Software Test Metrics and Measurements
In software projects, it is most important to measure the quality, cost and effectiveness of the project and the processes. Without measuring these, project can’t be completed successfully. This uses Software Test Metrics and Measurements to measure.
Communication techniques in Communication techniques distributed system
Overview of distributed systems in computer Science
Basic Algorithms
Various characteristics of distributed systems in computer Science
Design issues of distributed systems in computer Science
The Computer Misuse Act is designed to protect computer users against willful attacks and theft of information.
Offences under the act include hacking, unauthorized access to computer systems and purposefully spreading malicious and damaging software (malware), such as viruses.
The act makes it an offence to access or even attempt to access a computer system without the appropriate authorization. Therefore, even if a hacker tries to get into a system but is unsuccessful they can be prosecuted using this law. The act also outlaws “hacking” software, such as packet sniffers, that can be used to break into or discover ways to get into systems.
Internet service provider (ISP) is a company that provides Internet connections and services to individuals and organizations. In addition to providing access to the Internet, Internet service providers may also provide software packages (such as browsers), e-mail accounts, and a personal Web site or home page. Internet service providers can host Web sites for businesses and can build the Web sites themselves. Internet service providers are all connected to each other through network access points, public network facilities on the Internet backbone.
ADVANTAGES and DISADVANTAGES OF THE INTERNET
For more personal and interactive communication, it is possible to avail the facilities of video conferencing, chat and messenger services. With the help of these services, the geographically fragmented countries have come together to form a community that is able to share its thoughts on global issues, that affect each and every one of us. The Internet has given us a common platform and medium through which we are able to explore other cultures and ideologies.
Agri-BusinessBridgeBusinessCommercialComputer ScienceDesignDesign & DevDesignsEveryday LifeFashionGeneralGUILifeStyleMountainNaturePeopleSportsTechTravelUXWorld
Freedom of information in law
2 Mins read
In June 2006 nearly 70 countries had freedom of information legislations applying to information held by government bodies and in certain circumstances to private bodies. In 19 of these countries the freedom of information legislation also applied to private bodies Access to information was increasingly recognized as a prerequisite for transparency and accountability of governments, as a facilitating consumers’ ability to make informed choices, and as safeguarding citizens against mismanagement and corruption. This has led an increasing number of countries to enact freedom of information legislation in the past 10 years
Privacy and privacy protection
9 Mins read
Data protection is a type of privacy protection manifesting in special legal regulation. Data protection right ensures a person the right of disposal over all data in connection with his personality. This way it serves to sustain the protection of privacy in a world where the possibility of collecting, storing and conciliation of large pools of data is widely available.
Earlier, due to the lack of highly developed data-processing technologies no threat was imposed by a situation in which these data became public and known to others, while today processing, conciliation and association of data or creating new data relying on the old ones might result in the infringement to the right of privacy. The underlying notion behind the codification of data protection law is the insufficiency of secrecy protection: within the new context protection should apply to all data: “data protection should be differentiated from the interpretation of privacy as intimacy.
A trade mark is a mark that has been registered with the aim of distinguishing, in the course of trade, the services or products of a person from the services or products of his/her competitors. A trade mark gives its owner the exclusive right to exclude competitors’ use of the mark with reference to identical or even similar products or services. In addition to ordinary trademarks, collective trademarks and certification trademarks also exist. If a mark has not been registered, an action for unlawful competition may still be useful regarding unauthorized competitive use of the mark, provided that the mark has a reputation.
Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.
IP is protected in law by, for example, patent, copyright, and trademarks, which enable people to earn recognition or financial benefit from what they invent or create. By striking the right balance between the interests of innovators and the wider public interest, the IP system aims to foster an environment in which creativity and innovation can flourish.
License Agreements in Computer Science.
When customers buy software, they buy a copy and the right to use it in certain ways
In certain ways means: there are different types of restrictions in place
Single user license: allows the use of one copy on one machine for one user Example: computer game
Functions of Computer Science Professional Bodies
Establish a code of conduct to which members of the profession must abide.
Establish mechanisms for the dissemination of knowledge & good practice to members
Set standards of education (for example degree accreditation)
A professional body is a group of people in a learned occupation who are entrusted with maintaining control or oversight of the legitimate practice of the occupation.
Professionals and professional bodies have a crucial role to play as part of the regulatory landscape. Professional body membership gives the public, the sector and government assurance that services are being delivered by qualified and expert professionals who are self-regulating based on a code of professional practice (or conduct) that they have developed.
Principles software engineers.
1 Mins read
Help develop an organizational environment favorable to acting ethically.
Promote public knowledge of software engineering.
Extend software engineering knowledge by appropriate participation in professional organizations, meetings and publications.
Support, as members of a profession, other software engineers striving to follow this Code.
Characteristics of a IT/Computer Science profession
Great responsibility
Professionals deal in matters of vital importance to their clients and are therefore entrusted with grave responsibilities and obligations. Given these inherent obligations, professional work typically involves circumstances where carelessness, inadequate skill, or breach of ethics would be significantly damaging to the client and/or his fortunes.
Outsourcing IT/Computer Science Services
3 Mins read
Outsourcing is a contractual arrangement under which a client hands over a certain business function to a supplier
This usually includes planning, management, and operation of this function
Very common in some situations: few people generate their own electricity or drill their own wells
Logic is that a company specializing in a particular area, e.g. catering or office cleaning, is probably better at it
Contract hire is an arrangement in which the supplier agrees to supply the customer with the services of a certain number of staffs at agreed daily or hourly charge rates. The customer takes responsibility for managing the staff concerned. Either party can terminate the arrangement at fairly short notice, typically one week,
A contract is simply an agreement between two or more persons.
Essentials of a contract:
a) Offer and Acceptance. In order to create a valid contract, there must be a ‘lawful offer’ by one party and ‘lawful acceptance’ of the same by the other party.
Extreme programming methodology was created as a reaction to the old waterfall methodology. The reason is that software development is a very fluid process because requirements may not be fully implemented from the beginning but will always change as project progress there4 soft dev needs a methodology that can adapt changing requirement at any point during the project lifecycle.