Identify at least two vulnerabilities on your home computer and share them with your peers. Explain how you have/will mitigate those vulnerabilities.
Formative and Summative Evaluations
What are the differences between formative evaluations and summative evaluations? At which stage in product development do you believe that evaluations should use controlled settings instead of natural settings? Why?