unit is responsible for retrieving, understanding, and executing those instructions. It may also communicate with its arithmetic logic unit if arithmetic and logic operations need to be completed. How fast the CPU can process determines how fast the computer can run its instructions.
Isabelle Tubbs
ParticipantHi, Carlos. I like that you said that we all do our own troubleshoots from time to time. I think a lot of us as users at least try to do the things that are possible for us to try so we can fix the things we own or use. This can apply to checking that every cable is plugged in, seeing if we tried all the right buttons on a screen, etc.
Isabelle Tubbs
ParticipantTroubleshooting is important for finding out what is wrong with a device or system and taking the right steps to ultimately fix the problem. Without troubleshooting, devices would just be thrown away whenever they stop working, even though there is likely a good solution for fixing it. For information technology, this is a valuable skill to have so that IT professionals can help users have their devices up and running again. This is especially important if a user needs their information back and does not have a copy.
Further, after fixing a device, an IT professional can help prevent issues from coming up again. For example, if there was a specific action that caused the issue, the user can be informed on what not to do and what they could do instead. Also, in case of an emergency, if the user does not have their information backed up, they should definitely create some sort of backup so that they are not at risk of losing a great amount of data.
Isabelle Tubbs
ParticipantI find comfort with this week’s devotional because there are so many things in the world we need rest from. This could be rest from others’ expectations, rest from our own expectations, or rest from needing to do everything ourselves. Thankfully, with Jesus, we can receive rest. In fact, the passage in this devotional includes Jesus’s own words. Receiving the rest that Jesus offers us gives us freedom, especially the freedom to know that we do not have to save ourselves. Jesus has saved us and invites us to live in the blessing of that. We just need to come to Him and receive it. At times, we may be tempted to strive for things ourselves again or simply forget to rest, but He is always there for when we come back and give Him our burdens. It is amazing and comforting that there is nothing too difficult or heavy for Him to bear. He is so powerful and loving.
Have a blessed week everyone!
Isabelle Tubbs
ParticipantHello, Carlos! The mobile and physical vulnerabilities you mentioned are quite interesting. Your example with hardware backdoors in devices really shows the importance of buying from trusted vendors and viewing the behavior of devices. The USB attack you mentioned can be especially dangerous when the device automatically opens the USB that is plugged in. That is why sometimes this automation should be turned off, especially when many people will have access to the device. Great work this course.
Isabelle Tubbs
ParticipantHello, Caleb! Great summary of the SOHO features. I like how you focused on why each feature is helpful for security or practicality. Although I did not mention Network Address Translation in my post, I agree that its addition to security make it an important feature. SOHO routers are great for sustaining a network in a somewhat small area.
Isabelle Tubbs
ParticipantA SOHO (small office home office) router is similar to a standard router, but it gives more network control because of its greater number of functions. Most use private IP ranges and give access control features, and it is essentially a network node.
Because a SOHO router is such an important device, it contains many different parts and features. In itself, it should have memory, a CPU, an OS, and storage like most computers have. Typically, it also contains a switch, DHCP server, and firewall. A network switch “is responsible for filtering and forwarding the packets between LAN segments based on MAC address” (GeeksforGeeks, 2024). A DHCP server assigns IP addresses and additional settings, and a firewall controls the network traffic, making sure no unauthorized things come to the software.
There are different situations that call for different structures of SOHO routers, so there are some additional features. There could be static IP assignment instead of a DHCP server, or it could contain a wireless access point (WAP), VPN concentrator, or broadband modem.
References
GeeksforGeeks. (2024, August 13). What is a Network Switch and How Does it Work? https://www.geeksforgeeks.org/what-is-a-network-switch-and-how-does-it-work/Isabelle Tubbs
ParticipantAssessing the vulnerabilities of mobile and physical devices and can be helpful for coming up with ways to prevent attacks that exploit those vulnerabilities.
One vulnerability involves the type of network used on a mobile or physical device. If someone is connected to a public network or is simply sharing information insecurely, that leaves the device vulnerable to attacks. To prevent this, it can be helpful to use virtual private networks and encrypted messaging so that the messages cannot be intercepted (Cyserch, n.d.). Users, who may not know about these options or vulnerabilities, should be informed on how they can use their devices more securely.
A vulnerability that can easily come up on mobile devices involves configuring app permissions (Cyserch, n.d.). When someone downloads an app, the app typically sends some pop-ups asking for certain permissions. It can be easy to just say yes to all of them, but this is not safe. Some permissions must be enabled to use the app. For example, it makes sense that the camera app needs permission to take photos and videos and access photo and video files. However, if a new weather app or gaming app is asking for it, this should probably be denied. As a result, users should be informed that they should check their app permissions regularly to make sure they are only enabling the permissions that are absolutely necessary (Cyserch, n.d.).
Finally, the physical theft of someone’s device is a big device threat (Cyserch, n.d.). Naturally, physical measures should be in place so that devices are not stolen, but if those fail, there should be other measures in place. For example, encrypting the data on a device, placing strong authentication measures, and enabling remote wipes on a device can prevent someone from being able to steal the information even if they have the device with them (Cyserch, n.d.).
There are many potential vulnerabilities to devices that should be acknowledged, but there are also many ways to protect information. There is not one method that can make everything secure, but using a combination of security measures can prevent a lot of attacks.
References
Cyserch. (n.d.). Common Vulnerabilities in Mobile: An In-Depth Guide. Retrieved May 9, 2025 from https://www.cyserch.com/blog/Common-Vulnerabilities-in-Mobile-:-An-In-Depth-GuideIsabelle Tubbs
ParticipantIt can be easy to focus on the list of scary things that as humans would be natural to fear, but this devotional calls us to remember how powerful God is. God operates on a much higher level than we can even understand. We should fear and respect Him more than any other thing. I think today there are many people who may have fear and anxiety in life, but they do not have fear and respect for God. Knowing that God is bigger, stronger, and greater than anything else is a great comfort and reduces some of the other fears. Having God’s love and presence in our lives helps us focus on Him. It is far better to focus on God than to focus on anything else. He promises to be with us, so spending time with Him and meditating on His Word brings us peace, love, and joy as He renews our minds.
Isabelle Tubbs
ParticipantBusinesses today need physical security hardware devices to maintain security and safety of data and information. Three tools include intrusion detection systems, firewalls, and multi-factor authentication.
An intrusion detection system (IDS) examines the traffic on the network and then sends out an alert if it finds any malicious activity or unauthorized access (GeeksforGeeks, 2025). This is an important system to install for businesses who need to know when any attacks or unauthorized accesses happen on the system. Likewise, having a physical detection system, like surveillance cameras and sensors, is beneficial for business locations (Avigilon, n.d.).
However, to prevent attacks in the first place, firewalls are important tools for controlling the incoming and outgoing traffic. They are used to deny access to malicious users or software while also allowing known objects in. Although an intrusion detection system is helpful for alerting businesses of attacks, it is also good to have systems in place that prevent such things.
Another method for security is the way authorized users are authenticated for access. Previously in this course, we learned how multi-factor authentication can be more secure for authenticating users. It can use information (like a password), or an object (like access to an email), etc. Using more than one method can help businesses be more secure because it requires more than just a password to get in to access important information. This can apply to logging in online or even for accessing a secure building (Avigilon, n.d.).
References
Avigilon. (n.d.). What is physical security? Controls, methods, and measures for commercial buildings. Retrieved May 2, 2025 from https://www.avigilon.com/blog/physical-security-guide#key-physical-security-measures
GeeksforGeeks. (2025, April 28). Intrusion Detection System (IDS). https://www.geeksforgeeks.org/intrusion-detection-system-ids/ -
AuthorPosts