Assignment 19678289


1. What are the different kinds of password protections on iPhones and Android devices. Please compare as some of the newer iPhone models have different settings than the older ones e.g. iPhone 4 and 5 compared to iPhone x.

2. Let us assume you have an locked iPhone and you are unsure how to unlock the iPhone. What options might you have e.g. if you know the users’ iCloud password then would that be helpful? If so, why and how? Please cite your sources.

3. Let us assume you are able to take an backup of the iPhone using iTunes. What would be contained in an iTunes backup and how might that be valuable for you? Please do research and cite your sources.

4. Now, let us pretend that you are an defense attorney and you are planning for an cross-examination. Give me at least 5-7 questions that you would ask as part of your cross-examination. For ideas, please review Chapter 18. Make sure your questions are factual.

5. Now flip around your hat. Pretend you are the one answering the attorney’s questions. How would you defend your answers?

6. Now, once you have thought this through – tell me what makes the most sense? Investing in a well known commercial tool that has survived court scrutiny or using a different set of hodge podge tools to complete your analysis and present the findings in a court of law? Please tell me why

Project Plan 19691559

Complete the Contract Plan Template to use a third party for the new website.

Customize the template to fit the needs of HWE Accessories. Include the following: Evaluation and selection process Contract management Vendor risk and relationship management Software escrow Software licensing

Project Milestones

Review your project plan from Wk 2.

Add project milestone dates and dependencies to your tasks and subtasks.

Write a 1- to 2-page summary of your project milestones and dependencies. Include answers to the following questions: How will you know if your project is on track? What will you do if a task or subtask is not proceeding on time? What criteria besides time may be used to measure the project’s success?

Network Security Impact Data Security

How does Network Security impact Data Security? 

Consider the ethical implications of intrusion detection? 

What might you consider and what ethical values might you identify?

Would you do things differently on your work or home network in the future because of these ethical considerations? 

This is not just an opinion question, back it with valid research.


300+ words with citations. 

Discussion 19495001


The Problem of Asymmetric Information

There is frequent confusion about the terms asymmetric information, moral hazard and adverse selection?  Asymmetric information is the cause, moral hazard and adverse selection are the outcome.  This video is great at explaining the connection between asymmetric information and moral hazard.  Your job will be to see what these have to do with hiring a police officer.

Many police officer positions require the applicant to have a college degree even though the tasks of a police officer rarely call upon college course material. Why don’t police departments increase their applicant pool by dropping this requirement?  As you answer this question think back to last week and the problem of Type 1 and 2 errors and the human tendency to be risk-averse.



Discussion 6 19761273

 What are the implications for Basic Attention Token” (BAT) and Blockstack relative to global marketing? 

APA format- Minimum 500 words.


Read: What is Basic Attention Token? Blockstack Launches Decentralized Applications Store The Commoditization Of AI And The Long-Term Value Of Data

Watch: YouTube: Basic Attention Token
YouTube: Blockstart – A New Internet for Decentralized Apps
YouTube: Data is the New Gold, who are the New Theives?  

Responce For Each In A Paragraph Of At Least Five Sentences Wk5


Fair Use is described as copying of copyrighted material, but only for limited purpose and without any permission from the copyright owner. This promotes freedom of expression by permitting use of copyrighted material in certain circumstances. These certain circumstances are activities like criticism, comment, news reporting, teaching, scholarship, and research.

In my opinion, Fair Use of copyrighted material should be left as is, as it covers all the scenarios where in any material could be used for limited purposes and also, doesn’t exploit use of actual owner’s material. For instance, quoting an author’s material in a review is within Fair Use limits and totally understandable as it gives more context. ”A reviewer may fairly cite largely from the original work, if his design be to use the passages for the purposes of fair and reasonable criticism, if he cites the most important parts of the work, with a view, not to criticize, but to supersede the use of the original work, such a use will be deemed a piracy.” Justice Joseph Story of the United States Supreme Court wrote in that matter, Folsom v. Marsh, a Massachusetts case involving the papers of George Washington. (

In case of journalist’s they could quote a speech without the orator’s permission which gives them more credibility. In case of educational uses, teachers can photocopy portions of work, for classroom purposes which is totally acceptable. In the Educational Fair Use Guidelines, it is mentioned, “Since the current copyright law was adopted, various organizations and scholars have established guidelines for educational uses. These guidelines are not part of the Copyright Act and are summarized in Chapter 7, which deals with academic and educational permissions.” (

There are some considerations when Fair Use is in picture – The purpose for intended use, competition with the source, using the name of the author and giving him credits does not mean that any material or how much ever material can be used, the more material from the original you use means the less Fair Use that it will be, the quality is as important as quantity that is used.

By including a copyright notice, the author can make it simpler for anyone who desires to use the material for any purpose. Author can do this by giving a copyright notice which says, the word “copyright”, c in a circle, date of publication, name of either the author or the owner of all the copyright rights, this would help anyone to track the author to use any of his / her work. According to International Copyright Protection, “Copyright protection rules are fairly similar worldwide, due to several international copyright treaties, the most important of which is the Berne Convention. Under this treaty, all member countries — and there are more than 100, including virtually all industrialized nations — must afford copyright protection to authors who are nationals of any member country. This protection must last for at least the life of the author plus 50 years and must be automatic without the need for the author to take any legal steps to preserve the copyright.” (



In its most general sense, fair use is any copying of copyrighted material done for a limited and “transformative” purpose, such as to comment upon, criticize, or parody a copyrighted work. Such uses can be done without permission from the copyright owner. In other words, fair use is a defense against a claim of copyright infringement. If your use qualifies as fair use, then it would not be considered an infringement. Unlike other forms of fair use, fairly extensive use of the original work is permitted in a parody in order to “conjure up” the original [1].

There are several factors that a court will consider when determining whether an instance of infringement qualifies as fair use. Non-commercial use weighs heavily in favor of finding that the infringement is fair use. Violations often occur when the use is motivated primarily by a desire for commercial gain. The fact that a work is published primarily for private commercial gain weighs against a finding of fair use. When it comes to fair use, unpublished works are inherently different from published works. Publishing an author’s unpublished work before he or she has authorized it infringes upon the author’s right to decide when and whether the work will be made public [2].

Although some of the criticism is directed at courts’ alleged misapplication of the governing legal rules and standards, much of it has begun to focus on structural features that sometimes compel would-be users to give in to copyright owners’ expansive interpretations of the scope of the owners’ rights. Among these features are the potentially high costs of fending off even weak copyright infringement suits; endemic risk aversion on the part of all parties involved, including the providers of errors and omissions (“E&O”) insurance; and, relatedly, the often complex, fact-specific, and hence relatively unpredictable nature of the governing standards themselves [3].

Fair use is controversial in that it is a contradiction of the basic concept of copyright’s five rights. Fair use provides the privilege of using an author’s work without permission or payment. In 1978, the new copyright act spelled out fair use but only after resistance. The copyright committee working on the new law felt that trying to nail down specific guidelines for fair use in an era of technological change was futile. The codification of fair use is short and seemingly straightforward in the text of the law, but this still does not make its application any clearer than in the past [4].


Web Application Hacking

Write a 2 page paper (deliverable length does not include the title and reference pages) Explain the architecture of Web applications Describe the objectives of Web application hacking Explain the anatomy of an attack Describe Web application threats Explain countermeasures Describe Web application hacking tools

Cloud Computing Explain How Cloud Service Models Iaas Saas Paas And How Microsoft Office 365 Azure Fit In Explain The Aws Read Sp 1800 4 Draft Mobile Device Security Cloud And Hybrid Builds Then Write A Summary For This

2-3 Page writing in APA 6th standard and no plagiarism. 

Explain how Cloud Service Models (IaaS, SaaS, PaaS) and How Microsoft Office 365, Azure Fit In?

Explain the AWS?

Read SP 1800-4 DRAFT Mobile Device Security: Cloud and Hybrid Builds then write a summary for this publication( *please remember to include at least one credible scholarly reference with your initial post! 

Week1 19491135


Compare the statistical feature of R to its programming features. In a table format, describe the programming features available in R, explain how they are useful in analyzing big datasets.

Describe how the analytics of R are suited for Big Data.

Assignment Requirements

2 pages, double-spaced. (Does not include title page or reference page)

APA format

At least 2 scholarly references

Encryption 19515911

 Write an essay of at least 500 words discussing the use of encryption to protect data at rest, in motion, and in use.  

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).