501 words - 3 pages
1. Explain the difference between operating system software, application software, and utility software.
The difference between the 3 programs is that the operating system is the central control for all programs on a computer. The utility software is what keeps the operating system and application working normal without clutter or virus. Then the application software is what issued in the operating system to interact with the hardware to make the computer my user friendly.
2. Explain the concept of virtual memory and why it is needed.
Virtual memory is the use of hard drive space for program data that is currently not in use. So that the program that does need the ram memory can use
485 words - 2 pages
Software Development Life Cycle (SDLC) is a series of steps, or phases, that provide a model for the development and lifecycle management of an application or piece of software. The process varies with industries and organizations, but the most common such as ISO/IEC 12207 embody what establishes a life cycle for software, and produce a method for the development, acquirement, and structure of software systems.
SDLC can be broken down into six steps. First and most important being planning. Engineers in the organization compile requirements from the client and a scope document is created. Next is the implementation process. The code for the software is written by software engineers in
355 words - 2 pages
provides technical support to users regarding hardware, software, and network related problems
• Identifies problem sources to resolve hardware and software failures and malfunctions
• Provides specialized user support services including the timely diagnosis and resolution of problems and malfunctions in computer applications
• Performs setup and installation of computers, networks, peripherals, and software for users
• Prepares hardware, software, and procedural documentation
• Performs network administration functions including creation, deletion, maintenance, and assignments of rights to users, groups, and shared files
• Assists in optimizing computer and network
384 words - 2 pages
has smaller self-contained phases of life cycle in the project. There is an addition of functionality to the software product in each increment division. This creates the need for testing the added functionality before the software goes to the next stage of development. This model is critical in that it enables early detection of errors that could have been developed during the software development. Incremental Development Model examples include Rapid Application Development (RAD) and agile development.
The waterfall model is a process in which developers follow certain phases in an orderly manner while developing software. These phases form an important part of SLDC in that each phase has
395 words - 2 pages
that it selects the next computer to which the message should be sent. Second, it can find the address of that computer if it doesn’t already know it.
Transport Layer : It is very similar to the transport layer in the OSI model. It performs two functions. First, it is responsible for linking the application layer software to the network and establishing end-to-end connections between the sender and receiver when such connections are needed. Second, it is responsible for breaking long messages into several smaller messages to make them easier to transmit and then recombining the smaller messages back into the original larger message at the receiving end. The transport layer can also detect
739 words - 3 pages
collaboration on the World Wide Web.
< Enter the reference taken for project development >
/ < College name >
< Project scenario name > < Project scenario name > Software Requirements Specification
Version X.0 Version X.0
Technologies to be used:
< Mention the technologies to be used in your project > Ex :
J2EE: (Servlet, JSP, JAXP, Java Beans) Application architecture. JAVA: Application architecture. WASCE: (WebSphere Application Server Community Edition) Web Server DB2: IBM Database. Ajax: Asynchronous Java Script and XML. XML: Extension Markup Language. Web 2.0: RSS Feed 2.0.
• • •
RAD 7.0: Development tool
6174 words - 25 pages
MICROSOFT SOFTWARE LICENSE TERMS
WINDOWS VISTA HOME BASIC SERVICE PACK 1
WINDOWS VISTA HOME PREMIUM SERVICE PACK 1
WINDOWS VISTA ULTIMATE SERVICE PACK 1
These license terms are an agreement between you and
· the device manufacturer that distributes the software with the device, or
· the software installer that distributes the software with the device.
Please read them. They apply to the software named above, which includes the media on which you received it, if any. Printed-paper license terms, which may come with the software take the place of any on-screen license terms. The terms also apply to any Microsoft
· Internet-based services, and
370 words - 2 pages
Application of Risk Management Techniques
1. Identify threats to the seven domains of IT within the organization.
a. User: Employees, Weak passwords, Social engineering, Risky websites, Infected software.
b. Workstation: Malware, Bugs
c. LAN: Hackers
d. LAN-to-WAN: Accessibility, Untrusted zones
e. Remote Access: Remote access, Unprotected connections
f. WAN: Semiprivate lines
g. System/Application: Unneeded services/protocols, Default passwords, Unpatched systems
2. Identify vulnerabilities in the seven domains of IT within the organization.
a. User: Social Engineering
b. Workstation: No antivirus software
c. LAN: Inappropriate access controls
1201 words - 5 pages
explain the functions of audit productivity software and how that software can be used in Kudler’s AIS system.
How Will CAATs Be Used To Validate Data And System Integrity
CAATs are used to improve the effectiveness of an audit. According to Hunton, Bryant, & Bagranoff (2004), these are procedures that assist IT auditors in obtaining sufficient, reliable, relevant, and useful evidence to support predefined audit objectives. CAATs can be used to evaluate application controls, verify the integrity of data, and detect fraud. Substantive testing of application controls is typically done using test data. Test data is a set of fabricated data that an auditor creates to run through the
307 words - 2 pages
What is free software? List three characteristics of free software.Free software is code that is available for free to everyone, but it is also free in the sense that it can be used and altered freely to the user's desires. It is free to be studied, redistributed, and modified.
Why is Linux popular? Why is it popular in academia?Due to the operating system's distribution among universities, students were able to become used to it's sophisticated developing environment which helped these graduates succeed in the industry as UNIX was being spread throughout the world.
What are multiuser systems? Why are they successful?Multiuser is a term that defines an operating system or application
5701 words - 23 pages
Fundamentals of MIS
1. What is computer hardware? What are the different parts of hardware? Discuss.
Answer: Computer hardware is the collection of physical elements that comprise a computer system. Computer hardware refers to the physical parts or components of computer such as monitor, keyboard, hard disk, mouse, etc. Refers to objects that we can actually touch, like disks, disk drives, display screens, keyboards, printers, boards, and chips. In contrast, software is untouchable. Software exists as ideas, application, concepts, and symbols, but it has no substance. A combination of hardware and software forms a usable computing system.
All the elements that go together to make up a
1921 words - 8 pages
development (Cernosek & Naiburg, 2004).
Runeson and Greberg (2004) describe the rational unified process as “…a development methodology, created and marketed by Rational Software, and now owned by IBM.” It was designed for large software development projects and is typically packaged as a licensed application with a software system. RUP was first developed in 1998 by Grady Booch, James Rumbaugh and Ivar Jacobsen (Jacobson, Booch, & Rumbaugh, 1999). The process and methodology is use case driven and includes the following components; 1. Roles- who performs the functional task, 2. Artifacts- produced results from the task, 3. Activities- how the task is performed and 4. Workflows- include
1331 words - 6 pages
3. System and Software Architecture
The programming language for the Inventory Management System application will be in Java since the JSP/Tomcat architecture will be used. Both types of clients will communicate with the server using Java Remote Method Invocation (RMI) with Secure Socket Layer (SSL). Thus, security will be upheld by HTTPS in both a private network and a network connected to the Internet. The application will use a client-server model. See Figure 3.
Furthermore, the Java Database Connectivity (JDBC) will use the MySQL Connector/J driver for the server to communicate to the inventory database. Upon receiving requests from the clients, the
564 words - 3 pages
The application layer is the one most computer users are the most familiar with, whether it is known to them or not. This is where user forward software operates, such as e-mail and the beloved World Wide Web. The application layer handles resources, files, and verifications necessary for these things to operate.
The presentation layer is aptly named. Its main function is to present decrypted or encrypted data to the application layer. Examples of this process include viewing video streams or listening to music online.
The session layer creates a session, or connection between processes running between two separate
603 words - 3 pages
areas of the company, but they don’t need the full implementation because you only need the parts that fits your business needs and cost associated with it. The cost also depends on if they install the ERP themselves or have an outside firm do it.
Get the best out of ERP
You need to pick an ERP solution that will meet the specific business requirements and enable you Implementation to run smoother. Customizing the software is not needed if the software package is written for your industry. Also, Customized solutions are not timely-fashion implementations and add the unnecessary cost. One of the top reasons ERP implementations fail is
because the software doesn’t meet basic industry specific business requirements.
However; purchasing an ERP application is only half the battle. A well designed
implementation plan is the key to success.
The main reasons ERP system fail is because the software doesn’t meet the industry specific business requirements.
1151 words - 5 pages
Software Threat Analysis and Mitigation
Jan 14, 2015
Software Threat Analysis and Mitigation
Many different types of software threats exist today. All of these threats can harm your companies’ bottom line. Whether it is directly by stealing funds, proprietary information, data, or indirectly by damaging code, denial of service, reducing company productivity. There are many different products, services, and procedures that can provide differing levels of protection against these threats.
Threats and Counter Measures
A buffer overflow attempts to disrupt the function of an application by providing more data to the program than it was designed to handle. This
6035 words - 25 pages
-box type testing geared to functional requirements of an application.
System testing – Entire system is tested as per the requirements. Black-box type testing that is based on overall requirements specifications, covers all combined parts of a system.
End-to-end testing – Similar to system testing, involves testing of a complete application environment in a situation that mimics real-world use, such as interacting with a database, using network communications, or interacting with other hardware, applications, or systems if appropriate.
Sanity testing – Testing to determine if a new software version is performing well enough to accept it for a major testing effort. If application is crashing
556 words - 3 pages
The Objective-C environment, a growing collection of tools and reusable components (Software-ICs) for large-scale production system-building is discussed. Its goal is to make it possible for its users to build software systems in the way that hardware engineers build theirs, by reusing Software-ICs supplied by a marketplace in generic components rather than by building everything from scratch. The environment is based on conventional technology (C and Unix-style operating systems), which it includes and extends. The extensions presently include a complied and an interpreted implementation of Objective-C (an object-oriented programming language based on C) and several libraries of reusable
2501 words - 11 pages
learning. So there is a strict need to get away from this illegal act.
Hence the piracy in Pakistan should be wiped out using anti piracy measures. The very first step that can be taken is the strict application of copyright laws. Copyright law that is applied in Pakistan is The Copyright Ordinance of 1962. Which was amended in different years and now the punishment for piracy of software is also put under this law. According to this law a person is accused of piracy when, “any person who knowingly infringes or abets the infringement of the rental rights in cinematographic works and computer programs” (Sect. 66). In the very same law the penalty for this unauthorized rental of software
415 words - 2 pages
In this fast computerized world, cloud computing is one of the emerging technology in today's life and plays a major key role in changing the aspects of the computer world as many organizations have started using it from day to day life. The main purpose of "The Cloud" is what kind of models/architectures it offers for research and development in this digital world.
Cloud computing primarily focuses on sharing data over a scalable network. The network includes data centers, end user computers and web services. Such a network of nodes is called cloud. An application based on such cloud is called cloud application. Usually, cloud is an image for internet which
966 words - 4 pages
b. Threat and Vulnerability #2: Loss of Production Data
* Information – Threat
* Applications – Threat
* Infrastructure – Threat
* People – Threat to someone’s job
c. Threat or Vulnerability #3: Unauthorized access to organization owned Workstation
* Information – Threat
* Application – Vulnerability
* Infrastructure – Vulnerability
* People – Threat
d. Threat or Vulnerability #4: Workstation browser has software vulnerability
* Information – Vulnerability
* Application – Vulnerability
* Infrastructure – Vulnerability
* People – None
e. Threat or Vulnerability #5: User downloads an unknown e-mail attachment
732 words - 3 pages
TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false.
Supply chain inefficiencies can waste as much as 25 percent of a company’s operating costs.
Implementing an enterprise application typically requires organizational change as well as adjustments to existing business processes.
You would expect to find PRM and ERM modules in the most comprehensive CRM software packages.
Enterprise systems require fundamental changes in the way the business operates.
MULTIPLE CHOICE. Choose the one
2494 words - 10 pages
usernames and determine valid ones with the help of these different error messages (2006).
Countermeasures: display constant error messages to prevent disclosure of valid usernames. Make sure if trivial accounts have been created for testing purposes that their passwords are either not trivial or these accounts are absolutely removed after testing is over - and before the application is put online (2006).
Although securing a web server can be a formidable operation and requires expert know-how, it is not an impossible task. Unconnected of what web server software and OS is running, an off the shelf configuration is typically insecure. Consequently one must make some compulsory security
922 words - 4 pages
application must has an introduction with the story of the game, menu of the application, configuration such as display (full screen mode) and sound, and main game.
Here are the rules that you must follow to create your project:
1. Use appropriate software for this subject based on Sistem Praktikum that can be downloaded from Binusmaya.
2. There are some criteria that must be included in your game:
* Create a game play using a game concept by Ernest Adams (2010) which contains:
a. Input system that uses to get the input from user with the explanation.
b. The collisions that support the application.
c. Objective play which contains at least 10 in your
2759 words - 12 pages
CSC581: Advanced Software Engineering
Web Application Architectures
As the difficulty of web application grows, the need to develop an architecture for the web application is become necessary in order to support and guide an organization for web system planning, maintenance, deployment, building and design. This research paper presents an abstract view for web application architecture and it will be focused on the comparison of existing applications architecture. Moreover, it discusses the advantages and disadvantages of these architectural designs.
Web application, Architecture, Framework, MVC, Ajax, SOFEA.
489 words - 2 pages
Chapter 1 assignment
Nouf Mohammad Alshammiri
(1) Analysis: the second phase of the SDLC in which system requirements are studied and structured.
(2) Application Software: Computer software designed to support organizational functions or processes.
(3) Computer aided software engineering (CASE) tools: systems development methodologies created to radically decrease the time needed to design and implement information systems. This methodology relies on extensive user involvement, prototyping, integrated CASE tools and code.
(4) Design: the third phase of the SDLC in which the descriptions of the recommended solution in converted into logical and physical system
293 words - 2 pages
and bank receipts will not be used anymore and will be replaced by the ERP system. Customers have to sign a form whether they pay at a branch or at the HQ. If a branch deposited the money, an e-mail will be sent to the branch and HQ to inform the employees. The bank will send data to the main server that updates the main ERP system and thereby also the ERP branch software.
It is a must for customers to be able to use a web application that gives them the opportunity to pay online and have an overview of their profile. Each customer has its own account that can be used to log on the website. An online chat gives them a fast helpdesk service for any quick questions. Furthermore, Internet banking is also possible if they enter the right reference number that has been given in the preventive reminder mail. The ERP system will update this automatically when RFC receives the money with the right reference number.
411 words - 2 pages
Unified Communication Platforms
March 7, 2016
The differences of Unified Communication Platforms, Features, Functionally
Softphone: A softphone ( software telephone) is an application program that enables voice over internet protocol ( VOIP) telephone calls from computing devices in the enterprise, softphone are sometimes referred as a soft clients, Most softphones applications work in conjunction with a headset and microphone a specialized VOIP phone ( sometimes called a hard phone) or by using a device called an analog telephone adaptor ( such as magic
1120 words - 5 pages
outstations will also host a copy of the databases on their servers, which will synch data with the main databases every 5-10 minutes. These stations will also be able to keep accessing the system through the loss of internet, though the database tables will not synch with the main databases without internet connectivity. When the internet is not available, all copies of the databases will hold data until internet is available, at which point they will synch up with the main database.
Proposed business process changes
Riordan Manufacturing will experience an easy transition into the newly proposed business software application. Many departments will experience very little change. The
733 words - 3 pages
2. The situation in ERP software area
3. Analysis SAP, Oracle and QAD
4. What is QAD strategy
5. Conclusion for cloud computing in the future
QAD, a ERP software company which was founded in 1979. It is focusing on manufacturing industry. The competitors are such as SAP, Oracle, Inforsys, Epical etc.
2. The situation in ERP software area
2.1 Where is QAD’s position?
The collection data metrics on selection trends, satisfaction and benefits realization are also included. So QAD software is among the tier 2 area. Which is competed with Epicor, Sage, Infor etc.
2.2 How about the pattern of competion?
It is an oligopoly competition
829 words - 4 pages
Check Point Threat Categorization
May 10, 2013
Check Point Threat Categorization
|Define each of the following terms in your own words: |
|Boot sector - Is the area of the computer that contains storage devices like hard drives, and is the area where the firmware and software boot from |
|because the codes are located here
900 words - 4 pages
A middleware is an infrastructure that supports and connects enterprise applications. The middleware lies between the operating system and the enterprise application. It lies on each side of a distributed computer system network. Middleware supports sophisticated and distributed computer software applications. Any application between the computer kernel and user applications is considered to be a middleware.
The most important aspect of the middleware is that it enables communication and input and output of the developers. Middleware becomes the link between the os-ware and the application software. This aspect of the middleware makes it possible for the applications to borrow
279 words - 2 pages
Below you will find detailed information for this job. Click the link for Organization Name to view more information about the employer.
If Submit Resume is available above, click it to submit your resume directly to this employer. If it is not, please read the Application Instructions below for details on how to send your resume to the employer.
No of Openings:
$10.00-$13.00 Per Hour
Busy ENT office seeking Medical receptionist with a minimum of 1 year experience.
Candidate must have knowledge and experience using EMR or other electronic medical record software. Job duties include, but not limited to
2685 words - 11 pages
R project. In addition, a
considerable portion of big data is stored in diverse database systems. But, the data types of
general statistical software are different from the database systems such as Oracle, or
MySQL. So, many approaches to connect statistical software to database management
system (DBMS) were introduced. In this paper, we study on an efficient connection
between the statistical software and DBMS. To show our performance, we carry out a case
study using real application.
Statistical software, Database management system, Big data analysis, Database connection,
MySQL, R project.
Every day, huge data are created from diverse fields, and
1131 words - 5 pages
where they are in the manufacturing process, which will aid in eliminating cost for overtime.
The next software that I would recommend would be some kind of mobile application for the company’s delivery drivers and their sales. This will allow the sales staff to place their orders more efficiently and quicker from the customers’ front door. By taking the sales force software and integrating it with the ERP platform, the sales staff will be able to place the customer’s order remotely and they can determine a delivery time that is approximate based on the current conditions in the manufacturing plant. Sales and customer satisfaction will increase because of the company’s ability to move quicker
3065 words - 13 pages
, notifications etc. will mean that for the time they play, ASIO4ALL may be unable to initialize the audio device.
For updates, help and further information, please visit: http://www.asio4all.com/ - ASIO4ALL Web site http://mtippach.proboards40.com/ - Support forum
Getting Started Setting up your audio software
In order to make use of ASIO4ALL, you need to configure your audio software accordingly. How you would do this depends on your particular software application. Generally, you would always enter the audio configuration menu and select ASIO -> ASIO4ALL v2. There now should be a button to launch the ASIO control panel. How this button is labeled depends on your particular
3066 words - 13 pages
, notifications etc. will mean that for the time they play,
ASIO4ALL may be unable to initialize the audio device.
For updates, help and further information, please visit:
http://www.asio4all.com/ - ASIO4ALL Web site
http://mtippach.proboards40.com/ - Support forum
Setting up your audio software
In order to make use of ASIO4ALL, you need to configure your audio software accordingly. How you would
do this depends on your particular software application. Generally, you would always enter the audio
configuration menu and select ASIO -> ASIO4ALL v2.
There now should be a button to launch the ASIO control panel. How this button is labeled depends on your
particular software. Once you
460 words - 2 pages
– The software lets the computer use the |Web Server |
| |Hypertext Transfer Protocol to serve HTML file to web browser clients. | |
|10 |A reformulated as an application of XML based on HTML 4.01 |XHTML |
Match web design key terms with their correct definitions. Use the Principles of Web Design Glossary as a resource.
Note. Table definitions come from the Glossary of Principles of Web Design.
1) Absolute URL
3940 words - 16 pages
, detailing that I require an application developer who has prior experience and the appropriate skillsets in designing for Apple iOS. After finding this individual I will have them sign a Non-Disclosure Agreement, protecting my intellectual property before any of my business ideas are disclosed.
November-December: Design our application’s prototype- through web-based software, we will begin the designing my application, assisting prospective programmers in understanding my overall vision.
January-February: Coding the application- engineering an actual product through the implementation of all our ideas. This includes coding every component necessary in creating a smartphone application
6786 words - 28 pages
the device via Google-developed Java libraries. It empolys the software stack architecture, as shown in Figure 1. • Android relies on Linux version 2.6 for core system services such as security, memory management, process management, network stack, and driver model. The kernel also acts as an abstraction layer between the hardware and the rest of the software stack. It is implemented by programming language C. • The middleware level includes Runtime and Libraries. The Runtime includes core libraries, providing most of the functionality available in the core libraries of the Java programming language, and Dalvik virtual machine which allows every Android application runs in its own process
1987 words - 8 pages
internet. They protect internal systems by monitoring packets for the wrong source or destination, or by offering a proxy server with no access to the internal documents and systems, or by restricting the types of messages that get through, for example, e-mail. They act as a measure of control, enforcing the relevant components of the security policy. A firewall can be a number of different components such as a router or a collection of host machines. However, the basic function of a firewall is to protect the integrity of the network which is firewall controlled.
An intrusion detection system (IDS) is a device or software application that monitors network or system activities for
1242 words - 5 pages
how they would benefit the company: RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central site. It's specified as part of the Management Information Base (MIB) in Request for Comments 1757 as an extension of the Simple Network Management Protocol (SNMP). RMON can be supported by hardware monitoring devices (known as "probes") or through software or some combination. For example, Cisco's line of LAN switches includes software in each switch that can trap information as traffic flows through and record
2469 words - 10 pages
contrast, Microsoft (Leading OS market) products are not supported after a period of time following their release.
In Chart 1, it is clear that the Windows OS is dominating the market by a large margin, but this should not be a deterring factor. The UNIX OS has numerous benefits as outlined in the security and administration sections of this paper.
Typical Microsoft installations include software in addition to Windows which is critical to the successful integration of company business operations. Microsoft Office software includes a spreadsheet application, a database
1020 words - 5 pages
3rd party device management server supporting ActiveSync protocols.
Data protection Windows Phone controls how data is synchronized and does not allow synchronization of files and email via a local (USB tethered)workstation. This prevents rogue and potentially harmful files from being added to the phone. The Microsoft Zune software, the desktop application that connects Windows Phone to a Windows PC, only synchronizes media files, such as music, video and podcasts, or Windows Phone Marketplace apps, with a Windows Phone. This approach prevents users from copying or removing documents from or to a Windows Phone. IT professionals can set up Active Directory Rights Management Services (RMS
3731 words - 15 pages
, Boucher, Bogawat, n.d.).
The purpose of an application architecture is to build a bridge between business requirements and technical requirements by understanding use cases, and then finding ways to implement those use cases in the software. The first step is to identify the requirements that affect the structure of the application. The architect must consider the overall effect of design decisions, the inherent tradeoffs between quality attributes and the tradeoffs required to address user, system, and business requirements. The next step in application architecture is to make sure that there is flexibility in the application for future changes. ("Chapter 1: What Is Software Architecture
798 words - 4 pages
1.Android - Overview
What is Android?
Android is an open source and Linux-based Operating System for mobile devices such as smartphones and tablet computers. Android was developed by the Open Handset Alliance, led by Google, and other companies.
Android offers a unified approach to application development for mobile devices which means developers need only develop for Android, and their applications should be able to run on different devices powered by Android.
The first beta version of the Android Software Development Kit (SDK) was released by Google in 2007 where as the first commercial version, Android 1.0, was released in September 2008.
On June 27, 2012, at the Google I/O
387 words - 2 pages
the ability to effectively polish my public speaking. Every session we engage in Impromptu Speaking. We are given a topic question and immediately following the allotted 2 minutes of outlining a name is called and the speech is made. Listening is also important when working in the many group projects, and I have gained that ability and was able to exercise it numerous times this year. I have been delivering impromptu speeches for 3 years now, and I am graded well each time. I know that during an internship, I would be able to successfully communicate my ideas and thoughts during my tenure at the company.
The MBA program organizes the curriculum to include a computer literacy course that teaches how to use the Microsoft software. In that course, I was able to thoroughly learn the proper way to use each software application. In many of my business courses, we are required to put our learning to use by completing majority of assignments on Microsoft excel, PowerPoint, and email.
370 words - 2 pages
This article is about the type of website. For the article about Wikipedia, see Wikipedia. For other uses, see Wiki (disambiguation).
"WikiNode" redirects here. For the WikiNode of Wikipedia, see Wikipedia:WikiNode.
A wiki ([pic]i/ˈwɪki/ WIK-ee) is a web application which allows people to add, modify, or delete content in collaboration with others. In a typical wiki, text is written using a simplified markup language or a rich-text editor. While a wiki is a type of content management system, it differs from a blog or most other such systems in that the content is created without any defined owner or leader, and wikis have little implicit structure, allowing structure to
3341 words - 14 pages
•A state-of-the-art backup system will be implemented for centralized backup of enterprise systems
Upgrading IDI’s software is more than just an economic business decision. It is a matter of security, productivity, lower costs, and employee morale. The decision to upgrade software must be examined like any other decision. The longer a software package has been around and the more popular the software package is, the more the software represents a security risk. Over the useful life of a software package, security holes and the malicious viruses that take advantage of them make a long list of reasons to upgrade to newer and more secure versions of the same software.