Professional Documents
Culture Documents
Internet Technology
Student’s Name
Institutional Affiliations
Professor’s Name
Date
2
Internet Technology
Section A
Email is a computer-based program that allows users to communicate with one another
through exchanging messages. People can exchange emails fast thanks to a global email
network. Email is the electronic version of a letter, but it has the added benefit of being more
timely and flexible. It was first developed in the 1960s, became widely used in the 1970s, and
has since become one of the most widely used applications on the Internet. The features of
Gmail include inbox, sent items, drafts, confidential mode, contacts, calendar, nudge, offline,
processing resources and data to computers and other devices on demand. It is a model for
(e.g., networks, servers, storage, applications, and services) (Sunyaev, 2020). This technology
allows organizations to scale their IT resources as needed without making significant up-front
only pay for the resources they consume. However, this is not always the case. Some cloud
providers offer subscription-based services, in which users pay a fixed monthly fee for a
The software as a service (SaaS) paradigm of cloud computing refers to the process
through which computer programs are made available to users via the Internet. It is computer
software that is made available by the provider on the Internet. Customers have access to and
can make use of the software, typically through a web browser on a pay-as-you-go basis. At
the same time, the service provider is responsible for managing the underlying infrastructure
users remotely. It is a platform that gives developers a runtime environment and the tools
3
they need to create applications that they can run and manage. The customer is responsible
for managing the application, while the provider is in charge of the infrastructure and
security.
Section B
The use of augmented reality (AR) in military applications is a growing trend. There are
many potential benefits to using AR in military training and operations. However, some
potential disadvantages of using augmented reality in military settings exist. Some of the
awareness: AR can provide soldiers with real-time information about their surroundings,
including the location of enemy forces. This can help soldiers to avoid ambushes and make
explosive devices). This can help lower the likelihood of getting hurt or losing one's life in
terms of locating targets. AR is able to provide soldiers with information about their targets,
such as the target's range and size, which can help them better engage those targets. Engaging
in combat with hostile forces can help service members improve their accuracy. Finally,
augmented reality can be utilized by the military for the purpose of conducting training
exercises.
include decreased situational awareness, whereby augmented reality can provide soldiers
with so much information that they may become overloaded and unable to process all of it.
This could lead to soldiers making mistakes or missing important information about their
surroundings. Moreover, it could cause human error. AR systems are only as accurate as the
4
information that is input into them. If incorrect or outdated information is input into an AR
system, it could lead to soldiers making wrong decisions based on that information.
soldiers. AR systems require soldiers to be equipped with the necessary hardware and
software. If soldiers' AR system fails, they may be at a disadvantage in combat. Finally, the
technology is still new and expensive, and there are potential privacy and security concerns
Section c
The different types of malware include viruses, worms, Trojan horses, rootkits, and
spyware (Clincy & Shahriar, 2019). Malware is a type of software that is designed to damage
or disable computers and other devices. It can infect devices by exploiting security
vulnerabilities such as email attachments, USB drives, downloads, and websites. Malware
can also be spread through social engineering, which is when someone tricks a user into
installing it. Once a device is infected, the malware can steal data, delete files, and even take
control of the device. Malware can affect users in a variety of ways, including causing
financial damage, identity theft, disabling security systems, and even physical harm. Malware
Malware has a wide variety of attack vectors that can be used against users and their
devices. It is possible for there to be lost data, monetary loss, and physical damage to the
hardware. It also has the potential to cause workflow disruptions and downtime. Malware can
even be used to spy on users or launch attacks on other devices. It can do this by gathering
There are a few ways to protect against malware. The best way is to install and maintain
an antivirus program. Antivirus programs can detect and remove malware, and they can also
block malicious websites and email attachments. Another way to protect against malware is
5
to keep your software up to date. Software updates often include security patches that can
close security vulnerabilities that malware can exploit. In addition, be cautious when opening
email attachments and clicking on links. They should also avoid downloading files from
Furthermore, it would be best if you were cautious when downloading files from the
Internet and only download files from trusted sources. Finally, businesses should require
employees to use strong passwords and enable two-factor authentication. They should also
restrict access to sensitive data and systems and monitor network activity for suspicious
activity.
6
References
Daniel. (2022, February 27). Top Gmail features & functions any professional should use.
https://www.wisestamp.com/blog/gmail-features-and-functions/.
Sunyaev, A. (2020). Cloud computing. In Internet computing (pp. 195–236). Springer, Cham.
Clincy, V., & Shahriar, H. (2019, July). IoT malware analysis. In 2019 IEEE 43rd annual
IEEE.