(Apple) Data Privacy Paper

Would like to know if I can have a grad paper written in:

5-page paper APA format. 

Provided Background on the topic Including a  personal viewpoint.

Make sure you cite any references. 

“Here are some questions to ponder while you discuss this issue:

1. What harms are potentially produced by the FBI’s demand that Apple help it open an iPhone? What harms are potentially produced by Apple’s refusal to help the FBI?

2. Do you think Apple had a moral obligation to help the FBI open the iPhone in this case because it involved terrorism and a mass shooting? What if the case involved a different type of criminal activity instead, such as drug trafficking? Explain your reasoning.

3. Apple argued that helping to open one iPhone would produce code that could be used to make private information on all iPhones vulnerable, not only to the American government but also to other foreign governments and criminal elements. Do you agree with Apple’s “slippery slope” argument? Does avoiding these harms provide adequate justification for Apple’s refusal to open the phone, even if it could reveal crucial information on the terrorist shooting?

4. Politicians from across the political spectrum, including President Obama and Senator Ted Cruz, argued that technology preventing government access to information should not exist. Do you agree with this limit on personal privacy? Why or why not?

5. Ultimately, the FBI gained access to the iPhone in question without the help of Apple. Does this development change your assessment of the ethical dimensions of Apple’s refusal to help the FBI? Why or why not? Should the FBI share information on how it opened the iPhone with Apple so that it can patch the vulnerability? Explain your reasoning.”

Few video links listed in course:

Trump to Apple: Open the phone – https://youtu.be/PkcogFe3ZTM

Why Apple is fighting FBI court order – https://youtu.be/mXMeQ-76SRA

 

Apple: Break-in order a government ‘overreach’ – https://youtu.be/YTyuHgFPca0

questions

 

1.1 What is the OSI security architecture?

1.2 What is the difference between passive and active security threats?

1.3 List and briefly define categories of passive and active security attacks.

1.4 List and briefly define categories of security services.

1.5 List and briefly define categories of security mechanisms.

1.6 List and briefly define the fundamental security design principles.

1.7 Explain the difference between an attack surface and an attack tree.

Complete your answers on a WORD Document 

Exp22_Excel_Ch03_Cumulative_Patient

Exp22_Excel_Ch03_Cumulative_Patient

  

Project Description:

You work as a nurse in a health clinic. You record each patient’s systolic and diastolic blood pressures each week. A number of patients have requested blood pressure data and charts. This information helps patients know if they have hypertension, caused by high blood pressure. You prepared a spreadsheet that can be used as a template to track a patient’s blood pressure and heart rate. You are ready to create charts that you can use when discussing a patient’s blood pressure.

     

Start Excel. Download and open   the file named Exp22_Excel_Ch03_Cumulative_Patient.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

 

Weekly blood pressure readings   have been entered for a sample patient. You want to create a clustered column   chart to compare the readings for the month. After you create the chart, you   will move it to a Charts sheet that will be used to contain several charts   for easy reference.
 

  Create a clustered column chart using the range A2:C7 on the April worksheet.   Move the chart to cell A1 in the Charts sheet.

 

The chart needs a descriptive,   easy-to-read title.
 

  Change the chart title to Blood Pressure Readings in April and bold the title.

 

You realize the chart might be   easier to read as a bar chart.
 

  Change the chart type to Clustered Bar.

 

You will increase the chart size   to make it easier to read on a display screen.
 

  Set 4″ height. 

 

You want to remove the   additional dates displayed on the category axis.
 

  Select the dates on the axis and display the Format Axis task pane. In the   Axis Options category, select Text axis to remove the extra dates from the   chart.

 

You want to arrange the dates   with the oldest date at the top.
 

  Display the dates in reverse order on the category axis so that 4/1/2024 is   at the top of the vertical axis.

 

Next, you will create a line   chart depicting the heart rate readings for the month. This chart will help   the patient see trends over time.
 

  Create a line chart using the ranges A3:A7 and D3:D7 on the April worksheet.   Move the line chart to start in cell I1 in the Charts sheet.

 

You decide to adjust the size of   the line chart.
 

  Set 3.5″ height and 5″ width.

 

Change the line chart title to Heart Rates   in April and   bold the title.

 

Select the dates and select Text   axis to remove the extra dates from the line chart.

 

You will change the font color   for the axes to make the chart easier to read.
 

  Apply Black, Text 1 font color to the value axis and to the category axis on   the line chart.

 

Now you want to apply a gradient   fill color to the plot area to soften the image.
 

  Apply Light Gradient – Accent 1 gradient fill color to the plot area on the   line chart.

 

Data labels provide exact   details. In this case, adding data labels will provide exact heart rates.
 

  Add data labels in the above position on the line chart.

 

The April worksheet contains a   range that identifies how many times in the month the patient had normal and   high blood pressures. You decide a pie chart will help the patient visualize   the data better.
 

  Create a 2-D pie chart using the ranges F3:F4 and H3:H4 in the April   worksheet. Move the chart to start in cell A22 in the Charts sheet. 

 

Change the chart title to Percentage of   Normal and High Blood Pressure and apply Black, Text 1 font color to the title.

 

Removing the legend can reduce   extraneous elements in the chart. Adding data labels keep descriptions within   each slice.
 

  Remove the legend. Add Category Name and Percentage data labels in the Best   Fit position. Remove the Value data labels.

 

Changing the color of the high   blood pressure slice and exploding it away from the other slice will   emphasize it.
 

  Apply Red solid fill color to the High (Hypertension) slice and explode the   slice by 6%.

 

The last chart you want to   create is a combo chart to depict the blood pressure readings with the   overlay of heart rates.
 

  Create a Clustered Column – Line on Secondary Axis combo chart using the   range A2:D7 in the April worksheet. Move the chart to a chart sheet named Combo Chart.

 

After creating the chart, you   will apply a chart style.
 

  Apply Style 4 chart style to the combo chart.

 

Change the chart title to Blood   Pressure/Heart Rates.

 

Select the dates and select Text   axis to remove the extra dates from the chart

 

Apply Black, Text 1 font color   and 11 pt font size to the two value axes and the category axis.

 

You decide to add a title to   each axis to describe the data being plotted.
 

  Add a primary vertical axis title Blood Pressure and a secondary vertical axis title Heart Rate.

 

Move the legend to the top   position.

 

You decide to remove one of the   data series.
 

  Edit the data source to remove the 4/1/2024 data series.

 

Now you are ready to add Alt   Text to the chart.
 

  Display the combo chart and add the Alt Text Shows blood pressure and heart rate for   the last four weeks.

 

Finally, you add sparklines to   the blood pressure readings and heart rates below the respective columns.
 

  Select range B8:D8 on the April worksheet. Insert Column Sparklines using   data from the range B3:D7.

 

You want to customize the   sparklines.
 

  Apply Blue sparkline color and display the high points for the sparklines.

 

Save and close Exp22_Excel_Ch03_Cumulative_Patient.xlsx.   Exit Excel. Submit the file as directed.

Case Study

 

 –   Read The Case of Plant Relocation and complete the questions at the end of the case study.    ( https://www.scu.edu/ethics/focus-areas/business-ethics/resources/the-case-of-plant-relocation/)

– The answers should be a minimum of two pages with two references attached for each. There should be no plagiarism- attach a plagiarism report with 0% similarity index

COMPUTER SCIENCE

 Read the Article, “How to Start Your Own Business This Year” 

 

“Congratulations, you are a few weeks away from opening your very own information systems consulting business. As a new business owner you have a few things to get ready before opening.” 
To successfully complete your final you will need to complete the following:

  • Name your business
  • Decide what your email address will be
  • Choose the most appropriate hardware and operating system
  • Choose the type of router you will use 
  • Determine what information is important to have on your website
  • Describe how you will keep your network safe from malware and other security threats
  • Develop a plan to keep your servers maintained 
  • Discuss whether your business will have a Facebook and/or Twitter account and why
  • Discuss whether your business will be in the cloud.

In PowerPoint format. APA 7th edition, need it by Saturday 10am eastern time. 8pages.

discussion

 Discuss some of the constraints that must be overcome in order to build a successful implementation of a database system. 

Personal Privacy and Safety

 

For this assignment, you are asked to choose one (1) threat to security and safety as presented in this unit and create a blog (see instructions for the Unit 5 assessment) providing evidence of the threat chosen. Once again you will submit this assignment as a word document.

Your blog should address the following questions:

  • What threat did you choose, and why?
  • What technological advancement are you using to explore the threat?
  • What are the advantages of your chosen technological advancement?
  • What issues with personal privacy and/or safety at the individual and societal levels may occur due to the technical advancement?
  • In your opinion, do the damages to individuals and society outweigh the benefits? Or do the benefits outweigh the damages?
  • How might future technology increase the threat you described?
  • How might future technology decrease the threat you described?

Your completed blog must include:

  • A description of the threat you have chosen
  • A discussion of why you chose it
  • A description of the technological advancement you chose to explore
  • First advantage of this new technology, include one (1) external reference
  • Second advantage of this new technology, include one (1) external reference
  • A discussion of how these advantages could lead to issues with personal privacy and/or safety at the individual level, include one (1) external reference
  • Your opinion (analysis) based on what you have learned in your learning map and your external sources of the damages versus benefits of the technology at the individual level
  • A discussion of how these advantages could lead to issues with personal privacy and/or safety at the societal level, include one (1) external reference
  • Your opinion (analysis) based on what you have learned in your learning map and your external sources of the damages versus benefits of the technology at the societal level
  • A description of one way that future technology could increase the threat you described, include one (1) external reference
  • A description of one way that future technology could decrease the threat you described, include one (1) external reference

Be sure to use appropriate sources for the external references required for this assignment.

IT 472 week 3

DQ3:

  • The Unified Modeling Language (UML) was accepted as the standard language
    for object development. Give examples of a static model and a dynamic model
    in UML. How are the two kinds of models different?
  • Some experts argue that object-oriented techniques are simpler for novices to understand and use than are DFDs and ERDs. Do you agree? Why or why not?

Very important: Upload your discussion to Uni check for plagiarism check before you can submit for grading. The discussion that are not submitted to Uni check will not be graded until I see the Uni check report.

Please follow the rubric provided for weekly discussions. Formatting structure and APA is a must.

Not more than 350 words total. Respond to at least two other students (150 words each peer)!!

digital forensics

  

Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved. In 350 words