Projects
Android Development
Technologies: Android Studio, Java, SQLite, XML,
Poorly designed apps keep running in the background even when users close them. This consumes resources unnecessarily. The following assignment shows how to close an app properly, use a phone's camera and save pictures and data using SQLite.
ASP.NET and Visual Basic
Other Technologies: Visual Studio and SQL
When collecting user information or monitoring their behavior, it is crucial to prioritize security. ASP.NET and Visual Basic are reliable tools for achieving this. By utilizing Visual Basic, it becomes feasible to perform logic on the server, which conceals sensitive data from hackers and other developers. This task demonstrates how to build a secure web application for gathering user information. Once the data is stored in the database server, it can be easily updated, deleted, or edited.
React And JavaScript
Other Technologies: HTML5, CSS, ReactDOM, React JSX and Node.js
React can speed up websites by creating components that load as users scroll down. This assignment shows how to use React and JavaScript to display JSON:API info to users using CSS and HTML. With ReactDOM, users can easily search for specific data by name and add tags for quick navigation.
Jestjs
Other Technologies: JavaScript and Node.js
Testing and validating hundreds of files can be a daunting task for developers. However, Jestjs is a helpful tool that can save time during the testing and validation process of an application. This project demonstrates how to create customized Jestjs functions for testing JavaScript logic.
SQL Server Management Studio (SSMS)
Technologies: SQL
Accidentally erasing all data from a database server can result in millions of dollars in losses for a company. SQL involves not only writing statements, but also understanding database architecture. Here, I provide two assignments - one on writing SQL statements and the other on database architecture.
Java
Technologies: JavaFX, SQL, and Java.util.ArrayList
The purpose of applications is to solve problems and simplify tasks for users and businesses. This project offers a solution for collecting and storing data in a database, utilizing various Java libraries such as JavaFX, Java.sql, and Java.util.ArrayList.
Systems Analysis and Design
It's important to avoid making impulsive or ill-considered choices that could lead to major financial setbacks. In this project, a group of five students - myself included - demonstrated successful planning, information organization, report writing, and record keeping. Collaborating as a team can be difficult, but understanding management principles, motivational strategies, leadership responsibilities, and effective communication can simplify even the most daunting tasks and ensure timely completion.
Python
Writing code in a clear and organized manner is crucial to ensure easy maintenance. Object-oriented programming languages like Python are useful in enhancing logic communication thanks to their detailed approach and syntactic rules. This task showcases how Python can be utilized to create various programs that handle backend logic.
UX/UI Design
Technology: Adobe XD
A website can help a business, but it must be designed well. To ensure a good experience, UX/UI designers must perform usability and card-sorting tests. A custom design is also important for branding. This assignment shows these aspects in the mobile and desktop versions of a website's high-fidelity prototypes. It also shows what a sitemap and style guide is.
Digital Art
Technology: PhotoShop
Having pictures of high quality and the right resolution is crucial for website users to engage with its content. However, excessive resolution can cause slow loading times, leading to frustration. In my experience as a web developer and designer, I've worked on numerous projects that involved intricate digital art tasks using Photoshop.
Command Line
Every open network port listening for a connection is one more vector for remote attacks, and frequently working as the root user puts the system at risk of accidentally running malicious code at an elevated privilege level. It is better to make a hacker work to gain control of a system by using "sudo" at all times when it is not inconvenient to do so. The button below shows how to do this and more with the command line.