Additional Activity 1
Java is a high-level programming language developed by Sun Microsystems that is used widely in Web pages to provide active content. Java is an object-oriented language similar to C++, but simplified to eliminate language features that cause common programming errors. It can run outside the confines of a Web browser and it is platform independent. It also can run on many different computers as long as the Web browser is Java compatible. If Java adds functionality to business application, it can handle transactions and a wide variety of actions on the client computer. Once it downloaded, embedded Java code can run on the clientís computer. However, security violations such as secrecy and integrity violations will happen. To counter these violations, a special security model Java sandbox is developed. The most common complaint about the Java "sandbox" is it\'s SO strict it doesn\'t let innocent, well-meaning developers do things they have a real need to do. This will hopefully changes in the near future when Sun supports a certificate that will allow applets from trusted sources a little more freedom to get the job done.
ActiveX is an object, called a control that contains programs and properties that Web designers place on Web pages to perform particular tasks. ActiveX is not a language, but rather a set of rules for how applications should share information. An ActiveX control is similar to a Java applet. Unlike Java applets, however, ActiveX controls have full access to the Windows operating system. This gives them much more power than Java applets, but with this power comes a certain risk that the applet may damage software on your machine. Another difference between Java applets and ActiveX controls is that Java applets run on all platforms, whereas ActiveX controls are currently limited to Windows environments. The security danger with ActiveX control is that once they are downloaded, they execute like any other program on a client computer. They have full access to all system resources, including operation system code. This has very dangerous implications. An ill-intentioned ActiveX control could reformat a userís hard disk, send e-mail to all the people listed in his or her address book, or simply shut down the computer. Because ActiveX controls have full access to client computers, they can cause secrecy, integrity, or necessity violations.
Microsoft Antitrust PaperMicrosoft Antitrust Paper Viewed together, three main facts indicate that Microsoft enjoys monopoly power. First, Microsoft\'s share of the market for Intel-compatible Personal Computer (PC) operating systems is extremely large and stable. Second, Microsoft\'s dominant market share is protected by a high barrier to entry. Third, and largely as a result of that barrier, Microsoft\'s customers lack a commercially viable alternative to Windows, the operating system of all PC\'s. Microsoft enjoys so
Year 2000: Fiction, Fantasy, and FactYear 2000: Fiction, Fantasy, and Fact The Mad Scramble for the Elusive Silver Bullet . . . and the Clock Ticks Away. Wayne Anderson November 7, 1996 The year 2000 is practically around the corner, promising a new era of greatness and wonder . . . as long as you don\'t own a computer or work with one. The year 2000 is bringing a Pandora\'s Box of gifts to the computer world, and the latch is slowly coming undone. The year 2000 bug is not really a bug or virus, but is more a computer industr
Object Oriented LanguageObject Oriented Language Introduction Object Orientation has become more and more important in the last years. Object oriented programming was designed for re-use of codes. It is a type of programming in which programmers define not only the data structure, but also the types of operations that can be applied to the data structure. In this way, the data structure becomes an object that includes both data and functions. In addition, programmers can create relationships between one object and anot