Wednesday, July 17, 2019

Differences in Programming Language

Answer The implication of the computer computer programing knowledge for the company is real(prenominal) great since the correct choice entrust condition proper connectivity, accessibility, slackening of concern and the mixedity of the softw atomic number 18 (Vine, 2005). Certain full(a) get hold ofments batch be obtained from the transcript of the confabulation between Hugh McBride of McBride Financial Services and Abram LaBelle of smith Systems Consulting who discussed the computer network needed for McBrides planned moorings. By programming language, we mean value the make turn out of instructions that atomic number 18 written and called a program and the computer processor carries out the instructions. The signifi elicitce of the programming is matte on the development and alimentation cost, ease of use, gentle availability of the application from antithetic points, speed of access, features that groundwork be provided in the application.A programming language much(prenominal) as Visual Basic is quite easy to learn and implement notwithstanding the language does not forgos for complex computations such as forecasting, gathering information, creating reports, etc. To perform complex operations, algorithms would pretend to be used and programming languages such as C++, C, and opposites are rattling much suited. exactly the cost of development and charge would be signifi keisteristertly higher. These languages are called as OOPS quarry Oriented Programming Languages and they write the autograph around the information that has to be processed. In a majority of the cases, OOPS applications run on dedicated Intranets or WANs.The other(a) set of programming languages are the web establish languages such as Java, .NET, HTML, PHP, etc. These languages allow the application to be web base and the software used is ordinarily freely downloadable. Another set of programming languages are centred around Unix and Linux operatin g outlines. These are usually open source but very complex and requires a dedicated teams of developers and maintenance personnel (OBrien, et all, 2005).2. Differences in weave found and WANs programming languages.Answer on that point are two broad requirements, single is the website that customers, sales staff and brokers would be exploitation and the other is the backend application that the staff would be using to complete their accounting and other tasks. The first possibilities is having a WAN that provide invite dedicated terminals, which can be placed in all the involve line of businesss. The terminal will be instanter connected to a central legion and since it is dedicated, only the Intranet of McBride Financial Services can be accessed. This kind of a brass can be seen in ATMs and would require the application to be written in C++, have the user larboard written in Delphi or other front end languages.The organisation would be connected to a sizeable infobas e that would be able to handle hundreds of contact requests. Systems written in C++ are very stable, crashing of the establishment of rules is very rare, arrangement reply is very fast and most important since it is a dedicated Intranet, hacking is not mathematical and can be immediately detected. exclusively the development cost of such systems is huge, it becomes very complex, in house software programmers are required and software programming is not a core business area of McBride Financial Services. Another alternative is to have a web based system that is written in Java or .NET. These systems also requires expensive programming but after the software is implemented, it can be easily obligeed by lesser expensive teams who are not delicate enough for programming but can set right small bugs and maintain the database.The case also requires a powerful database into which information can be uploaded and downloaded as required. In both possibilities, the database would rem ain aforementioned(prenominal) and only the call procedures would be different. Since auspices is a major concern, very severe credential should be forced. For each connection request, the IP number of the computer should be verified and this can be through through web-based languages. Cookies should not be stored in the client computer and this pr regularts the possibility of other person acquire information from normal computers (Turban, et all, 2002).3. Recommendation for the applicationAnswer A web-based system is recommended since such a system can be accessed from anywhere in the world. A system written in Java or .NET can be implemented. such programming languages can be easily keep and less expensive and the work of maintenance can be outsourced as per the stock industry practice where back office operations are outsourced to reliable parties at lower costs. The database can be each Oracle or IBM WebSphere since both have connectivity to the Internet and are web s ervers. Such servers have the optimum speed and in that location are lesser instances of slow speeds. Customers can access the application from cyber cafes, K market and other department stores and view the choices for pecuniary plans.An online calculator can be provided that will calculate the amount, premium, interest rates, etc. and customers can also provide their personal information. By using 128 bit encryption for authentication as used by PayPal, the chances of hackers getting into the system are very impertinent and this system can be stored in a central server. Employees will logarithm into another server which will develop data from the customers server and carry out their tasks. A robust gateway can be provided between the two servers and this barely reduces hacking possibilities.To prevent the chances of crashes and data loss, it is recommended that day to day records be cached in mirror servers and this data can be written every dynamically or once in 12 hours. I n the case of system crashes, data can be acquire from the mirror servers. To further prevent data loss, tape backups can be interpreted periodically and stored in Storage field of operations Networks. By providing such a system, customers and even staff can access the system from anywhere and use secure login and authentication. If on that point is an unusually high suspicious drill in the network, then this can be seen as a hacking attempt and the system can be stopped all manually or through programs. Web based application will ensure that all the requirements are met (Olson, 2006).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.