technology

I’m working on a Computer Science exercise and need support.

Note* have 3 different works in this post

The intent of the assignment is to create 2 ethical case studies. not real ones. they had to include something with technology. It could be about people falsifying the resume; it could be about disclosing information but you were to create some type of case study.

  • Identify 2 potential events that involve a technical issue and ethics – explain the event and the ethical issue.
  • Explain both sides of the issue and why it is an ethical issue.
  • Explain what you would do if placed in the ethical dilemma?

__________________________

Write a page on the technology behind the darkweb that can anonymize user identities and actions

__________________

Write a two page narrative and include an additional 2 pages for screenshots for the following assignment:

  • Gather information on mit.edu. Go to https://lookup.icann.org/, virustotal.com, whois.net or other publicly available sources. What intelligence and footprinting information can be obtained from these sites? How can a hacker use this information to perform reconnaissance on the target system?

2. Download nmap (and zenmap for the user interface). Run a full TCP scan (use the -ST option) on your computer or test system. What ports are opened? Choose three ports or services and discuss if they are needed.

Technology

I’m trying to learn for my History class and I’m stuck. Can you help?

General Overview

For this assignment, youwill identify forms and applications of technology for use in an elementary school social studies classroom. You will be required to describe the general applications of these technologies, specific applied activities in the general social studies arena, and provide an evaluation.

Learning Objective

You will develop a portfolio of technologies that could be used in an elementary school social studies classroom, identifying general uses, aligned appropriate national social studies standards, potential activities, and good and bad points to that technology’s use.

Assignment Process

1. Select 10technologies (defined below) that can be used in an educational setting environment for each of the categories listed below. Notice that I did not say educational or instructional technologies. This is to not restrict you to that search parameter, but rather to allow you to critically explore any technology that might have a pedagogical use. Select technologies representing:

a. Hardware devices

b. Business/productivity software (i.e., Microsoft Office)

c. Web-based technologies (delivered via the Internet)

d. Multimedia software (audio, video, graphical)

e. Games/entertainment

2. Then,review each technology, answering the following questions (best recorded in a word-processing program like Microsoft Word as a multi-page document):

a. What are the general functions and purposes of this technology (a paragraph or 2 fordescription)

b. What types of social studies objectives/ goals could be met by this technology and how? Please relate to a NCSS main theme (or more than one if appropriate).

c. What, in your opinion, are the good and bad points of using this technology in a pedagogical setting? Consider this a risk analysis.

technology

I’m working on a Computer Science exercise and need support.

Note* have 3 different works in this post

The intent of the assignment is to create 2 ethical case studies. not real ones. they had to include something with technology. It could be about people falsifying the resume; it could be about disclosing information but you were to create some type of case study.

  • Identify 2 potential events that involve a technical issue and ethics – explain the event and the ethical issue.
  • Explain both sides of the issue and why it is an ethical issue.
  • Explain what you would do if placed in the ethical dilemma?

__________________________

Write a page on the technology behind the darkweb that can anonymize user identities and actions

__________________

Write a two page narrative and include an additional 2 pages for screenshots for the following assignment:

  • Gather information on mit.edu. Go to https://lookup.icann.org/, virustotal.com, whois.net or other publicly available sources. What intelligence and footprinting information can be obtained from these sites? How can a hacker use this information to perform reconnaissance on the target system?

2. Download nmap (and zenmap for the user interface). Run a full TCP scan (use the -ST option) on your computer or test system. What ports are opened? Choose three ports or services and discuss if they are needed.