What are the latest ways to steal identity and money

Assignment Help Computer Engineering
Reference no: EM131325294

Library Research Assignment

Introduction

You are to complete a research assignment during weeks 6-7, after a Librarian visits the class and shows various research strategies and tools during a one hour long class presentation. Questions on the research strategies and tools should be directed to the Reference Librarians, located at: https://library.csun.edu/ResearchAssistance/AskUs. You must take notes from the Librarian visit and submit those notes (handwritten) at the end of the lecture. Please be sure to include your name and class time on the paper.

Before your Librarian visits your classroom, please watch ALL of the three videos on this link: https://library.csun.edu/Guides/comp100 and then click on Quiz to test your knowledge.
https://library.csun.edu/Guides/comp100/Quiz

Questions regarding due dates, point value for completion of the assignment, or appropriateness of topic selection should be directed to your comp 100 instructor.

Research Topics

Please review all the topics below, and choose one with your group members.

1. How do computer viruses spread and in what ways do they affect computers?
2. How has the Music/TV industry been affected by the internet and digital downloading?

- How have sites such as Youtube , Netflix, Hulu, affected the TV/Music industry

3. Microblogging

- It has surfaced and inspired mainly by people's tendency to jot down babble and post it. They consist of sites like Twitter and Chinese equivalent Weibo, also Facebook Status Updates, which are very popular. In what way has Microblogging revolutionized the way information is consumed?

4. From where does spam email come and can we stop it?

5. Cell Phones - How have they changed us socially?

6. Cloud Computing - What is it and related Security Issues .

7. Cyber Crime - Identity Theft

- What are the latest ways to steal identity and money? Social Security numbers are the most valuable pieces of consumer information for identity thieves! How can we prepare and protect ourselves?

8. Internet Censorship

- How is internet censorship used in China/Middle East/Korea? Should parents censor what their children are looking at? Should companies see what employees are doing in their time?

9. Computer waste and the environment: whose problem is it?

- You'd never guess it, but your PC puts about 1,000 pounds of carbon dioxide into the atmosphere every year! What can you do to help?

10. Internet and children

- Are children smarter (or more socialized) because of the Internet?

11. Privacy of Medical Records

- What medical information should be confidential? Who, if anybody, should have access to medical records? Is your data safe?

12. Internet Dating

- Internet dating is proving a much more successful way to find long-term romance and friendship for thousands of people than was previously thought, new research shows! Is it safe and for everyone?

13. Augmentive Technology for the Handicapped

- Using technology to improve the quality of life of the disabled. Some products are natural-voice talkers for the speech impaired, single-switch Internet surfing for quadriplegics, robotic wheelchairs, sensory systems to teach cause-and-effect to severely delayed children, tablet PCs that translate the uncharacteristic handwriting of people with spastic cerebral palsy, and a means to extend special-education class work to home-bound and hospital-bound children, among many other ideas

(If you have a topic that is not on the list, please see your instruction for approval.)

Overview of Research Assignment

Students will develop a more in-depth understanding of various topics. This will be achieved through the use of research strategies and a systematic exploration of appropriate information sources introduced in the library Resources lecture. Students will document their research by creating an annotated bibliography using the topic selected.

Assignment Requirements

1. The annotated bibliography will contain NINE sources (for Groups of Three) using the MLA Style for the reference citations.

2. Of the 9 sources in the annotated bibliography, at least (3) should be from a book, e-book, personal interview, or media resource (i.e. TV broadcast, or film); (3) should be from a periodical (newspaper, magazine or journal) and (3) should be from freely accessible websites.

3. Each source listed will also include a 3-5 sentence annotation which will describe the relevance between the information in the source and the topic of the research.

4. The annotated bibliography should be typed in MLA style, Double spaced with one inch margins (top, bottom, left, and right). Include your names and page number in the header (top - aligned right), include your names, Prof. Name, Class name, date on the left side.

5. A cover sheet is not necessary in MLA format!

6. The completed annotated bibliography is due to your instructor on the date announced in class. Each team member must upload the team project; the team leader will print and submit the team project.

Summary Activity

When you have completed your annotated bibliography, answer the following question in one separate page and attach to your annotated bibliography

If a friend asked you where you found the best information on your selected topic, based on your research activities, what would you tell them you discovered about the process and/or the information sources?

(NOTE: Each student is to write his/her own individual summary!):

Reference no: EM131325294

Questions Cloud

Contrast fixed exchange rate and managed floating systems : Compare and contrast the fixed exchange rate, free floating, and managed floating systems?- How can central banks use direct intervention to move the value of a currency?
Discuss the organizational strategy and hr activities : Describe the current relationship between organizational strategy and HR activities at The King Company.
Create an essential question that your webquest : Choose a specific grade level and strand from the following social studies strands: American History, World History, Civics/Government, Geography, and Economics -  Create an essential question that your WebQuest will address.
Levels of equity market capitalization to gdp : Why do some developed countries have high levels of equity market capitalization to GDP while other developed countries have low levels?
What are the latest ways to steal identity and money : What are the latest ways to steal identity and money? Social Security numbers are the most valuable pieces of consumer information for identity thieves! How can we prepare and protect ourselves?
How should given affect the us demand for british pounds : All other things being equal, assume that US interest rates fall relative to UK interest rates. Again with all other things being equal, how should this affect the US demand for British pounds.
How team-building intervention could be conducted for virtue : Research an organizational development theory you would use to effect change in a large, multinational company that is experiencing significant growth. Be sure to identify the theory and highlight the points of the theory and why you think it is e..
Relationship between the relative real interest rates : What is the expected relationship between the relative real interest rates of two countries and the exchange rate of their currencies?
How does he do that in far from a city on earth : How does he do that in "Far From a City on Earth"? Consider his use of detail, his story's ch.aracters, and the purpose of the scene on Earth before switching to the main story, which takes place on Mars

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd