Order Number |
636738393092 |
Type of Project |
ESSAY |
Writer Level |
PHD VERIFIED |
Format |
APA |
Academic Sources |
10 |
Page Count |
3-12 PAGES |
Discussion:Need 250 words for each Answer
1:Your aunt contacted you last night. Your cousin, who is 14, wants a Facebook account. Your aunt has heard lots of stories of how difficult it is to protect your privacy on Facebook, and she wants your advice. Research the privacy and security settings on Facebook and create a “User’s guide” for your aunt to work through with your cousin. Make sure you include information on how to remove your cousin from Facebook search results, make contact information private, keep friendships private, adjust Wall posting visibility, set up photo album privacy, customize photo tagging, and explain what personal information should and should not be included on your cousin’s profile.
2:You really like the concept of web-based computing and want to use as many web-based programs as possible. Write a brief paragraph discussing the programs you would use for productivity, file storage, collaboration, and communication. What are the benefits and drawbacks of each choice?
3:You will want to keep an archive of all your academic work so you can develop the best possible e-portfolio at graduation. Which type of portable hard drive is best suited to your needs? What size? Do you need built-in WiFi? Can the drive stream media content? Do you think you could store everything you produce in your academic career in a single cloud storage account?
4:You’re working for a local coffee shop that offers free wireless access to customers. Your supervisor has asked you to create a flyer for patrons that warns them of the potential dangers of surfing the Internet in public places. Conduct research on the Internet about using public hotspots to access the Internet. Prepare a list of specific steps that customers can take to protect their data when surfing on publicly accessible networks.
5:With the arrival of reliable, fast, networked digital information, businesses can track the location and status of all kinds of objects, such as cars and bicycles. This is introducing a new business model different from individual ownership—now, using a car can become a “subscription” service. What options are there for “subscribing” to a car instead of owning one? How about for a bicycle? Are there other businesses you can identify that would be able to take advantage of digital information and become subscription services instead of vendors of a physical product? What are the advantages to the consumer of subscription over ownership? What are the drawbacks?
6:Computer security professionals are among the highest-paid employees in information technology organizations. Using employment sites such as Monster.com, computerjobs.com, and dice.com, research computer security jobs available in the state where your school is located (try searching “computer security”). Select three entry-level computer security jobs from different employers and prepare a document comparing the following: What are the educational requirements? What job skills are required? How much prior work experience are firms looking for? Are programming skills required?