How people handle their wireless devices

Assignment Help Basic Computer Science
Reference no: EM131412137

Hands-On Project 7-5: Observing How People Handle Wireless Devices

Objective: Observe how people handle their wireless devices and note any security lapses.

Description: In this project, you observe how people handle their wireless devices, take notes on your observations, and report your findings to your classmates or instructor. You need a notepad and pencil for this project.

1. Choose a busy time to observe wireless users.

2. Select a location where you are likely to find plenty of people with wireless devices, such as your school's common areas or a cybercafé.

3. Watch the people around you and observe how they handle their cell phones, laptops, and other wireless devices.

4. Did you notice any mishandling or any security lapses? For example, did anyone leave a cell phone unattended so that it could be stolen or tampered with? Did anyone leave a laptop unattended or unsecured? Did anyone place a device in a potentially damaging environment, such as beside a hot or cold drink?

5. Write down your observations. Turn them in to your instructor or present them in class.

Reference no: EM131412137

Questions Cloud

Representative from greenleaf investments : A representative from Greenleaf Investments has offered to purchase all the payments from you for $25 million. The interest rate is a 9 percent APR compounded daily. Assume there are 12 months in a year, each with 30 days. Should you take the offe..
Planning a wireless network site survey : Prepare the presentation, and then submit your work to the instructor or present your work in class.
What method did you use to answer the question : What method did you use to answer the question - and was this the best method? What kinds of evidence did you consider? Was there other evidence you could have used?
Financial information for apple computer : Financial Information for Apple Computer can be found on Yahoo.com/finance (Symbol: AAPL). You will find information under financials for the balance sheet and income statement for three years.
How people handle their wireless devices : Did you notice any mishandling or any security lapses? For example, did anyone leave a cell phone unattended so that it could be stolen or tampered with? Did anyone leave a laptop unattended or unsecured? Did anyone place a device in a potentially..
Evaluates all of its projects : Calculating IRR [L05] A ?rm evaluates all of its projects by applying the IRR rule. If the required return is 14 percent, should the ?rm accept the following project? 8. Calculating NPV [L01] For the cash ?ows in the previous problem, suppose the ..
What is the rate of per capita income growth : Now assume rate of population growth to be 2% per year. The savings rate is 20% and capital -output ratio is 4 and depreciation is 1%. What is the rate of per capita income growth? What happens to g, if n is 4% and 5%. What rate of population grow..
Swiss francs per us dollar : The exchange rate is 0.9991 Swiss francs per U.S. dollar. How many U.S. dollars are needed to purchase 9,548 Swiss francs?
Unacceptable for external financial reports : Why is the ABC described in the reading this week, unacceptable for external financial reports? In what fundamental ways does ABC differ from traditional costing methods, such as those described in Chapter 4?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd