Lunes, Enero 9, 2012

HCSD Data Structure Case Studies

Case Study 1
To aid the fight against computer viruses and other types of malicious software, many security advisory organizations and developers of anti-virus software compile and publish lists of viruses.
The compilation of a unified list of viruses is made difficult because of naming. When a new virus appears, the rush begins to identify and understand it as well as develop appropriate counter-measures to stop its propagation. Along the way, a name is attached to the virus. As the developers of anti-virus software compete partly based on how quickly they react to the new threat, they usually study and name the viruses independently. By the time the virus is identified, many names denote the same virus.
Another source of ambiguity in names is that sometimes a virus initially identified as a completely new virus is found to be a variation of an earlier known virus.There are many viruses and it is can fix using anti viruses.
                                                               Case Study 2
  Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers.Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.
Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.
Bad hackers is making  a virus to indicate all cases to make a wrong doing. They build a viruses to spread to web site or to company to hack the server using their talent of programming.The all hackers are secured and it is safety to as to make them a hack to the public.

                                                                       Case Study 3

a.Silicon Valley Programmer-This people are all group of programming that are testing or examine how to create a real robots.They success in there experiment but I think there is an errors to the robot cause   of death by the operator.


b.I make a rules that indicate of safety first.I make a  laboratory for the robots that the user is easily program the robot.First I make my own uniform that can protect the body and using programming I also chick first my codes in my data base before I run it, to make it safety.


c.I think it is hard to select witch is I make my codes fake.Because first is my name is involved  in the case and I can prove to my self as a good programmer i can fix the codes using the previous codes that I use.
 

Walang komento:

Mag-post ng isang Komento