Policy and legal_2

Discuss in 500 words your opinion whether Edward Snowden is a hero or a criminal. You might consider the First Amendment and/or the public’s right to know as well as national security concerns. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

IT345 Week 6 discussion

 Pick a topic below and post your reply. Your response should be at least 500 words and appropriately cites your resources. 

 

Topics:

  • What jobs have been eliminated due to technology? What jobs have been created?
  • Do automated systems mean fewer jobs for high-skilled workers?
  • Would you want to telecommute? Why or why not? Is it a viable solution for all employers?
  • Is hacking that does no direct damage a victimless crime? Give an example to support your case

User Interface Design Document.

  

User Interface Design Document

Design a multi-platform application that has a desktop, web and mobile interface for a property rental company, called UMUC Property Rentals.

The full description for this project, project template and a sample template are attached. 

Single sign-on (SSO)

Single sign-on (SSO), security, and authentication are common terms in enterprise technology.  Research SSO and prepare a comprehensive paper that explores the pros and cons of the SSO system.  Discuss the benefits and detriments of SSO to the security protocol in an enterprise.  Finally, assert your opinion on whether SSO is a benefit or detriment to security.

3 pages 

Limitations of Blockchain and Emerging Concepts

The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.

Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.

Conclude your paper with a detailed conclusion section that discusses both limitations and emerging concepts.

Your paper should meet the following requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

information security-Delete Yourself from the Internet (Is it possible and how can it be accomplished?)

  

Do you feel you are vulnerable to hackers or identity thieves because you have a large online presence? Have you ever thought of removing your personal data from the net? Well, it’s not quite as simple as it should be. There are a few easy-to-follow steps that should point you in the right direction that can be found online, but the story does not end there. How can you make sure your personal information or financial data will not be exposed on sites that do not have your written permission? Is it possible to completely remove yourself from the web?

  

Project Plan

In this case project, we will determine the many options and the companies that collect your personal information. They’re called data brokers and they have names like Spokeo, Whitepages.com, PeopleFinder, BeenVerified, as well as plenty of others. 

1) In addition to the sites named above, list 5 additional agencies you find that collect this type of personal data. Hint: Many of them claim to be marketing agencies.

2) Provide a list of the companies that you find that claim to be able to remove your personal information from the data broker sites and the methods they use to delete this information.

3) Write a report with a step-by-step written summary of the processes and the methods which describe how you would go about DELETING yourself from the Internet. 

python short project

 I have this short and introductory project (python).the complete requirements are attached and the module is attached . read the full instructions to understand exactly what should be done. 

Discussion

 In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity, not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc. 

Please find the sources from  https://libguides.nec.edu/az.php