How people handle their wireless devices

Assignment Help Basic Computer Science
Reference no: EM131412137

Hands-On Project 7-5: Observing How People Handle Wireless Devices

Objective: Observe how people handle their wireless devices and note any security lapses.

Description: In this project, you observe how people handle their wireless devices, take notes on your observations, and report your findings to your classmates or instructor. You need a notepad and pencil for this project.

1. Choose a busy time to observe wireless users.

2. Select a location where you are likely to find plenty of people with wireless devices, such as your school's common areas or a cybercafé.

3. Watch the people around you and observe how they handle their cell phones, laptops, and other wireless devices.

4. Did you notice any mishandling or any security lapses? For example, did anyone leave a cell phone unattended so that it could be stolen or tampered with? Did anyone leave a laptop unattended or unsecured? Did anyone place a device in a potentially damaging environment, such as beside a hot or cold drink?

5. Write down your observations. Turn them in to your instructor or present them in class.

Reference no: EM131412137

Questions Cloud

Representative from greenleaf investments : A representative from Greenleaf Investments has offered to purchase all the payments from you for $25 million. The interest rate is a 9 percent APR compounded daily. Assume there are 12 months in a year, each with 30 days. Should you take the offe..
Planning a wireless network site survey : Prepare the presentation, and then submit your work to the instructor or present your work in class.
What method did you use to answer the question : What method did you use to answer the question - and was this the best method? What kinds of evidence did you consider? Was there other evidence you could have used?
Financial information for apple computer : Financial Information for Apple Computer can be found on Yahoo.com/finance (Symbol: AAPL). You will find information under financials for the balance sheet and income statement for three years.
How people handle their wireless devices : Did you notice any mishandling or any security lapses? For example, did anyone leave a cell phone unattended so that it could be stolen or tampered with? Did anyone leave a laptop unattended or unsecured? Did anyone place a device in a potentially..
Evaluates all of its projects : Calculating IRR [L05] A ?rm evaluates all of its projects by applying the IRR rule. If the required return is 14 percent, should the ?rm accept the following project? 8. Calculating NPV [L01] For the cash ?ows in the previous problem, suppose the ..
What is the rate of per capita income growth : Now assume rate of population growth to be 2% per year. The savings rate is 20% and capital -output ratio is 4 and depreciation is 1%. What is the rate of per capita income growth? What happens to g, if n is 4% and 5%. What rate of population grow..
Swiss francs per us dollar : The exchange rate is 0.9991 Swiss francs per U.S. dollar. How many U.S. dollars are needed to purchase 9,548 Swiss francs?
Unacceptable for external financial reports : Why is the ABC described in the reading this week, unacceptable for external financial reports? In what fundamental ways does ABC differ from traditional costing methods, such as those described in Chapter 4?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Address three components represented in cell

Assume that a security model is needed for protection of information in your class. Write a brief statement on how you would address the three components represented in that cell.

  Evaluate five to seven most important things about computer

Evaluate five to seven most important things about computer network

  Server and database server in information saving

Identify the pages/components which need to be developed for the complete system to function. Elaborate how each page/component will be used for the interaction between both web server and database server in information saving and retrieval, which..

  Research a writing guide for forensics organization

Your manager has asked you to research and recommend a writing guide that examiners in your computer forensics organization will use for all official written reports.

  Identify and reuse free memory area in a heap

Discuss two main approaches to identify and reuse free memory area in a heap.

  Examining defense perimeters

There are many scenarios one might encounter when examining defense perimeters. These include the single router, defense-in-depth, and demilitarized zone (DMZ) methods. Each has a strategic approach geared specifically toward the environment in wh..

  What opportunities enabled team to accomplish its goals

What motivational theories do you think could have been used to encourage the team to be more successful? What specific rewards or opportunities would have enabled the team to accomplish its goals? Why?

  Write an array-based implementation of the adt binary tree

Write an array-based implementation of the ADT binary tree that uses dynamic memory allocation. Use a data structure like the one in Figure 16-1.

  Prove that this language is nonregular

Build a PM that accepts the language of all words that have an a as the middle letter. (These words obviously must have odd length).

  Explain project hr management

Project HR Management, Describe how you can build quality into your project in each of the PMBOK® process groups.

  What is the pmf of k

What is the PMF of K, the number of fish that are hooked on a single cast of the line?

  Design a database application to keep track of movies

Design a database application to keep track of movies, actors, and the roles played by actors in movies. You may make up all the data.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd