What is digital rights management

Assignment Help Basic Computer Science
Reference no: EM132519987

Question 1:

Visit the OWASP website.

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP.

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.

Question 2:

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly.

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry?

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam?

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned?

10. According to the Supreme Court 'anonymity is a shield from the tyranny of the majority'. What does that mean?

Question 3:

Answer each question in a paragraph with at least five sentences:

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search?

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent.

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work?

8. Watch this Science Friday video by Ira Flatow "https://www.youtube.com/watch?v=i1lvPpuiTjU" And, offer your opinion - Are advancing algorithms taking our free will?

9. Should Facebook be regulated, at least as far as it's privacy and data policies?

10. How many public Cameras "https://www.theguardian.com/world/2019/feb/18/chinese-surveillance-company-tracking-25m-xinjiang-residents" is too many?

Question 4:

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly.

1. what do each of these terms refer to: copyright, patent, trademark, trade secret?

2. Why is intellectual property entitled to legal protection?

3. Why did copyright laws become stricter and more punishing in the late 20th century?

4. What is the Fair Use doctrine?

5. Make an argument for legalizing the copying of music or software.

6. Do I or don't I own the books on my Kindle? If I own them, why can't I transfer them? If I don't own them, what is my legal right to them?

7. What was the 1984 Sony Supreme Court case about?

8. Was Napster responsible for the actions of its users?

9. Why did the court find in favor of Diamond in the Rio case?

10. What is Digital Rights Management?

Question 5:

Answer the following questions from Chapter 5 in the text with a paragraph that contains at least five sentences.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA's hacker tools compromised?

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work?

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson's disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Question 6:

This quiz is based on chapter 6 in the text. Answer each question in a paragraph that contains at least five sentences:

1. Should society help workers dislocated when technology, like the Internet, eliminates their jobs in a process called 'Creative Destruction'?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not?

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law?

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs?

8. How much monitoring of employee activities at work is appropriate?

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time?

10. What is the relationship betwee BYOD (bring your own device) and shadow IT.

11. What is cyberloafing?

Question 7:

Please answer the questions in paragraphs containing at least five sentences.

1. Describe Digital Literacy (how to know what is real on the web).

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowd sources answers?

5. What are some drawbacks to crowd sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?

9. If models are simplifications or reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?

Question 8:

Discuss each question in a paragraph of at least five sentences.

1) Give an example from the book where insufficient testing was a factor in a program error or system failure.

2) What was one cause in the delay in the completing of the Denver Airport.

3) Why didn't the healthcare.gov website work at first?

4) What is one characteristic of high reliability organizations?

5) Describe the potential risks of alert fatigue in EHR systems.

6) What were 2 common factors in both the Therac-25 case and the space shuttle disaster.

7) What does design for failure mean?

Reference no: EM132519987

Questions Cloud

Explain the oxidation process : Explain the oxidation process. How is the process affected by how fast the oxidation occurs? What are the primary accelerants? Identify and describe them.
Are really keeping digital world safe : Do you think this is a good idea? Are we really keeping our digital world safe? Or are we training new potential criminals that could "turn to the dark side"
Law enforcement organization : As the policy manager for your law enforcement organization, the best practices related to the regulation of police officers' use of social media
How can social media help or harm the given reputation : Write a paper that discusses the importance of reputation management in relation to an organization's credibility. If a PR person only has their credibility.
What is digital rights management : What was the vulnerability in the Target Breach? What do you think of hactivism? What is Digital Rights Management?
Discuss facts begbie theological account of created beauty : Are there any of these you find especially helpful to your own understanding of beauty? Are there any you find particularly unhelpful or confusing?
Describe a few proposed approaches to global warming : Describe a few proposed approaches to global warming that Lomborg believes are problematic and explain why he thinks they're problematic
Selection of access control software : What are the factors that influence the selection of access control software and/ or hardware? Discuss all aspects of access control systems.
Describe the way you first grouped the 8 anole lizard : Describe the way you first grouped the 8 anole lizard together and justify in detail why you chose to group them in this way. This should be my original hypothe

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How the generated code passes the integer

Look at the code generated for this function and call on your favorite C or C++ compiler. Explain how the generated code passes the integer and character array parameters and how the return value is passed back to the caller.

  What is the complete defining relation for this design

What is the complete defining relation for this design?

  Assignment on disaster recovery plan

This assignment consists of two (2) parts: a written paper and a PowerPoint presentation. You must submit both parts as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is wri..

  One type of cryptography or encryption

Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption.

  Review the excellent design problem published by downs

Review the excellent design problem published by Downs and Vogel (1993). Transfer this problem statement into a specification in a control design form.

  Conducting system design for a development project

What are the five high-level tasks involved in conducting system design for a development project to be built in-house

  Setup a wireless lan

You are to setup a wireless LAN. What are some of the interferences that you should watch for?

  Assignment on excel using solver

Maximize Z= 400a +275b +190c subject to the following constrains : a) 7a +5b +4c

  Defining leadership styles

Defining Leadership Styles Here Is A Questionnaire For You To Take On Your "Influencing Style".

  Design robot that can perform any function or activity

Design a robot that can perform any function or activity you choose from an automatic laundry robot to a customer service robot.

  Describe an application that you have to solve

Describe an application that you have to solve by using at least 2 Excel functions. It can be Math, Statistics, Engineering

  Calculate average salary of all administrative assistants

Calculate the average job satisfaction for Administrative Assistant. Calculate average salary of all Administrative Assistants and place the result in cell J5.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd