Posts

Showing posts from October, 2022

Major project

Image
Mobile applications Mobile applications are defined as specific applications developed for download onto the smartphone through its specific store such as GooglePlay or the App store ( Ameringen, 2017) .  (Mobile apps, 2016)   Big part of popularity behind creating mobile apps was firstly pioneered by Apple. The company motivated the surge of smartphone and mobile application development by introducing the world to the first iPhone. Apple's phone made the divide between the Internet and telecommunications devices crumble ( Kenney and Pon, 2011 ). The issue with the tech giant's approach is that its operating system iOS is exclusive only to iPhones. There was a niche gap for open source operating system which Google capitalised on by acquiring mobile software firm Android in 2007 ( Kenney and Pon, 2011 ). Android became a massive success, by 2010 it surpassed all competition on the smart phone OS market share and obtained a leading position ( Butler, 2010).    (iOs ...

Planning for major project

Date started Time allowed Task/Activity Completed (date) 14/10/2022 1.5h Researching into possible ideas for major project, then finally deciding on the topic of mobile applications.   14/10/2022 14/10/2022 2h Defining mobile applications and looking into their history.   14/10/2022 21/10/2022 1.5h Researching differences between two biggest competitors in the app space.   21/10/2022 24/10/2022 2h Researching into possible essay directions. Deciding my essay will be about Mobile apps in healthcare.     24/10/2022 27/10/2022 3h Using DMU library to find sources on Mobile apps in healthcare.     27/10/2022 28/10/2022 20min Writing essay introductio...

Initial idea 1

Image
Database Design and Implementation Databases (DB) are poorly understood by most people but in simple terms it is considered to be a collection of connected data stored on a computer ( Connolly, et al., 2008).  (Visual representation of database, 2021)   Nowadays every aspect of society if affected by databases, schools use DB to store students information, libraries store information of available books, hospitals hold patient details (Harrington, 2009)   However, vast amounts of such data are hard to search through so that is where database management software (DBMS) becomes essential. To be effective DBMS has to have a facility that stores the data and such facility must provide some way to enter, delete, modify, retrieve or restrict access to the information stored. ( Harrington, 2009) As demand for information greatly escalates (Ponniah, 2003) so does the need of databases.   References: Connolly, T., Begg, C. and Holowczak, R. (2008) Business Database Systems . ...

Initial idea 2

Image
Web application development Back at its early stages, the Internet was limited for military, university and research facility use only. When the government decided to release it for civilian use, there were fears among the professionals of these fields that it would hinder the usability of the Internet since it could be overwhelmed with millions of new users. However, the opposite has occurred. Increased demand of this new service put pressure on communication carries to improve the capacity, reliability and cost efficiency of the Internet (Deitel, et al., 2012). Such rapid improvement is a substantial part of why World Wide Web and web applications exist. The term web based applications usually means programs which run in a web browser (Dissanayake, et al., 2018). According to Deitel (et al., 2012) they are often divided into separate groups: Bottom tier, which preserves the application's information. Middle tier, that "controls interactions between the appl...

Computer ethics

Image
(Cyber awareness, 2022) I believe the 9th commandment " Thou shalt think about the social consequences of the program you write or the system you design" is linked to my project the most since programs are used by a huge amount of people it means that even the littlest things and issues found in software may negatively impact large groups of users.  That is not to say other commandments are not important. All commandments have their own use and I cannot say that any of them are more important than the others. What is more, it is necessary to enforce them but the laws require careful and considerate wording so it is extremely hard to accomplish without creating loopholes for people to exploit.  Generally, the legislation should keep up with the ever changing world of the internet but it is easier said than done since internet evolves and changes so quickly. References:   Cyber awareness (2022) Forgotten Computer Ethics And Importance Of Cyber Awareness . Available at: ht...