Demonstrate an understanding of basic legal processes

Assignment Help Basic Computer Science
Reference no: EM131232241

Homework 1- Chapter5 and Research Paper Outline

Learning Objectives#1: Identify and analyze legal, ethical, social, and security issues related to network and stand-alone computer systems;#2Demonstrate an understanding of basic legal processes and of computer misuse, fraud and the law; and #3: Explain how regulations such as the Telecommunications Act of 1996 and industrial standards impact national and global computer interaction.

1. Suppose a denial-of-service (DoS) attack shuts down two dozen major websites, including your email server, Amazon.com, Google.com and Facebook. The attack is traced to one of the following perpetrators. Discuss if different penalties are appropriate depending on which perpetrator it is. Explain why and how these penalties would be different.

A. A foreign terrorist who launched the attack to cause billions of dollars in damage to the U.S. economy.

B. An organization publicizing its opposition to commercialization of the web and corporate manipulation of consumers.

C. A teenager using hacking tools he found on a website.

D. A hacker group showing off to another hacker group about how many sites it could shut down in one day.

2. Research paper outline.

A. Select any legal or ethical computing topic for your final research project.

B. Using Word, create a topic outline (I. A.1.a.).

i. The topic outline should include an Introduction, a Comparison of Viewpoints from literature on your topic, a Description of the Methods you plan to use to locate your research, a list of appropriate laws, an Opinion Summary, and a beginning List of References - you will be adding more as you write your research paper (use APA citation style formatting)

ii. Use a right-aligned header that contains your name and the date, and a footer that contains a centered page number

iii. Do NOT use justified paragraph alignment

Homework 2- Chapters6, 7, 8 and 9 (File #1)

Research Paper (File #2)

Learning Objective #2 Demonstrate an understanding of basic legal processes and of computer misuse, fraud and the law.

NOTE: Make sure your opinions are backed up with legal cases and or other references. Use APA citation style for these quoted or paraphrased references.

File #1 - Responses to the following questions

1. One ethical argument against offshoring jobs is that employee health and safety requirements are not as strong in some countries as they are in the United States. Evaluate this argument.

2. Many college students register for online classes rather than taking the same courses in a classroom. Discuss both advantages and disadvantages (to the students and to society in general) of students getting degrees solely from online education.

3. Software developers are sometimes advised to "design for failure." Give some examples of what this might mean.

4. As part of your job responsibilities, you oversee the installation of software packages for large customers. A recent order of laptops for a local school district requires webcam software to be loaded. You know that this software allows for remote activation of the webcam. Which laws and ethical considerations should you bear in mind?

File #2 Research paper (part of your Attendance/Discussion/Participation points)

Based on the outline you submitted as part of Project 4, submit your completed final research paper as a separate file from the answers you provided for the above questions. Do NOT click the SUBMIT button until both files have been uploaded.

If you need guidance in general on writing a research paper, a good source can be found at https://www.ruf.rice.edu/~bioslabs/tools/report/reportform.html.

• While there is no assigned length for this paper, be sure that your workcovers your topic's requirements, plus foot/endnotes and bibliography, using standard one-inch margins, 12-point font and double spacing.

• It must cover the topic effectively and present a well-developed thesis, supported by evidence from primary and secondary sources, not just your own opinion.

• Your work must in some way demonstrate an understanding of the development of scholarship on the topic-that is, the paper itself must incorporate in the text and notes an adequate discussion of the scholarly works on the subject.

• Every sentence with information from a source must give credit to the source. Otherwise, it is plagiarism.

• Proofread everything carefully.

• Be prepared to present your topic briefly to the class (in-class) or as a discussion (online students only).

Reference no: EM131232241

Questions Cloud

Create a strong working client-consultant partnership : How can one create a strong working client-consultant partnership? What tools and techniques might you use to establish the bond of trust in your relationships with clients
What are the steps in analyzing an ethical dilemma : What are the four elements that specify the types of behaviors that are judged underethical criteria? Which groups traditionally have been exempt from legal and moralculpability? Why?
What is the maximum conversion time : What is the maximum conversion time? - How many clock pulses are required to produce an output of 0100100100?
Define and analyze the regulations convoy trucking needs : Define and analyze the regulations Convoy Trucking needs to comply with as the company begins to service the new customer by transporting and storing hazardous materials
Demonstrate an understanding of basic legal processes : Demonstrate an understanding of basic legal processes and of computer misuse, fraud and the law. Use a right-aligned header that contains your name and the date, and a footer that contains a centered page number.
How the court did or should resolve your example : Based on your experience, the video, or a news story, relate a time when you believe that the law affected a business. Describe the events, the law, and how the court did or should resolve your example. What sources of law would have created or ..
How many clock pulses are required to produce an output : What is the maximum conversion time? - How many clock pulses are required to produce an output of 0100100100?
Analyze the affordable care law : For your project, analyze the Affordable Care Law in a 9-10 page paper not including the title or references pages. In your analysis you will need to address the following: How all three branches of government were involved in its creation, and the..
Design a lan for a very successful cpa firm : Design a LAN for a very successful CPA firm with five departments in one building and a total of 560 employees -  It wants to make sure that it can easily expand its LAN in the future without exorbitant costs and moving a lot of equipment.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the maximum number of bytes

A disk unit has 24 recording surfaces. It has a total of 14,000 cylinders. There is an average of 400 sectors per track. Each sector contains 512 bytes of data.

  Measure of the remaining angle

a quadrilateral, each of the two angles has a measure of 37 degrees. Another angle has a measure of 118 degrees. What is the measure of the remaining angle?

  Justify components of material list and resource requirement

I need to justify the components listed in the attached document names Materials List and Resource Requirements.

  Compute the side-length of a square plate capacitor

if the smallest observable voltage is 0.1 V, compute the side-length of a square plate capacitor that can detect one electron, assuming the dielectric is air with relative permittivity of 1 and the distance between plates is 10 nm (10 × 10-9 m).

  Develop a plan to set up a wan based on the scenario

Recommendations for network equipment that must be placed at each location; also, consider equipment based on teleconferencing needs

  People spend hundreds and hundreds of dollars

People spend hundreds and hundreds of dollars hiring writers to help them with their resume and cover letters.

  Can either of these fields be a random number

In the text, these fields were sequentially incremented. Can either of these fields be a random number?

  Synchronized and synchronized block

What is the Difference between synchronized and synchronized block?

  Ensure security, integrity, and operability of the database.

Select one of the steps you perform in the physical design of this database. Analyze how this step helps ensure security, integrity, and operability of the database.

  Risk of using a signed public key

Describe a scenario where the risk of having an unsigned public key is not acceptable but the risk of having a signed public key is acceptable. Describe a scenario where risk of using a signed public key is not acceptable

  Devise a configuration management scheme

Devise a configuration management scheme for a small project (say, less than one person-year) and a large project (say, more than ten person-years). Give a rationale for the possible differences between those schemes.

  Write a function to print the data of a student

Write a function to print names of all students who joined in a particular year. (b) Write a function to print the data of a student whose roll number is given.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd