Skip to main content

Newer Post or latest post

Explain the content distribution in a distributed computing system?

Explain the content distribution in a distributed computing system? The content is a database that is distributed on the internet in various types of ways to be shared on the social media, websites published blog posts, video published at specific platforms etc. these are the content that provide the information to the visitors. The user consumes from those websites links and admin users account to publish these content from their own hard work and some research to provide to the user to give valuable information to the user. The data can be distributed from these types of connections through https requests and ftp server to provide the text information and other types of video database and audio and image database also can provide information to the user. In a distributed computing system, content distribution refers to the method of delivering data or resources efficiently across multiple networked computers or nodes. The system is designed to share the workload by dividing tasks and...

Why is it necessary to execute the application software?

Why is it necessary to execute the application software?

Execution of application is necessary on the computer system or smartphone device because the application software after giving a running command to the program file then the program file runs on the environment of the operating system on the computer or smartphone device.

The execution of an application is possible through the execution file that accesses all the related files of the application software to display and run on the application software on the computer system.

The execution is a term that runs the file which is the main file and displays the home page of the application software after completing the execution process.

The execution of all types of files is necessary to run because every type of files can be used for service and execute all the files when the end user opens the file on the application software or any type of option to use its services.

The execution of a program in application software is to provide the output interface and response to the user through the display form of an application software.

The program is used to provide the form of taking input value that means the program is now running on the application software on the computer to show the response for taking some values to get the output data for the end user on the computer from the output resource.


Introduction to the computer system related topic and the topic is following below here:


Why is it necessary to execute the application software?


Let's discuss the computer system related topic is mentioned above and the explained following below here:


Why is it necessary to execute the application software?

There are some points on the computer system and application software development related to the topic of "Why is it necessary to execute the application software?" following below here:


Why is it necessary to execute the application software?

  • Execution of the system design model for providing interface of the application
  • Execute the program for providing the service for end user
  • Execute the database processing output to the output interface for user
  • Security interface also execute to protect the user data on application


Let's discuss the points listed above about the computer system and application software development related to the topic of "Why is it necessary to execute the application software?" explanation following below here:


Execution of the system design model for providing interface of the application

Execution of the system design model for providing interface of the application software that means the interface is only displayed on the screen of the monitor output device of the computer system when the program file is executed and run on the operating system environment and executes the graphics files on the application software.

The interface is a design view of the operating system to provide the display form of the application software.

The file which is used to display the interface of the application also shows the forms of the service options and home page of the application to understand where the end user starts their task in the particular department on the computer system.

Execution of the system design model is to provide the interface of the application software to see the response back when the user takes an option to click on it and the program shows the output interface of the program after taking input value according to the program on the application software.


Execute the program for providing the service for end user

Execute the program for providing the service for the end user on the application software to display the design of form and the form is executed through the calling a program on the application software.

The file of the program is used to execute and run on the application software on the computer system is used to provide the input taking interface for the end user on the application software.

The execution of the program files is connected to the main file of application software which is used to run, execute and call the function with program file on the application software.

The program is used to run and provide the interface of input taking form and provide the output data on the output interface of the program which is running on the application software.

The executes when the end user takes an action on the application software through input resource on the application to click the option of the application then the program executes to show the response to the end user in the display form of design interface.

The program of application is activated when the user performs an event on the option designed for application software such as:- clicking on the button.


Execute the database processing output to the output interface for user

Executed the database processing output to the output interface for user that means the database file is used to process the data at backend system of the application software means the program data is saved but it is used to manage the data through the SQL programs and commands on the database file of the application software to process the data at backend of the application software.

Execute the output interface when the user sends some instructions and provide application software through the input hardware and to process it and give some post on the application software or computer system and smartphone devices.


Security interface also execute to protect the user data on application

Security interface also executes to protect the user data on the application software that means the security interface is used to protect the data when the user tries to open their account without the process of security layer then the user cannot access their account without verifying the username with the password data.

The security layer interface included basically username and password and button to open or login account which the user has been created on the application software database model file containing the database, record, tuple or row and their attribute, field, columns etc. the attribute is verified when the username and password recorded on the record of the relational database model for security system.


Example of security execution on the application software for the end user:-


Security execution on application software involves implementing measures that ensure the software operates securely, especially when an end user interacts with it. Here's an example of how security execution can be applied using a security model:


An online banking application that uses a Role-Based Access Control (RBAC) security model:-


Security Execution Example:


1. Authentication on the application software security model:

- Process:

The end user logs in with a username and password.

- Security Execution:

- The application uses multi-factor authentication (MFA) to ensure the user is who they claim to be.

- Passwords are hashed and salted before being stored in the database to protect against data breaches.


2. Authorization on the application:

-Process:

After logging in, the user tries to access various features of the application.

-Security Execution:

- The RBAC model restricts the user’s access based on their role (e.g., customer, teller, manager).

- A customer can view their account balance but cannot approve transactions for other customers, while a teller can view and manage multiple customer accounts within their branch.


3. Data Encryption of the end user:

- Process:

The user sends a request to transfer money to another account.

- Security Execution:

- The application encrypts the transaction data both in transit (using SSL/TLS) and at rest.

- This ensures that even if data is intercepted or accessed without authorization, it cannot be read or modified.


4. Input Validation from the end user:

- Process:

The user inputs the account number and amount for the transfer.

- Security Execution:

- The application validates the input to ensure it meets expected formats (e.g., account numbers must be numeric and of a certain length).

- This prevents injection attacks, such as SQL injection or cross-site scripting (XSS), that could exploit vulnerabilities in the application.


5. Logging and Monitoring by program of security model on application:

- Process:

The user successfully completes the transaction.

- Security Execution:

- The application logs the transaction details, including the user ID, timestamp, and transaction amount.

- These logs are monitored for unusual activity, such as repeated failed login attempts or large, unexpected transfers, which could indicate a security breach.


6. Session Management on application:

- Process:

The user remains logged into the application.

- Security Execution:

- The application manages sessions securely by issuing a session token after authentication.

- The token expires after a period of inactivity or after a certain time, requiring the user to log in again. This limits the risk of unauthorized access if the session is hijacked.


7. Error Handling on the application security model:

- Process:

The user enters an incorrect account number.

- Security Execution:

- The application provides a generic error message like "Invalid account number" without revealing sensitive information (e.g., "Account number not found in the database").

- This prevents attackers from gaining insights into the system's inner workings.


Outcome on the application software security model:-

By following this security execution strategy within the RBAC security model, the application ensures that:

- Only authorized users can access and perform actions.

- Sensitive data is protected from unauthorized access and tampering.

- The system is resilient against common security threats.


This ensures the security and integrity of both the application and the end user's data.

Comments

Popular posts from this blog

what are the function of the joystick and light pen?

Q 1. State the functions of a joystick and that of a light pen? Introduction to the joystick device, virtual or soft joystick tool, game controller, virtual or soft game controller and light pen topics are covered below here: Joystick What is the meaning of the joystick in computer? What is the joystick as a peripheral device in the computer system? What is main use of joystick in computer system peripheral devices? What is the purpose of the joystick in computer? What are the types of joysticks in the peripheral system for game purpose? What do you mean by analog joystick in peripheral system? What are the advantages of analog joystick device? What are the disadvantages or drawbacks of analog joystick device? What are the uses of joysticks? What are top 5 uses of joystick device in the computer system peripheral? Where is the use of joystick? How to connect the joystick for game in computer system? Can you connect the joystick to the laptop? Why do n...

About the memory and its Classification of the computer Memory

"Hi everyone, I'm Rudra, a CS engineer and passionate blogger. Welcome to my post on [About the memory and its Classification of the computer Memory. ], where I'll share insights on Information Technology and Computer Science education. My goal is to provide helpful information and answer your questions. Feel free to ask me anything in the comments below. Let's dive into today's topic…🙂” What are the memories in the reference of computer system? What is Computer Memory?:- The memory is the essential for the computer to store the data, instruction and information. Without memory, computers are not be able to store data, instruction etc. The memory is an essential part of a computer system. It is require by the computer system to store information. Memory can be divided into the following two categories types: i) Primary or Main memory ii) Secondary Memory or Permanent memory In this figure I'll show the classification of the memory of computer s...

Describe the different ways of mobile communication systems for users?

Describe the different ways of mobile communication systems for users? Mobile communication makes it easy to connect with many users through the different types of ways to provide the communication system, share the information to each other and make communication between two or more users through the mobile devices. Such as:- an internet service provides many ways to connect the users in the text, audio, image and video file or data connections sharing the information to each other using these data types to communicate to each other. The user needs to communicate with the other user on the data communication system application software provide the process the data to send the file or message to the user who is connected to the communication application software through their user ID name or email to communicate to share the text or audio file or video file or image file also can be shared into the application software to the user such as:- if the application software provide the chatt...