TOPIC “FIREWALL”
APA FORMAT
12 PT FONT
6-8 PAGES
6-8 REFERENCE
TOPIC “FIREWALL”
APA FORMAT
12 PT FONT
6-8 PAGES
6-8 REFERENCE
This week we focus on establishing your editorial thinking. What does the author mean by editorial thinking? Also, this week there was a video of Andy Kirk (2015) noting the key concepts of data visualization thinking. Please pick one major concept from the video and note what was said and your thoughts about the topic.
Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.
Assignment Objectives: Choose an Alert closely related to the weekly topic and write a concise summary using the template.
Assignment Directions:
1page
Write a summary of Week 3’s PowerPoint slides (Chapter 3) in the attached file
BI-16
1. Some say that analytics in general dehumanize manage-rial activities, and others say they do not. Discuss arguments for both points of view.
2. Diagnosing infections and prescribing pharmaceuticals are the weak points of many practicing physicians. It seems, therefore, that society would be better served if analytics-based diagnostic systems were used by more physicians. Answer the following questions:
a. Why do you think such systems are used minimally by physicians?
b. Assume that you are a hospital administrator whose physicians are salaried and report to you. What would you do to persuade them to use an intelligent system?
c. If the potential benefits to society are so great, can society do something that will increase doctors’ use of such intelligent systems?
3. What are some of the major privacy concerns in employing intelligent systems on mobile data?
4. Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.
5. Search the Internet to find examples of how intelligent systems can facilitate activities such as empowerment, mass customization, and teamwork.
2pages
3references
diagrams with explanation
One interesting story this week is an issue related to user data harvesting on Android phones
https://www.bleepingcomputer.com/news/security/android-apps-with-45-million-installs-used-data-harvesting-sdk/ (Links to an external site.) – Apparently tens of millions of affected devices.
Contrast the Google-controlled Android platform and how this can happen against the user privacy restrictions imposed by Apple. Do you think that Android should go the same way?
What kind of harvesting apps are out there in the wild? Are there any mainstream consumers of this kind of data (i.e. apps that are likely to be widely used?)
Download The Attachment and Message Me Please for Detailed Instructions
Refer to the “Contemporary Issues in Science and Technology Research Guide,” located in the Course Materials, for complete instructions……………(PROBLEM: RANSOMWARE).
Section 3: Possible Feasible Solutions
Now that you have clearly defined the problem and gathered data that validates it, it is time to propose the solution.
In a Microsoft Word document that is 500–750 words, include the following:
NOTE- MAKE EACH QUESTION A HEADING AND MAKE USE OF THE ATTACHMENT TO DO THE ASSIGNMENT.
Second opinion] ListDescriptionIn this exercise you will find the longest string from a list of strings. Longest refers to the string with the largest number of characters. If two strings have the same number of characters, always choose the one that came first in the list. There will always be at least one string in the list.Function Namelongest_stringParametersstrings: A list of stringsReturn ValueThe longest string in strings.Exampleslongest_string([“a”, “aa”, “b”]) -> “aa”