Personal computers are multi-purpose, meaning they can be used for various things. Their size, both physical and software, is usually average compared to institutional or work-specific computers. One can argue that personal computers always target the end-user and not the computer guru. Therefore, they are more user-friendly and easier to manoeuvre. When selling personal computers, one should understand the needs of the end-user to pair him or her with a suitable device. If the end-user is a gamer, for example, he or she will be attracted to detailed specifications on the suggested computers ability to handle such heavy graphics, and so forth. The following items are some of the key selling points of any type of personal computer.
RAM and ROM
Both the Read-Only Memory (ROM) and the Random Access Memory (RAM) are key elements of a personal computer. The specification of each will depend on the major activities the user will conduct on the computer. As a salesperson, it is important to fully understand the difference between the two to understand the clients needs. Taylor explains that the ROM is a non-volatile storage chip (p. 35). This means that contents and data stored in the ROM are not affected by the presence of power or lack thereof. On the other hand, RAM is volatile (Taylor, p. 35). A client looking for a personal computer mainly for gaming purposes will need one with a larger ROM as compared to the RAM. This is since the ROM cannot be manipulated easily, and secondly, the ROM can handle several applications in one device (like the game console). Additionally, data is stored permanently in ROM while it is only temporarily stored in the RAM chip.
Architecture and Platforms
Featherstone explains that a computer platform is an environment in which software is run (p. 45). Using this definition, one can argue that there are many different computer platforms. It is prudent to note that these digital platforms can take the form of both hardware and operating system. Again, as a salesperson, the needs of the client should guide which type of platform you advertise. If the client is interested in the hardware aspect, then some examples that will excite him or her include the video game console for gamers or the ARM architecture that is most suited for people that link their computers to their mobile phones (Tolga, p. 158). Concerning the operating systems, the client will be interested in knowing whether the device uses Linux, Windows NT, FreeBSD, or Solaris, among other similar software. Software frameworks such as JAVA and Mozilla Prism are also important to mention.
Advantages and Disadvantages of Two Platforms
Both the platforms mentioned (either hardware or operating system) have advantages and disadvantages. It is common to find a client comparing two different platforms of the same architecture. For instance, one can compare Linux to Windows NT. One advantage of Linux is that it is significantly safe from malware attacks. Additionally, the operating system is very affordable and is one of the most stable operating systems in the market (Whitt 201). Despite this, the software has several disadvantages. For example, a significant number of other software cannot run on Linux. On the other hand, software in the market can run in Windows NT. Another advantage of Windows NT is that it is very user-friendly, especially compared to Linux (Panek, p. 4). Also, because there are many Windows users, there are hardware developed that run on Windows easily compared to any other operating system. Just like Linux, Windows NT has its disadvantages. One major disadvantage is that it is easily attacked by malware. Secondly, the software is also expensive compared to Linux.
Five factors to consider when purchasing a personal computer
Apart from ROM and RAM, there are other things that a client will need to consider when purchasing a personal computer. The first is the price of the computer, which will be informed by the amount of money the client is willing to spend. Secondly, the client should also consider the processor, which is essential in both input and output. Third, the client has to think about the graphics. The right graphics will be determined by the major uses of the computer as they affect things such as resolution and so forth. The inbuilt software is also important to note. Indeed, clients can buy and change software at any point of their computer use. However, to save on costs, the client should get a computer that already has stable and reliable inbuilt software. This also goes hand-in-hand with the availability and reliability of anti-virus software that can be installed. There are operating systems that do not require additional anti-virus software. However, the software will require such additional security and this would mean additional costs for the client. To best serve the client, the salesperson needs to understand the specifications of personal computers and also the needs of the buyer.
Works Cited
Featherstone, Mark. Computer Games Designer. Raintree, 2014.
Panek, William. MCSA Windows Server 2012 R2 Complete Study Guide: Exams 70-410, 70-411, 70-412, and 70-417, Issue 410. John Wiley & Sons, 2015.
Taylor, Graham. Work Out Computer Studies GCSE. Macmillan, 2016.
Tolga, Soyata. Enabling Real-Time Mobile Cloud Computing through Emerging Technologies. IGI Global, 2015.
Whitt, Phillip. Pro Freeware and Open Source Solutions for Business. Apress, 2015.
The Computer Information Sciences course is intended to explore the latest technological development and their influence on communication and knowledge. It explains the functioning of various devices that are involved in most peoples everyday lives, teaches students essential competencies in various aspects of their use, and talks about ethics. During this course, I have improved my ability to create documents and spreadsheets, learned the fundamentals of database management, and created complex multimedia presentations. I have also learned about Web design tools and increased my awareness of the uses of various hardware and software.
In my opinion, the Computer Information Sciences course should not only be an elective one can choose, but a general requirement for all students. The world of technology is becoming increasingly complex, and progress enables various opportunities. People in most professions could benefit from an awareness of digital tools that assist with their works. Furthermore, malicious behavior is also becoming easier, particularly about peoples data. The course includes explanations of the risks of the online environment and may help students avoid becoming victims of harmful activities. It may also help to increase awareness of current issues in the field.
Net Neutrality
In 2017, the Federal Communications Commission reviewed a set of laws known as net neutrality. According to Kang, the regulations were repealed despite the campaign to retain them, a move that favored Internet providers over consumers. Kang notes that the FCC chairman, Ajit Pai, expected the measure to promote competition among various providers and thus to benefit consumers. However, the opposition to the decision stated that with the new freedoms given to providers, they could arbitrarily restrict access to websites or applications for monetary or political gains.
Net neutrality regulation fundamentally forces providers to treat the Internet as a monolithic entity instead of a collection of nodes that represents it more accurately. According to Kang, it prohibited broadband providers from blocking websites or charging for higher-quality service or certain content and regulated high-speed Internet delivery like a utility (par. 2). I believe that the repeal was not the right choice for consumers, as it provided them with no benefits while potentially damaging their freedoms. I would tell my United States Senator to reinstate the legislation, possibly along with some other programs that have been shut down by the FCC.
Computers and Public Harm
There are numerous dangers associated with the use of computers, with some stemming from malicious intent and others being more challenging to identify. Baig describes a recent data breach that exposed the personal information of 80 million U.S. families (par.1). Such incidents have been becoming more frequent recently, and while the one in Baigs article did not leak any critical data, Internet databases often contain essential data. A criminal agent could use credit card numbers or social security numbers to commit fraud. Since I started the course, I have been more careful to keep my personal information safe.
Other dangers are more subtle and associated with the increasing domination of the Internet by a handful of gigantic companies. Dorman describes the recent banning of Michael Morrison, who was maintaining an Alexandria Ocasio-Cortez parody account, from Twitter for unclear reasons. The creators page, which had a significant follower count, was also permanently suspended. According to Dorman, many people claim that the banning was political and a continuation of a trend where right-wing people keep getting banned from large social networks. As a social media account is among the best and easiest ways to obtain public reach, one could argue that the platforms are engaging in political censorship, endangering freedom of speech.
Works Cited
Baig, Edward C. Massive Data Breach Exposes Ages, Addresses, Income on 80 Million U.S. Families. USA Today, 2019.
Have you ever wondered what modern life would be without all those gadgets? Laptops, tablets, and smartphones seem to be everywhere, and no one can live without them today. Smartwatches have recently joined the ranks of obligatory electronic devices. This state of affairs is not a surprise because smartwatches are tiny gadgets that provide their users with all the necessary functions as smartphones do and even more.
General Information and Main Functions
Smartwatches are fully-featured computers with a few advantages worn on a wrist. Since these devices use touchscreens and offer a lot of particular applications, they seem to be substituted for smartphones. However, the fact that the tiny gadgets can record users heart rate and other vital signals makes it clear that smartwatches are something different than just small mobile phones. It is also possible to find mini-computers designed explicitly for withstanding extreme conditions. There is no doubt that these devices can be useful for everyone.
Numerous functions of smartwatches are another explanation of why these devices are so popular nowadays. Firstly, they provide their users with the possibility of media management. Paired with smartphones, for example, a smartwatch can be used to change volume and tracks while listening to music. Secondly, users can send voice messages via their smartwatches if they are paired with smartphones. Finally, these devices are suitable for athletes because of their fitness tracking functions. Thus, this gadget can be an irreplaceable item for modern people.
Conclusion
Smartwatches are deservedly said to be popular devices nowadays because they provide users with a lot of useful functions and opportunities. Even though smartwatches should be paired with smartphones, the two are not the same. There are crucial differences between them, and these differences indicate that smartwatches can be more significant than smartphones in some cases. Thus, everyone today should have this tiny computer on their wrist.
Viruses and worms are harmful computer programs that infect computers, often causing them to malfunction. Although worms and viruses both infect computers and cause some sort of damage or data loss, there is a difference between the two. A virus is a program that attaches itself to any computer file, usually an exe file, or program and spreads across with the help of data transfer from computer to computer. (How Do Computer Viruses Spread?) A worm, on the other hand, does not need files to attach to and spread like viruses. They make use of the already present file transfer systems to spread from one place to another (Vangie, n.d).
With the advent of internet technology and a globally integrated network, viruses are spreading online more rapidly than any other means. One of the most common ways online viruses spread is through spam email. These are unwanted and often infected emails that clutter your inbox, offering fake product offers and attractions. Viruses not only spread through spam mail but also through regular emails from known sources. These viruses come with email attachments. Another very common channel for viruses is through websites. Many websites leave cookies for later identification but many plant viruses as well. One of the most common forms of online virus spread is through downloading. Downloading files off the internet from unreliable and unverified sources can harbor virus infections. Many peer-to-peer networks such as LimeWire, Kazaa, and Bearshare have virus-infected files in search results that are disguised as actual search result files. Another common way of virus spread is through removable media such as USB flash drives and on computer networks through file sharing and network drives as well. Many popular viruses and worms spreading online, these days, are through automatically generated disguised links on Windows Live Messenger and Facebook. These links appear to be sent by the users themselves and attract friends by offering them to explore provocative and interesting content. An example of such a link would be, Hey! I found your picture online! (Tamiflu spams spread online).
To prevent the spread of viruses and worms, there are certain precautionary measures that can be taken. First, use a good virus scanner or anti-virus software to scan computers regularly. Also, make sure that the software and scanners are up to date so that the latest virus definitions are supported. Another measure that can be taken is to scan all files before transfer and scan all removable media before use and transfer. Firewalls can also be implemented over computer networks to restrict harmful activities. Another feature on computer networks can be to block harmful website content and not allow access to those websites. Now, certain websites like Google offer page ranking facilities that warn users about harmful websites. Users can also apply security settings to their internet browsers to restrict the inflow of content from untrustworthy websites. Email services offer features such as junk mail filter and attachment virus scan to prevent spam mail and other viruses. With the correct measures and prevention, the spread of online viruses and worms can be controlled to a safe level (McCullough).
Arguably, the tablet personal computer emerged from the concept of laptop PC but evolved to incorporate a touch screen controlled by a stylus light/digital pen and hand calibration for finger sensitivity, thus making the mouse and keyboard feature of a laptop obsolete.
The main reason why people prefer the tablet PCs is the ease of mobility and operability compared to the laptops and the desktops. The tablet PCs are in various shapes styles an types but the most common types are convertible tablets, slate PCs, booklet tablet PCs and the hybrid tablet PCs.
Types of Tablet PCs
The stale tablet PCs get its name and resemblance from the slate writing pads, which do not have any keyboard attachment or features. The data input occurs through hand writing recognition using the touch-pad pen/stylus or the finger touch. These tablet PCs are also user friendly and allow connection of various external peripherals such as keyboards in case the user needs them. The external devises use the latest wireless or USB connection features.
Today, firms or industries such as the education sectors, health-care industries or manufacturers, who depend on mobility and constant communication with employees or clients, utilize the tablet PCs technology for full-time internet connections. The slate tablets are also more resistant to harsh climatic conditions such as high humidity, dust, heat and accidental impacts such as dropping (Jacko, 34).
On the other hand, compatible tablet PCs have a similar appearance to the laptops with touch mouse pads and keyboarding features but have incorporated the option of 180o screen rotation. These PCs forms the bridge between the laptops and full tablet PCs since they offer both the keyboard usage options and the digital pen input options.
In contrast, the booklet tablet PCs get their book name from the reasoning that pages of a book are written on both sides and this PCs have dual screen on either of their sides. They can therefore be opened like a book. They allow the touch detection mechanism as well as the digital-pen usage. The PCs are often preferred due to their support of internet TV, internet browsing, and electronic interpretations (Jacko, 34).
Lastly, the Hybrid tablet PCs has high technological functions that both the slate tablet and convertible PCs have. It is referred to as the Hybrid due to the incorporation of various features of earlier designs. The convertible features are evident when a keyboard is incorporated, while it acts as a slate tablet PC when the keyboarding features are removed (Jacko, 34).
Current and promising Future types of Tablet PCs
Among the tablet personal computers was the iPad launched in mid 2010. Various launches competed with the iPad and there was need to have a clear definition or identity of simple tablet computer. A tablet computer either has a touch screen feature or permits use of a virtual keyboard or writing recognition.
The term Virtual computer first emerged from Microsoft and it is arguable that the first operating system incorporated on tablet PCs was from Microsoft. Today the PCs use various operating systems from different companies. The e-readers have fewer functions compared to those of a tablet PC, thus causing a bump up over their categorization as tablet PCs. Tablet PCs such as iPads have the e-reader features, therefore an iPad is an e-reader (Gookin, 20).
The low-powered iPads lack various common feature found in normal laptops and desktops especially some publication demanding features. They are thus easy to carry and handle but limit usage and thus cannot complete the tasks of a laptop or desktop effectively. The origin of tablet computers emerged due to the need for full-time access to various features.
The need included communication via e-mail, browsing, downloading, uploading, or data storage. Today there is a wide range of the tablet computers with different functions for different needs. According to Gookin (20), rating pricing as well as comparisons between tablet PCs depends on analysis of size (for portability), convenience, features and power.
Popularity of Tablet PCs
The tablet PCs are more popular among students and personnel in commerce industries due to the evident portability advantages over other earlier types of PCs. The tablet PCs are slightly bigger than the smart phones but slightly smaller than notebooks. The reduction of microprocessor size and establishment of better battery life span are the two main properties that determine improvement of a tablet PC.
Current tablet PCs have longer battery life, support handwriting features, wireless technology such as server access, enlarged memory and better screen resolution. The aim of future tablet producers such as HP Company is to establish a multi-tasking gadget that is able to support wider range of features or options for expanding usage.
In line with Books Llc (91), HP established a tablet PC to counter the high costs of iPad tablet PCs. The company today has one of the global best-selling tablets PC with equally favourable features such as flash players, a high-resolution touch screen, effective hard drive space, built-in stereo audio system, effective RAM, microphones and support of external memory such as support of Micro-SD or USB connectors for drives.
There is a clear indication that the tablet PCs are becoming better day-by-day because of their support of normal feature found in normal PCs such as laptops or desktops. A good example is the touchpad by HP that incorporates a built-in WI-FI feature to support faster access of internet files and compatible play-in features that support various video and audio files.
The tablet PCs are also competing for the ability to offer features that will win clients confidence such as pleasurable and easy to use touch screens. The assured convenience is a sure marketing strategy since it stimulates acquisition and usage.
For instance, would a client prefer a tablet PC that has a hand touch screen only or one with both the touch application and an allowance for digital stylus pen? Most tablets have slower hand writing speed than the typing speed and thus future PCs would be more appropriate if they allow additional external keyboards and mouse connections to facilitate user needs.
Future Predictions for Tablet PCs
The future of tablet PCs depends on ability to produce gadgets with more inbuilt features, more storage space and better portability. This will require a state of the art technology that will enhance ease of usage to combat existing computability and complexity involved in usage.
Probably the technological changes of chips will see the emergence of paper-size or virtual gadgets. We are getting to a stage where users will not need to worry about the struggles of keypad entry of data. The monitors will have higher resolutions that allow easier and faster digital manipulations. The easiness of usage and user-friendliness of the features will also be main determinants of sale and advancement of tablet PCs.
The battery life is another feature that will determine the generational differences of tablet PCs. The future gadgets will have longer spans and therefore users will have little to worry about the battery life during usage. The future technology will also allow adjustments to cater for customized handwritings. The users will be in a position to have input in form of personal handwritten types, as an alternative to the user defined keyboarding input requirements.
The time required to put on the gadgets will also decrease meaning that the delay time will be reduced. The future tablet PCs will be paper-size gargets an indication of reduced overall weight for better portability. Like the smart phones majority of the current tablet PCs support different screen orientations, for instance the ability to adjust the orientation automatically between portrait to landscape setting and vice-versa for easier handling and comfortable operability.
Sales Charts of Tablets PCs
The year 2010 was non-contentious year for iPad from Apple since the company had a clear-cut sales record of approximately 3.3 million units within three months of its release, compared to other competing tablet PCs. It is still the reading seller with a rate of approximately 4.5 million units sold every quarter.
HP is also set to release its three tablet PCs and Motorola XOOM is causing blizzard and heated comparison debates. Other companies include LG and Samsung who are promising to avail irresistible offers on future Tablet PCs (Vermaat, 226).
The Motorola Xoom Vs iPad
Apple Company introduced its iPad 2 tablet personal computer in 2nd March 2010 in a launch that appeared like a war against Motorola XOOM, which had hit the market slightly earlier in later February. The iPad 2 tablet PC was launched in March 11 and Apple was therefore categorical to indicate their eagerness to have the best Tablet PC in the market (Vermaat, 226).
The users are today seeing various marketing adverts from both companies and it is a clear indication that future gadgets will depend on what extra feature they offer their clients. Is the extra feature important or just a marketing gimmick?
There are some critical features a user may consider when comparing what is on offer today and what will be in future. First are the specifications of the hardware. The hardware mainly concerns the physical representation of the PC. Secondly, the user must determine the usability in terms of what the new gadget offers, mainly the applications and software offers for the user. Marketers are keen to interpret what users want on their future tablet PCs and how they interpret the current hardware as well as software applications.
According to Vermaat (226), the differences of the operating systems are also properties that future developments will have to consider. Currently, iPad uses the Apples Operating System (iSO) as used in various smart iPhones. On the other hand, the most recent Motorola XOOM a competitor of iPad uses the Android 3.0 software also referred to as the Honeycomb, which is customized for the tablet versions of PCs and other iphones.
The Android 3.0 software is arguably more complex and rigid for PCs since there is need for users to have flexibility during applications and therefore Apples iPad is more applauded due to simplicity tricky and instinctive operation system software, over Motorolas XOOM. This means that software sells hardware and future manufacturers will need to consider the type of software to implement.
Considering the current XOOM and iPad as examples of the latest tablet PCs, one would easily settle for the Motorola XOOM due to its specifications such as higher screen resolutions, better and wider screen displays as opposed to the iPads displays. IPad screen views have black bars at the top and bottom of the screen during wide-screen viewing. The future tablet PCs will need to increase the processor speed from the current dual core to core-two dual processors, like the current desktops and laptops.
The Motorola XOOM tablet has various extra features such as the inbuilt stereo system, HDMI high definition video output without requirement for extra connections and provision for USB port connections. The cameras of the Motorola XOOM are also of higher resolution count compared to those of iPad 2. These features make the Motorola more superior and a possible future preference compared to other similar tablets from potential competitors.
The future Tablet PCs must be able to offer 4G inbuilt cards and options of upgrading the software to latest technologies. The compatibility with other common software such as printer software is equally essential. Although the appearance of iPad is more appealing such as better and thinner look compared to the potential competitors such as Motorola, the application features are thinner in terms of applications, than those in competitors products are.
The trade name is a clear marketing feature for the Tablet PC products and Apple has better advantage over competitors due to well established trademark in the PC industry; nevertheless, the offers the definitely below future expectations.
Having application is important but having support of the developers is an even greater future advantage. The iPad has been in market for over a year and the developers have had a chance to incorporate various applications, majority of which are in use on various iPhones. Competitors of iPads such as the Motorola XOOM and HP touchpad are at the verge of forming a strong establishment in the industry.
Although Apples selection of software for its Tablet PCs dwarfs the competitors efforts to incorporate similar or better software, Apple has not been able to form a better future establishment due to failure to incorporate vital software like the flash. XOOM uses flash while iPad does not.
Considering the current multimedia requirements, majority of the web features will need to run on flash applications. Future user-requirement will make Tablets with features such as those of an XOOM more superior than the competitors will. Long-term considerations therefore indicate that expandability will overrule current simplicity functions.
The XOOM definitely have better long-term offers compared to iPad for instance offer of higher specifications like the 4G technology and flash features. The future demands will strongly be bases on the ability to incorporate a wider variety of software (OReilly, 29). This means that considering the above status, XOOM is a more preferable future Tablet PC.
Current iPad tablet PCs lack features to enable future upgrade options such as change of 3G to 4G technology or failure to incorporate the USB connectors for easier compatibility of various devises such as external hard drives/storage devices. The need to cater for future expansion is important because such allowances cater for the future other than the present needs.
XOOM users are currently surfing the web at 4G speeds while the iPad 2 users will have to wait for the establishment of an iPad 3 that will offer better surfing speeds and probably expansion abilities to cater for extra external storage. A good technological device for the future incorporates some of the future requirements other than forcing users into new purchases whenever they require an upgrade.
The Tablet PCs are meant for gaming, audio and visual plays. Any of the future devices should therefore incorporate the stereo options even on external speakers. The current market price of 32 GB 4G XOOM is $71 higher than the same 32 GB 3G Ipad 2.
This means that it is wiser to purchase an XOOM due to the extra applications and features now, than wait to by another iPad 3 that will run at 4G speed in future at approximately $500. The appearance might be stylish and the company name might be big due to earlier establishments in the industries or the reputable history, but this may be deceiving for future prospectors.
HP multi-touch Tablet PC
The new-looking HP multi-touch Tablet PC that will be launched soon has features meant for the near future. The support of multiple touch signals ability to accelerate the visual displays through the use of an accelerometer, detection of user position to adjust its orientation to automatically suite usage and the use of the attest Microsoft operating system; window 7, makes the devise more superior over potential competitors (McNamara, 19).
Other current establishments are the incorporation of notebooks and tablet PCs features, such as the hybrid Ideapad U1 that has a detachable touch screen acting like a tablet on its own. The notebook also runs on a core-2-duo processor based on a storage space of 128 GB and provides keyboard and mouse features as well. The standalone Tablet PC however runs on Linux platform powers by an inbuilt 16 GB memory and 1GHZ processor. The base of the tablet also functions as a 3G wireless hub to ensure constant internet connection.
Most of these future smart personal computers will be able to support multi-tasking such as audio playback as well as net surfing. Although these devices are presenting a spackle in the technology industries, most users are still wondering when they will get a device that incorporates all the required needs. The devices offer fairly new and unique features different from each other due to need for competitions, but there is lack of a tablet PC that will offer all these features without fluctuations.
There is a misunderstanding over preferences and standard requirements. People will prefer to have full and speedy internet connections wherever whenever, but they are forgetting that once in a while they also need, quality entertainment, editing, typing, formatting and printing a letter or other formal documents. Although the tablet PCs are called computers, none of the current offers has all this features. Future requirement will need a tablet PC that offers all requirements for less.
Conclusion
Today Tablet PCs, the PDAs, smart phones and notebooks/palmtops are constantly replacing the laptops. This evolution is due to peoples demands for something more portable.
Portability means thin, stylish, caters for touch facilities and is friendly especially for the social sites users who need to be fulltime browsers, regardless of place and time constrains. Future demands are however very specific. There is need for better portability than what laptops offer, better and dominant features than what notebooks offer and stronger user-comfort than what smart phones offer. The tablets PCs are having all this demands such as e-reader requirements and more versatile and user-friendly features.
The success of well-recognized brands like iPad 2 prompts immediate pessimism over sales of tablet PCs. The gadgets are mainly meant for entertainment since users are not ready or used to pointing at the screen all day long. It s also not possible to hold a chat while still enjoy a movie, thus some of the reasons that tablet PCs will not completely replace the notebooks and laptops.
Most users are also adapted to the mouse and keyboarding techniques. Although tablets may have stylish designs and designer looks, lack of ability to perform might be some of the reasons why the sales of iPads are far worse than Iphones. The performance of iPad in the market therefore depends on the cost and its stylish designs. The future economic performance of the tablet PCs will depend on changes that manufacturers will implement. These are technological developments, whose life span can only be judged by time.
Works Cited
Books Llc. Tablet Pc: Ipad, Joojoo, Comparison of Tablet Pcs, Microsoft Courier, Hp Touchsmart, Itablet, Adam Tablet, Hp Compaq Tc1100. New York, NY: General Books LLC, 2010. Press.
Gookin, Dan. Laptops for Dummies. Indiana, IN: Wiley Publishing, Inc. 2010. Press.
OReilly, Tim. Web 2.0: A Strategy Guide. California, CA: OReilly media Inc. 2008. Press.
Jacko, Julie. Human-Computer Interaction. Interacting in Various Applications Domains. Germany: Springer-Verlag Berlin Heidelberg. 2009. Press.
McNamara, Joel. Netbooks for Dummies. Indiana, IN: Wiley Publishing, Inc. 2009. Press.
Vermaat, Misty. E. Discovering Computers 2011-Introductory: Living in a Digital World. Boston, MA: Cengage Learning, 2010. Press.
A computer is an electronic machine that is vulnerable to many risks. The computer ought to be protected from risks such as viruses that may affect their normal functioning. In dealing with computer security, many scientists have come up with different ways of protecting a computer from unauthorized parties.
There are many technical areas of computer security but the main ones are initialized CIA. This initials stand for confidentiality, integrity and authentication. Confidentiality means that other unauthorized persons cannot access what is in the computer.
Integrity is used to mean that the information in the computer cannot be hacked or changed by unauthorized persons. Authentication is used to mean that the information in the computer is only available and accessible to the authorized parties (Seong 24). The main reason for enhancing computer security is protecting it from unauthorized persons who cause destructions to the computer system hence interfering with confidential information.
Another issue with computer security is privacy that is related to people who use the internet everyday and they are supposed to ensure that they protect their personal information from the websites they deal with. To ensure that these security systems are in work, some fault-tolerance methods are necessary as discussed below (Seong 83).
Discussion
Most of the software fault tolerance methods are advancements of the old hardware fault tolerance methods that were less effective in performance. Three software fault-tolerance methods are in use today as discussed (Bishop 45).
Recovery blocks
Randell developed the method in which an adjudicator is used to confirm the effects of a similar algorithm. The system using this method is broken down into small recoverable blocks that build up the entire computer security system.
Each of the small blocks is connected alongside primary, secondary and tertiary case codes, which are just next to the adjudicator. According to Seong, the adjudicator is used to show the effectiveness of the various blocks and incase the primary block fails, then it rolls backs the state of the system and tries to fix the secondary block (76). In case of failure of a block, then it reveals that the block is not worthy for use.
N-version software
This method works parallel to the traditional N-version hardware. In this method, there are different models that are made up of N different implementations. Each of the variants/ models returns its results after performing any action.
It is from these results that the effectiveness of the modules is determined and then the correct ones can be known. This method is more effective as it can include hardware using multiple versions of software and the results are correct (Bishop 27).
Self-checking software
This method is rarely used compared to the previous methods. It includes extra checks that are set at some checking points. Some rollback recovery methods are also installed in the computer security system. In self-checking, the correct codes are obtained and then used. This method is however not effective because it lacks rigor (Seong 98).
Conclusion
The methods used to create fault computer systems have never been 100 percent effective. They are faced with some failures and most of them are 60-90 percent effective.
This means that more research needs to be done to come up with very effective and reliable methods. In addition, the methods are very expensive to execute hence the next generation must come up with cost-effective methods.
Works Cited
Bishop, Matt. Computer security: art and science. New York: Addison-Wesley Professional, 2003.
Seong. H. Poong. Reliability and risk issues in large-scale safety-critical digital control systems. Washington, DC: Springer, 2009. Print.
Computer security is a crucial concept in ensuring organizational performance and efficiency and effectiveness in service delivery. This is so, especially since the application of technology in delivering services is now a basic need to any organization that desires to compete favorably in the market economy, given the rise and move towards globalization (Conklin, 2010).
Data and network security form part of the foremost computer security concern in most organizations. This includes both asymmetric and asymmetric method of ensuring the maintenance and establishment of security. However, deciding between these two types of computer security is a substantial problem that most organizations are facing.
Introduction
In deciding which among the two is suitable for use in ABC, an analysis of the two is necessary. Researchers say public key cryptography is more secure than the private key cryptography, but others dispute this view as being so much biased. In examining the extent of their use, none of the two is more popular than the other, but both apply to their suiting situations and to which their unique benefits pertain (Conklin, 2010).
Asymmetric and Symmetric Cryptography
Asymmetric key algorithms are well known for their use in public key cryptography given their mathematical relationships and links. This also entails the use of keys, where someone ensures that the information is encrypted so that they are in the cipher text. This key is well known for its confidentiality capability and its support for digital signatures used in ensuring authentication and reducing issues of contradictions.
Convenience associated with asymmetric cryptography forms its greatest advantage and makes it a better choice. This is as a result of the fact that public keys are readily available for use by any interested party. Authenticity, validity, and accountability issues are also addressed and effected by use of this method adding up to its strengths.
On another perspective, this method has some limitations. Key among them all is the need to authenticate them and their slow nature. Asymmetric keys are also hard to replace once lost, are too much compromising on most security issues and require so many computer resources to function effectively (Stallings, 2011).
On the other hand, symmetric key cryptography is a situation where only one key is used both in encrypting and decrypting. This comes with a challenge to key management if the keys are to be used effectively and securely. This cryptography is also known as private key cryptography or one- key cryptography. This encryption is easier and faster to implement and use as it is less complex especially when the files are managed by one person. It also uses minimal resources, and in the event of a security compromise, only one set of communication is affected while the rest remains secure (Stallings, 2011).
However, there are some limitations associated with the use of this method for security of data and networks. Ensuring the key remains a secret and unknown to people who should not access it is a leading limitation, followed by the need to have many keys for all the communications that are to be made. It is also a challenge to verify how much authentic a message is since both parties use the same key.
Conclusion
Having discussed the two possible methods of ensuring security of information in ABC is maintained, use of asymmetric key algorithms is seen as the best solution to their situation. This is true after considering how confidential their data is and the fact that the keys will be accessed by multiple people legible to access to and use of information. It is a somehow public institute that has many users, ranging from the internal users to other third party stakeholders (Conklin, 2010).
References
Conklin, W. A. (2010). Principles of computer security: CompTIA security+ and beyond (2nd ed.). New York: McGraw-Hill.
Stallings, W. (2011). Cryptography and network security: principles and practice (5th ed.). Boston: Prentice Hall.
The computer has in the last few years become indispensable to humans in performing a whole lot of functions with convenience and speed that could not be imagined before computers became affordable and a household name for almost everybody in the modern world. Computers allow us to shop online, play interesting games with people, and work from home in regard to several personal and official functions. Large amounts of information can be stored in the computer that is instantly available with the click of the mouse, which enables the ordering and tracking of resources in a very convenient and fast manner. Computers allow people to interact with each other and to conduct meetings from different locations for business purposes. Businesses use computers in conducting their financial and accounting work with speed and accuracy, most of which was previously done manually by office workers with possibilities of human error that could cause a setback to the predictions of company objectives which were based on such data. Computers are a big asset in enabling education by way of the internet, allowing access to thousands of options to extract relevant research material as relevant to the subject of study. It also allows colleagues to interact with one another to enhance learning experiences and to come to required conclusions. People across the world can communicate with each other with convenience and without any high cost. The internet is the biggest asset for the common man in benefiting from the use of computers, while it is an excellent means of entertainment in providing a wide array of choices in choosing the modes of entertainment which are readily available (Joshua Givens 2008). Indeed man has become extensively dependent on the computer for meeting his needs for several of his requirements, and life without is absolutely unimaginable.
The extent to which we have got addicted to the computer is evident from the fact that a few years back we had difficulty in picking up the phone and calling someone without assistance from an operator. Parents whose children were studying away from home used to send them letters by post or telegrams for urgent work, much in contrast to the instant messages and emails that are used today. Indeed we have travelled a great distance with the technological advancements that are the order of the day in todays world. It is impossible for the average urban citizen to do a single day without using a computer, mobile phone, printer or fax machine. People in all circles of life have now started to wonder whether it is appropriate and a healthy practice for mankind to continue becoming so severely dependent on advanced technology of this kind which may put us all in extreme jeopardy if one day the entire computer technology failed and vanished. This would entail severe negative consequences in creating a vacuum for all human roles and ways of doing things. Agreed this is a purely illusionary thought, but it is essential to ponder over the issue in the light of our over-dependence on computers.
There is no doubt about the fact that computers are now an indispensable part of our lives that affect us at home and office. It is now feared by psychologists and sociologists that if such a pattern continues, the day is not far when our minds will lose their original capabilities in being creative in view of their tasks being now performed by computers. Computers are now capable of performing jobs that were being done by workers in factories, and there seems to be no end to the additional jobs that computers will undertake in the future, thus rendering human labour and brain to lesser utility value and reducing human role to be increasingly limited to lesser functions. With the overuse of computers, especially in the 21st century, there has come to be a difference between users of computers who use them for work that truly facilitates the work and those who have in fact become addicted to them to such an extent that they just cannot do without them. It is observed that often there is compulsive overuse of computers in staying glued to them for the sake of convenience to avoid effort in using other physical and mental means (Shotton M A, 1989).
Indeed, the catching on with the internet and related services by more and more people and the increasing dependence on convenience that is enabled by using practices such as e-trading, e-shopping, e-therapy and several other services that are e-enabled, is making more and more people savour the excessive convenience enabled by these services. Due to the proliferation of such services, concerns have started to arise whether humans need to interact with each other in pursuance of their goals for getting information and assistance since the internet can provide almost everything and consequently, there is no evident need to relate with people. In this context, there would soon be a time when newspapers will become obsolete because better news services are available on the internet. Most entertainment establishments would have to close down in view of the vast choice of entertainment available online, and the huge plethora of information material available on the internet is so exhaustive that people consider its size to be incomprehensible. The threat of the internet has now become so strong that sociologists have come to believe that it may adversely impact the religious, moral and ethical value systems of the coming generations. Some theorists have started predicting what may be unimaginable for some, but they say that if there is no control and reduction in such excessive dependence on technology, it may soon gain control over the human race. Indeed a far fetched observation, but it does indicate the extent to which we have become over-dependent on technology in our daily lives. We need to contemplate over the issue in that our brain will be required to work lesser and consequently; we may soon reduce the potential of our mental faculties to achieve the wonders that mankind has achieved so far by sheer dint of the power of the brain.
It is believed by many that the increasing dependence on information as taken from the internet and the overdependence on e-books for academic purposes will eventually erode the importance of literary works, and the overall standard of literacy will begin to decline steadily in due course because the regular printed academic books will become scarce in view of their reduced popularity. In such a situation, book stores and public libraries will begin to vanish, and considering the situation that in furtherance to such developments, the printing of textbooks and other literary works may not prove to be commercially viable (Manali Oak 2008). In this context, as a consequence of high dependence on the internet, if there is a crash in the entire internet system, the situation will become deplorable. There would be very scarce means for education available, and people will have a lot of difficulty in getting access to information and knowledge. We surely cannot imagine a world without books and knowledge material. The message is clear that there should not be too much dependence on computers.
The fact remains that it was the human brain that invented the computer, and subsequent innovations that have led to the present state of affairs is making us over-dependent on such technology. There is no doubt that technology has played a vital role in the betterment of our circumstances and in the improvement in quality of life, and we will continue to do so. It does have a profound and vital effect on mankind in making society and the human race much advanced in meeting the goals of betterment and development (Todd Ayers 2008). But the high rate of such acceleration should not be allowed to erode the basic foundation in terms of adversely impacting human capabilities of thinking, creativity and communication. The development and use of advanced technology have to be balanced so that it is in keeping with the need for humans to interact and correspond with one another and continue to maintain their capabilities in the furtherance of the improved quality of the human race. We have to be in control in all situations and not allow our own creations to dominate over us in making us mere puppets in the hands of such technologies. We must retain and maintain our ideologies and individuality in keeping the use of technology as a separate identity for facilitating our tasks and not for making us a slave of them. We need to understand that technology is our dominion, and it cannot claim to have dominion over us.
References
Alfred Lewis, New World of Computers, 1965, Dodd Mead, New York
David Williamson Shaffer, How Computer Games Help Children learn, 2008, Palgrave Macmillan
Eric Filiol, Computer Viruses: from theory to applications, 2005, Springer
Importance of Computers Stressed, 2005, The Hindu
Joshua Givens, The Increasing Human Dependence on Computers, 2008.
Katie Kashmanian, The Impact of Computers on Schools, 2000, The Technology Source Archives, University of North Carolina
Manali Oak, Importance of Computer education, 2008.
Paul N Edwards, From Impact to Social Process: Computers in Society and Culture, Handbook of Science and Technology Studies, 1994, Sage Publications, Beverley Hills
Shotton M A, Computer Addiction? A study of computer dependency. 1989 New York, Taylor & Francis.
Todd Ayers, Importance of computers.
Vladimir Vapnik, Estimation of Dependences Based on Empirical Data: Empirical Inference Science, 2006, Springer
Information security has three basic attributes viz., Availability, Confidentiality, and Integrity, and the effectiveness of computer security policies depend on the efficacy of the methods by which these three attributes are sought to be implemented and/or strengthened. Cybersecurity policies require the formulation and implementation of security access control models like the Bell-LaPadula (Bell, D.E. and LaPadula, L.J, 1973) and the Biba, (Biba, K.J.,1977) to successfully ensure availability, integrity, and confidentiality of information flows via network access.
In addition, modeling for computer security is based upon some fundamental principles like the Principle of Defense in Depth. This brief paper outlines the fundamental principles governing the Bell-LaPadula and Biba Security Access Control Models as also examines the defense in depth principle
Computer Security Attributes and Computer Security Models
Computer security access control modeling takes into consideration basic information security attributes of availability, confidentiality, and integrity. In other words, the purpose of a computer security access model is to help prevent unauthorized alteration (Integrity), disclosure (Confidentiality) and to a lesser extent, loss of access to computer resources and data (Availability). Depending on requirements by the government and public corporations doing business, a variety of models have been developed over the years. Some well-known ones are the Bell-LaPadula (1973) and the Biba (1977).
Others are Clark-Wilson, Brewer and Nash, Graham-Denning, etc. All these have been developed to address specific issues like ensuring information availability, confidentiality, and/or integrity. Based on how the models define relationships amongst subjects, objects, permissions, and operations access control models may be classified as Discretionary Access Model, DAC, Mandatory Access Model, MAC or Role-Based Access Control Model, RBAC (Ferraiolo, D.F., Kuhn, R., and Chandramouli, R., 2003).
The Bell-LaPadula Computer Access Control Model is a Static Machine Model developed in 1973 for analyzing MLS operating systems. In this model, the ordering of information is based on various security levels and a security matrix through which permissions are defined and the flow of information from a higher level is governed by the Discretionary Security, the Simple Security, and the Star Properties. Clearances are given to users and objects are classified as per given rules.
The advantage is that system security can be easily checked by using BLP Model and its state machine model characteristics can be applied for other attributes like integrity, However, the model contains covert channels, is meant for static security levels, and its functionality of system testing is restricted to checking confidentiality.
The Biba model was developed in 1977 for ensuring the integrity of computer systems. In addition to maintaining data consistency, the model also restricts the unauthorized alteration of data and computer resources (Bishop, 2003). It has a strict restrictive integrity property which is the exact opposite of the Bell-LaPadula Model property. There are three conditions in which this property operates, viz., a simple integrity condition in which no reading down is enforced, the star integrity property which enforces no write up and the invocation property in which the subject may invoke another with lower integrity level (Balon, N., and Thabet, I., 2004). While the model has numerous dynamic policies, it has its disadvantages; it does not support the granting and revocation of authorizations nor is it able to enforce confidentiality
The Principle of Defense in Depth
The principle is one of the key contributions of the US military which developed it for ensuring that the defense is hidden from attackers and has ample time and opportunity to respond to their (adversaries) attacks. In information security, this implies a layered security approach to modeling computer architecture and invariably envisions multi-layered security levels for defense. For example, we can develop two firewalls (one internal layer and another outside) as a more effective defense mechanism against cyber attacks instead of relying on a single firewall. Essentially, use is made of multiple layers of security as also the application of technologies at each layer that complements one another (Pereira, J.P., 2004).
Four sub-principles are envisioned in implementing the defense in depth principle to computer systems; the network infrastructure is distributed to broad base security application, multiple and parallel layers of security are built up, support infrastructure is strengthened, and data mining and data analysis of security events is continuously done to help evolve more effective and foolproof security systems. Examples of a few multiple layers of defense using various controls may be given as follows:
Applications Layer: This may include validity controls for data entry and processing, host and network controls for guarding against possible flaws in software applications, etc
Physical layer: The related controls help protect the organizational assets against physical threats and the assets include entire physical systems like computers, UPS, routers, switches, etc
Distribution Layer: Two defense controls may be the usage of trusted software & distribution and the application of run-time integrity controls
Conclusion
The topic of computer security is too vast to warrant a comprehensive description in a few pages of text. The security control models described above have their merits and demerits and their actual selection for any particular computer system architecture depends on the end-use, complexity, and purpose of the same. However, the technology landscape is changing very fast and it may not be long before more innovative and fool-proof IS systems are developed to effectively tackle the growing incidences and variety of computer security violations
References
Balon, N., and Thabet, I., 2004, Biba Security Model Comparison.
Bell, D.E. and LaPadula, L.J, 1973 A mathematical model, Technical report esd-tr-278, vol. 2, The Mitre Corporation, Bedford.
Biba, K.J., 1977, Integrity considerations for secure computer systems. Technical report tr-3153, The Mitre Corporation, Bedford.
Bishop, M., 2003, Computer Security: Art and Science, Addison Wesley, Boston, MA
Defense in Depth, Design Notes, Wilson, M., 2001, Decision Support Systems Inc. Web.
Eydt, B., Security Models and Architecture, CISSP Exam Preparation Guide.
Ferraiolo, D.F., Kuhn, R., and Chandramouli, R., 2003.
The computers at our organization have been giving us problems, the problems we have been experiencing with our computers have made us to look for a solution and we had to look for a better computer model. There are a number of things I had to consider when deciding on which model to purchase. I have taken into account the practicality of usage of the computers, durability, attractiveness, maintenance services and the worldwide reputations as well. I finally decided on the Dell because it has a good temperature control system and virus security which is excellent for the work our organization is involved in.
Introduction
In a company which employs many people, there a number of issues which affect the performance of the workers and therefore contribute towards improving the morale of the employees for the job they may be doing. Apart from the salaries they are given, the other factors that affects the employees performance is the work condition. This may be in terms of the equipment they use for the job, that is how efficient, effective, how good are they for doing the job. Currently in our department we have been using some computers which have had problems of overheating and shutting down anyhow. This problem of overheating has really taken away our morale due to the many problems this usually cause for us as we usually lose data when this happens. This made me to look into and compare the different models of computers which can be good for the kind of work we do. I did this by making comparisons of features of the models from different manufacturers.
The main Factors that I considered when looking for the models to buy are:
After going through the websites of different computer manufacturers and sending enquiries as to the features of their computers, I decided to pick on Dell (XPS ONE) due to:
Practicality of computer- The Apple, though uses a different operating system from windows and is not so wisely used, and the users would need new training to use it, has proven to be more user friendly. Dell, like HP use the popular windows. Apart from this, Apples and Dells security against viruses is much better. This is excellent for the company.
Computers Longevity and aesthetics the Dell is a long lasting and strong computer. Its monitor and Central Processing Unit comes in various sleek attractive shapes and colors.
Service Availability- it is easy to get the replaceable parts for it since it is very popular. Apart from this there is excellent customer service hotline, online services, remote diagnostics and online customer feedback base.
Reputation- Dell and Apple computers have a solid international reputation. This has been built due to the excellent services they give their customers.
Costs- in comparison to the costs of the other computers in terms of purchase and transport to our premises, the software and hardware update, Apple will cost the company more than the other computers, followed by Dell. This is due to its excellent features.
Conclusions and Recommendations
After comparing all the computers, I found out that some customers have been dissatisfied with the HP computer even though it has a very low price. Considering that our work is very important, we would not want to reduce its quality and efficiency so we would not risk anything with the HP. The Dell and the Apple on the other on the other hand basically have similar qualities and capabilities. The deciding factor therefore is the cost. Apple is more expensive than Dell and since we need many computers, I think it will be better to purchase the Dell (XPS ONE) because it has good virus protection and excellent temperature control which are perfect qualities for long hours office use.
The report is based on the report already presented by the customer.