Ø Open source software is computer software that
is distributed along with its source code. The code that is used to create the
software via a special software license. The license allows users to use,
change and improve the software's source code, and to redistribute the software
either before or after it has been modified.
From your opinion, why people prefer open source
software over proprietary alternatives nowadays?
Ø In my opinion, people prefer open source
software over proprietary alternatives because open source model is often
developed in collaboration with other contributors, which you can get access
and shared intellectually.
5 Most Popular Open Source Software
- Open Office
- Mozilla FireFox
- Web Browser
- Word Press
- Magento
COMPARISON BETWEEN OPEN OFFICE AND MICROSOFT OFFICE...
Microsoft
Office
|
Open Office
|
|
Different
(definition)
|
Microsoft Office is a suite of different
applications, servers and services such as Word, Excel, Power Point, etc
|
Open Office is a suite of open-source office
productivity software suite that contains word processor, spreadsheets,
presentations, etc
|
COMPARISON BETWEEN MOZILLA FIREFOX AND INTERNET EXPLORER...
Mozilla
FireFox
|
Internet
Explorer
|
|
Different (advantages)
|
Speed, Security, array of features and
extensions
|
Address bar provides auto complete, crash
recovery, flexible search option
|
COMPARISON BETWEEN WORD PRESS AND BLOGGER...
Word
Press
|
Blogger
|
|
Different (themes
and customization)
|
No
template editing. Stylesheet editing only as a paid upgrade. Most of the
themes have user-selectable options.
|
Google’s Dynamic Viewswill replace customized templates unless users set their
Blog Feed to ‘None’ or ‘Short’
|
COMPARISON BETWEEN NOTEPAD AND MICROSOFT WORD...
Note
Pad
|
Microsoft
Word
|
|
Different (function)
|
Simply a
bare-bones text processor.
|
Offers a
wide range of formatting and publishing features and can create many types of
files.
|
COMPARISON BETWEEN MAGENTO AND OPENCART...
Magento
|
OpenCart
|
|
Different (template
option)
|
Extensive
|
Limited
but growing
|
2.Discuss different types of threats and
malicious program (malware) that can damage a computer, mobile device or
disrupt any system.Search for information on current known malware program.
Based on the information that you have found, create a table to list different
types of malware, what it does, and how it can be repaired or removed. This
information is useful for you to prevent any malware from damage your computer
system.
Malware is a short form of malicious software
which used or programmed by attackers to disrupt a computer operation, gather
sensitive information, or to gain access to private computer systems. It can
appear in the form of code, scripts, active content, and other software.
Malware is a general term used to refer to a variety of forms of hostile or
intrusive software. Below are stated the types of malwares, their function and
prevention from them.
Types of
Malware
|
What It
Does
|
How It
Can Be Repaid And Removed
|
Computer Virus
|
A malware when executed
replicates by inserting copies of itself into other computer programs, data
files, or the boot sector of hard drive. Perform some type of harmful
activity on infected host.
|
Install an
antivirus that can detect and eliminate known viruses when computer attempts
to download or run an executable. Also operating system updated timely,
careful Internet browsing and installation of trusted software.
|
Ransomware
|
A malware,
known as crypto viral extortion, which restricts access to the computer
system that it infects, and demands a ransom to paid to the creator of the
malware in order for the restriction to be removed.
|
Keep all of the
software on your computer up to date. Keep your firewall turned on. Don't
open spam email messages or click links on suspicious websites.
|
Worms
|
A standalone
malware that replicates itself in order to spread to other computers. Often
uses a computer network to spread itself relying on security failures on the
target computer to access it and cause some harm to the network
|
Operating
system’s vendors will supply regular security updates. Users should be wary
of opening unexpected email, not run attached files or programs, or visit
suspicious web sites. Update regularly anti-virus or anti-spyware.
|
Trojan Horses
|
A hacking
program, non-self-replicating type of malware which gains privileged access
to the operating system while appearing to perform a desirable function but
instead drops a malicious payload, often including backdoor.
|
Never run an executable
file unless you are absolutely sure it comes from a trusted source. Security
patches should always be downloaded directly from a vendor's website. Also,
turn off computer when not used.
|
Root-kits
|
Stealthy
malicious software, designed to hide the existence of certain processes or
programs from normal methods of detection and enable continued privileged
access to a computer.
|
Apply security
patches, implementing the principle of least privilege, reducing the attack
surface and installing anti-virus software. Also routine monitoring is
required.
|
Spyware
|
Software that
aids in gathering information about a person or organization without their
knowledge and that may send such information to another entity without the
consumer’s consent.
|
Install an
anti-spyware program, which provide real-time protection, which scan all
incoming network data for spyware and block the threats if detected.
|