Elliptic Curve Cryptography

 1 page discussion

  • Perform research on Elliptic Curve Cryptography. Define what  Elliptic Curve Cryptography is and identify the associated benefits and  the associated negatives.
  • Would the implementation of Elliptic Curve Cryptography be a good  option for the HU Investment Firm? Fully explain your comments.

ARTIFICAIL INTELLIGENCE

You will argue that health care’s increasing reliance on artificial intelligence will have a negative effect on health and society.

Present your assigned case against artificial intelligence in a PowerPoint presentation with speaker notes

At minimum, address each of the following elements.

· Explain how artificial intelligence is used in health care.

· Analyze how artificial intelligence and related technologies are effecting change in health care.

· Compare and contrast clinical decision support systems in terms of implementation of artificial intelligence.

· Examine the legal and ethical considerations of the use of artificial intelligence in health care.

· Summarize the key points supporting your point of view within your slides, adding additional detail within your speaker notes.

mysql and database

Show the results (using screenshots) of executing each SQL statement against the database you created . Do not highlight your SQL statement in MySQL Workbench before taking the screenshot (this makes it difficult to read the output). For the VIEWs create in exercise-3, also show the results of executing a SELECT * … statement against the VIEW. All screenshots and text must be submitted as a single Word document.

Deep Web and phishing

 Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #3). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.

1. Define and describe the “deep web” or Tor Net and the ‘dark web’.

2. What is phishing? How does phishing fit into the problem of identity theft?

Please see instruction below.

 Need to complete both 3 & 4 assignments. 

  1. Read the Final Assignment direction to understand the scope of your final assignment.
  2. Use FAIR Basic Risk Assessment Guide to follow the steps as a guideline.
  3. Complete the Risk Management Plan document to attach/include in your final paper.
  4. Complete the Business Impact Analysis document to work on your business impact analysis.

PLEC Week 10

 Answer each these questions in a paragraph with at least 3-4 sentences: Include the question and number your responses accordingly. Provide a citation for each answer.   

 

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘ Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?