Sign In
Not register? Register Now!
Essay Available:
6 pages/≈1650 words
10 Sources
Literature & Language
English (U.S.)
MS Word
Total cost:
$ 21.6

Writing Assignment #3: Computer and Emerging Trends in Technology (Essay Sample)


I will attach instructions. Please use all sources from last paper that you wrote for me. If you have further questions let me know please.


Computer and Emerging Trends in Technology
On the onset of the 21st Century, technological trends improved at an alarming trend. We saw the invention of smart phones, powerful computers that are smaller and portable to carrying trade online. In my bewilderment, I became more fascinated with technology and wanted to be part of the people who shall improve it more. In this time, phones became even more common with almost each individual owning one. The use of computers has revolutionized many operations in our normal life; operating lifts, security roadblocks, street lighting, and research operations. The use of technology though comes with many challenges and mitigating them can be more complex and tiresome.
In my studies about technology, I desired to know how certain problems can be solved. The use of smart phones came with its own problems. Apart from using a lot of power and their screens breaking up easily, android applications used in most android phones presented security problems as some steal user information. This is a real security problem at the age of cyber attacks and espionage. This can be even more risky, especially when using smart phones to perform online procurements whereby sensitive financial information might leak. Another problem I encountered in technology was the use of e-commerce systems and how it affects consumer behaviors. The use of smart phones and computers has made it easy to order almost anything from many convenient stores worldwide and the product delivered right to your doorstep. I wanted to know the effectiveness of the e-commerce systems and their future prospectus.
Additionally, the massive use of computers presented questions that computer experts have tried to answer for a long time. The production of complex systems is expensive and time consuming; therefore there is a need to simplify the process to reduce cost. In my quest to know how technology works, I researched about how to design these complex systems through simulation, and the best simulation system to use. I also wanted to know about the appropriate means of allocating file in complex systems and the network types such as RING topology. There are still more areas to explore in the computer aided technology, but these fascinated me the most.
The security of Android applications
I began my research on issues of technology by delving into the world of programming. The fact that 50% of smart phone users in the world use android smart phones was enough to prove that my research would be useful. I found an article by Enck, Octeau, McDaniel, & Chaudhuri in 2011 about android applications security; a highly ignored area. The authors showed in their work that many android applications have security ploys hidden in the source code. This is difficult to unravel for most android phone users who are not bothered by such trivial things. The authors showed that the writing of android applications is in java, compiled in Java bite-code, and finally translated to DEX byte-code. Therefore, to find the security hitch one has to decompile the application back to Java. This is easier since there are many Java applications that are free to get.
Whenever a user installs and android application, the app usually prompts the user to grant the application access to some information (Gommerstadt, & Long, 2012). Some of these are sensitive data that users may not know, the implications it may have on their security. Such may include network access, system tools, development tools, GPS location, and sending message; identify location among other features (Gommerstadt, & Long, 2012). According to Gommerstadt & Long, android applications are made of components such as activity, content provider, service, and broadcast receivers. With these components coupled by the permi...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

Need a Plagiarism Free Essay?
Submit your instructions!