Posts

Software (Evaluation)

Image
  What Software Evaluation Is It is the standardized process for assessing the quality level of a software program. It is an inherently difficult task to carry out because the assessor has to walk the fine line between his or her subjective views derived from the actual test of the software’s functionalities and his or her professional objectivity. The Approach Two very broad approaches are used in software evaluation. The criteria-based approach In the criteria-based approach, you assess the software against a checklist of sustainability, maintainability and usability goals. Done right, this approach will help identify and document the various modules of the operating systems that ought to be improved on. 2. The tutorial-based approach The tutorial-based approach works by assessing the SW from a user’s perspective. The assessor must perform a complete walkthrough of all of the software’s modules, testing its functionalities along the way. The assessor then documents his or her experie

Software overview (Linux)

Image
                                                                   (The Linux Kernel Archives, 2022) Introduction to Linux Operating Linux is a community of open-source Unix like operating systems that are based on the  Linux Kernel . It was initially released by  Linus Torvalds  on September 17, 1991. It is a free and open-source operating system and the source code can be modified and distributed to anyone commercially or noncommercially under the GNU General Public License.  Initially, Linux was created for personal computers and gradually it was used in other machines like servers, mainframe computers, supercomputers, etc. Nowadays, Linux is also used in embedded systems like routers, automation controls, televisions, digital video recorders, video game consoles, smartwatches, etc. The biggest success of Linux is Android(operating system) it is based on the Linux kernel that is running on smartphones and tablets. Due to android Linux has the largest installed base of all general-pu

Software examples

Image
  1. Mozilla Firefox [Image source:  Mozilla Firefox ] Mozilla Firefox is a customizable internet browser and free open source software. It offers thousands of plugins that are accessible with a single click of your mouse.   The platform holds  3.98%  of the worldwide browser market share and it is available for Android, iOS, Windows and Linux.    According to  CNET , Mozilla reshaped the technology industry and fanned the flames of open source software that changed the way social networks and operating systems function. 2. LibreOffice [Image source:  LibreOffice ] LibreOffice is a complete office suite that offers presentations, documents, spreadsheets and databases.  Unlike Microsoft Office, which is not accessible (read our article on  what is web accessibility ) for everyone due to its pricing model, LibreOffice is totally free.  To support it, its users can make donations when they download. So, it has a huge community of contributors. It is available for Mac, Linux and Windows an

Student's idea (Data privacy and Data security in Cloud computing)

Image
                                               (Security and Privacy in Cloud Computing –, 2022) Data Privacy One of the main concerns regarding the security and privacy in cloud computing is the protection of data. Millions of users have stored up their important data on these clouds, which is what makes it riskier to secure each and every bit of information. In cloud computing,  data security  has become a serious issue different data is distributed in different storage devices and machines including PCs, servers and different mobile devices such as smart phones and wireless sensor networks. If the security and privacy in cloud computing are neglected, then the private information of each user is at risk, allowing easy cyber breaches to hack into the system and exploit any users’ private storage data. The advantages we receive from cloud computing have become an essential part of our lives. This is why security and privacy in cloud computing needs to take action if users are to trust

Academic Paper Summary

Image
  Reference list:  Public Intelligence |. 2022.  (U//FOUO) MS-ISAC Intel Paper: Common Cyber Threats to Universities | Public Intelligence . [online] Available at: <https://publicintelligence.net/ms-isac-universities-cyber-threats/> [Accessed 8 June 2022].

Questionnaire (General questions analysis)

Image
  As you can see 50% of people prefer Avast antivirus, 50% of people prefer Kaspersky and 25% of people use none of them. As you can see 100% of people use antivirus to protect their devices. As you can see here 100% of people know Trojans Horses, 75% of people know Spyware, 75% of people know Worms and 25% know Ransomware. As you can see 75% of people were been attacked by Malware and 25% were not been attacked.