Lenay Nichols
Forum Replies Created
-
AuthorPosts
-
Lenay Nichols
ParticipantWorking for the Department of Defense also known as DoD under DLA, we commonly use Public Key Infrastructure (PKI) encryption. PKI uses certificates and key pairs, public and private keys, to verify identity and encrypt communications. This is why we use CAC cards to log into systems and access secure networks. PKI is appropriate in this environment because it provides strong authentication and secure access to sensitive government systems. In addition to PKI, AES or Advanced Encryption Standard, is widely used within our DoD systems to protect data at rest, such as classified files, databases, and stored system information. AES is appropriate because it is fast, highly secure, and approved for government use. TLS (Transport Layer Security) is also used to protect data in transit, especially when accessing internal web applications or transmitting information across DoD networks. TLS ensures that sensitive data cannot be intercepted while traveling between systems.
Overall, us DLA workers depend on a combination of PKI, AES, and TLS encryption to meet these strict government security requirements and protect sensitive information.Lenay Nichols
ParticipantTCP/IP is the foundational set of rules that allows computers and devices to communicate across networks and the internet. It defines how data is packaged, addressed, transmitted, and received so information can travel from one device to another successfully. The TCP (Transmission Control Protocol) focuses on reliability. It breaks data into smaller packets, sends them across the network, and confirms that all pieces arrive correctly and in the proper order. If data is lost along the way, TCP handles retransmitting it. Whereas, the IP or Internet Protocol, handles addressing and routing. It assigns source and destination addresses to data packets so they know exactly where to go, similar to how a street address works in real life. When you put these two together, TCP/IP provides a reliable way for devices to communicate over networks and the internet. Because of this, devices with different hardware and operating systems can still exchange information, which is what enables reliable communication across the internet.
Lenay Nichols
ParticipantNetworks are classified by how big they are and what they are used for. A Personal Area Network (or PAN) connects devices very close to one person; like a phone and wireless headphones. A Local Area Network ( or LAN) connects devices in a small place like a home, school, or office so they can share internet and files.
A Campus Area Network (or CAN) connects multiple LANs across several buildings, such as on a college campus or hospital. A Metropolitan Area Network (or MAN) covers a city and is often used by internet providers or city services. A Wide Area Network (WAN) covers very large distances; the internet is the best example.
There is also a Storage Area Network (or SAN), which is used in data centers to connect servers to storage instead of connecting people’s devices. Overall, these network types help organize how devices communicate based on distance and purpose.Lenay Nichols
ParticipantPersonally, I would describe myself as someone who is still learning patience. There are times when I am understanding and willing to give people grace, but there are also moments when I catch myself judging too quickly. It is often easier to notice what someone else is doing wrong than to stop and reflect on my own actions and attitudes.
I can admit at times I need to slow down and look inward instead of immediately focusing on others faults, however I am a human and I am a work in progress. When I take time for personal evaluation, I realize that I also make mistakes and need grace just as much as anyone else.
Because of this, I have been more patient and understanding with others. Choosing patience over judgment has been helping me see people in a more optimistic light and respond with kindness rather than criticism.Lenay Nichols
ParticipantThe purpose of a command line is to let a user talk to the computer by typing instructions instead of clicking on icons or menus. It gives direct control over the operating system and is often faster and more powerful than using a graphical screen, especially for technicians.
With a command line, you can do basic tasks like moving between folders, creating or deleting files, and checking what is stored on the computer. For example, commands like cd changes from one directory to another, dir shows what files are inside a folder, and del removes files.
Command lines are also helpful for checking how the computer is running. You can see which programs are open, stop a frozen program, or check system information.
You can also use the command line to help fix network problems.
Overall, the command line is important because it helps technicians control, fix, and manage computers more easily, even if the screen or mouse is not working.Lenay Nichols
ParticipantForgiveness is something I can honestly say I am actively practicing in my adult years. I have learned, un forgiveness disrupts my focus, and when I hold it in my heart, I struggle to function fully in my day to day life. When I feel hurt or resentment rising, I intentionally acknowledge it and say out loud that I forgive the person who caused me pain, then I redirect my focus toward something positive; sometimes that even means physically getting up or changing my environment to reset my mindset.
I understand without forgiveness in my heart, my Father in heaven will withhold forgiveness from me, and I need forgiveness every day. Because of this, my work in this area is ongoing, and my growth is a continuous journey. I am discovering, forgiveness clears my path and helps me stay present, which then allows me to accomplish more and live with greater peace. I strive to always forgive, and when I struggle, I take the necessary steps, including working through it with my therapist. I truly thank God for the power of forgiveness and the freedom it is/has brings/brought to my life.Lenay Nichols
ParticipantFour examples of operating applications and their purpose include macOS, Windows, Linux, and iOS. These operating applications run in the background and allow devices to function properly by supporting and managing applications such as Zoom, Instagram, Google Chrome, and SHEIN. They help computers, tablets, and cell phones operate by controlling hardware, managing system resources, and enabling users to install and use other software. Additional examples of operating applications include Android and Chrome OS.
-
AuthorPosts