Skip to main content

My First Step in the Technological World











(Wondershare Group., 2020)

 Well👀 I think you are waiting for my story with the Technology💻. I used to collect many types of computer when I was 15 years, it was one of my interests. I have been developing my skills in Technological space which contributed to change my concept about the Technology.

 In Saudi Arabia, the Saudi Federation for Cybersecurity and programming are interesting in development and encouragement the Technology Fields in many ways 📣; I was very excited to discover where I can find my self in this project?💭They have been doing many conferences about the latest science in the field of Technology📷, and made technology competitions and many courses in Cybersecurity, Programming, Encryption and many other sections participating by many computer experts.  In 2018, the biggest Hackathon in the middle east was in Saudi Arabia called HACKATHON ALHAJJ, which supported by GOOGLE. Many programmers and designers competed to find an application to help visitors of MAKKAH during AL-HAJJ to serve them by technology.


(the Saudi Federation for Cybersecurity and programming, 2020)


                                                                              (Dark Line Films, 2020)

Also there are annual competitions in Cybersecurity in different cities, one of them is: KAIZEN ARABI CTF. It has been starting for five years, to improve and discover Participants experience and test them in different methods of Cybersecurity Science.

                                         (the Saudi Federation for Cybersecurity and programming, 2020)

This experiment has shown me how is the Technology in general, and what is the meaning of cybersecurity between of this science. I have earned more ideas about cyber security which help me to improve my knowledge about cyber security fastly. In the end, I have decided to complete my bachelor degree in computing then I have looked for one of the best universities in the UK. After that, i have applied to get a place in DE MONTFORT UNIVERSITY. I was searching a lot for which speciality should I study it? then I decided to study a Bachelor of


 cyber security





References 

DarkLine Films, D., 2020. Hajj Hackathon, Darkline Films. [video] Available at: <https://www.youtube.com/watch?v=A7GKMnsUZ6E&feature=youtu.be> [Accessed 7 August 2018].

the Saudi Federation for Cybersecurity and programming, 2020. Hajj Hackathon 2018. [video] Available at: <https://www.youtube.com/watch?v=gmJ7em35c-g&feature=youtu.be> [Accessed 24 July 2018].

the Saudi Federation for Cybersecurity and programming, 2020. Kaizenarabia CTF. [video] Available at: <https://www.youtube.com/watch?v=IOAAmXfJWbs&feature=youtu.be> [Accessed 2 April 2018].

Wondershare Group., 2020. Technology Grow Infographics Template. [image] Available at: <https://www.edrawsoft.com/templates/pdf/technology-grow-infographics.pdf> [Accessed 28 October 2020].










Comments

  1. Hi

    Please do not forget to add references following Harvard style as we have discussed.

    Many thanks
    Chirag

    ReplyDelete
  2. Title of this should be "My First Step in the Technological World."

    ReplyDelete
  3. good to see how far you came and can see how far you can go .

    ReplyDelete

Post a Comment

Popular posts from this blog

WHAT IS THE CYBER SECURITY !!!!?

    Cyber security is the mode of defending computers, servers, mobile devices, electronic systems, networks, and data from hacker attacks. (What is Cyber Security?, 2020) we can be divided the cyber security into a few common categories: 1) Network security. 2)Application security. 3)Information security. 4)Operational security. 5)Disaster recovery and business continuity. 6)End-user education. (What is Cyber Security?, 2020)   An essential job in cyber security is protecting kinds of technology devices and Sensitive data from hacker attacks. (Taylor, H. 2020) These attacks impact on a different variety of users, whether if they are governments, individuals, institutions, banks, universities, Etc The methods of hacker attacks consist of many technical tools, these technical are developing rapidly to stay invisible and penetrate through the protective technical walls to harm or steal the personal data. (Taylor, H. 2020) The following types show the popular methods using b...

CASE STUDY- VODAFONE GLOBAL COMPANY (INTRODUCTION)

                 (caveman, 2017)              The Vodafone Global Company is considered a leading telecommunications system in the Europ and Africa. It was established in 1982 by one of the British electronics companies which called Racal Telecommunication.   (The History of Vodafone, 2020)   In the begging of 1985, the first office for this company was located in Newbury, Berkshire. Vodafone's name comes from (Voice Data Fone), which means the elements of the telecommunication system.  (The History of Vodafone, 2020)  The company has made many agreements acquisition on various telecommunication companies globally during the last 45 years ago, Which contributed obviously to spread the name of the company rapidly across the world. The biggest takeovers in the history was made in 1999, when the Vodafone has been taken over the German Telecom Giant Mannesmann by 112£ billion. ( BBC News...