You are on page 1of 6

1

Internet Technology

Student’s Name

Institutional Affiliations

Professor’s Name

Date
2

Internet Technology

Section A

Email is a computer-based program that allows users to communicate with one another

through exchanging messages. People can exchange emails fast thanks to a global email

network. Email is the electronic version of a letter, but it has the added benefit of being more

timely and flexible. It was first developed in the 1960s, became widely used in the 1970s, and

has since become one of the most widely used applications on the Internet. The features of

Gmail include inbox, sent items, drafts, confidential mode, contacts, calendar, nudge, offline,

and search (Daniel, 2022).

Cloud computing is a type of internet-based computing that provides shared computer

processing resources and data to computers and other devices on demand. It is a model for

enabling ubiquitous, on-demand access to a shared pool of configurable computing resources

(e.g., networks, servers, storage, applications, and services) (Sunyaev, 2020). This technology

allows organizations to scale their IT resources as needed without making significant up-front

investments. Cloud computing is often described as a pay-as-you-go model in which users

only pay for the resources they consume. However, this is not always the case. Some cloud

providers offer subscription-based services, in which users pay a fixed monthly fee for a

certain amount of resources.

The software as a service (SaaS) paradigm of cloud computing refers to the process

through which computer programs are made available to users via the Internet. It is computer

software that is made available by the provider on the Internet. Customers have access to and

can make use of the software, typically through a web browser on a pay-as-you-go basis. At

the same time, the service provider is responsible for managing the underlying infrastructure

and maintaining security. A platform as a service, or PaaS, provides software platforms to

users remotely. It is a platform that gives developers a runtime environment and the tools
3

they need to create applications that they can run and manage. The customer is responsible

for managing the application, while the provider is in charge of the infrastructure and

security.

Section B

The use of augmented reality (AR) in military applications is a growing trend. There are

many potential benefits to using AR in military training and operations. However, some

potential disadvantages of using augmented reality in military settings exist. Some of the

potential benefits of using AR in military applications include increased situational

awareness: AR can provide soldiers with real-time information about their surroundings,

including the location of enemy forces. This can help soldiers to avoid ambushes and make

better decisions in combat situations.

In addition to this, it has improved safety by assisting soldiers in recognizing potential

dangers in their surroundings, such as improvised explosive devices (IEDs) (improvised

explosive devices). This can help lower the likelihood of getting hurt or losing one's life in

dangerous situations. In addition to that, it has been helpful in improving performance in

terms of locating targets. AR is able to provide soldiers with information about their targets,

such as the target's range and size, which can help them better engage those targets. Engaging

in combat with hostile forces can help service members improve their accuracy. Finally,

augmented reality can be utilized by the military for the purpose of conducting training

exercises.

Some of the potential disadvantages of using augmented reality in military applications

include decreased situational awareness, whereby augmented reality can provide soldiers

with so much information that they may become overloaded and unable to process all of it.

This could lead to soldiers making mistakes or missing important information about their

surroundings. Moreover, it could cause human error. AR systems are only as accurate as the
4

information that is input into them. If incorrect or outdated information is input into an AR

system, it could lead to soldiers making wrong decisions based on that information.

Furthermore, its dependence on technology thus being a disadvantage to illiterate

soldiers. AR systems require soldiers to be equipped with the necessary hardware and

software. If soldiers' AR system fails, they may be at a disadvantage in combat. Finally, the

technology is still new and expensive, and there are potential privacy and security concerns

with using AR.

Section c

The different types of malware include viruses, worms, Trojan horses, rootkits, and

spyware (Clincy & Shahriar, 2019). Malware is a type of software that is designed to damage

or disable computers and other devices. It can infect devices by exploiting security

vulnerabilities such as email attachments, USB drives, downloads, and websites. Malware

can also be spread through social engineering, which is when someone tricks a user into

installing it. Once a device is infected, the malware can steal data, delete files, and even take

control of the device. Malware can affect users in a variety of ways, including causing

financial damage, identity theft, disabling security systems, and even physical harm. Malware

can also launch attacks on other computers, making them unusable.

Malware has a wide variety of attack vectors that can be used against users and their

devices. It is possible for there to be lost data, monetary loss, and physical damage to the

hardware. It also has the potential to cause workflow disruptions and downtime. Malware can

even be used to spy on users or launch attacks on other devices. It can do this by gathering

information about the user.

There are a few ways to protect against malware. The best way is to install and maintain

an antivirus program. Antivirus programs can detect and remove malware, and they can also

block malicious websites and email attachments. Another way to protect against malware is
5

to keep your software up to date. Software updates often include security patches that can

close security vulnerabilities that malware can exploit. In addition, be cautious when opening

email attachments and clicking on links. They should also avoid downloading files from

untrustworthy sources and only install apps from trusted sources.

Furthermore, it would be best if you were cautious when downloading files from the

Internet and only download files from trusted sources. Finally, businesses should require

employees to use strong passwords and enable two-factor authentication. They should also

restrict access to sensitive data and systems and monitor network activity for suspicious

activity.
6

References

Daniel. (2022, February 27). Top Gmail features & functions any professional should use.

WiseStamp. Retrieved November 7, 2022, from

https://www.wisestamp.com/blog/gmail-features-and-functions/.

Sunyaev, A. (2020). Cloud computing. In Internet computing (pp. 195–236). Springer, Cham.

Clincy, V., & Shahriar, H. (2019, July). IoT malware analysis. In 2019 IEEE 43rd annual

computer software and applications conference (COMPSAC) (Vol. 1, pp. 920–921).

IEEE.

You might also like