Computer Science homework help
Computer Science homework help. Question 1:
Visit the OWASP website.
Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP.
See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.
Safe Assign is software that verifies the originality of your work against on-line sources and other students.
Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.
Question 2:
Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly.
1. What kind of speech was the First Amendment written to protect?
2. Does the First Amendment apply only to spoken words?
3. What does it mean that laws regulating speech must be content neutral?
4. Why are common carriers prohibited from controlling the content of the material they carry?
5. How does the Supreme Court determine whether material is obscene?
6. Why have attempts to censor the Internet failed in the US?
7. Why not just ban spam?
8. Why did Facebook ban Alex Jones and Louis Farrakan?
9. Should websites that show how to 3d print guns be banned?
10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean?
Question 3:
Answer each question in a paragraph with at least five sentences:
1. What is privacy?
2. What risks, if any, does facial recognition software raise?
3. How much information about you can be found on-line with a simple google search?
4. How much information about you can be found by searching government and commercial databases?
5. Describe informed consent.
6. Should secondary use of consumer provided data be available without notice to the consumer?
7. How do data mining and predictive analytics work?
8. Watch this Science Friday video by Ira Flatow “https://www.youtube.com/watch?v=i1lvPpuiTjU” And, offer your opinion – Are advancing algorithms taking our free will?
9. Should Facebook be regulated, at least as far as it’s privacy and data policies?
10. How many public Cameras “https://www.theguardian.com/world/2019/feb/18/chinese-surveillance-company-tracking-25m-xinjiang-residents” is too many?
Question 4:
Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly.
1. what do each of these terms refer to: copyright, patent, trademark, trade secret?
2. Why is intellectual property entitled to legal protection?
3. Why did copyright laws become stricter and more punishing in the late 20th century?
4. What is the Fair Use doctrine?
5. Make an argument for legalizing the copying of music or software.
6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?
7. What was the 1984 Sony Supreme Court case about?
8. Was Napster responsible for the actions of its users?
9. Why did the court find in favor of Diamond in the Rio case?
10. What is Digital Rights Management?
Question 5:
Answer the following questions from Chapter 5 in the text with a paragraph that contains at least five sentences.
1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?
2. How has the term hacking changed meaning over the years?
3. What is the most dangerous hacker tool?
4. From the news: How were NSA’s hacker tools compromised?
5. What was the vulnerability in the Target Breach?
6. What do you think of hactivism?
7. How did Stuxnet work?
8. What was the Arpanet?
9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?
10. What is the Red Team?
Question 6:
This quiz is based on chapter 6 in the text. Answer each question in a paragraph that contains at least five sentences:
1. Should society help workers dislocated when technology, like the Internet, eliminates their jobs in a process called ‘Creative Destruction‘?
2. are we working more and earning less?
3. Would you want a telecommuting job? Why or why not?
4. Does the gig economy appeal to you? Why or why not?
5. How is an employee differentiated from a contracter under US law?
6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?
7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs?
8. How much monitoring of employee activities at work is appropriate?
9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time?
10. What is the relationship betwee BYOD (bring your own device) and shadow IT.
11. What is cyberloafing?
Question 7:
Please answer the questions in paragraphs containing at least five sentences.
1. Describe Digital Literacy (how to know what is real on the web).
2. None of these people exist. What does this mean to you?
3. Why is Wikipedia more reliable than a paper encyclopedia?
4. How useful are crowd sources answers?
5. What are some drawbacks to crowd sourced answers?
6. Do people generally utilize the diversity of sources on the Internet effectively?
7. How reliant are we and how reliant should we be on getting our news from social media?
8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?
9. If models are simplifications or reality, why do we rely on them?
10. Why was this model, used by Amazon for hiring, wrong?
11. Why did Skynet declare war on the human race?
Question 8:
Discuss each question in a paragraph of at least five sentences.
1) Give an example from the book where insufficient testing was a factor in a program error or system failure.
2) What was one cause in the delay in the completing of the Denver Airport.
3) Why didn’t the healthcare.gov website work at first?
4) What is one characteristic of high reliability organizations?
5) Describe the potential risks of alert fatigue in EHR systems.
6) What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
7) What does design for failure mean?