• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14

Software Fundamentals

Extracts from this document...

Introduction

2.2.1 Software Fundamentals Social and ethical issues Bug Free Software What are the issues associated with this subject? In today's moneymaking society in which results are the main focus of every business, it is not uncommon to find programmers rushing to meet deadlines. In their rush, programmers often tend to overlook bugs or errors in their work. This leads to the question of whether having software released faster with more bugs is better than having software released more slowly, but with fewer bugs. Who are the stakeholders? What are the major advantages and disadvantages for the stakeholders? The stakeholders in this issue are major software companies such as Microsoft. If they continue to release software that is full of bugs instead of testing it to make sure that it is perfect or at least near perfect, other software vendors will eventually create new software that contains fewer bugs and has better functions. People will start to turn to the more bug free software and use it instead. This has already been shown with Internet Explorer and the release of Mozilla Firefox. Internet Explorer was infamous for its security issues, and Firefox promised a better, more secure internet browser. As a result, many decided to switch from Internet Explorer to Firefox. However, there are always people who decide to remain loyal, and this is clear when one notices the astounding number of people who have stayed loyal to the Windows operating system, despite its many security issues. What areas of impact does it affect? The issue of bug-free software does not only affect general office software such as Internet Explorer. Bugs have also overflowed into the gaming world. With the release of every new game, companies often fail to find and fix bugs. These bugs can range from certain game functions not working to game balance issues that ruin the gaming experience for certain players. ...read more.

Middle

Passwords are generally short enough to be memorized. Passwords also can contain letters as well as numbers making it even harder to get through. Information with passwords are generally thought of having more value and people would attempt to get through the password to gain access to the information that is being protected by the password. Once a password is placed, it is thankfully replaceable by the user. A user might want to change his or her password because the user might think or know that his or her password has been found out and wants to change the password on a precautionary measure. Some systems of computers forces users to change their password frequently in order to make a password that has been found out by an unwanted person unusable. Globalization of software 1. What are the issues associated with this subject? The globalization of software is quickly becoming a major component in today's society especially since its growth is closely associated with technology especially in information, business, and work etc. It helps to contribute to the economy there are such things as the gaining of wealth such as the US and China where in China it generates new revenue and creates high-value jobs. Whereas in the US, it achieves better financial performance as a result of cost savings as it is investing increased profits in growing business opportunities as a result of the globalization of software. 2. How did this technology emerge? The globalization of software emerged as a result of the information technology coming up as a major global field, the evolution of work business processes, education and national policies. The rapid shift to a global software-systems-services industry in which it is a reality has been mainly driven by advances and changes in the four major areas of technology ex: (the availability of low-cost, high bandwidth telecommunications), work processes ex: (digitalization of work), business models ex: (rise of companies that help firms offshore their work), and other drivers ex: (lowering of national trade barriers). ...read more.

Conclusion

Voice Recognition A new form of data input is through voice. The computer converts a sound signal and translates it back into doing some sort of command. The technology is still a work in progress, yet the technology can already be seen in some programs, such as Microsoft Office and the Opera web browser. The main flaw in voice recognition lies in the process of converting the "sound signal" into the desired command. Generally, users are required to 'voice train' their voice recognition software, by reading passages of text so the computer can recognize how you pronounce words and phrases. This is problematic as voice training takes time, and requires lots of voice training to retain an accurate measure of your speech. Another flaw in current speech recognition technology is that would have to be done in a quiet environment, as background noise would distort the received 'sound signal' and lead to executing the wrong commands. Although it is still a work in progress, voice recognition has high potential of becoming a primary input method for computers. The efficiency increase of using computers would be very high. For example saying "System Properties" is much faster than having to use your mouse to move the pointer to Start, then Control Panel, then click the System Properties icon. Social and Ethical Issues The issues associated with interfaces in essence are next to nothing, but these interfaces are the tools in which unethical conduct such as piracy and hacking are carried out with. As we continually simplify the interaction with computers, we would also be simplifying the process of piracy and hacking, thus attracting more people to carry out such unethical acts. In other words, security is a trade off of simplicity, where no solution really exists, besides the conventional security measures we take when using computers (firewalls, antivirus software, etc.) ?? ?? ?? ?? Arshad Akber, IB2 Software Fundamentals - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. The Effect on Music in the Christian Church

    The piece has a lot of catchy upbeat rhythms that catch the ear of contemporary listens. Church music, has a profound effect on a worship service; either negative or positive. It sets a mood positively for worshippers to be spiritually ready to engage in a sacred service.

  2. Are Science and Religion Compatible?

    Science also shows through methods such as carbon dating, which are based on fact, that the universe is in fact around 15 billion years old, not the mere 6000 which is suggested by the creationist theory. The empirical evidence obtained by science is very much against the literal truth of

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    Good vendors should have offline information available for consumers to study. Things like contact information, experience, reviews and when the products are from should be available for the consumers to see. 3"Know your vendor's complaint and return policy and don't be afraid to use it."

  2. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    Authentication and authorization are two keys words for a user to identify. If the user has a password or something to confirm their identity, then it would decrease the chance of hacking. As for authorization, it is important for the client to limit the amount of people who have access

  1. Free essay

    The Evolution of a Theme/Element in Popular Culture. Industries such as the jewellery and ...

    The show was gaining a wide acclaim for its satirical handing of American culture, society as a whole and the human condition. It was a major hit and was closely followed by 'South Park'. The American industry a sudden surge of growth in the 1990's as yet another wild card

  2. To what Extent Does Government Know What is Best for its Subjects? (Stimulus: Antigone)

    To this perspective, John Stuart Mill ardently presents a different point of view in On Liberty. Mill argues that governments are often wrong in their assertions. Furthermore, Mill criticizes control (both governmental and social) over individualism for he argues that they stunt the progression of human development, and in any

  1. GCSE Welsh Baccalaureate Completed Diary Pages

    words which acts to trigger keywords, or through performing group activities, role play, or translating activities. One of the most important exercises is completing past papers which definitely help to understand the format of the exam, and pick up essential vocabulary that may be present in the exam we have to sit in the summer of year 11.

  2. Can the work of architect Le Corbusier be explored in the context of the ...

    After these sources are identified information and data is then collected from these areas. This information and data can be given in the form of pictures, words, drawings etc. This data then needs to be processed and analysed to enable it to be manipulated.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work