Technical Communications Part 2

Specialized Audience (CIS classmates)

In this paper I will be explaining how to get the most out of a keyboard and using it to its full potential. The most common keyboard is the “QWERTY” keyboard. The keyboard can be used more than to type papers or search the web. It has a way greater potential than that. The keyboard can now be used but no limited to hack other computers, using different kinds of computer programs, design all types of objects and shapes, and communicate with others all over the world.

Cyber warfare is a very critical issue in today’s society. There are cyber-attacks on a daily basis. A cyber attack is an attempt by hackers to damage or destroy a computer network or system. (Google) We are now able to use our keyboards to equip pictures, music, or other files with dangerous codes and then send them to other computer networks or systems and infect them with malicious malware. Hacking is a big deal because valuable information can be stolen. This information includes but is not limited to credit card information, social security number, mailing address, email address, and bank account.

There are many different types of computer programs readily available to us on daily basis due to new technology and the masterminds behind it. A program is to provide a computer or other machine with coded instructions for the automatic performance of a particular task. (Google) They can only be implemented using a keyboard. NetBeans is popular and powerful computer programming software. It is used in a lot of computer programming classes across the country today. Within NetBeans you can generate many different types of codes just by using your keyboard. Again this is another reason why the keyboard is such a powerful tool.

Due to new technological innovations you can design shapes and objects just by typing on your keyboard. Simply typing the dimensions of an object on your keyboard will bring of a visual aid of the object you created. It is crazy to think that we do not even have to draw objects anymore because our keyboards became so powerful throughout the number of years. Another feature of this is being able to type the name of a shape on your keyboard brings up the actual shape. Why do we even need to use pencils anymore?

Last, but not least we can use a keyboard to communicate with others that are all over the country and even the world. Keyboards have allowed us to use features such as Instant messaging, e-mail, text messaging, twitter, and Facebook. Your keyboard is used in all of these applications. I hope after reading this you are able to not only realize the power of your keyboard but utilize its full potential.

Technical Description Part 1

General Audience (Elementary School students)

In this paper I will be explaining learning to use a keyboard. The most common keyboard is the “QWERTY” keyboard. First make sure that your computer is actually on because if not then the keyboard is perfectly useless. Before actually using a keyboard you must first familiarize yourself with it. By this I mean learning where all the keys, numbers, and symbols are located. After familiarizing yourself with the keyboard you may then begin practicing to use it. The first step in using a keyboard effectively is hand and finger position. Your fingers should be placed on the A S D F and the J K L ; keys. Those keys are known as the resting position on a keyboard. Getting used to this will greatly increase your typing skills, saving you a lot of time. This could be really important if you have a paper to type in a limited amount of time. Next, let’s evaluate your appropriate hand position. When typing on a keyboard your wrist or palms should not be resting against the edge of the keyboard. They should instead be hovered over the edge. This position also allows for more efficient typing as your hands are more freely allowed to move around the keyboard.

Every keyboard has special keys that everybody should be aware of. The keys include but are not limited to Delete, Backspace, Tab, Caps lock, Shift, Space, and Enter. Each one of these special keys performs a different function. The Delete key allows you to delete any key that is in front of the cursor. However you cannot delete any keys behind the cursor which is the primary function of the backspace key. These keys are critical because instead of deleting the whole word you can just erase the part you messed up on and give it a simple fix. The next special key is the Tab key. The tab key allows you to add a special indent at the beginning of a paragraph. As shown at the beginning of this paragraph. Holding the shift key down while typing capitalizes each letter that you type while holding it down simultaneously. It is important to use the shift key when you need to capitalize the first letter in a word that it is needed. The Caps lock key kind of works as the permanent shift key. Unlike the shift key you do not need to hold the caps lock key down. Just one click of this key will give you indefinite capitalization. A major key, if not the most important key on the keyboard is the space key. The space key is more than likely the most used key. The space key allows you to create sentences while typing. Words would be all conjoined together if there was no space key. The enter key on a keyboard is used for a variety of purpose. In applications such as Microsoft word it is used to jump to the next line, but on applications like google it is used to confirm a search. Learning these essentials about the keyboard will not only save you a lot of time, but it will also teach you how to use a keyboard most effectively.

Problem Analysis

Deondre Anderson

Help Received:  Article Deondre Anderson

9/9/2016

 

Analysis of “Why you don’t need an RFID-Blocking wallet”

Purpose of Article

Author and security advisor Roger Grimes purpose of this article was to inform readers that buying and RFID defense products is waste of money because black hat hackers are coming to an end. Also just because you buy this does not mean your safe from being targeted my hackers, even though that is what the company broadcast. My interest in this is why people still continue to buy RFID defense products when they are becoming useless and why is it still a booming industry.

Analysis of Article

The author suggests that before buying an RFID defense product ask yourself if you are worrying about the right things. (Grimes, 2) The problem is that people waste their money and sacrifice their way of living because they are paranoid and living in fear that their money will be stolen if they do not have these products. For starters most cards do not actually have RFID transmitters inside them. (Grimes, 2)  Next the product aluminum foil works just as well as RFID defense products if not better. (Grimes, 4)  Aluminum foil not only works as well as an RFID product but it’s cheaper to use. Last, but not least credit card hackers are less likely to hack you using an RFID transmitter. Credit card hackers have be known to hack online for multiple credit cards at a time. This way is more efficient then trying to hack one person at a time. (Grimes, 4)

RFID defense companies are on the rise because people have such a fear of being hacked. People actually are so paranoid of being hacked that they waste money on useless products and give up their way of living. There have been people that removed every electronic product in their house due to hacking fears. Some even sold their new cars with embedded computers to go back to older models without them. (Grimes, 4)

What are RFID defense products used for? They are used to stop potential criminals from using card readers to obtain valuable information from a potential victim. Less than one percent of all major credit card companies have RFID transmitters inside them. (Grimes, 3)  Also we as humans are using cards less and less every day. Most of the world is going to wireless payment using our mobile devices. Mobile pay is way more secure. Apple pay had more users and adopters in its first day in the market than all active users of RFID credit card products combined. (Grimes, 1/19/16, 3)  RFID is a multibillion dollar company, so just think about that. With that being said the days when a criminal can sit on a corner and sniff your credit card information out of thin air are limited, so there is not really a need for an RFID product.

Conclusion

Whether you use and RFID defense product or not you are still just as likely to be hacked as non RFID product users. It is cheaper for criminals to buy a credit card online then it is for RFID transmitter products. Finally, the days that people can actually sit on a corner and steal all your card information using a card reader are limited, so it is totally pointless for consumers to buy any RFID products. You have a better chance of hitting the lottery.

 

 

Work Cited

Grimes, Roger A. “Why You Don’t Need an RFID-blocking Wallet.” InfoWorld. InfoWorld, 19 Jan. 2016. Web. 09 Sept. 2016.