Cyber law assignments

  

All the below three questions need to be without plagiarism and need to user proper references, inline citations, APA formatted and wordcount to be as requested,.

Question 1:

Using a Microsoft Word document, please discuss the case involving the United States of America versus Ross Ulbrecht. Please include what took place at the United States Supreme Court. The minimum word count shall be not less than 500 words

Question 2:

Using a Microsoft Word document, please review ONE of the following films and tell how that film represents a contribution to the field of CyberLaw. 

War Games (1983)

Citizen Four (2014)

AlphaGo (2017)

Google and the World Brain (2013) 

The minimum word count shall be not less than 1000 words.

Question3:

Using a Microsoft Word document, please list in order of your preference the five top areas in which you think computer-based laws should be passed or strengthened by legislatures, and a brief description of  why you chose this law and its ranking

The minimum word count shall be not less than 250 words.

COMPUTER

 

Below are some example good topics but any topic that can associate use of computers and technology is fair game to use for this final written paper.

  • Application of Artificial Intelligence
  • Application of Technology and Computers applied to a Field of Study
  • Biotechnology
  • Electronic Commerce
  • Electronic Monitoring
  • Management of Information Systems
  • Geometric Computation
  • Gaming
  • Green Computing
  • Hardware/Architecture
  • Human Computer Interaction
  • Informatics
  • Internet Systems
  • Knowledge Management
  • Machine Learning
  • Mobile Computing
  • Networks
  • Nursing Informatics
  • Robotics, Vision & Physical Modeling
  • Scientific Computing
  • Security and Privacy
  • Smart Cards
  • Social and Academic Networking
  • Social Commitment using Technology
  • Software/Operating Systems
  • Systems Reliability/Dependability

Assignment Expectations

Length: Minimum of 1500 words; thoroughly addressing research topic in a clear, concise manner.

Structure: Include a title page, abstract, and reference page in APA style. These do not count towards the minimal word amount for this assignment.

References: Use the appropriate APA style in-text citations and references for all resources utilized to answer the questions. Include at least three (5) scholarly sources to support your claims.

Format: Save your assignment as a Microsoft Word document (.doc or .docx).

File name: Name your saved file according to your first initial, last name, and the assignment number (for example, “RHall Assignment 1.docx”)

5s week 4 assignment BS

in 350 words,

You were supposed to pick three password examples, one not secure, one acceptable, and one very secure. Then write a brief description of the passwords you have chosen, indicating why they are secure or not secure.

Include references. Do not copy paste.

Need 2 Page document with proper APA formatting and citations and 3 references. No Plagiarism

 Assignment: Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course( Telecomm Network Security, Firewalls and VPNs ) have been applied, or could be applied, in a practical manner to your current work environment (software developer). If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Project paper – COmputer Science

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

Cyberlaw

1.  On the discussion forum, describe an instance of plagiarism or other use of another’s intellectual property with which you are familiar. Please give one argument condemning this conduct and one argument defending it. On April 18, 2016, The United States Supreme Court denied a petition for certiorari (refused to review the lower court’s ruling) in the case of Authors Guild v. Google, Inc., 804 F. 3d 202 – Court of Appeals, 2nd Circuit 2015. Tell me what you would do if you were the Supreme Court. That case let stand the ruling of the Court of Appeals which can be found at the following website: https://scholar.google.com/scholar_case?case=2220742578695593916&q=Authors+Guild+v.+Google+Inc&hl=en&as_sdt=4000006 

 February 9, 2019. Please write a 500-word summary of fair use as this court decision says it.

   2. Please run a Google search of the term, “United States Supreme Court Carpenter v. United States 2018.”  Please write an essay of not less than 500 words, summarizing the court’s decision. 

 3. Complete the following two steps:  Social media platforms such as Facebook, Twitter, and even Tiktok have become very powerful and influential. Please give your thoughts on whether governments should regulate the content of content on these media. Minimum 250 words.

Database system

  

What is the importance of the master system database? Discuss the pros and cons of full database backup. Discuss all components of the database engine in relation to data availability, and their benefits and disadvantages in relation to server redundancy, database redundancy, and file redundancy. Provide examples to justify your ideas. (50-70 words with reference)

Entities within databases take on many forms. Provide three examples of entities you may encounter and summarize the attributes of each. Explain why entities are important and provide examples to illustrate your ideas. (50-70 words with reference)

1 page essay answer

 

  1. (a) Describe and give examples of the 2 most significant computer security threats that are impacting the world at the present time.  (b) What steps are being taken to minimize or thwart these threats?  (c) Will the efforts proposed to protect individuals, companies and the governments from these threats still protect the rights of citizens?  (d) Do you think that the steps taken or to be taken are ethical and will not cause a backlash in society?  Please elaborate (beyond a yes or no answer)

2.  (a) Describe at least 3 of the most significant ethical/social issues for individuals and at least 3 of the most significant ethical/social issues for businesses/organizations in the field of Computer Science.  (b) Which, if any, of these issues overlap both individuals and businesses/organizations?  (c) For each issue that you identified that is causing a major ethical/social problem for society, suggest a solution for this problem.  Be as concise as possible in your answer and do not address the issue of security threats in this questionPlease elaborate (beyond a yes or no answer)

3.  The field of computer science has changed during your lifetime and will continue to change in the future.  When the Computer Science department at this University was created in 1974 students were using keypunch cards to run programs on the main frame.  There was no PC, no cell phone, no phone aps, no internet, no Facebook, no Twitter, no Google, no Microsoft, etc.  The field of computer science has changed dramatically from then till now.  Over your entire life the changes could be as dramatic as it has been since the CS Department was created.  (a) How important is it to you to keep up to date with the coming changes in hardware, software and ethical issues?  (b) What specific steps will you in engage in to make sure that you are up to date as a computer professional?  Please elaborate (beyond a yes or no answer)

10 pages

  Circuit City was an American consumer electronics company founded by Samuel Wurtzel in 1949. By 1990s, Circuit City became the second largest consumer electronics store in the United States with annual sales of $12 billion. On March 8 2009, Circuit City shutdown all its stores. On January 8th at the 2018 Consumer Electronics Show in Las Vegas, Circuit City CEO announced a comeback and relaunch of Circuit City into “a dynamic, a social-focused ecommerce site” and a new business strategy for its retail stores 12 . In this case study, assume that Circuit City hired you as the new chief information officer (CIO) to help relaunch the company into a global e-commerce multinational company. Create a PowerPoint presentation containing the IT strategic plan that will address Circuit City ecommerce initiatives. The following information should be covered in the documentation. 

´1. History of Circuit City

´2. What were the issues and challenges that caused the collapse of Circuit City in 2009?

´3. What are the issues and challenges with Circuit City 2018 latest e-commerce initiative?

´4. Discuss the major competitors in global e-commerce.

´5. How would IT deliver value to the business?

´6. Proposed the IT infrastructure required to support global e-commerce

´7. Proposed the IT budget for the e-commerce initiative

´8. Discuss the IT based risks associated with global e-commerce

´9. Discuss how IT can leverage innovative technologies such as social media, big data and business intelligence to provide value to the business

´10. Discuss the future or emerging technologies that would be leveraged to give Circuit City a competitive advantage.