Limitations of Blockchain and Emerging Concepts

The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.

Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.

Conclude your paper with a detailed conclusion section that discusses both limitations and emerging concepts.

Your paper should meet the following requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

700 words: Leadership & AI

The journal article focus on the how positive team culture can correct the impact of lagging leadership creativity.  Additionally, discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:

1. What is your definition of AI?  Please explain.

2. What is your opinion of AI, is the technology currently available? Why or why not?

3. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.

4. How is AI perceived as different in various industries and locations? Please explain.

Research the variety of enumeration tools available. Select one tool and explain what it does, how it works and what type of information it extracts

Research the variety of enumeration tools available. Select one tool and explain what it does, how it works and what type of information it extracts (example:  Softerra LDAP Browser is the industry-leading software for browsing and analyzing LDAP directories. It provides a wide variety of features for handy viewing of directory contents, getting information about directory infrastructure and objects.) 

Please write 350 words essay. 

Response

Essay– Evaluate the National disaster recovery effectiveness based on case studies from the text or recent news stories and make recommendations for improvements based on your research.  500 words, APA required 

homework computer

 
Forum 1: Reflective Journal     Objective of the activity  The Reflective Journal is a tool that teachers use to obtain their opinion or opinion of the student on a specific topic. Depending on the course, the Reflective Journal can be a tool to measure the level of critical thinking, defend a point of view or simply for the student to express himself. 

 
Knowing that this computer course is something innovative for many and, perhaps a review of basic concepts for others, it is established that this reflective diary will contain some simple questions that the student will have to answer. Because it is a forum, what the student expresses will be seen by his classmates and the teacher, therefore, he will receive comments on his presentation. 

 
Instructions  In this forum, the student will share his opinion with his classmates on the following topics:  How has it been adapted to the online course platform? What have you learned in these four (4) modules? What have you found most difficult to understand in these four modules? What has made it easier for you to master in these four modules? To present your main contribution, you must create a new topic to which you will give a title. You can write in paragraph form and talk about all the aspects or you can list each one on the same topic and put your point of view.  He must read what other classmates and the teacher have posted and react to one of the writings. Remember that the most important thing is mutual respect, sharing ideas and if we differ, let it be with respect. 

 
Basic review resource  Hoisington, C., Freund, S., Vermaat, M., Pratt, P. J.,. Last, M. Z., Schmieder, E., Sebok, S. L., Starks, J. (2016). Shelly Cashman series Microsoft Office 365 & Office 2016: Introductory. Cengage Supplemental Review Resource  Microsoft. (2018). Word for Windows Training. Retrieved from https://support.office.com/es-es/article/word-for-windows-training-7bcd85e6-2c3d-4c3c-a2a5-5ed8847eae73 

User training

 

Topic: What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?  Make sure to cite your sources.

Assignment should follow all APA rules and include a min. of (1) citation/reference and should be between 2-4 pages long.

app development

Need help to build a website with the already exiting database.

technology used –

mysql ,jsp , java web technology

Security Policies

Using  the guidelines provided in the textbook’s Chapter 10 of  the Easttom text, Security Policies (and other resources as needed),  create a step-by-step IT security policy for handling user   accounts/rights for a student who is leaving prematurely (drops, is   expelled, and so on).

You  will need to consider specialized student scenarios, such as a  student  who works as an assistant to a faculty member or as a lab  assistant in a  computer lab and may have access to resources most  students do not.

Requirements:

– No Plagiarism

– 400 words with in-text citation and references

– Textbook reference: Computer Security Fundamentals 4e (Easttom) Pearson (2019) ISBN: 9780135774779

MySQL

Create a simple PHP login page which will allow to create a new username and password and then log in as that username and password.  

Submit:  1. SQL script to create table that will store usernames and passwords 

2. PHP script with embedded SQL performing the task above

High-Speed WLANs and WLAN Security Response

  

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline. 

QUESTION: Describe the differences between authentication and privacy. Describe how WLANS can protect both.

DISCUSSION 1:

Authentication is the process of determining whether or not the user or device is supposed to have access to the network or the computer systems There are many different ways to conduct an authentication check, you can use passwords, one-time-passwords, tokens, etc. It is designed to provide access control measures that ensure only properly authorized users have access.

Privacy is the steps you take to protect your identity or personal information online. As with authentication, there are many ways you can protect your privacy, you can use a VPN, you can use TOR. You want to have as much privacy as you can because you don’t want any of your personal information on the internet, or worse, the darkweb. 

WLAN’s can do both of these, because you can connect to the wireless LAN via a VPN, you can have security passwords in place so that only those you want on your network can get on the network.

DISCUSSION 2:

Authentication and privacy work hand in hand to ensure communication is confidential between legitimate users and clients. Authentication “the process that occurs when a user proves an identity, such as with a password.” (Gibson, 2017, p. 533) There are three types of authentication factors, something you know like a password, something you have like an RSA token and something you are like a fingerprint.

Encryption is a process that scrambles the original message using unique algorithms. At the same time, the traffic in transit is protected in the event a hacker or eavesdropper may intercept. The message is unreadable because it needs to be decoded or unencrypted. Utilizing encryption helps to ensure privacy. “Privacy is a collection of processes that attempts to ensure that unauthorized users cannot understand wireless transmissions.” (Olenewa, 2013, p. 301) Ensuring the legitimate user receives the message, confidentiality.

WLANs utilize longer keys and more robust encryption to protect the privacy and ensure authentication. “The trade-off is that stronger encryption increases the number of octets transmitted, which in turn decreases the overall throughput of the WLAN.” An encrypted message received by the legitimate user will be able to decode the letter utilizing a key to decrypt the message.