Answer:
1. Professional Software is not just the program developed for a customer
2. The software is meant for a specific purpose
Explanation:
Professional software is not just the program developed for a customer. Infact professional software along with executable code will also contain documentation, configuration of data - all that is required to make the operation of programs correct and accurate. Generally such a software do contain separate files for program and configuration purposes. Documentation of the professional software consists of several topics such as structure of the system, user documentation with all the information required for user to work on that. Hence professional software is not just a set of programs developed for customer - but it is a comprehensive information collection and set up tool set designed for the usage of a customer as well.
2. Custom software development are commisssioned by a specific customer for his specific requirements. Whereas Generic software products are general software applicable for diverse customers for their requirements and hence can be sold in open market for any customer. And hence the aplication development of both the software products mentioned above also do vary, in the first case specifications will be completely provided by the customer and will be controlled as well by the cusotmer
Two things that I can do in order to protect these assets
with the use of the computer or the internet is by first, downloading and using
an antivirus software where this has the ability to protect the computer from
invaders, hackers and other viruses that could get into the system of the computer.
Second, making the data encrypted, so that it will be protected with a code to
prevent other people who are trying to get in the data.
Answer:
Conflicts can be classified into five different types: structural, value, relationship, interest, and data [
Explanation:
Answer:
its b I think I'm pretty sure
Answer:
Five provisions of cyber ethics are:
Your computer or system should not be used to harm others. Your cyber knowledge should not be used to steal other people's resources. One should not use or copy softwares for which you have not paid. ... Never use other people's resources without their consent.