Internet Privacy

In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #1). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Privacy is a concept that is rapidly evolving in relation to the most public of mediums, the Internet, which became even more super-charged with social networking websites. In a recent California election, one ballot measure, Proposition 8, asked voters a question on marriage. Donors to the Prop 8 campaign found that their names, addresses, and amount of contribution were masked up with Google Maps and thus rendered into a format showing the world a map image of donors’ names, street addresses, and dollar contributions. All this data is public record information already, but still quite inconvenient to access. What are the side effects of this action?

Organ leader & Decision making

This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity. Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:

  1. What is your definition of AI?  Please explain.
  2. What is your opinion of AI, is the technology currently available? Why or why not?
  3. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.
  4. How is AI perceived as different in various industries and locations? Please explain.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3 – 4 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Concept of Tokenization

Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols. 

Python Assignment

Write a Python program to read the item name and quantity of each item included in a shopping list using a loop. 

Assume a shopping list will include only following three items: 
Item name
Item unit price
Pencil
$1
Eraser
$2
Box
$3
The program should ask the user to enter the item name and quantity of each item. Assume user enters valid input. You are NOT required to do validation checks of the data input.
Your program must find and display the itemised cost and the total cost of the items in the shopping list using a loop.
Sample program run (user input is given in italics):
Enter item name: pencil
Enter item quantity: 2
Enter item name: box
Enter item quantity: 1
Enter item name: eraser
Enter item quantity: 2
Sample output:
*************************************************************************************
Item No Item Name Unit Price Quantity Item Price
*************************************************************************************
1 pencil 1 2 2
2 box 3 1 3
3 eraser 2 2 4

Security Architecture and Design

  

Please read the Document attached:

The Questions:

List and describe the required tools needed for an effective assessment. What are some common mistakes and errors that occur when preparing for a security assessment?

Describe in depth the role in which organizational risk tolerance plays in relation to systems under assessment. 

Identify and describe what threat agents should be avoided in preparation for an assessment. How do we effectively screen out irrelevant threats and attacks in this preparation? 

Identify when to use architecture representation diagrams and communication flows. Define and illustrate when decomposing of architecture would be used. Provide an example of architecture risk assessment and threat modeling. 

Whiteboard Animation

Stock market knowledge is a plus. Please follow all instructions, failure to follow instructions will result in refund request.

Video is uploaded with audio. Starting at 6:59 until 8:42 the animation needs to describe the example provided for Bank of America buying 100,000 shares of Boeing using Market Order vs Limit Order. Please use company transparent logos in animation (attached).

*Note: There is a minor discrepancy with the numbers but the example should be explaining buying 100,000 shares with 20k at $250, 20k at $260, 20k at $270, 20k at $280, 20k at $280 with Market Order.