• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14

Software Fundamentals

Extracts from this document...

Introduction

2.2.1 Software Fundamentals Social and ethical issues Bug Free Software What are the issues associated with this subject? In today's moneymaking society in which results are the main focus of every business, it is not uncommon to find programmers rushing to meet deadlines. In their rush, programmers often tend to overlook bugs or errors in their work. This leads to the question of whether having software released faster with more bugs is better than having software released more slowly, but with fewer bugs. Who are the stakeholders? What are the major advantages and disadvantages for the stakeholders? The stakeholders in this issue are major software companies such as Microsoft. If they continue to release software that is full of bugs instead of testing it to make sure that it is perfect or at least near perfect, other software vendors will eventually create new software that contains fewer bugs and has better functions. People will start to turn to the more bug free software and use it instead. This has already been shown with Internet Explorer and the release of Mozilla Firefox. Internet Explorer was infamous for its security issues, and Firefox promised a better, more secure internet browser. As a result, many decided to switch from Internet Explorer to Firefox. However, there are always people who decide to remain loyal, and this is clear when one notices the astounding number of people who have stayed loyal to the Windows operating system, despite its many security issues. What areas of impact does it affect? The issue of bug-free software does not only affect general office software such as Internet Explorer. Bugs have also overflowed into the gaming world. With the release of every new game, companies often fail to find and fix bugs. These bugs can range from certain game functions not working to game balance issues that ruin the gaming experience for certain players. ...read more.

Middle

Passwords are generally short enough to be memorized. Passwords also can contain letters as well as numbers making it even harder to get through. Information with passwords are generally thought of having more value and people would attempt to get through the password to gain access to the information that is being protected by the password. Once a password is placed, it is thankfully replaceable by the user. A user might want to change his or her password because the user might think or know that his or her password has been found out and wants to change the password on a precautionary measure. Some systems of computers forces users to change their password frequently in order to make a password that has been found out by an unwanted person unusable. Globalization of software 1. What are the issues associated with this subject? The globalization of software is quickly becoming a major component in today's society especially since its growth is closely associated with technology especially in information, business, and work etc. It helps to contribute to the economy there are such things as the gaining of wealth such as the US and China where in China it generates new revenue and creates high-value jobs. Whereas in the US, it achieves better financial performance as a result of cost savings as it is investing increased profits in growing business opportunities as a result of the globalization of software. 2. How did this technology emerge? The globalization of software emerged as a result of the information technology coming up as a major global field, the evolution of work business processes, education and national policies. The rapid shift to a global software-systems-services industry in which it is a reality has been mainly driven by advances and changes in the four major areas of technology ex: (the availability of low-cost, high bandwidth telecommunications), work processes ex: (digitalization of work), business models ex: (rise of companies that help firms offshore their work), and other drivers ex: (lowering of national trade barriers). ...read more.

Conclusion

Voice Recognition A new form of data input is through voice. The computer converts a sound signal and translates it back into doing some sort of command. The technology is still a work in progress, yet the technology can already be seen in some programs, such as Microsoft Office and the Opera web browser. The main flaw in voice recognition lies in the process of converting the "sound signal" into the desired command. Generally, users are required to 'voice train' their voice recognition software, by reading passages of text so the computer can recognize how you pronounce words and phrases. This is problematic as voice training takes time, and requires lots of voice training to retain an accurate measure of your speech. Another flaw in current speech recognition technology is that would have to be done in a quiet environment, as background noise would distort the received 'sound signal' and lead to executing the wrong commands. Although it is still a work in progress, voice recognition has high potential of becoming a primary input method for computers. The efficiency increase of using computers would be very high. For example saying "System Properties" is much faster than having to use your mouse to move the pointer to Start, then Control Panel, then click the System Properties icon. Social and Ethical Issues The issues associated with interfaces in essence are next to nothing, but these interfaces are the tools in which unethical conduct such as piracy and hacking are carried out with. As we continually simplify the interaction with computers, we would also be simplifying the process of piracy and hacking, thus attracting more people to carry out such unethical acts. In other words, security is a trade off of simplicity, where no solution really exists, besides the conventional security measures we take when using computers (firewalls, antivirus software, etc.) ?? ?? ?? ?? Arshad Akber, IB2 Software Fundamentals - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. The Effect on Music in the Christian Church

    the melody of the song, but presenting a style that can change the spirit. We are not degrading the untrained musician; however, when people don't know any better - you can't expect any better. In the original tune of Amazing Grace, looking at the chord structure everything has a balanced

  2. Comparing and Contrasting Envy and Deception in Shakespeares Much Ado About Nothing and Othello

    Iago is fully aware of Othello's growing sense of isolation due to his race and age and so he plants ideas into his head, leading to Othello being almost blinded, in a metaphorical sense. Iago's main weapon is Cassio who, he points out, served almost as a messenger during Othello's

  1. Are Science and Religion Compatible?

    Science also shows through methods such as carbon dating, which are based on fact, that the universe is in fact around 15 billion years old, not the mere 6000 which is suggested by the creationist theory. The empirical evidence obtained by science is very much against the literal truth of

  2. The History & Development of Reflexology

    through reflexology or other means, can help the body to recognise these low levels and increase production in cholinoceptive cells. Appendices APPENDIX 1 Members of the Reflexology Forum - The developing Regulatory body for Reflexologists in the UK Association of Reflexologists The British Association of Beauty Therapy 5 Fore Street & Cosmetology (BABTAC)

  1. Dutch politics. Political parties are aiming for the same goals. The people in it ...

    They want to be attractive for the international businesses. The companies has taken over a lot of things, so the government has less to say about some things. Competition with emerging economies around the world is very big. How the PvdA thinks about the economy of the Netherlands: * The

  2. SALES OF GOOD ACT

    As the condition is to be fulfilled after sale it is called as a condition subsequent. Contract of sale Absolute Conditional {Sale to {Agreement} sell} Time Condition Subsequent Precedent Distinguish between Sale & Agreement to sell :- Sr. No. Sale Agreement to sell 1 When the seller transfers the property

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    Solution for the Issue: The first and best way to ensure a safe online grocery order is to acknowledge that there are serious risks when purchasing products because personal information is given out. A good and simple way to minimize reliability issues regarding online grocery shopping is to establish a good relationship with the vendors that you are working with.

  2. Can the work of architect Le Corbusier be explored in the context of the ...

    They bring us back into harmony with the profound and natural purpose of life.? (Le Corbusier 1967, p. 86). This is a demonstration of how Le Corbusier work is mirrored in the DCM and shows a direct link to the initial stage of identifying needs and opportunities.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work