Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
1st Edition
ISBN: 9781305657458
Author: Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 12, Problem 4IR

Explanation of Solution

Java security flaws from two articles:

  • As java in browser is Operating System (OS) independent and it has the popular run-time environment in desktop browsers, java becomes more attractive target for malicious attacker.
  • Oracle is decided to move rapidly to fix the java flaws.
  • In 2013, Oracle released a critical one-off path update to fix the issue before two weeks of the issue being actively exploited...

Explanation of Solution

Processes of informing users about the need to obtain updates to fix security holes:

  • A Critical Patch Update program is a group of patches for various security vulnerabilities where patches are a set of changes such as update, and fixing the data to a computer system.
  • Oracle informs the users that they need to be remains in actively supported version and apply for the Critical Patch Update program.
  • Critical Patch Update program releases the patches for the product versions covered by premier support or extended support of Lifetime Support Policy...

Explanation of Solution

In the world, there are 5 to 10 billion devices have java installed.

Devices that have java installed:

  • In the world, 1.1 billion desktop systems run java...

Explanation of Solution

Ways to identify whether java is installed on a computer

  • If the user uses command prompt to identify the installation of java.
  • After installing java, the user needs to set “PATH” variable in environmental variables.
  • Then, the user types the command “java –version” in terminal.
  • After running the above command, if java is installed on a computer then it shows the version of java, java Standard Edition (SE) Environment’s build and Java HotSpot client Virtual Machine’s (VM) build.
  • The user can also use program that reads java system properties to identify whether it is installed or not...

Blurred answer
Students have asked these similar questions
When first released, operating systems and programs may have bugs. There are literally hundreds of bugs in each application. In many cases, when a software problem is discovered, the manufacturer will provide a fix (also known as patches). Criminals launch zero-day assaults the day after a security hole is disclosed to the public. While no one disputes the immorality of the criminals' actions, one can wonder what responsibility a software developer has when its ineptitude or haste to market results in damage to its clients. It is the responsibility of every computer user to install the latest security updates.
Computer Science Assume you work in the IT department at an organization in Florida. The 500 employees in the organization are diverse in age, gender, race, nationality, and religious preference. Scenario: You discover pornographic images on a company server, which you are responsible for maintaining. You think that some of the images are of nude children. After a forensics investigation, you cannot trace the origins of images to a specific user in the organization. You discover that dozens of employees, including a co-worker, have viewed the images, but no one has reported the incident. What do you do? Whom do you inform? Do you delete them? Do you block further access? Do you call the police? What are the legal requirements you must take?
The majority of software, including operating systems, does not function flawlessly at first release. Many thousands of bugs have been found in various application frameworks. Vendor fixes for recognized software issues are often provided (also known as patches). Zero-day attacks are launched by cybercriminals the day after a new vulnerability is disclosed. The immorality of these criminals is without dispute, but what responsibility does a software developer have if its ineptitude or haste to launch causes damage to its customers? Users also have a responsibility to apply any necessary security fixes to their computers.

Chapter 12 Solutions

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

Ch. 12 - Prob. 11SGCh. 12 - Prob. 12SGCh. 12 - Prob. 13SGCh. 12 - Prob. 14SGCh. 12 - Prob. 15SGCh. 12 - Prob. 16SGCh. 12 - Prob. 17SGCh. 12 - Prob. 18SGCh. 12 - Prob. 19SGCh. 12 - Prob. 20SGCh. 12 - Prob. 21SGCh. 12 - Prob. 22SGCh. 12 - Prob. 23SGCh. 12 - Prob. 24SGCh. 12 - Prob. 25SGCh. 12 - Prob. 26SGCh. 12 - Prob. 27SGCh. 12 - Prob. 28SGCh. 12 - Prob. 29SGCh. 12 - Prob. 30SGCh. 12 - Prob. 31SGCh. 12 - Prob. 32SGCh. 12 - Prob. 33SGCh. 12 - Prob. 34SGCh. 12 - Prob. 35SGCh. 12 - Prob. 36SGCh. 12 - Prob. 37SGCh. 12 - Prob. 38SGCh. 12 - Prob. 39SGCh. 12 - Prob. 40SGCh. 12 - Prob. 41SGCh. 12 - Prob. 42SGCh. 12 - Prob. 43SGCh. 12 - Prob. 44SGCh. 12 - Prob. 45SGCh. 12 - Prob. 1TFCh. 12 - Prob. 2TFCh. 12 - Prob. 3TFCh. 12 - Prob. 4TFCh. 12 - Prob. 5TFCh. 12 - Prob. 6TFCh. 12 - Prob. 7TFCh. 12 - Prob. 8TFCh. 12 - Prob. 9TFCh. 12 - Prob. 10TFCh. 12 - Prob. 11TFCh. 12 - Prob. 12TFCh. 12 - Prob. 1MCCh. 12 - Prob. 2MCCh. 12 - Prob. 3MCCh. 12 - A(n) _____ report consolidates data usually with...Ch. 12 - Prob. 5MCCh. 12 - Prob. 6MCCh. 12 - Prob. 7MCCh. 12 - Prob. 8MCCh. 12 - Prob. 1MCh. 12 - Prob. 2MCh. 12 - Prob. 3MCh. 12 - Prob. 4MCh. 12 - Prob. 5MCh. 12 - Prob. 6MCh. 12 - Prob. 7MCh. 12 - Prob. 8MCh. 12 - Prob. 9MCh. 12 - Prob. 10MCh. 12 - Prob. 2CTCh. 12 - Prob. 3CTCh. 12 - Prob. 4CTCh. 12 - Prob. 5CTCh. 12 - Prob. 6CTCh. 12 - Prob. 7CTCh. 12 - Prob. 8CTCh. 12 - Prob. 9CTCh. 12 - Prob. 10CTCh. 12 - Prob. 11CTCh. 12 - Prob. 12CTCh. 12 - Prob. 13CTCh. 12 - Prob. 14CTCh. 12 - Prob. 15CTCh. 12 - Prob. 16CTCh. 12 - Prob. 17CTCh. 12 - Prob. 18CTCh. 12 - Prob. 19CTCh. 12 - Prob. 20CTCh. 12 - Prob. 21CTCh. 12 - Prob. 22CTCh. 12 - Prob. 23CTCh. 12 - Prob. 24CTCh. 12 - Prob. 25CTCh. 12 - Prob. 26CTCh. 12 - Prob. 27CTCh. 12 - Prob. 28CTCh. 12 - Prob. 29CTCh. 12 - Prob. 1PSCh. 12 - Prob. 2PSCh. 12 - Prob. 3PSCh. 12 - Prob. 4PSCh. 12 - Prob. 5PSCh. 12 - Prob. 6PSCh. 12 - Prob. 7PSCh. 12 - Prob. 8PSCh. 12 - Prob. 9PSCh. 12 - Prob. 10PSCh. 12 - Prob. 11PSCh. 12 - Prob. 1.1ECh. 12 - Prob. 1.2ECh. 12 - Prob. 1.3ECh. 12 - Prob. 2.1ECh. 12 - Prob. 2.2ECh. 12 - Prob. 3.1ECh. 12 - Prob. 3.2ECh. 12 - Prob. 1IRCh. 12 - Prob. 2IRCh. 12 - Prob. 4IRCh. 12 - Prob. 5IRCh. 12 - Prob. 1CTQCh. 12 - Prob. 3CTQCh. 12 - Prob. 4CTQ
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning