Demonstrate an understanding of basic legal processes

Assignment Help Basic Computer Science
Reference no: EM131232241

Homework 1- Chapter5 and Research Paper Outline

Learning Objectives#1: Identify and analyze legal, ethical, social, and security issues related to network and stand-alone computer systems;#2Demonstrate an understanding of basic legal processes and of computer misuse, fraud and the law; and #3: Explain how regulations such as the Telecommunications Act of 1996 and industrial standards impact national and global computer interaction.

1. Suppose a denial-of-service (DoS) attack shuts down two dozen major websites, including your email server, Amazon.com, Google.com and Facebook. The attack is traced to one of the following perpetrators. Discuss if different penalties are appropriate depending on which perpetrator it is. Explain why and how these penalties would be different.

A. A foreign terrorist who launched the attack to cause billions of dollars in damage to the U.S. economy.

B. An organization publicizing its opposition to commercialization of the web and corporate manipulation of consumers.

C. A teenager using hacking tools he found on a website.

D. A hacker group showing off to another hacker group about how many sites it could shut down in one day.

2. Research paper outline.

A. Select any legal or ethical computing topic for your final research project.

B. Using Word, create a topic outline (I. A.1.a.).

i. The topic outline should include an Introduction, a Comparison of Viewpoints from literature on your topic, a Description of the Methods you plan to use to locate your research, a list of appropriate laws, an Opinion Summary, and a beginning List of References - you will be adding more as you write your research paper (use APA citation style formatting)

ii. Use a right-aligned header that contains your name and the date, and a footer that contains a centered page number

iii. Do NOT use justified paragraph alignment

Homework 2- Chapters6, 7, 8 and 9 (File #1)

Research Paper (File #2)

Learning Objective #2 Demonstrate an understanding of basic legal processes and of computer misuse, fraud and the law.

NOTE: Make sure your opinions are backed up with legal cases and or other references. Use APA citation style for these quoted or paraphrased references.

File #1 - Responses to the following questions

1. One ethical argument against offshoring jobs is that employee health and safety requirements are not as strong in some countries as they are in the United States. Evaluate this argument.

2. Many college students register for online classes rather than taking the same courses in a classroom. Discuss both advantages and disadvantages (to the students and to society in general) of students getting degrees solely from online education.

3. Software developers are sometimes advised to "design for failure." Give some examples of what this might mean.

4. As part of your job responsibilities, you oversee the installation of software packages for large customers. A recent order of laptops for a local school district requires webcam software to be loaded. You know that this software allows for remote activation of the webcam. Which laws and ethical considerations should you bear in mind?

File #2 Research paper (part of your Attendance/Discussion/Participation points)

Based on the outline you submitted as part of Project 4, submit your completed final research paper as a separate file from the answers you provided for the above questions. Do NOT click the SUBMIT button until both files have been uploaded.

If you need guidance in general on writing a research paper, a good source can be found at http://www.ruf.rice.edu/~bioslabs/tools/report/reportform.html.

• While there is no assigned length for this paper, be sure that your workcovers your topic's requirements, plus foot/endnotes and bibliography, using standard one-inch margins, 12-point font and double spacing.

• It must cover the topic effectively and present a well-developed thesis, supported by evidence from primary and secondary sources, not just your own opinion.

• Your work must in some way demonstrate an understanding of the development of scholarship on the topic-that is, the paper itself must incorporate in the text and notes an adequate discussion of the scholarly works on the subject.

• Every sentence with information from a source must give credit to the source. Otherwise, it is plagiarism.

• Proofread everything carefully.

• Be prepared to present your topic briefly to the class (in-class) or as a discussion (online students only).

Reference no: EM131232241

Transformational theory leader-member theory

How would you apply the transformational theory leader-member theory (LMX) to improve an organization's performance? Discuss in the context of your own organization, an orga

Delaware department of correction starting a project

CASE:Delaware Department of Correction starting a project to train new officer to have experience working in all levels of prisons during their probation period. The following

How to make components of system user-friendly

How do components of your computer system interact within system? What improvements or additions to your system do you think would benefit you or make system more user-friend

Start menu to find programs

You're working with a typical user who doesn't know much of ANYTHING about computers, let alone Windows. They're notorious for losing track of documents they worked on, and

Design and code a project to calculate the amount due

Design and code a project to calculate the amount due for rentals. Movies may be in VHS(videotape) format or DVD format. Videotapes rent for $1.80 each and DVDs rent for $2.

Write a short program that generates a 256-bit aes key

Investigate the random number generators built into three of your favorite programming languages. Would you use these random number generators for cryptographic purposes?

What is the access time of the disk cache

Work through all combinations of actions that can occur in the directory method described in Section 3.8, drawing a flow diagram and the values of the bits in the directorie

Would he be able to access the data in some other way

Assume that the user is not allowed to mount media such as the floppy disk. Thus, he would not be able to access the data on the disk as though it were a file system. Would

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd