Does the first amendment apply only to spoken words

Assignment Help Basic Computer Science
Reference no: EM132519368

Question 1:

Visit the OWASP website.

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP.

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.

Question 2:

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly.

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry?

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam?

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned?

10. According to the Supreme Court 'anonymity is a shield from the tyranny of the majority'. What does that mean?

Question 3:

Answer each question in a paragraph with at least five sentences:

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search?

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent.

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work?

8. Watch this Science Friday video by Ira Flatow "https://www.youtube.com/watch?v=i1lvPpuiTjU" And, offer your opinion - Are advancing algorithms taking our free will?

9. Should Facebook be regulated, at least as far as it's privacy and data policies?

10. How many public Cameras "https://www.theguardian.com/world/2019/feb/18/chinese-surveillance-company-tracking-25m-xinjiang-residents" is too many?

Question 4:

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly.

1. what do each of these terms refer to: copyright, patent, trademark, trade secret?

2. Why is intellectual property entitled to legal protection?

3. Why did copyright laws become stricter and more punishing in the late 20th century?

4. What is the Fair Use doctrine?

5. Make an argument for legalizing the copying of music or software.

6. Do I or don't I own the books on my Kindle? If I own them, why can't I transfer them? If I don't own them, what is my legal right to them?

7. What was the 1984 Sony Supreme Court case about?

8. Was Napster responsible for the actions of its users?

9. Why did the court find in favor of Diamond in the Rio case?

10. What is Digital Rights Management?

Question 5:

Answer the following questions from Chapter 5 in the text with a paragraph that contains at least five sentences.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA's hacker tools compromised?

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work?

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson's disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Question 6:

This quiz is based on chapter 6 in the text. Answer each question in a paragraph that contains at least five sentences:

1. Should society help workers dislocated when technology, like the Internet, eliminates their jobs in a process called 'Creative Destruction'?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not?

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law?

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs?

8. How much monitoring of employee activities at work is appropriate?

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time?

10. What is the relationship betwee BYOD (bring your own device) and shadow IT.

11. What is cyberloafing?

Question 7:

Please answer the questions in paragraphs containing at least five sentences.

1. Describe Digital Literacy (how to know what is real on the web).

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowd sources answers?

5. What are some drawbacks to crowd sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?

9. If models are simplifications or reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?

Question 8:

Discuss each question in a paragraph of at least five sentences.

1) Give an example from the book where insufficient testing was a factor in a program error or system failure.

2) What was one cause in the delay in the completing of the Denver Airport.

3) Why didn't the healthcare.gov website work at first?

4) What is one characteristic of high reliability organizations?

5) Describe the potential risks of alert fatigue in EHR systems.

6) What were 2 common factors in both the Therac-25 case and the space shuttle disaster.

7) What does design for failure mean?

Reference no: EM132519368

Questions Cloud

Prepare closing balance for financial statement : Prepare closing balance for financial statement of 2019. With excess cash, Tom purchased a 30% (30,000 shares) investment in Board Books, Inc
What happens to abc company profit : Andrew Shapiro is a sales agent for ABC Company. He has an effort cost function of C = e2 and a reservation wage of $1,500.
Two essential ingredients of economic analysis : Scarcity and choice are the two essential ingredients of economic analysis. A good is scarce when the human desire or need for it exceeds the amount freely
Provide supports the view of the standard setters : Provide supports the view of the standard setters. Under current accounting rules, companies cannot recognise internally generated goodwill
Does the first amendment apply only to spoken words : What kind of speech was the First Amendment written to protect? Does the First Amendment apply only to spoken words?
Prepare journal entries relating to income tax expense : Present the income tax expense in the income statement for 2019. Prepare journal entries relating to income tax expense for 2019.
Solve for the monopoly price and quantity : The government imposes a unit tax, t, on the monopolist producer. Solve for the monopoly price and quantity.
How much do firm market and book values per share differ : By how much do the firm's market and book values per share differ? How does the difference in these values matter to the firm? Explain.
Underlying production function exhibits increasing return : Just by studying the total cost function, can you tell whether the underlying production function exhibits increasing return to scale, constant return to scale

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is demand elasticity

If I sell 5,000 T-shirts for 8.5 USD each, then increase my selling price to 9.5 usd/ I only sold 4000 shirts. What is my demand elasticity?

  Flowchart that display the students average scores

Flowchart that display the students average scores for 3 quizzes - Display an appropriate error message and ask the user to re enter a value of 3 quizzes.

  Multi-function printer can perform

As an output device and the most demanding out put for computer work, printers have been advancing technologically to the latest known as a multi-function print

  Prompt the user for the three strings

In the main method, prompt the user for the three strings.

  Argument three arrays of strings

Compose a function (that_string.py) that takes as argument three arrays of strings, determines whether there is any string common.

  Private individuals, businesses, politicians

You are required to research and discuss how the "Right to be forgotten" ruling (C131/12) may affect the quality of information shared on the Internet. Build and publish a website to illustrate and draw out your findings.

  How could tcp and udp know the values in the ip header

When adding a per-segment checksum to a segment, TCP and UDP include some fields in the IP layer before the segment has been passed to its underlying layer, the IP layer. How could TCP and UDP know the values in the IP header?

  Analyze the relationship between risk and rate of return

Analyze the relationship between risk and rate of return and suggest how you would formulate a portfolio that will minimize risk and maximize rate of return.

  Assignment instructions

Assignment Instructions

  Draw a uml diagram for storing a played game of chess

Draw a UML diagram for storing a played game of chess in a database. You may look at http://www.chessgames.com for an application similar to what you are designing. State clearly any assumptions you make in your UML diagram. A sample of assumption..

  Unity and the gnome desktop environments

Question 1: What are some of the differences between Unity and the GNOME desktop environments?

  Recreate the zeus world presented

The philosopher is still in the scene, however, and the user can zap him again. Revise the program to make the zapped philosopher fall down below the ground, where he can't be mouse-clicked again.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd