When the internet is down, it becomes slow to access personal documents and social information that I find critical and beneficial. Most of my social media and official or work platforms rely on the internet. Illustratively, it becomes difficult to reach personal emails and other official arenas such as class updates from the websites. As a result, a slow internet means that my official and social life would be slowed down to some extent and degree. In the conventional society, it becomes critical and dire to use the internet not only to balance official communications but also personal lives. If the internet had not been invented it would have been impossible to share and communicate with the various friends in the online spaces. The web has also enabled me to share and receive information at a fast speed without which our lives would be limited to our geographical areas. As such, social media platforms that allow people to connect and share would not have been possible and tenable. In all aspects and considerations, there are many avenues of sharing and connecting that have been enabled by the presence of the internet.
My personal gadgets and devices such as cell phones and personal computers are dependent on the internet for convenience and communication or connectivity. In the modern society, it is easy and convenient for people to share information with one another using the online platforms. It has become some form of reliance and utmost dependence because my lifestyle is reliant on daily information and visitation on the webs. For instance, breaking news and quick information reaches the social media platforms faster than they reach the mainstream media outlets. As such I easily rely on the social media platforms to receive the news updates and also engage other people on the issues of interest to the society and globe by extension.
i. Cell Phone
iv. CCTV cameras
v. Digital camera
2. i. Communication with others such as through emails and messaging. Similarly, I relate and contact other people such as classmates through the use of the internet
ii. It is a platform where I shop by placing orders through web-based markets such as Amazon and eBay. It is convenient and cheaper to buy commodities from the online based markets such as Amazon because they do home deliveries.
iii. Bookings such as events and other entertainment cycles. It is easier to buy tickets and appointments because most companies have launched their online platforms hence making it easier to make bookings.
iv. Online banking services such as account and balance inquiries. I find it easier to monitor my financial information from home or any other place of my convenience through the Internet.
v. I also freelance because I search for work opportunities through the online and internet platforms. I have a passion for working with some of the leading Information Technology firms in the world. Most of them place vacancies and openings in their websites hence internet allows me to access some of the existing vacancies and career openings.
3. I use the social media to connect and share information with friends. Additionally, I make friends and keep in touch with people from other parts of the world. In essence, I also find it beneficial to find people who share similar interests with me such as students from other institutions of learning. In brief, the social media has made my communication and interaction modalities easier and convenient. Also, I get updates on happenings from the world instantly because of the ease of information flow. In essence, the social media platforms are my first stop shop for breaking news and information updates.
4. I employ a combination of measures such as antiviruses and firewalls to keep my Personal Computer safe. It is necessary for me because I access online files that might be laced with suspicious wares that may affect the safety of my computer.
5. Web-based emails are internet accounts that companies use to verify and access information about their clients. It requires some special privileges such as official clearance for a person to be allowed to access the web-based emails. The email client, on the other hand, is an account that is held and opened from multiple sources. As long as one has the internet connection, he or she would have the chance to access the accounts. A practical case and instance, if the Yahoo and Gmail platforms of clients.
In generally learned the modalities of the internet and social media platforms. In principle, I got to appreciate the place of the social media to the people in the human society. In essence, the internet is a global network that interlinks computers and mobile device on the same grid. The FTP refers to the File Transfer Protocol that links a user such as a client to the main server on the same grid of network. As such it is a server-client model. The Web on the other hand is a string of interconnected files or elements.
The internet has made my research and academic life easier, faster and convenient. Further, it has enabled me to access various databases of academic materials at an instant instead of going through dense manual or physical books. I must also admit that it has advanced my social life because I meet and interact with interesting people online on a regular basis. Intuitively, it would have been difficult or impossible to establish the kind of social links and friendships that I enjoy without the presence of the internet.
Email has enabled the interlink of information between two parties such as school and student or clients and businesses faster. It is also less strenuous or cumbersome as opposed to mail that would take days to deliver or reach their intended destinations.
Google is my favorites search engine because it is popular and easy to use. Also, it has colorful features that illuminate the experience of a user during data and information search.
Amazon, eBay and PayPal because they have they own domains and entry portals that ensure that the privacy and dignity of the user are respected and maintained. Social media websites do not have the same security and privacy features and also require one to log in through special social media platforms such as Facebook.
The Internet is a global network that accessed by anybody from any part of the world while the intranet is a private grid for specific people such as within an organization. There are firewalls and clearance codes such as passwords in the intranet, unlike the internet.
Cloud computing is a remote server that hosts, processes and manages data on behalf of another firm or company.
The Capstone Project was critical to confirm that the internet is a critical component of the human society. In the conventional society and timeframe, it has changed the outlook of humanity. Specifically, the way through which people communicate and interact or do business has also been shaped and changed. People relate and interact with other without necessarily being in the same geographical location and space. As a result, it would be easier to find people who are in other spaces which share similar interests and capabilities or talents. The uniqueness of the internet is also a manner and way of life. All things in the modern society such as shopping have also been revolutionized and changed through the internet and its accompanying applications and features. As a result, all businesses and markets have become points of engagement and interaction because people receive and share information on the changes that occur all over the world. The baseline is that the internet is a new invention that has changed the way of life and culture of the world on how things work.
There are many inventions in the internet and online spectrums. It thus becomes critical to understand and define the way through which a person would articulate the web and online situations. It is also my respectful and humble outlook and opinion that there other relatable creations and inventions that have mushroomed from the main internet creations. In essence, is become better and positive to the world and society. A practical case and sense are the cloud computing services that have been developed from the basic tenet of the internet. As such there is a possibility that the future of the internet arenas and spectrums would be advanced and technical than it is in the current state and situation.
i. Operating System for instance Windows 10 is the engine of all computers and digital devices. Additionally, it is easily configurable to other hardware hence it is a multipurpose operating system. As a result, acquiring an original key and genuine operating system would be beneficial because it would assist in other systems of mobile devices. It is critical to mention that it has an application store that are convenient and configurable with various devices. Due to its high functionality, Windows 10 operations system is essential for all-purpose devices and digital gadgets such as computers and mobile phones. For an original key it and subsequent installation including repairs and maintenance during its lifetime it should cost an approximate price of $200. Another reason as to why the Windows 10 operating system is a proper software and cannot escape attention is its security feature. In effect, the operating system comes with an inbuilt complete system program that would protect and safeguard the digital device and gadget against malicious ware. It is imperative to articulate that an operating system must be fixed with other protective gears and applications that would be leased or purchased by the seller from other developers and companies. Illustratively, the cloud services are leased from other developers whose programs are configurable with the Windows 10 operating system.
ii. Antivirus such as McAfee is a systems security software that checks, detects and cleans any malicious programs or viruses. McAfee regularly updates itself and alternates to blend with the improvements in the malicious programs. It goes without saying that hackers and cybercriminals are constantly reviewing their style and penetration codes. As a result, it would require a different version of improved security software and program that would detect and manage such sleekness. McAfee self-updates even without the internet and is able to renew its versions to the latest development. The intention is to be updated with the latest spyware and viruses that may affect the functionality of a computer or any other digital device, gadget and systems. A complete version of the McAfee antivirus would cost approximately $200, and it would be usable by more than one person. Hence, it can be installed into the mainframe of a server or office computer systems and allow multiples computers to be protected from the dangers of hackings. It is important and critical to note and mention that McAfee is one of the latest software to enter the market and has the high degree of efficiency. Unlike other antiviruses, it has a longer shelf-life and can be used by many computers at the same level of efficiency.
iii. Software database such as the Structured Query Language (SQL) that focuses on the relational techniques and tenets. In the modern society management of datasets is critical because of the delicacy of information and data. It is imperative to mention that management and storage of information is a daily need and situation. All aspects of business and social life rely on the efficacy and efficiency of databases. As a result, it is practically impossible to overemphasize the essence and relevance of the database. In order to install a fully functional program, it should cost roughly $200. A business must appreciate and value SQL database because it would be beneficial to separate datasets based on their relevance and essence. For instance, the invoice of suppliers can be separated from the list of clients hence give the business an easy time and convenient operating environment. Specifically, the database software would be intuitive and important to use in the business angles and situations. Murky and unorganized databases or datasets translate to inconvenience and chaotic office environment of operations. Thus, the database SQL software would be installed into the mainframe of a server and a computer system for subsequent use by many officers and data analysts in an organization.
iv. Graphics program such as Adobe Photoshop is an important design software necessary for both social or personal and official aspects and areas. On a personal level, I would use the Adobe Photoshop to design postcards and make cosmetic videos and other artistic drawings and features. Being a lover of social media and the fun in the webs, it becomes critical that one must maintain some semblance and hype. To create funny videos and inspirational artworks or pieces such as pictures the software would be important to crop out and edit images to fit the social realities of different times. As such, I would use the software to build and grow a huge social media following that would assist me to become relevant in the social media cycles. Professionally, I would use it develop my brand as an online freelancer. Intuitively, the features embedded in the software Adobe Photoshop have innate abilities and characteristics that would model some of my artistic creations. Hence, I would prefer to use it to shape my professional brand and image. A fully functional and ensures Adobe Photoshop software that can fit an office organization would cost $200. This is because the generic feature of the software would ensure that more people can use it effectively and efficiently.
v. Internet Browser such as Google Chrome is and search engine host that allows users to access information from multiple datasets and various databases online. In all aspects and fairness, an internet browser is beneficial and critical to search and peruse millions of databases. Everything or information is embedded in the webs. Searching information both professional and social requires an amiable browser that is flexible and easy to maneuver. As such to search all information and data requires a person a strong and configurable browser. Additionally, Google Chrome is installed with some security features that digitally sieves and searches or scans information in the webs. This is my first choice browser because it notifies the user of any suspicious data that might affect the functionality of a computer and the applications or software that come with them. Likewise, Google Chrome allows a user to multitask and perform various functions at the same time without hanging. In retrospect, the functionality and performance of Google Chrome are expressive and critical. In essence, to fully purchase and install the browser such as Google Chrome it should cost $200 because it would require to integrate all the security and safety features that would blend with a wide mainframe of the information system of a computer and server.
Antivirus is a program or software that has been designed to destroy and detect any suspicious malware such as computer viruses. Productivity, on the other hand, refers to the mechanism and framework of a trade that documents, presents and designs databases and other digital videos. In essence, it focuses on the productive functionality of a computer and information system. System tools, on the other hand, refers to the whole elements such as disk defragmenter and disk checker that endeavor to maintain the functionality and effectiveness of a computer system. All these components tend to improve the functionality and efficiency or effectiveness of a computer system.
Ribbon UI and Tab both organizes the features of the page of a computer into a single slide that encompasses all the relatable elements into a single window and click. Similarly, both the Ribbon UI and the tab form part of an enhanced tips that give suggestions on some of the associated commands and the adjacent or subsequent keys that
An Antivirus is an application software that ensure the security of the digital device and gadget by tracking, detecting and monitoring against any suspicious wares such as viruses. Word Processor, Presentation software such as PowerPoint and Utility such as Disk Clean-up are part of the application programs. In principle, these are conventionally called the end-user programs because they tend to provide enhanced functionality and usability of the computers. In essence, this software and programs do not control the technical or architectural and mechanical functionality of a computer. But in its place, they offer increased level and degree of output and efficiency for the users. Implicitly, there are two main categorizations of the applications software that include the end-user programs such as those named above herein. Additionally, there are others such as the system software that improve the output and efficiency of the mechanical and technical abilities of a computer.
1. i. Components- Central Processing Unit, Memory, Hard Drive Space, Video Requirements, HD, USB, Optical Drive, any specialty items you may require for what you do.
ii. Uses. What will you be using the computer for?
iii. Type of computer. Laptop, Desktop, Tablet
iv. The length of Service. How long do you expect your computer to last you before you have to purchase a new one?
v. Price. This should focus on the financial ability and impetus of a user so that one would not exceed his or her budget.
2. I would expect to use the computer for my school work in the current time, but in future, I would prefer to convert it official work and commercial purposes. Besides, it also serves as my great asset of socialization because I can reach other people with similar interests and desires.
3. I need a laptop because it is portable and has greater functional features. Besides, I intend to move around with it from the library to different locations and chasing Wi-Fi network hotspots. Comparative to a tablet laptop is not fragile hence can withstand any mechanical knocks and shocks inevitable during the life of a student.
4. I intend to use it in the immediate to balance my studies and freelance jobs in the various online spaces. It is my respectful submission and line of thought that some of the features and software that I would install in the current time would be relevant in sessions and times to come. Thus, I would anticipate that some of the features and programs that I would use would still bear the same essence and relevance to me in the time to come or future.
There are various components of the system unit because these are the marginal elements of the computer. Mainly, the motherboard is the core part because it is the center and engine of all parts of a computer. Most elements are connected to it, and it varies in form and outlook such as MicroAtx and the ATX that is smaller in size and popular among the youths because it is smaller. Secondly, the processor is a form of integrates link, network or circuit that receives information that is coded for the purpose of execution. In the conventional sense, there is the pin-less process and one with pins. The Memory is another critical element and component of the system unit. Mainly it is referred to as the Random Access Memory or the RAM because it encompasses the data and programs.
Further, the hard drive is the main archival component an element for the system unit because it is the location where the information about the operating system is stored and managed. Also, data of applications, programs and other software including the security systems such as antivirus are also stored or kept. There are two types of hard drives namely the SAPI (Serial Attachment Packet Interface) and the PAPI (Parallel Attachment Packet Interface). Video card regulates the information observable on the monitor. Lastly, if the power supply that feeds power to both the PATA and SATA areas or connectors of a PC.
A laptop is a portable device suitable for movement and has high functionality. A desktop is a computer that in installed on a table or desk due to its heavy or big mechanical components such as CPU and speakers. On the other hand, a tablet is the smallest wireless digital computer in the shape and form of a cell phone. It has a relatively higher degree of functionality as opposed to the desktop but lower than an advanced laptop.
Input devices are any form of hardware or mechanical device that remits information to the system unit of a computer thereby allowing the user to control its applications through the subsequent interaction. In the common sphere the mouse and a keyboard are the main forms of input devices noticeable to the computer realms. An output device, on the other hand, refers to a mechanical element and component that send information from the processing unit of a computer to another external user of the device. Illustratively, the audio and visual messages that users receive are instances of data output that emanates from the systems of the systems unit. A practical case and instance include the printers, headphones, projectors, and monitors.
The term ergonomics in the simplest and basic form represents the study and consideration of the efficiency of people in areas of their work. It is to say that this concept measures and contextualizes the harmony that people have with their immediate work surrounding. Intuitively, the information system encompasses part of the work environment of people. In principle, computers and people form part of this complex or intricate network thus it becomes critical to reduce any conflict or disharmony that may exist. In effect, physical damage and mechanical insufficiencies would be avoided when the information system operates in ample ergonomic situation and environment. Therefore, it is imperative to delineate and separate the systems and create a fluent and peaceful or mutual environment of work. This would ensure and imply that people with the right and proper authorization would be allowed to access the information system. These would include technicians and Information Technology experts due to their skills and talents or abilities. Additionally, they have the critical knowledge to address technical and mechanical situations that might occur in the course of work and existence.
The input devices are the gadgets that transfer and put information to a computer and its mechanics. These may include the sensors, storage facilities and the parts that process data and information that might have been keyed in by the human operator. The primary function and component of an input device are that it is expressive to convert incoming digital data and signals whose codes are binary in nature to readable data for the system units. It implies that the codes must be understandable to the system units of the computer and allow the internal computations to appreciate and analyze such information and data. The output device, on the other hand, processes the information into consumable forms to the end user or a human operator.
The common examples of the input devices include the trackpads, joysticks, mouse and keyboard. On the other hand, the output features include the headphones, flow valves, monitors or screen and the laser printers. In brief, both the input and output devices process and analyze data into readable form either to the computers or the end users who are the people.
The outright difference is that input devices process readable data to the system unit of a computer while the output devices avail the consumable information to the end user such as the human operator. Similarly, input devices can relay a given set of information to another computer outlet without necessarily having the capability of receive the same information. Furthermore, the output devices can receive and process data from an external source, but it cannot send the same data to another device such as an external computer. As such, the guiding differences are on data processes to readable forms either to the systems units of a computer for the input devices and final end user such through screens for the output devices.
Green computing as a concept refers to the manner in which the computer facets are handled in an environmentally and ecosystem friendly modalities and outcomes. As a result, it also focuses on how to handle and dispose of the redundant features and wares so that they do not affect or harm the environment in any way or manner. In the same aspect and line of argument, this no9tion encompasses the approach and perspective of designing computer devices in a way the limits and greatly inhibits their chances of adverse environment impacts.
Mesa Community College can improve green computing modalities and aspects by improving teleconferencing services that would reduce the concentration of magnetic radiation in the institutions. As a result, it would be better when the main servers and concentration sites are dispersed from one area to online platforms or spaces. A practical case and instance is the online classes’ platform that reduces the number of people and students who would have otherwise concentrated their personal computers in the facility thereby increasing their magnetic radiations and emissions that are adverse to the environment.
Also, Mesa Community College can encourage and implement effective power saving mechanisms. Intuitively, it can reduce the reliance on electricity and focus more on solar power which is eco-friendly with no environmental side effect. As a suggestion, it should consider using cloud and virtual services frequently because it would decentralize the concentration of data smog and energy thereby reducing environmental degradation. Another argument and consideration that cannot escape attention is the composition and mechanical makeup of the hardware of the devices in use at Mesa Community College. The institution can purchase hardware materials that are laced with bio-degradable features so that when they become ineffective, they would decompose. Such a move would ensure that there would be no buildup of non-degradable metallic and computer waste that would adversely affect the environment.
The basic meaning and implication of a storage device is a form of hardware that retains information even when the computer or power source is off. This is different from other computer storage facilities and amenities such as random access memory (RAM). There are three types of storage devices that include the magnetic drive the optical drives and the solid state or flash devices. To begin with, the magnetic-based drives include the floppy disks, the magnetic tapes, and the hard disks. Secondly, the optical based drives encompass the DVD drives which may include the RW and RPM while the CD drives include the RW and ROM features. Additionally, the flash and solid states include the Micro SD cards and the Universal Server Bar (USB) intuitions in the recent past, cloud, and virtual storage facilities have gained prominence and relevance due to their high efficiency and effectiveness. All these storage devices vary in their functionality, portability, recency, features and compatibility with the modern trends. Illustratively, the floppy disks are almost extinct because other versions of storage were introduced.
Disk spaces determine the amount of information I store and access or use over a given period of time. This ranges from storing school work, movies and work data. It is my respectful and measured opinion that a big space of data storage is better. As such, I would opt for a single external hard drive than have multiple smaller capacity and storage devices. As a result, I would prefer a five hundred Giga Bites device such as a Universal Server Bar (USB) because it is smaller in size, portable and can fit or be used in various digital devices such as cellphones and computers. This is to say that the five hundred GB space would be sufficient to blend academic and official data as well as social information.
Attached in Excel Sheet-includes Pivot Table, Chart, and Correlational Analysis
Date are from hypothetical computation.
The term and concept of network in the simplest sense refer to a string and grid of connectivity. In the human realm, there are various networks of friendships and social bonds such as families and relatives. In brief, a network defines and shapes the identity of a person. The internet refers to a grid of international digital connection that links computers, digital devices and host servers across the world. The baseline required for internet connection is the permissible network that allows the links to be processed from one server to an end recipient or receiver. As a result, the internet provides the ample gateway and link of connecting various people across the world based regardless of their geographical location. The internet also assists me to advance my academic and social journeys or merits. Thus, I can balance both aspects of my life in a seamless and critical manner.
In the event that the network such as the internet stops or is ineffective then my life would be limited to the same geographical area and location. It would be strenuous and difficult to review academic information from online databases and instead use the dense physical books which would be cumbersome and tiresome. Additionally, it would be more expensive or costly to receive and pass information because social media has provided an avenue of easy and cheap communication. Thus, my phone bill would rise, and frequency of using manual mails would also double or rise.
Cables, Wireless hotspots, and Satellites are types of connection devices that link people over the internet and other spectrums or spheres. Cables may require some string such as a broadband modem to receive and remit signals of a network. The Wi-Fi or the wireless principle or tenet does not require or physical device or feature to connect and instead a person may link with a hotspot area of connection.
1. Types of IT jobs of interest to me include: Head of IT department in an organization, a Software developer or a data Administrator and Analyst.
2. Primarily, a dream job must have a good salary and favorable work engagement terms. This is to say that the prospective job opening must have realistic chances of progression and career growth. As a result, there must be adequate openings and chances or cases of progression from one job group or position to the next. In the same line of thought and argument, there should be room for diversification because technology is a dynamic career path. As an IT officer the job should bestow to me some degree of freehand to implement decisions in a structured and measured form.
3. Head of IT department is advantageous because the person in charge has the autonomy and authority to oversee the implementation of online programs and software. On the contrary, all the blame and responsibility would lie with the officer in the event of any breach, failure of weakness such as data theft or hacking. A software developer has the impetus to create something new and invent or innovate a program that might be a life changer in the digital world. The drawback is the constant threat from cyber criminals and hacker who lurk to destroy the codes created by the developer. Lastly, a data administrator helps in the orderliness of information set hence is a core member of the information system of any organization and department. The sensitivity of data makes it susceptible to attacks and breaches. Hence, there is a prospect of the data breach such as cyber-attacks that may affect the overall performance of an information system.
4. As such a job as a software developer would best fit me because it gives me a chance and opportunity to create new things and contributes to the addition of knowledge.
Ethics states the acceptable, moral and the legal framework for operations within the industry as such enables accountability and high degree or levels of professionalism to thrive. The code of ethics would ensure that all the practitioners in the industry would operate within the same sphere and rule. Thus, it would be easy to rip out any negative connotations and activities that may dent the moral and professional aptitude of practice.
Viruses and malware refer to set of computer codes that can replicate themselves and have an ability to corrupt data and computer system unit. Firewalls and security systems such as anti-viruses are important to check the presence of any malicious or suspicious codes. The primary role of the anti-virus software would be to detect and quarantine or erase any threats that such codes may pose not only to the computer system unit but also the efficiency of the programs and software put in place. Additionally, a user should not visit sites that are not securely encrypted. Also, one should only download files and information from ratified websites that have elaborate security features.
Ergonomics is the study of how person or a worker interacts with his or her immediate work environment. Thus, this concept helps a person to regulate and control or understand modalities and approaches of working fairly with computers. If a person disregards ergonomics, one may cause mechanical damage to a computer or any of its wares and devices or features thereby reducing its overall efficiency and output levels. Hence, ergonomics encourages human and computer harmony.
I would expect to use online payment systems such as PayPal and Payoneer to relate with clients in a convenient manner. I would expect to develop other efficient payment and interaction systems that would increase my contact point with clients. As a result, I would not only wish to use the payment system or technology but also interact with clients through live chat.
Organizational Information Flow in an organization refers to the seamless and meticulous movement of information from one channel or avenue to the next. There are various echelons of decision-making in any structured organization as such the movement of the information should also be designed to regulate the ideas of people and departments. There are various types of Organizational Information Flow namely the vertical mode and the horizontal perspective. To begin with, the vertical aspect focuses on the top-down and vice versa movement of information. For instance, the executive management and the top leaders within the business spectrum may pass and receive information from or to their juniors and people below their job description and pay grade. This may come in the form of orders, memos or general workplace directives. In the same line of thought and argument, people in the lower echelons of the work station may also pass information to their seniors through suggestions or complaints through their elected representatives in the labor unions and organizations.
Implicitly, the horizontal Organizational Information Flow refers to the situation where people or staff members of the same job rank and level share information across. It focuses on the sideways information flow from one area and department to the next. As such, the most common intuition is that the information shared or received would be in the form of suggestions or coordinating ideas. It is highly unlikely that such directives and information flow would be as orders or directives. Instead, it is the representation of ideas among peers and people in the same job echelon or rank.
Management Information Systems refers to a systemized or computerized set of information designed and set to articulate the actions of an organization or company. In principle, it is the care and attention extended to the efficient running of an information system that includes the humans and the computer systems. Decision Support Systems is a form or set of interlinked software and programs that assist in the analysis of data thereby improving and enhancing decision-making processes within the given organization. Executive Support Systems entails the information system and network that provides the management of an organization with the technical abilities to reach external and internal data concerning the running of an organization. In essence, it is used by the executive or the management. It goes without saying or mentioning that the executive component and top management of an organization relies on a higher technological spectrum with increased clearance to process information and make decisions efficiently and easily.
The VBA (Visual Basic for Applications) refers to a designated programming language of codes that create smaller functionalities so as to conduct specified functions within the wider application of Microsoft. It important to note and mention that a user can generate other functionalities such as charts from the listed commands that would edit to articulate the macro components. In brief, a user would have the chance or ability to customize their commands to suit the features and functionalities that they require. For instance, it can be blend with excel since VBA (Visual Basic for Applications) cannot exist on its own as a unique application.
Expressly, the VBA (Visual Basic for Applications) has a simple structure particularly the executable code. As such a user would have an easy and convenient time to manipulate and maneuver through the features of the application such as through the Excel spreadsheets. Also, the interface is interactive and presents commands that would be meticulous to use and analyze. A practical case and instance in this regard are that a user can debug, test and code a given information set easily. In the event that a person or user may require some technical assistance then the MDN (Microsoft Developer Network) has the inbuilt features that would assist a person to conveniently understand and appreciate the processes involved. Instinctively the VBA (Visual Basic for Applications) can be used as a source server for other applications to be developed such as the Active Server Pages (ASP). In this regard, it would be easier to create other interfaces for the end-users emanating from the same VBA (Visual Basic for Applications) server or source.
The field is an elementary part of a record in a database that contains a unit piece of data. It is subjective of the record. In the most basic representation, the fields appear as columns in a structured database. Essentially, a field helps to organize the data set into rational and stratified features that are similar and distinct or unique to one another. Records are house or harbor unit of the data in a given set of information. In principle, a record includes all the relevant information about a given set of features regarding a specific entity, item or person in a given set of the database. It is imperative to mention that records are the entirety of features and information contained that concerns a given entity or person. Table are the specific datasheets that hold data concerning different features but in the same component. Illustratively, a table may include various files about different traits but under the same component and framework.
Databases are useful in organizations because of the various roles and functions that they perform. Expressly, they are used as the dictionary of information or data because they define and give meaning to the codes they hold. Secondly, they serve as storage facilities and amenities where massive and enormous information is held and analyzed. Likewise, databases are critical in managing the integrity of information gathered. Similarly, security management is a clear and critical component that uses databases for its output and efficiency. For instance, this feature ensures that only specific people such as staff members with the clearance access information from a given set such as a company’s information.
A practical case and instance of online databases include the customer portals, job portals and attendance trackers. All these databases can be used by multiple people instantaneously or at the same time.
See the attached Access 2016 the same data from excel sheet translated to the Access database
The primary value of the systems development cycle is to develop a meticulous and continuous line of action that would safeguard the integrity and continuity of the project. The process is meticulous from the start to the end with no loops or weaknesses or shortcomings that would have otherwise stagnated the progress of the implementation. As such cycle include Planning, analysis, designing, implementation, and maintenance of the respective order. There is also room for improvement and review if there is any breach of efficiency and shortcoming may be realized. As such, the systems development cycle would be valuable to create the module and framework of action.
Expressly, I would patent the design and final product so as to acquire the sole and exclusive rights and strategic ownership over the final product. Similarly, I would endeavor to register the product under the requisite copyrights laws so as to protect the property under exclusive ownership packages. Additionally, I would ensure that the trademark is protected under the relevant legislative laws hence the final benefits would be solely mine.
Cybercrime is one of the latest developments and threats to inventions and intellectual property hence my endeavor would be a combination of security measures. Firstly I would install internal measures such as antiviruses, firewalls, and passcodes so that only authorized people would have access to the classified data. This would be the first line of defense against unauthorized entry and data access that may be risky. Secondly, I would also store the sensitive data in a cloud or virtual space away from the servers of the company. This would reduce the risk of any eventuality should the system be broken into by advanced hackers or cyber criminals. Further, I would contract the services of an external company to review our security measures and also offer consultancy services. There is always a chance of a structural overlap or a system defect that may pass the attention of internal officers.
The concept of System Analysis, in brief, refers to the procedure of contextualizing the business operations and delineating the set objectives and intended goals. The framework would then articulate the most convenient measures and ways of achieving the set objectives. System design, on the other hand, refers to the modules, data, interface, and architecture or the mechanical composition required to fulfill a given project and process. The aspect of Software Development Life Cycle on its merit refers to the modality of testing, creating, deploying and engineering a software (or operating information and programs) within the wider context of the information system.
The Software Development Life Cycle has three distinct components or parts namely creating, testing and deployment of the finished product. To begin with, creation focuses on the introduction of a mechanical and technical idea that utilizes the codes in a new form that had not been previously witnessed. This is the inaugural stage as it focuses on introducing a new set of the idea within the world and spectrum of information systems. Testing, on the other hand, borders on the module of analyzing the security features, ease of usability and efficiency of a software and program. As a result, it focuses on the mechanisms of ensuring that the program has all the right features and principles or tenets so that it would be easier and convenient to use by the clients. It is important to note and mention that testing is done in various stages as the progression of the software development continues. As a result, it would be an end to end module with each stage analyzed on the security and usability features. Lastly, is the deployment component that focuses on the relay of the program and software to the final consumers. It is to say that it focuses on the mode of introduction of the program to the market and the intended users in a manner that would achieve and attract maximum returns or benefits.
Assignment 1 When the internet is down, it becomes slow to access personal documents and social information that I find critical and beneficial. Most of my social media and official or work platforms rely on the internet. Illustratively, it bec...22-Assignments-on-Topics-for-CIS105 …Read Article
Essays are mandatory from the start of your high school education until you are done with college. However, no matter how many essays you write, you never get hung of doing the essays within the shortest time possible without a proper guide. Consi...8-Tips-on-How-to-Write-an-Essay-Fast …Read Article
A narrative essay, as the name suggests, is a text that tells an interesting story in the hope of inspiring the reader. However, before the reader dives into reading the story, they must have first read the topic. Therefore, the topic needs to be...The-Ultimate-Guide-on-How-to-Choose-Narrative-Essay-Topic …Read Article