final paper-1

  Delete Yourself from the Internet

(Is it possible and how can it be accomplished?)

Do you feel you are vulnerable to hackers or identity thieves because you have a large online presence? Have you ever thought of removing your personal data from the net? Well, it’s not quite as simple as it should be. There are a few easy-to-follow steps that should point you in the right direction that can be found online, but the story does not end there. How can you make sure your personal information or financial data will not be exposed on sites that do not have your written permission? Is it possible to completely remove yourself from the web?

Facebook’s practices were under scrutiny when it was revealed that the data of more than 50 million Facebook users found its way into the hands of UK-based Cambridge Analytica, which reportedly used it to better target political ads for the Trump campaign during the US 2016 presidential election.

The more troubling aspect of the story is that your personal data on these free services is often somewhat exposed because you opted-in to all sorts of onerous provisions when you first signed up for these “free” services. That’s exactly why some users are choosing to completely delete or deactivate accounts when and where possible.

So, how can deleting yourself from the internet prevent these companies from acquiring your information? Some say there is no sure way to completely remove your information, but there are ways to minimize your online footprint, which would lower the chances of your data getting compromised.

Project Plan

In this case project, we will determine the many options and the companies that collect your personal information. They’re called data brokers and they have names like Spokeo, Whitepages.com, PeopleFinder, BeenVerified, as well as plenty of others. 

1) In addition to the sites named above, list 5 additional agencies you find that collect this type of personal data. Hint: Many of them claim to be marketing agencies.

2) Provide a list of the companies that you find that claim to be able to remove your personal information from the data broker sites and the methods they use to delete this information.

3) Write a report with a step-by-step written summary of the processes and the methods which describe how you would go about DELETING yourself from the Internet. 

Discussion 4-2

????Week 4 Discussion 2 Week 4 Discussion 2When thinking about data visualization, it is important to understand regular expressions in data analytics.  Therefore, note the importance of data visualizations and choose two types of expressions (* – wildcards for example) and discuss the difference between the two types of expressions.

Unit 6 Discussion: How You See Me

Unit 6 Discussion: How You See Me

Unit 6 Discussion: How You See MeAfter viewing the “How You See Me” short film series, discuss the intersection of culture and interpersonal communication.  More specifically, how does culture impact the way you communicate with individuals from diverse communities.  What is the biggest contributing factor in your perception of cultural groups which are different from yours (family, upbringing, media)?  What steps can be taken to communicate more effectively and personally with these groups?

MKT-6

 

1.  What are some of the primary reasons people resist change? What are some of the ways a team leader can ensure that change is accepted or at least not resisted? 

Read chapter 10. Based on case 10-1 on page 343 as reproduced below, answer the following question.

THE QUIET MEETING:Debbie Ronson, sales supervisor, was just opening a meeting she had called for members of her department. Debbie did most of the talking for the first five minutes, recounting her group’s performance over the past week. Then she asked, “Are there any questions?” No one responded. Debbie then changed subjects. “As you know, in two weeks we’ll be going to a new format for scheduling our calls. This was outlined in the memo from the vice president, copies of which I sent to each of you. This is going to alter your calling schedules and significantly change the way we’ve been doing things. I have some ideas on how we can best work into this new system. But before getting into that, I’d like to see if anyone here has any ideas … [pause]. Anyone care to contribute anything?” No one in the group responded. Debbie continued, “Well, here’s what I think we should do. …” She then spent eight minutes outlining her plan. After the meeting was over, Debbie discussed it with one of her fellow supervisors. “I don’t know what it is,” she said, “but I can never get my people to say much at meetings. I try to give them a chance, but I always end up doing most of the talking. It seems they’re either shy or disinterested, but I really don’t know if that’s the reason or not. I just wish they’d contribute their ideas.”2. What might be some reasons for participants not saying much at Debbie’s meetings? 

analyzing 4

 When thinking about data visualization, it is important to understand regular expressions in data analytics.  Therefore, note the importance of data visualizations and choose two types of expressions (* – wildcards for example) and discuss the difference between the two types of expressions. 

Assignment 1 computer science

1 page.

Sometimes a big picture can help to give an idea of what is going on in a particular subject area.  Examine the attached photo. Explain your basic understanding of WAN to WAN connections, LAN to LAN connections, and WAN to LAN connections. Explain how networks intercommunicate.   Also explain the terms server, bridge, router, hub, node, communications network, and communications line.

due 05/05/23 (SSO): Advantages and Disadvantages

 

Pick an industry that you work for, and you work for the  chief information officer ( CIO) of a company within this industry. Your CIO is considering implementing Single Sign-On (SSO) and wants you to prepare some background information for her review.

Please provide the following Single Sign-On (SSO) background information for your CIO in a post of

  • Detail the advantages and disadvantages of SSO architecture.
  • Recommend whether SSO or another form of sign on architecture would be best for a company within your selected industry.
    • Be sure to provide the rationale behind your recommendation.
Poetry: Why it is Important: Scott Griffin at TEDxBishopsU

LIT101 week 7 B

Discussion 7B: Poetry In Business

Most people can see how poetry can highlight people’s creativity and allow people to express their emotions. However, many people many not see the connection of how a knowledge of poetry can apply to professional settings.

To prepare for this discussion board assignment, review the following:

The Benefits of Poetry for Professionals: https://hbr.org/2012/11/the-benefits-of-poetry-for-pro (Links to an external site.)

Why People Need Poetry: https://www.ted.com/talks/stephen_burt_why_people_need_poetry/transcript?language=en (Links to an external site.)

Poetry: Why it is Important: Scott Griffin at TEDxBishopsU:Poetry: Why it is Important: Scott Griffin at TEDxBishopsU (Links to an external site.)Poetry: Why it is Important: Scott Griffin at TEDxBishopsU

Initial Response

After reviewing the articles, discuss what skills are important to understanding and/or writing poetry. Then, give a specific example of how those skills can be used in a professional setting. While some of the readings may have an example, I want you to come up with your own example. Be as detailed as possible.

Responses to Others

Once you have completed your initial response, respond to at least two other persons. What did you learn from their post?

Discuss

  

1. Discuss the differences between external and internal threats as they relate to network security. Which threat is most difficult to defend against and why? What protections would be used specifically related to internal threats? Why is it important for organizations to have a written security policy?

2.Highlight the basic functions and operation of public key cryptography. What is the “Advanced Encryption Standard”? How are digital signatures generated and used? 

3.Discuss “Pretty Good Privacy.” What is it? Why has it stood the test of time, and will it be good enough in the future, why or why not? Compare it to Kerberos encryption. 

4.Identify and compare the two primary and currently used techniques to secure wireless communications. How safe are your data communications when using a typical wireless hotspot (public)? What can you do to improve your data security when using one of these services?

Computer Architecture Feb 6

Assignment Content

  1. We are now in Week 4 so you all should be more familiar with the Architectural components and processes of a computer. To further enhance your knowledge on this topic, you will be answering the questions below.

    Remember to format your work in an APA style (Cover Page is a Must) and provide proper citation and references for the paper. Plagiarism is not allowed and I will give you an automatic zero if I discover that any part of your work was plagiarized either from the internet or another student’s paper.

    For this week’s assignment, Please provide a write-up as an answer to the question below;

    • Compare the computer architecture of modern processors from two different vendors in terms of memory, speed and expansion bus.
    • Explain the concept of virtual memory and its role in memory management and in memory protection.
    • Provide any five differences between logical addressing and physical addressing in operating systems.
    • What are the benefits of using scripts to automate operating systems tasks?
    • You should submit at least TWO FULL PAGES OF CONTENT…meaning sources, title, etc. do NOT count…be sure to include any reference material you used…