Assignment Needed

 Due is 48hrs

Describe what the Internet of Things means and how this interconnectedness of smart devices will affect how we live and work. Do you foresee any positive and/or negative effects from this infrastructure based on billions of devices that will be collecting and exchanging data daily? Provide at least one example of a smart device and how it can be applied to the Internet of Things.

  • A minimum of 3 to 5 paragraphs.
  • Must include at least one source (a journal, periodical, article, etc.) from a Broward College Library database (Library Resources).
  • Must include a Work Cited page for the source material.
  • Must be submitted as a .docx (Microsoft Word) file and in APA format

Your answers to all five questions must be in the Answers worksheet of the Ad Bids workbook that you downloaded from Blackboard. In addition, your Excel model coming up with the answers for each of the five questions should be on

 Your answers to all five questions must be in the Answers worksheet of the Ad Bids workbook that you downloaded from Blackboard. In addition, your Excel model coming up with the answers for each of the five questions should be on the appropriate worksheet in the Ad Bids workbook 

Writing Assignment 1

 

Answer the following questions in a cohesive and comprehensive essay. 

  • What is the difference between the “DELETE” and “TRUNCATE” commands?
  • What is the difference between the “WHERE” clause and the “HAVING” clause?
  • What is the difference between “Primary Key” and “Unique Key”?

Click the link above to submit your completed assignment.

Requirements:

  • A minimum of 350 words. 
  • Use APA format. 
    • Times New Roman 12 pt font, double spaced with 1″ margins.

Assignment – Database Security

Write an essay of at least 500 words discussing the use of encryption to protect data at rest, in motion, and in use.    

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

https://www.zdnet.com/article/encrypting-data-at-rest-is-vital-but-its-just-not-happening/

https://digitalguardian.com/blog/data-protection-data-in-transit-vs-data-at-rest

https://docs.microsoft.com/en-us/azure/security/azure-security-encryption-atrest

https://www.datamotion.com/2015/12/best-practices-securing-data-at-rest-in-use-and-in-motion/

https://www.youtube.com/watch?v=5DsnvMkGLS4

Transparent Data Encryption

https://www.youtube.com/watch?v=8DNx4s8q-8E

Homomorphic Encryption

https://www.youtube.com/watch?v=NBO7t_NVvCc

https://www.youtube.com/watch?v=Kfwo-S2jZv4

PLEC Week 3

  Answer Each question in 2-3 lines with in line satiations 

 

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many? 

project

group 9 : Clustering with correlation coefficient

This presentation / project is about correlation coefficients used as the clustering measure.

File needed to see the correlation coefficients and bi-monthly returns:

returnAstcBiMonthlyEG1.mat

Address in the presentation the following:

1) Given correlation coefficient from https://mathworld.wolfram.com/CorrelationCoefficient.html

A) What is the meaning of correlation coefficient between the two set of stocks prices?

B) Show why the correlation coefficient between the set of prices A and set of prices B is the same as the correlation coefficient between the set of prices B and set of prices A.

2) After loading returnAstcBiMonthlyEG1.mat in Octave, you’ll have stocks with bi-monthly returns of above 0.009 : 

CC -> correlation coefficients between the stock returns,
RTRS ->  bi-monthly returns (rows) for 412 stocks (columns)

A) Comment the correlation coefficients based on bi-monthly returns among 412 stocks shown in the figure  P5_CC_eg1.pdf

B) Assuming that clusters are created by putting all the stocks whose correlation coefficients among all the pairs are greater than 0.5, comment on the following cluster distribution : 302 clusters with only 1 stock,  28 with 2 stock,  6 with 3,  4 with 4, 1 with 5,  1 with 6 , and  1 cluster with 9 stocks in it.

C) Explain why it would be good to pick just one stock from the cluster for the diversified portfolio.

Computer Security

 

Instructions

In order to complete assignment #2 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #2). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 2

  1. For apps to be featured on the iPhone, developers must build it with Apple’s software development kit and then apply for approval. Apple rejected the Google Voice iPhone App, and further stated that it would not accept any applications that incorporated Google Voice functionality. Apple reasoned that this app duplicates the phone’s core features. It also rejected Google’s location-based app Google Latitude. If you were developing a collaborative platform, do you think the best model is this collaborative model, or is the open innovation model better – if your main goal is to maximize innovation? What if your main goal is to make money?

Chapter 3
2.Plaintiffs filed a class action lawsuit against investment banks alleging that they inflated prices on more than 300 IPOs, causing IPO investors to overpay for stock, and unlawfully benefited these banks through overcompensation of banking commissions and profits made through quick sales of this stock in their own accounts before prices settled into a more realistic valuation. How would you combat such abuses going forward?

3. Read the following laws and articles:

1. The Computer Security Act of 1987

2. The Patriot Act.

3. Jaeger, P. T., McClure, C. R., Bertot, J. C., & Snead, J. T. (2004). The USA PATRIOT Act, the Foreign Intelligence Surveillance Act, and information policy research in libraries: Issues, impacts, and questions for libraries and researchers. The Library Quarterly, 74(2), 99-121.

4. Politics

Discuss the relationship and impacts of CSA, USA PATRIOT ACT, and FISA. Also discuss the current status of these laws and the replacement of these laws.