1
Sai Vasanth Nanduri
Getting Started with Android – 6
COLLAPSE
窗体顶端
Besides cost and flexibility, what additional factors influence mobile app developers to target the Android platform?
Android apps are more stable, more secure, and easier to use. Android can be installed on many different devices, and the OS is designed to run many different apps that are similar in principle (Guven et al., 2021). Android developers target the Android platform because it is open-source. Open source is usually a source of competition, not trust. For example, open-source software is usually made to compete with proprietary software. It just happens that, in this case, open-source software has also become a source of trust and the Android platform is quite the case. The Android platform has become a market standard in mobile app development. The availability of Android developers is constantly growing (Sari & Riyansah, 2021). Android is open source, and developers can easily customize and create their versions. Android’s openness is also the primary reason why developers target the platform.
Why is Android considered competition to itself?
Android is designed to be a completely open platform for mobile developers, and it is a massive boon to the development of the Android platform (Sari & Riyansah, 2021). This allows developers to quickly bring new features to Android devices by releasing updated software versions, even the core Android OS. It is a perfect thing for Android to take advantage of that approach. When Android first launched in 2008, it was revolutionary in the mobile phone market (Guven et al., 2021). A radically different user interface offered the user choice and independence that is now becoming the norm with today’s mobile phone software (Sari & Riyansah, 2021). The interface also featured an unusual method for sharing content. Android, in short, made computing easy. The essential things are the app store, Android’s operating system, the price, and the user interface.
Why is it important to include activities, services, content providers and broadcast receivers within apps developed on the Android platform?
These components are used to provide and interact with the user interface and the application’s data store, using a specific approach and pattern. An activity is a component of the Android application that shows some visual elements of the user interface UI (Guven et al., 2021). If the user closes the application, it is stopped. In addition, if the user is not currently using the application, the Android operating system kills off all of the application’s activities to free up memory for other activities (Sari & Riyansah, 2021). Content providers are like activities that can implement content provider interfaces to give the user a custom way of accessing their app’s content and bind to those interfaces to allow the user to access that content. Broadcasts are described as activities that can trigger events that are broadcast. For instance, if the user has clicked a button, an event has occurred in another activity or received a notification. Activities can also receive broadcasts from the Android system and even other applications (Guven et al., 2021).
窗体底端
Venkata Ravi Teja Duggisetty
Week 6 Discussion
COLLAPSE
窗体顶端
Besides cost and flexibility, what additional factors influence mobile app developers to target the Android platform?
A large percentage of the devices on which Android is installed are the low-cost, low-spec devices that are typically more targeted at third-world countries (Kollnig et al., 2021). These low-end and budget-based Android devices are often most needed for mobile applications. This provides immediate access to a larger market of potential customers. Android platform is a very natural fit. It is one of our three major platforms, iOS and Windows Phone. Platform-Specific Features: Google has provided the best mobile operating system since its launch. The number of Android app developers targeting the platform in no time shows this. The Google Android platform is popular, but it also has several exciting features. This makes it the right choice for developers looking to bring out the best in their mobile app (Lukács, 2021). Features like Android App Development that encourage users to download apps and get in touch with brands are interesting things developers should be aware of.
Why is Android considered competition to itself?
Some Android users were concerned about Google’s market power in this area. While there is some truth to this, there are also benefits to offering users free access to Android, which gives a great deal of freedom when using the system and gives the vendors a great deal of flexibility when building the devices (Lukács, 2021). Android is built on Google’s open-source code. With so many mobile hardware partners, including Samsung, HTC, LG, Sony, Huawei, and others, it is easy to think of the mobile industry as Google-centric. That is where the money is, and all the power, the innovation, and the best technology are right under Google’s nose. Libraries, Development tools, The way apps are distributed on the marketplace, The market for these apps, and the overall user experience. Android’s ecosystem is enormous (Kollnig et al., 2021).
Why is it important to include activities, services, content providers, and broadcast receivers within apps developed on the Android platform?
Because these apps need to be distributed to users via an app store, Android provides various activities and services, for example, email clients, the Android Market, voice control features, and applications that interact with location-based data (Kollnig et al., 2021). These can be broadly classified as either content providers or broadcast receivers. A content provider provides data for applications to read or use. These data may be from a local or network database or received from a server. Other content providers may provide the user with their information. For example, the content provider from the Android Market may present information about other applications (Lukács, 2021). A broadcast receiver is similar to a content provider, but it does not have specific data. Instead, it simply listens for specific messages and performs the appropriate actions based on these messages.
窗体底端
Laljibhai Laxmanbhai Valiya
Week 6
COLLAPSE
窗体顶端
What are five types of support services in a typical large organization?
Walk-in Service Departments
Support via live chat
Customer Service by their own
Communities and forums
Phone and Email -support
Should the same or different support services be available when an incident impacts the operational performance of an organization? Explain your answer
The design and size of the finance division fluctuate by the kind and size of the medical care association. Nonetheless, for some medical care associations, the overall model is that the bookkeeping capacities are overseen by the wellbeing finance supervisor and financier under the bearing of the CFO.
Most finance offices keep up with these records electronically with information bases or concentrated bookkeeping programming. There are as yet a couple of offices that utilization records to record this data. The last option is typically seen in more modest medical services associations.
窗体底端
Srujan Kumar Kanakamedala
Week 6 Discussion
COLLAPSE
窗体顶端
Five types of support services in a typical large organization
Identification of critical information: Critical information about company strategy, products, services, processes, or sensitive personnel issues is critical and must be protected. Also critical is a company’s financial position (Ani et al., 2018). An organization’s chief financial officer must protect the identification and classification of critical information, a complex and time-consuming process in organizations. It is often an exercise in futility, with essential details being missed or lost before being identified. Critical information may include sensitive corporate data such as secret formulas, customer or supplier information or intellectual property, and confidential information about the individual employees of an organization. Because of this, it is a highly desired goal in the security community (Ani et al., 2018).
Identify possible threats: The Identify potential threats are a support service in a typical large organization for operational security. The function is also used in a specific business organization for business continuity planning, whereas the Identify and Protect the primary tasks for information security purposes and are used to protect a computer network from network security threats (Ani et al., 2018). and are used to protect an organization, a physical structure or facility, and equipment or media from malicious attacks or disruptions and are also known as physical security. It consists of the management of security products and services and security systems (Ani et al., 2018).
Analyze security holes and other vulnerabilities: The vulnerability analysis and remediation activities are performed by security analysts trained in analysing threats, such as viruses, that may attack a client’s computer system or network by uncovering possible holes in its IT security infrastructure (Ani et al., 2018). By analysing and tracking known security flaws or vulnerabilities in hardware, software, or applications, a security analyst can help an organization improve its overall security posture and security management programs. The typical analysis for the security hole begins with a request for security analysis, where the organization requests a security analyst to perform a vulnerability scan for the organization. Security analysts perform a comprehensive, multi-level analysis of their client’s IT infrastructure (Ani et al., 2018).
Appraise the level of risk associated with each vulnerability: Appraise the level of risk associated with each vulnerability as a support service in a typical large organization for operational security. However, the organization is different, is application may be very different, how many systems are on the network, which application on the network, what is the business value of the data on the web and each application, how much access will each application require, how much control will allow, how many users will use the application and the level of expertise will all be essential factors in assessing the risk (Fan et al., 2020).
Application of appropriate countermeasures: The countermeasures may implement internally and externally. As with many other types of security, countermeasures are intended to guard against attempts to breach security (Fan et al., 2020). These countermeasures may implement both individually and the security measures generally in place and collectively. Countermeasures have several primary purposes. First, they must detect any security breaches so that the information security team can take appropriate action. Second, countermeasures must prevent the intrusion from being successful. It may achieve by making the intrusion challenging to initiate or more challenging to carry out once activated. Third, countermeasures must limit the harm caused by the intrusion if it is successful or minimize the effects of the breach if it is detected before the intrusion is initiated (Fan et al., 2020).
Should the same or different support services be available when an incident impacts the operational performance of an organization? Explain your answer.
While organizations need to consider how well they manage incidents that impact the IT infrastructure or performance, evaluating how well these operational performance impacts are supported is also essential (Fan et al., 2020). The version of a service is an aggregate function of several factors, including the performance and availability of the physical infrastructure, the performance and availability of computing services, and the availability and performance of the network. Service availability includes the ability to access service and the ability to access the service and get the services content (Fan et al., 2020). For example, if a service contains data or requires data, availability may include the ability to communicate with a service endpoint and the ability to get the data or service. In the case of a service that is an application, availability may include sharing with the application and getting the service’s functionality (Fan et al., 2020).
窗体底端
1
Sai
Vasanth
Nanduri
Getting
Started
with
Android
–
6
COLLAPSE
Besides
cost
and
flexibility,
what
additional
factors
influence
mobile
app
developers
to
target
the
Android
platform?
Android
apps
are
more
stable,
more
secure,
and
easier
to
use.
Android
can
be
installed
on
many
different
devices,
and
the
OS
is
designed
to
run
many
different
apps
that
are
similar
in
principle
(Guven
et
al.,
2021).
Android
developers
target
the
Android
platform
because
it
is
open-source.
Open
source
is
usually
a
source
of
competition,
not
trust.
For
example,
open-source
software
is
usually
made
to
compete
with
proprietary
software.
It
just
happens
that,
in
this
case,
open-source
software
has
also
become
a
source
of
trust
and
the
Android
platform
is
quite
the
case.
The
Android
platform
has
become
a
market
standard
in
mobile
app
development.
The
availability
of
Android
developers
is
constantly
growing
(Sari
&
Riyansah,
2021).
Android
is
open
source,
and
developers
can
easily
customize
and
create
their
versions.
Android’s
openness
is
also
the
primary
reason
why
developers
target
the
platform.
Why
is
Android
considered
competition
to
itself?
Android
is
designed
to
be
a
completely
open
platform
for
mobile
developers,
and
it
is
a
massive
boon
to
the
development
of
the
Android
platform
(Sari
&
Riyansah,
2021).
This
allows
developers
to
quickly
bring
new
features
to
Android
devices
by
releasing
updated
software
versions,
even
the
core
Android
OS.
It
is
a
perfect
thing
for
Android
to
take
advantage
of
that
approach.
When
Android
first
launched
in
2008,
it
was
revolutionary
in
the
mobile
phone
market
(Guven
et
al.,
2021).
A
radically
different
user
interface
offered
the
user
choice
and