The history of the food consumption applicalication is one of the most interesting that have ever been made. The work of the application is to keep attack of the food that is being consumed by the user. The application is launched in the android is because of the factor that the majority of the population in the world uses the android operating system in daily life (Vepsäläinen, 2016). The features a simple user interface which will let the users to use the app as an ease. Further the application uses the technology of the database so that it becomes easier for the user to include and delete entries from a table.
The application works as the following way when the user gets to the application the first page or the home page shows the food history, and there are options of the add food. Once the food is added it is listed in the homepage and the option for the deletion of the food is also present in the homepage along with the edit options (Zhang, Yao & Ramakrishnan, 2016). The user can store the details of the food in the local storage and also in the Google drive or the Microsoft drives.
The application will have their nessacery layers for the working of the applications namely the Presentation Layer, Business Layer and Data Layer. The user interface is the part of the presentation layer while the management is done in the business layer and the data layer of the application (Salva & Zafimiharisoa, 2015). While the requirements for the purpose of the installation of the application is quite low as the app can run on as low as the 1 GB of ram and 20mb of the internal storage. While the minimum android version that is required to for the purpose of running the application is Version 5.0 that is android lollipop. The user interface consist of t for parts namely thee add food where the user can choose for the food, write description about it including the date and time. While the second screen that the user gets is the edit food table. While the third one is the delete food table where the user gets the table for deletion of the food chart. The other pages consists of the lists like the view food options and share list options. The use of the MySQL database is one of the other major feature of the application as it can help the user to access the application in a better manner (Xia et al., 2015). Also it helps the user in the proper interaction with the different layers of the application.
Overall it can be said as a good application but there are some of the major issues that is needed to be fixed. The issues are explained in the paper further why this issues must be fixed is also justified in the paper.
In the modern world with the use of the technology it has become easier for thee hackers to access any information from anywhere if there is one single point to be exploited. In the case of the food history it must be said that there is no security feature that is implemented in the application. There is no a any option for the user to keep the data secured. Once any fraudster gets the access to the smartphone then automatically the fraudster gets the access to the users’ application data. One of the most dangerous thing is that the app is connected to the drive or the Microsoft drive and hence any one can get the access to the information present in the drives (Wijesekera et al.,2015). Also the user email address if connected with the applciaiitn may be leaked hence every personal information of the user will get leaked. This is one of the major issue that has be to be properly introduced in the application (Li et al., 2015). In order to make the account more secured there can be options for log in every time the user gets in the application so that the data in the application are safe. Further one of the other major issue is that whether the application is capable of proper handling of the cache files that are stored in then local files. One of the other major problem is that if every time the data base is not properly updated overtime the user enters a new food or edits or deleted something (Backes, Bugiel & Derr, 2016). This may create missing data and also errors in the data base can create data redundancy. One of the other major problem is the three can be numerous number of people logging in at the same time in the application hence there must be a huge cache memory. When a number of people is logging in at the same time there must not be any lagging issue in the system
Some of the minor issues that can come up in the applications can be easily solved by the client or the admin. Some of the problems like the extra battery drainage problems, orientation problems like the application getting stuck in one mode that is portrait or landscape mode, proper ram management can be easily solved by the admiration and the creator of the application (Cai & Ryder, 2017). One of the other minor problem is same kind of the applications are present is that there are too many similar applications that are present in the store hence the user must be careful while downloading the applications. The user must clear the cache file of the application in a regular interval of time so that there are less chances of the application to get lag. Also one the other issue is that the app is free for some duration of time, this helps the creators of the application a good profit but reduces the number of the users.
References
Vepsäläinen, A. (2016). Application security: In Android application development.
Zhang, H., Yao, D. D., & Ramakrishnan, N. (2016, October). Causality-based sensemaking of network traffic for android application security. In Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security (pp. 47-58). ACM.
Salva, S., & Zafimiharisoa, S. R. (2015). APSET, an Android aPplication SEcurity Testing tool for detecting intent-based vulnerabilities. International Journal on Software Tools for Technology Transfer, 17(2), 201-221.
Xia, M., Gong, L., Lyu, Y., Qi, Z., & Liu, X. (2015, May). Effective real-time android application auditing. In Security and Privacy (SP), 2015 IEEE Symposium on (pp. 899-914). IEEE.
Wijesekera, P., Baokar, A., Hosseini, A., Egelman, S., Wagner, D., & Beznosov, K. (2015, August). Android Permissions Remystified: A Field Study on Contextual Integrity. In USENIX Security Symposium (pp. 499-514).
Backes, M., Bugiel, S., & Derr, E. (2016, October). Reliable third-party library detection in android and its security applications. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 356-367). ACM.
Cai, H., & Ryder, B. G. (2017, September). Understanding Android application programming and security: A dynamic study. In Software Maintenance and Evolution (ICSME), 2017 IEEE International Conference on (pp. 364-375). IEEE.
Li, L., Bartel, A., Bissyandé, T. F., Klein, J., Le Traon, Y., Arzt, S., … & McDaniel, P. (2015, May). Iccta: Detecting inter-component privacy leaks in android apps. In Proceedings of the 37th International Conference on Software Engineering-Volume 1 (pp. 280-291). IEEE Press.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download