Skip to main content

Newer Post or latest post

Li-Fi vs Wi-Fi: A Battle of Light and Waves

Li-Fi vs Wi-Fi: A Battle of Light and Waves Li-fi is a light fidelity device that supports only the infrared and other lighting systems to transfer the data to the device which is used to receive from the sender device. Wifi is a wireless fidelity device that supports the radio waves to transfer the data to the wifi device which is used to receive the wifi signals at the limited ranges due to the device version capacity. Introduction to the computer system and computer applications related topics are listed following below here: Li-Fi vs Wi-Fi: A Battle of Light and Waves Let’s discuss the computer system related topic and questions above listed and their answers are following below here: Li-Fi vs Wi-Fi: A Battle of Light and Waves There are some points on the computer system and data communication related to the topic of “Li-Fi vs Wi-Fi: A Battle of Light and Waves” following below here: Lifi based data communication system:- Li-Fi is a light based signal data transmission ...

Why is it necessary to execute the application software?

Why is it necessary to execute the application software?

Execution of application is necessary on the computer system or smartphone device because the application software after giving a running command to the program file then the program file runs on the environment of the operating system on the computer or smartphone device.

The execution of an application is possible through the execution file that accesses all the related files of the application software to display and run on the application software on the computer system.

The execution is a term that runs the file which is the main file and displays the home page of the application software after completing the execution process.

The execution of all types of files is necessary to run because every type of files can be used for service and execute all the files when the end user opens the file on the application software or any type of option to use its services.

The execution of a program in application software is to provide the output interface and response to the user through the display form of an application software.

The program is used to provide the form of taking input value that means the program is now running on the application software on the computer to show the response for taking some values to get the output data for the end user on the computer from the output resource.


Introduction to the computer system related topic and the topic is following below here:


Why is it necessary to execute the application software?


Let's discuss the computer system related topic is mentioned above and the explained following below here:


Why is it necessary to execute the application software?

There are some points on the computer system and application software development related to the topic of "Why is it necessary to execute the application software?" following below here:


Why is it necessary to execute the application software?

  • Execution of the system design model for providing interface of the application
  • Execute the program for providing the service for end user
  • Execute the database processing output to the output interface for user
  • Security interface also execute to protect the user data on application


Let's discuss the points listed above about the computer system and application software development related to the topic of "Why is it necessary to execute the application software?" explanation following below here:


Execution of the system design model for providing interface of the application

Execution of the system design model for providing interface of the application software that means the interface is only displayed on the screen of the monitor output device of the computer system when the program file is executed and run on the operating system environment and executes the graphics files on the application software.

The interface is a design view of the operating system to provide the display form of the application software.

The file which is used to display the interface of the application also shows the forms of the service options and home page of the application to understand where the end user starts their task in the particular department on the computer system.

Execution of the system design model is to provide the interface of the application software to see the response back when the user takes an option to click on it and the program shows the output interface of the program after taking input value according to the program on the application software.


Execute the program for providing the service for end user

Execute the program for providing the service for the end user on the application software to display the design of form and the form is executed through the calling a program on the application software.

The file of the program is used to execute and run on the application software on the computer system is used to provide the input taking interface for the end user on the application software.

The execution of the program files is connected to the main file of application software which is used to run, execute and call the function with program file on the application software.

The program is used to run and provide the interface of input taking form and provide the output data on the output interface of the program which is running on the application software.

The executes when the end user takes an action on the application software through input resource on the application to click the option of the application then the program executes to show the response to the end user in the display form of design interface.

The program of application is activated when the user performs an event on the option designed for application software such as:- clicking on the button.


Execute the database processing output to the output interface for user

Executed the database processing output to the output interface for user that means the database file is used to process the data at backend system of the application software means the program data is saved but it is used to manage the data through the SQL programs and commands on the database file of the application software to process the data at backend of the application software.

Execute the output interface when the user sends some instructions and provide application software through the input hardware and to process it and give some post on the application software or computer system and smartphone devices.


Security interface also execute to protect the user data on application

Security interface also executes to protect the user data on the application software that means the security interface is used to protect the data when the user tries to open their account without the process of security layer then the user cannot access their account without verifying the username with the password data.

The security layer interface included basically username and password and button to open or login account which the user has been created on the application software database model file containing the database, record, tuple or row and their attribute, field, columns etc. the attribute is verified when the username and password recorded on the record of the relational database model for security system.


Example of security execution on the application software for the end user:-


Security execution on application software involves implementing measures that ensure the software operates securely, especially when an end user interacts with it. Here's an example of how security execution can be applied using a security model:


An online banking application that uses a Role-Based Access Control (RBAC) security model:-


Security Execution Example:


1. Authentication on the application software security model:

- Process:

The end user logs in with a username and password.

- Security Execution:

- The application uses multi-factor authentication (MFA) to ensure the user is who they claim to be.

- Passwords are hashed and salted before being stored in the database to protect against data breaches.


2. Authorization on the application:

-Process:

After logging in, the user tries to access various features of the application.

-Security Execution:

- The RBAC model restricts the user’s access based on their role (e.g., customer, teller, manager).

- A customer can view their account balance but cannot approve transactions for other customers, while a teller can view and manage multiple customer accounts within their branch.


3. Data Encryption of the end user:

- Process:

The user sends a request to transfer money to another account.

- Security Execution:

- The application encrypts the transaction data both in transit (using SSL/TLS) and at rest.

- This ensures that even if data is intercepted or accessed without authorization, it cannot be read or modified.


4. Input Validation from the end user:

- Process:

The user inputs the account number and amount for the transfer.

- Security Execution:

- The application validates the input to ensure it meets expected formats (e.g., account numbers must be numeric and of a certain length).

- This prevents injection attacks, such as SQL injection or cross-site scripting (XSS), that could exploit vulnerabilities in the application.


5. Logging and Monitoring by program of security model on application:

- Process:

The user successfully completes the transaction.

- Security Execution:

- The application logs the transaction details, including the user ID, timestamp, and transaction amount.

- These logs are monitored for unusual activity, such as repeated failed login attempts or large, unexpected transfers, which could indicate a security breach.


6. Session Management on application:

- Process:

The user remains logged into the application.

- Security Execution:

- The application manages sessions securely by issuing a session token after authentication.

- The token expires after a period of inactivity or after a certain time, requiring the user to log in again. This limits the risk of unauthorized access if the session is hijacked.


7. Error Handling on the application security model:

- Process:

The user enters an incorrect account number.

- Security Execution:

- The application provides a generic error message like "Invalid account number" without revealing sensitive information (e.g., "Account number not found in the database").

- This prevents attackers from gaining insights into the system's inner workings.


Outcome on the application software security model:-

By following this security execution strategy within the RBAC security model, the application ensures that:

- Only authorized users can access and perform actions.

- Sensitive data is protected from unauthorized access and tampering.

- The system is resilient against common security threats.


This ensures the security and integrity of both the application and the end user's data.

Comments

Popular posts from this blog

what are the function of the joystick and light pen?

Q 1. State the functions of a joystick and that of a light pen? Introduction to the joystick device, virtual or soft joystick tool, game controller, virtual or soft game controller and light pen topics are covered below here: Joystick What is the meaning of the joystick in computer? What is the joystick as a peripheral device in the computer system? What is main use of joystick in computer system peripheral devices? What is the purpose of the joystick in computer? What are the types of joysticks in the peripheral system for game purpose? What do you mean by analog joystick in peripheral system? What are the advantages of analog joystick device? What are the disadvantages or drawbacks of analog joystick device? What are the uses of joysticks? What are top 5 uses of joystick device in the computer system peripheral? Where is the use of joystick? How to connect the joystick for game in computer system? Can you connect the joystick to the laptop? Why do n...

Describe the different ways of mobile communication systems for users?

Describe the different ways of mobile communication systems for users? Mobile communication makes it easy to connect with many users through the different types of ways to provide the communication system, share the information to each other and make communication between two or more users through the mobile devices. Such as:- an internet service provides many ways to connect the users in the text, audio, image and video file or data connections sharing the information to each other using these data types to communicate to each other. The user needs to communicate with the other user on the data communication system application software provide the process the data to send the file or message to the user who is connected to the communication application software through their user ID name or email to communicate to share the text or audio file or video file or image file also can be shared into the application software to the user such as:- if the application software provide the chatt...

I am exploring the points on if data centers uses a SAN how it is bigger than SANs?

Is data centers using a SAN and how much are data centers bigger than SANs? The data centers are used to provide the big data analytics for the website and companies to provide the processed data for making different types of informed decisions at a large amount of data processing in the data centers because it is a very big area to install into the building and many buildings if it requires to install into many buildings. The large requirement of data centers installation is necessary because the data centers uses many types of computers, storage devices, network attached storages, network devices such as:- servers, switches, hubs, routers, bridges, repeaters, gateways etc. data cables and different types of network equipment to use in the data centers to make a large area of data processing for the companies uses and major projects for website at larger industrial area for website for data processing. The storage area network is used to provide the high performance of data processing...