Installing and upgrading software is a common thing for everyone. It is advised that software should be upgraded or installing for better performance of the PC, however as well as its many beneficial features installation and upgrading of software can result in many risks. In this document I will describe the potential risks of installing and upgrading software. Viruses A virus can be within a file or an upgrade; this virus can harm the computer system and corrupt files within the PC. This is a potential risk because it leads to inefficiency in work i.e. a file that had important typed up information is corrupted then it becomes impossible to access, this leads to frustration and inefficiency in work as the document will have to be retyped except the individual had a backup. Incompatibility If your PC is older or you have other installed software, this enhances the chances of a piece of software becoming advanced or conflicting with existing software. This may cause program incompatibility and will prevent the programs from running. This is a problem as it takes time to resolve such a situation; this kind of situation will also prevent programs from running. Negative change/ loss of features When software updates are released, they often contain added features and uses, this may result in problems because it may make existing features harder to use, these features can be such as changing shortcuts or the position of the tool bar, this can reduce efficiency in the level of work produce in an organisation. Stability issues When new software is installed, or existing software is updated then the software may become more demanding of the system, this may affect the PC’s stability and performance – this may lead to freezing, lagging a... ... middle of paper ... ...d method is check the features of the software being installed if you check the features of the software being installed, the details can then be checked and a judgement can be made whether or not to install software. Installing antiviruses can also reducing the potential to be exposed to risky software, antivirus on a system detect harmful files within software being download, an antivirus would warn the user before downloading the file whether or not it is safe for the work to be upgraded. Methods of minimising risks could also be performing the update or installation during free time, this will prevent down time, when upgrading and installing software onto a PC it should be done on days i.e. holidays when there are no staff members using the system. A perfect example of this would be upgrading a school system during the summer holiday when it is not being used.
Also, implement patch management and keep up to date with anti-malware and anti-spyware updates. This helps in the summarization of the possible threats the College can face in certain scenarios and explains how to protect against them.
date with the latest software and security patches. Reputable antivirus programs such as Norton Security, McAfee Antivirus, and Bitdefender Antivirus and firewall programs should be installed and kept up to date for maximum protection.
Windows hardware’s has played a vital role in current technology of computer era. Computer application has significantly changed the workloads and manual records and information keeping has been significantly managed easily. This has been tremendously associated with the respective improvements with the software and hardware application development and Windows Xp and windows 7 have been most powerful operating system used by many computer applicants and users.
Install apps and Windows OS will fail to perform well. If update history is missing from the PC, user will not be able to work. The computer will start to perform negatively. It is so annoying when you are trying to install updates and it is failing. If updates failed to install, apps will stop working.
Reduction of internal stress factors derived from less computer downtime that converts to improved operational processes
Maintenance may be corrective, adaptive, perfective or preventive maintenance, depending on the situation and software. The maintenance may be a routine maintenance to address an error or it could be larger scale maintenance to keep the software up-to date. Operating systems upgrade over time and hardware keeps changing. At the same time software needs to be upgraded to keep it functional. However, sometimes the structure of the software does not allow these maintenances to be done. Different maintenances done to software may also decay the software structure. More and more maintenances are done which may decrease the software structure. At some point this will become too complicated and uneconomic to maintain and it is better to replace the system. (Tutorialspoint 2015; Carl
The worst-case scenario for malicious software would be the software traveling to other workstations and eventually servers. The hope would be that anti-virus or higher security in the rest of the network would keep it from traveling too far, but it is possible for something very new and very harmful to make its way to sensitive company servers.
can be very severe and even lifethreatening, the amount of protection from these viruses that
1.0 IntroductionIn this report I will be concentrating on the failure of software systems. To understand why software systems fail we need to understand what are software systems. Software systems are a type of information system. This is because a software system is basically a means for hardware to process information. Flynn’s definition of an information system is:"An information system provides procedures to record and make available information, concerning part of an organization, to assist organization-related activities."Humans have been processing information manually for thousands of years, but with the vast increase of demand for knowledge this century has meant that a new method of information processing has been needed. Software systems have provided a new means that is much faster and efficient.
Testing is one of the important methods to boost the confidence of the developers in the reliability of software. Sometimes, programs that are not properly tested perform correct for few months and even years too before some input sets shows the presence of critical errors. Incorrect application that is released to public without fully tested could result in client dissatisfaction and moreover it is important for software in applications that it is free of software faults which might lead to heavy economic loss or even endanger lives. In the past durations, systematic ways to software testing procedures and tools have been developed to avoid many problems. Testing is the most usual technique for fault detection in today’s organization. Main aim of application testing is to boost one's confidence in the correctness of the program being tested.
The virus is defined as a piece of code that can copy itself and typically has a detrimental effect, such as corrupting the system or destroying data. At that time viruses were not known to be used to attack countries, most viruses were motivated by money and moral beliefs. In the early 2000s Iran was gaining nuclear power and the U.S. knew they were in the wrong hands. As the rise of viruses grew the CIA knew they could take advantage of cyber-attacks. Couple years later they had a lethal virus capable of damaging uranium plants all over Iran.
In upgrading the Alsager Ltd IT facilities, despite numerous advantages that the new systems brings one has to be made aware of the possible threats posing.
and distributing it or installing more than one copy of one piece of software on
...ntial information from a user. Luckily, there are reliable ways of defending against them. The most reliable way is to install strong security software that has the capacity to defend against the multifaceted forms of threats. Avoiding P2P file sharing sites and scanning email attachments before downloading them are also a surefire way of protecting a computer against malware threats. Basic acts like using an updated browser and allowing Windows updates to install and update themselves are also necessary to keep a machine safe. Furthermore, checking validity of individual website addresses and installing authenticated software can also help a computer user remain safe from potential data theft and possible damage of useful programs. It may also pay good dividends to backup files. In case of a lethal malware attack, backed-up files can always be recovered easily.
Here we have tried to provide some better facilities to the users of the software. In fact the requirements were easily attainable. Machines successfully solve the requirement for installation.