Tech Topic: Connection

  •  History of Computers
    In this course, TEC 101, students learned how computers function from where they started and where they are now. The advancements in technology are incredible, from the technology evolving from vacuum tubes, to switches, to the processor and RAM they use now. The first computers used vacuum tubes, as explained in the article Geeks for Geeks. Vacuum tubes control the flow of electrical current within a sealed glass enclosure where most of the air has been removed. (Geeks for Geeks, 2025)
  • Hardware of the modern Computer
    Computer hardware has evolved from the old vacuum tubes. In the modern age, computers use CPUs, RAM, Hard drives, and different devices that add to the computer, like keyboards and mouse. 

  1. CPU (brain of a computer)
  2. RAM ( Temporary memory)
  3. Hard Drives (Storage)
  4. Input/output devices (Keyboards and Mouse) 

  • Programming Language
    TEC 101 also allowed us to practice some form of programming language. We had an activity where we programmed on Scratch. This was an enjoyable exercise for me; it showed me that small commands can create actions in the programming world. It was a small understanding of a programming language. According to Geeks for Geeks, a programming language is a set of instructions and syntax used to create software programs. (Geeks for Geeks, 2025)  

  1. Python
  2. Java
  3. C
  4. C++
  5. Ruby
  • Application Software
     Software is the counter to hardware; software is the applications, programs, and operating systems that people interact with on computers. Nowadays, most people interact with programs on various devices, from computers, cellphones, watches, and TVs. The software side of a computer is programmed by coders and used by the user population. 
  • Database 
    As users, we create tons of digital data on different devices. Most of the time, we don't take a second to think about what we put online, but as users, we must protect our data. Data can be used by different people for different reasons. Companies like Uber can get data on a person's eating habits and serve them by giving users suggestions on what to eat. 
  • Network Architecture, Management, and Security
        As a culmination of the lessons, I learned that one thing makes a computer work, but multiple functions. From the lessons I learned, it is essential to think about how a person networks their systems, manages their information, and what types of programs they use, and most importantly, think about their digital security. Digital security is critical because people must protect their own digital information. For example, a company needs high digital security to protect against threats from attackers and hackers. 

References: 

Priyagautam , S. (2023, March 29). Introduction to Programming Languages. Retrieved May 26, 2025, from https://www.geeksforgeeks.org/introduction-to-programming-languages/

Sharma, P. (2025, May 8). First Generation of Computer. Retrieved May 26, 2025, from https://www.geeksforgeeks.org/first-generation-of-computer/

Comments

Popular posts from this blog

Web/Mobile App Critique

Network Security

Traveling Through a Network