One of a kind app software developed for a specific

This preview shows page 1 - 2 out of 2 pages.

Example: Firefox (a browser), MySQL (a DBMS), Ubuntu (a Windows-like desktop operating system), etc.Advantages: oIt’s freeoIt’s continually evolving in real time as developers add to it & modify it => it can be better quality, more secure & less prone to bugs than proprietary systems, because it has so many users poringover it & weeding out problems.oYou are not locked into using a particular vendor’s system that only work with their other systems.oYou can modify and adapt open source software for your own business requirements, something that is not possible with proprietary systems.Disadvantages:oOpen source software can tend to evolve more in line with developers’ wishes than the needs of the end user.oThere may also be less support available for when things go wrongoMalicious users can potentially view it and exploit any vulnerabilities.What is closed source software?Software whose source code is highly protected and only available to trusted employees and carefully vetted contractors.Differences between native and web applications.Native applications are used to create difficult, complex apps, high-performance code that is easy to alter when requirements change, only run on OS for which they are programmed, cost is high. Web applicationsrun on any OS & device, unlike native applications, has one code base & one development team, cheaper to develop than native app, unable to support very specialized & complex appsUnderstand object-oriented programmingObject-oriented languages are generally used to create difficult and complex applications.Examples: C#, VB.NET, C++, JavaWhy mobile and challenges of mobile devices at work including BYOD.The major reason for the importance of mobile systems is the size of their market. Mobile use is favored by the youngChallenges:oData loss or damageoLoss of controloCompatibility problemsoRisk of infectionoGreater support costsJust-in-time data: data delivered to the user at the precise time it is needed Review BYOD policies: oAbring your own device (BYOD) policy is a statement concerning employees’ permissions and responsibilities when they use their own device for organizational business.Just-in-time data: data delivered to the user at the precise time it is needed Review BYOD policies: oAbring your own device (BYOD) policy is a statement concerning employees’ permissions and responsibilities when they use their own device for organizational business.How computers count. Differences amongst binary (Base2), decimal (Base10), and hexadecimal (Base16)Binary (Base2): use 2 digits, 0 and 1Decimal (Base10): use 10 digits: 0,1,2,3,4,5,6,7,8, and 9Hexadecimal (Base16):

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture