Entries by Student

write my assignment 21426

Create a 3 page essay paper that discusses Light peak( high speed opictal cable technology).

Light Peak is defined to as a new interface technology of peripheral which enable nodes to connect devices of peripheral or other nodes through an optical connector. Use of optical technology has been in the industry for quite sometime. Telecom companies have used it for networking for years. Light, instead of a wire, is considered much more efficient means of relaying enormous data over long distances. The challenge is optical modules used in conversion of the electrical signals into optical were exceedingly large and expensive. By use of the newly come technology, there is a possibility for the firm to produce affordable and compact optical modules.

There are several outstanding differences between optical cabling and electrical cabling. However, the major advantage of using Light Peak technology is seen in optical cabling substituting electrical cabling. Use of copper wire in inter-device communication has its demerits. The level of signal distortion increases with the increase in the distance and speed of transmission. Consequently, the interruption becomes too much that there is no reliable signal transmission between the peripheral and the computer. This explains the reason as to why peripheral cables have fixed lengths.

Optical signals do not reflect the interruptions experienced when copper wire is used in signal transmission. This implies that optical cables can extend to serve longer distances compared to copper wire. Additionally, optical fibers are much thinner enabling more flexibility in cabling compared to bundles of copper wire. A recommended cable of Light Peak is almost of the same size of a strand of human hair. These optical cables can be increased up to a length of100 meters that will effectively serve every place within a household as well as enough for businesses.

Light Peak technology has a close comparison with the allied USB technology. Although USB

 

"Not answered?"


Get the Answer

write my assignment 28371

Provide a 7 pages analysis while answering the following question: What Is the Technological Imperative. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required. The present paper has identified that&nbsp.Doomsayers predict that since with the technology we possess we can destroy the planet, “we eventually will”. The self-sufficiency of technological leads to the oft-quoted inference that technological events that cause change are usually irreversible. To support this contention, a lot of intellectuals who hold or expound theories usually quote similar inventions isolated in different geographic regions. “Technological determinism” is basically associated or compared with the general aspect of inexorableness or predictability, and is also referred to as the “the technological imperative. The overriding principle of the technology is that when a specific technology poses a difficult challenge, which is doable, then this specific action must be done because it is a challenge, but technically possible (moral imperative) and must (as an operational requirement) it will eventually be undertaken, even if just for the sheer challenge of doing what is difficult but practically possible (Hasan Ozbekhan 1968). Due to the accelerated progression of technology, Donald Cardwell makes us remember that technological modernization and improvement is not created out of nothingness, but results from the victorious and dominant communication and contact that ushers in social changes, development in science and political acumen. In a comprehensive review of the tools and machines that humans have made and used throughout history, Cardwell not only emphasizes the motorized, perfunctory procedures, but also explores the fundamental, general tendencies, movement, or direction that have resulted in periods of great and even revolutionary changes and upheavals. Specifically, he pins points the eighteenth century as the cut-off point in the contemporary history of technology, describing how the progression in physics and chemistry accelerated and provided the inducement for the mechanical ideas and methods for the Industrial Revolution. Starting with the steam engine to the invention of electricity to nuclear-powered energy that drives today’s world of electronics and computers. Technology in eighteenth-century Britain was vastly different from what we see today, and their workings were also in a very different context. The eighteenth century was the period which gave birth to civil engineering an individual and diverse discipline. Most of the famous people who we would refer to as engineers today, such as James Watt, John Smeaton, Willian Jessop regarded themselves as scientific philosophers, who were trained in and adhered to the Newtonian educational institutional convention that was considered the prevailing archetype for both mechanics and the study of motion and change-producing forces. The Philosophy of technology shows the ways and means to understand the technology that could shape public policies. It also goes a long way to arrive at a concept or generalization as a result of things seen, experienced, or believed and addresses the inception of new fields of information and to follow a line of investigation.&nbsp.

 

"Not answered?"


Get the Answer

write my assignment 5475

What are allies/enemies of Panama? don’t tell me to go to wikipedia or background notes or anything like that. i`ve tried everything but couldn’t find the allies and enemies of Panama, although it seems like a really easy question! PLEASE HELP! thank you <3Have you tried your local library. The encyclopedias at mine are more useful than the online ones.I don’t think Panama has any specific enemies. I found this information about Panama’s international alliances in the CIA World Factbook. International organization participation: FAO, G-77, IADB, IAEA, IBRD, ICAO, ICC, ICCt, ICFTU, ICRM, IDA, IFAD, IFC, IFRCS, ILO, IMF, IMO, Interpol, IOC, IOM, IPU, ISO, ITU, LAES, LAIA (observer), MIGA, NAM, OAS, OPANAL, OPCW, PCA, RG, UN, UNCTAD, UNESCO, UNIDO, UPU, WCL https:// usa is the allies of panama

 

"Not answered?"


Get the Answer

write my assignment 30316

Chapter 04 The Role of People in Security

1. Time can be manipulated to drive asense of __________ and prompt shortcuts that can lead to opportunities for interjection into processes.

• A. scarcity

• B. trust

• C. familiarity

• D. urgency

2. Which term describes a type of phishing where individuals who are high up in an organization such as the corporate officers are targeted?

• A. Whaling

• B. Pharming

• C. DNS poisoning

• D. Vishing

3. Which statement explains why vishing is successful?

• A. Vishing is successful because people desire to be helpful.

• B. Vishing is successful because indi­viduals normally seek to avoid confrontation and trouble.

• C. Vishing is successful because of the trust that individuals place in the telephone system.

• D. Vishing is successful because people tend to trash information that might be used in a penetration attempt.

4. Which statement describes how reverse social engineering is accomplished?

• A. An attacker attempts to find little bits of information that could be useful for an attack in a target trash can.

• B. An attacker tries to convince the target to initiate contact and then gets the target to give up confidential information.

• C. An attacker uninstalls software on an unsuspecting user’s computer.

• D. An attacker initiates a conversation with the target to obtain confidential information.

5. A user receives an e­mail warning of a dangerous computer virus and instructing the user to delete files it claims were put there by the virus. However, the files are actually critical system files. Which term describes this scenario?

• A. Social engineering

• B. Reverse social engineering

• C. A hoax

• D. Phishing

6. What common password character combinations do users tend to use when creating passwords?

• A. All capital letters

• B. Passwords that are too long

• C. Names of family, pets, or teams

• D. Numbers only

7. Which password is strongest?

• A. [email protected]$$w0rd

• B. G0*49ers

• C. C#as%t*1ng

• D. April301980

8. Which statement identifies the best defense to prevent information from being obtained in a shoulder surfing attack?

• A. Small shields should be installed to block the view of a user’s entry into a keypad.

• B. The keypad system should be designed with “scrambled” numbers to help make shoulder surfing more difficult.

• C. Cameras should be installed over the keypad to record the area and the person entering the information.

• D. Users should be aware of their surroundings and not allow individuals to get into a position from which they can observe what the user is entering.

9. What is a sophisticated countermeasure to piggybacking?

• A. A man trap

• B. A rogue access point

• C. A concrete barrier

• D. A camera

10. Which statement describes how an attacker can open up a backdoor?

• A. A user can install a wireless access point so that they can access the organization’s network from many different areas.

• B. An attacker can follow closely behind a person who has just used their own access card or PIN to gain physical access to a room or building.

• C. An attacker leave the door to a room or building ajar.

• D. An attacker follows closely behind a person who has just used their own access card or PIN to gain physical access to a room or building.

11. What is a paradox of social engineering attacks?

• A. An attack can compromise an organization’s corporate secrets yet identify the organization’s greatest assets.

• B. People are not only the biggest problem and security risk but also the best tool in defending against an attack.

• C. A social engineering security breach may actually highlight how unhelpful an organization’s employees can be.

• D. Attacks happen frequently, yet little corporate data is stolen.

12. What is a good way to reduce the chance of a successful social engineering attack?

• A. Lock all doors to the organization’s building.

• B. Implement a strong security education and awareness training program.

• C. Use security guards at the building entry point.

• D. Use biometric security controls.

TRUE / FALSE

13. A social engineer uses various deceptive practices to convince the targeted person to divulge information they normally would not divulge or to convince the target of the attack to do something they normally wouldn’t do.

14. Implied scarcity or implied future change can create perception of scarcity.

15. Phishing is the most common form of social engineering attack related to computer security.

16. Reverse social engineering is easier to execute than social engineering.

17. Setting up a rogue access point is a good way to prevent social engineering attacks.

 

"Not answered?"


Get the Answer