Project 1

In: Computers and Technology

Submitted By blackhawk127
Words 1506
Pages 7
1. Can you (or Mr. Yourprop’s supervisor) search Yourprop’s personal vehicle currently parked in the Company parking lot for digital evidence? Support your answer.
Mr. Yourprop is guaranteed certain rights do to his residence in the United States. One of these rights is the 4th amendment which prohibits “unreasonable searches and seizures and requires any warrant to be judicially sanctioned and supported by probable cause.” Employees hired by the Makestuff Company are issued handbooks at indoctrination informing them anything brought onto the company’s property, including the employees themselves, is subject to random search for items belonging to the Company. Reasonable expectation of privacy in this situation should not apply since the handbook clearly informs employees of the company’s right to search. Furthermore the 4th amendment should not apply since Make stuff is a private company and the 4th amendment only forces government officials to acquire a warrant before searching.
The statement Mr. Yourprop made “it is okay because I have a new job already and they were VERY happy to have me come from Makestuff, with ALL I have to offer.” has raised suspicions that a theft may have occurred. Due to the automobiles location on company property in combination with the employee handbook statement the company should feel safe searching the car. The company handbook statement states “anything brought onto the Company’s property, including the employees themselves, is subject to random search for items belonging to the Company”. This statement would combat any reasonable expectation of privacy since Mr. Yourprop was made aware of company policy at the time of hiring.

2. If evidence of this theft of intellectual property can be found, Makestuff Company may seek to pursue criminal prosecution. Can Mr. Yourprop’s supervisor direct local police investigators…...

Similar Documents

Project 1

...Project 1   Write an essay of 1500 words, giving credible references on the use of physics in your daily activities. You need to mention 5 or more activities where physics is used. Remember to follow the APA style and give references. Physics is used in so many ways that most people do not even realize that they are using it. Even a stay at home mom uses physics more than one would think. Daily activities that many people do include physics without thinking about it, such as driving a car, using a headrest in a car, walking and running, flushing the toilet, and washing and drying clothes. Driving a car has many different aspects of physics involved, but today only acceleration, speed, and velocity will be discussed. People talk in terms of physics everyday without even knowing that is what they are discussing. For example, “speed” limit, how quickly a car can “accelerate,” and when they add a direction, they are actually talking about the velocity of a vehicle because velocity has a magnitude and direction, not just magnitude. According to Barry Parker in Issac Newton School of Driving, “you are accelerating and decelerating most of the time when you take a trip through the busy streets of a city, either by stepping on the gas, braking, or turning the steering wheel.” Basically, if someone gets in the driver seat of a car and drives, that person is changing the acceleration, speed, and velocity of the car that is being driven. A speed is just the scalar, magnitude with...

Words: 1921 - Pages: 8

Project 1

... fire truck order some general supplies build a city hall pay principal and interest on long-term debt issue long-term debt to build the city hall pay the current portion of pension liability 15-32 Chapter 15 ANS: a. b. c. d. e. general general general capital general account f. capital g. general DIF: E fund fund and general fixed asset account group fund projects fund and general fixed asset account group fund, debt service fund, and general long-term debt group projects fund and general long-term debt account group fund OBJ: 5 15-33 Chapter 16 — Governmental Accounting: Other Governmental Funds, Proprietary Funds, and Fiduciary Funds MULTIPLE CHOICE 1. Capital improvements which are financed by special assessment debt for which the government is obligated in some manner would be recorded in the General Fixed Assets Account Group as a(n) a. debit to Expenditures. b. debit to Assets for the portion owned by the government. c. investment in General Fixed Assets--Capital Project Funds. d. Bonds Payable. ANS: B DIF: E OBJ: 1 2. Which of the following activities would NOT be accounted for in a Special Revenue Fund? a. hotel taxes restricted for tourism expenditures b. lottery proceeds restricted for property tax relief c. interest earned on temporary investments of long term bond proceeds d. park fees restricted to cover a small portion of park upkeep and maintenance ANS: C DIF: E OBJ: 1 3. Which of the following fund types have accounting principles most...

Words: 167618 - Pages: 671

Project 1

...Project Part 1: Multi-Layered Security Plan Loren Miller NT2580 Monday PM Introduction: Describe each layer of the Open System Interconnection (OSI) Model. List a security feature of each layer if it applies. List the protocol of each layer if it applies. List types of attacks that are you protecting against in each layer. Your goal is to be able to protect a web hosting company that has a global presence. This web hosting company supports customers in the following industries: Medical, Financial, and Governmental. Physical Layer: The Physical Layer defines the physical properties of the network, such as voltage levels, cable types, and interface pins (Baker). Any attack on the Physical Layer would have to be some type of physical action, like disrupting a power source, changing of interface pins, or cutting the actual cables. Simply tampering with someone’s fuse box outside their office can cause a disruption of service. Faulty power is a problem that can be caused accidentally by the power company, or intentionally by your competitor tampering with the fuse box. A smaller business may consider installing an Uninterrupted Power Supply (UPS) which may help avoid many unrecoverable power associated problems. The addition of a UPS to your critical system will give you time to perform an orderly shutdown when power is interrupted. An abrupt termination of power to any electrical equipment has potential for great damage. Much in the same way you might protect your...

Words: 1467 - Pages: 6

Project 1

...Project Alverenga Project Part 1 Task 1 The business needs; must comply with the Sarbanes-Oxley Act (SOX), Payment Card Industry - Data Security Standard (PCI-DSS), and the Gramm-Leach-Bliley Act (GLBA).   The business must comply with SOX, because the business is publicly-trading financial institution; PCI-DSS, because the business processes online credit card transactions; and GLBA, because the business is a financial institution.   All of the regulations of these three compliancy laws must be met, while still maintaining the Confidentiality, Integrity, and Availability (CIA) triad. All security requirements for SOX, PCI-DSS, and GLBA can be achieved using Linux and open source infrastructure.   Some examples of open source software that we might use are: Web Server - Apache     Web Filtering - DansGuardian           Network Firewall - Turtle Firewall     VPN - Endian Firewall Community         IDS/IPS - Suricata       Database - MySQL     File Server - Samba SMTP Server - hMailServer I would recommend that we use a "Defense in Depth" strategy, having multiple layers of access protection.   We need to have an IDS/IPS on both sides of our edge firewall.   The inside IDS/IPS will be used as additional protection for our network and the outside IDS/IPS will serve as an early warning system from attacks.   We will also use the outside IDS/IPS for additional protection and to monitor what types of attacks are occurring.   Our web server and mail......

Words: 257 - Pages: 2

Project 1

...Project 1 Berkeley has a Mediterranean climate with discrete season both wet and dry. In the tardy spring and early fall, vigorous sea winds bring drought weather conditions including heat and dryness in these types of areas. In the spring, this is not customarily a quandary as vegetation is still moist from winter rains, but extreme dryness prevails by the fall. The warmest and driest months are typically June through September, with the highest temperatures occurring in September. Mid-summer which includes July and August is often marginally cooler due to the sea breezes and fog, which are mundanely most vigorously developed then (Western Regional Climate Center, 2014). Terre Haute has a mid-latitude continental climate. Rainfall in is fairly evenly distributed throughout the year. The wettest months in the year are May and June and the warmest month of the year is July with an average maximum temperature of 87.30 degrees Fahrenheit, while the coldest month of the year is January with an average minimum temperature of 17.70 degrees Fahrenheit. Potential evapo-transpiration is the amount of water that would be evaporated under an ideal set of conditions, among which is an unlimited supply of water. In other words, it would be the water needed for evaporation and transpiration given the local environmental conditions. One of the most paramount factors that determine water demand is solar radiation. As energy input increases the injunctive authorization for water...

Words: 502 - Pages: 3

Project 1

...Course Schedule ------------------------------------------------- BIBL 110 Textbooks: Duvall & Hays, Journey into God’s Word (2008). Towns & Gutierrez, The Essence of the New Testament: A Survey (2012). Module/Week | Reading & Study | Assignments | Points | 1 | Duvall & Hays: chs. 1–2Towns & Gutierrez: chs. 1–4Bible Readings1 presentation1 study guide | Course Requirements ChecklistClass IntroductionsDB Forum 1 Reading Report 1 | 10037.525 | 2 | Duvall & Hays: chs. 3–4Towns & Gutierrez: chs. 5–7Bible Readings1 presentation1 study guide | Reading Report 2Test 1 | 25125 | 3 | Duvall & Hays: chs. 5–6Towns & Gutierrez: chs. 8–9Bible Readings1 presentation1 study guide | Interpretation Project 1Reading Report 3 | 7525 | 4 | Duvall & Hays: chs. 7–8Towns & Gutierrez: chs. 10–13Bible Readings1 presentation1 study guide | Biblical Worldview Essay Reading Report 4Test 2 | 7525125 | 5 | Duvall & Hays: ch. 9Towns & Gutierrez: chs. 14–18Bible Readings1 presentation1 study guide | DB Forum 2Reading Report 5 | 37.525 | 6 | Duvall & Hays: ch. 10Towns & Gutierrez: chs. 19–22Bible Readings1 presentation1 study guide | Reading Report 6 Test 3 | 25125 | 7 | Towns & Gutierrez: chs. 23–26Bible Readings1 presentation1 study guide | Interpretation Project 2Reading Report 7 | 7525 | 8 | Towns & Gutierrez: chs. 27–31Bible Readings1 presentation1 study guide | Reading Report 8 Test 4 | 25125 | Total |......

Words: 250 - Pages: 1

Project 1

...Case Study 1: The Curious Case of Gary McKinnon By Aicha Doudou CCJS 390 Professor Daniel Draz University of Maryland University College Gary McKinnon was a Scottish hacker who hacks into NASA computers to search for evidence of aliens and extraterrestrial technology. He believes the NASA and other US government were hiding something from the public and that they had classified documents about Unidentified Flying Objects (UFOs). It all started in 2000 when he decided to look for UFO evidence on the U.S. government's computer systems. He began obsessively researching ways to break into the machines. Using the Perl programming language, he wrote a small script that he says allowed him to scan up to 65 000 machines for passwords in under 8 minutes. After dialing up the government systems, he ran the code and made an astonishing discovery: Many federal workers failed to change the default passwords on their computers. On these unsecure machines, McKinnon installed a software program called Remotely Anywhere, which allows remote access and control of computers over the Internet. McKinnon could then browse through the machines at his leisure and transfer or delete files. Because he was able to monitor all activity on the computers, he could log off the moment he saw anyone else logging on. It is claimed that between February 2001 and March 2002, Gary McKinnon hacked into dozens of US army, navy, air force, and Department of Defense computers, as well as 16 NASA...

Words: 1239 - Pages: 5

Project 1

... difference between analog and digital sound recordings, but audiophiles certainly notice the difference, and the science is on their side. With that being said, many famous recordings have been made on digital systems.” Research Methods The participants in this study varied in age and economic status. Both males and both have been recording music using various means for 20+ years. They both have music’s published by major distributors. Research Instrument(s) In the telephone and personal interviews the following questions were asked; #1 When recording music what is your preferred method? #2 Do you feel that you have been more influenced to one vs the other via demographic background? #3 How does your social circle influence the way your record? #4 Would you consider using other technics to record and if so what? #5 How much does money impact the way you record? And follow-ups were asked as necessary. Limitations There was a very small sample size and some limited time to conduct a large survey. However the data that was collected accounts for both sides of the spectrum allowing for a complete picture of the topic. My research has brought forth the following. Although the music industry as a whole has relied on analog for the majority of its recording history, but with the advent of newer technologies, faster computing power, higher bit rates there has been a significant upswing in digital recordings. Results From participant......

Words: 1660 - Pages: 7

Project 1

...Project One Revised 1 December 2014 Articles to be added to Second Edition of The Ethical Citizen There it is. The four-hour flight is ready to emerge into the open air. Everything has gone smoothly, and then it comes around the corner slowly wobbling down the aisle. Eyes frantically look around to see if there is an open seat other then the one next to them. Panic sets in. The phrase, “please don’t sit by me.” is silently thought amongst everyone nearby. Then it happens. The oversized man plops his body right next to the unsuspecting passenger. It happens all the time…people judge another person by how they look before knowing a single thing about them. Does that make them a bad person? Ethics would argue yes. But what makes a person ethical? Everyone has his or her own idea of what makes someone an ethical citizen. For the second edition of The Ethical Citizen, three main components of what makes someone ethical should be incorporated into the book. These things include; responsibility, selflessness, and helping those in need. Responsibility is something that humans in today’s world strive for; in many instances responsibility can be an instinct. In Kathleen Toner’s “Taking Out the Rivers' Trash, One Piece at a Time” Chad Pregracke devotes his life to removing trash from the Mississippi River and other waterways across America. Pregracke has removed 67,000 tires, 218 washing machines, 19 tractors, 12 hot tubs, four pianos and almost 1,000 refrigerators from various...

Words: 1283 - Pages: 6

Project 1

... Your Name Instructor’s Name ENGL 1302 Date Title or Assignment Name Goes Here This document illustrates the correct MLA format and requirements for all work in this class. The grade may be reduced up to 10% on any assignment that is incorrectly formatted. Please save a copy of this document. Replace the generic information with your personal information, and use this file as a template for your own work. Filenames All composition classes focus on writing process, so each part of the process must be saved; all drafts, revisions, and edits must be saved to document the process. Therefore, naming and organizing your files is important to your success. Each time you revise or edit a file, save the file with a new filename. Do not just overwrite the existing file. Use the following method to name files: lastname assignment number (for example, if your last name is Smith and you are working on Week 2, Session 1, Assignment C, use the filename Smith 2-1-C. Some assignments ask you to specifically label a draft (e.g., Revision 1 or Revision 2). Please carefully follow instructions so your assignments will be clearly identifiable, to both you and your instructor. Please note the important elements of MLA format: • Appropriate font and font size • One-inch margins on all sides of the page • Four-line heading that appears only on page one • Pagination on each page, placed in the header in the upper right corner of the page. Pagination is the...

Words: 1410 - Pages: 6

Assessment 1 - Project Management

...T. +61 2 9283 4388 | E. Lower Ground, 101 Sussex St., Sydney NSW 2000 Australia | ABN: 19 080 559 600 | CRICOS CODE: 01856K | RTO: 90501 Assessment 1 – Presentation Instructions: You have been assigned to set update the website for Windsor Institute. It is not required to have skills of developing websites however it is required that you may do some research or discuss with your trainer to identify tasks involved in such projects or processes. You may also visit the current Windsor website ( to identify organisational vision/strategy and needs for the update. You need to demonstrate (present) your ability to identify the strategic and operational needs of the IT project and develop a project plan including scheduling and project control plans like quality and risk management plan. During this demonstration (presentation) you also need to determine project approach or project phases. Duration: Trainer will set the duration of the assessment. Evidence required: Tasks Evidence Submission Task At least 25- 30 presentation slides on the topics listed below. Use screen shots for the plans and the charts to fit them in one slide. Presentation in front of the class and the trainer. Also in printing Your tasks: Prepare some (20-22) presentation slides to present the following items to your trainer:             Windsor’s strategic and operational needs...

Words: 582 - Pages: 3

Project 1 - Avis / Enter. Project

...February 2016 Project #1 1. Avis – $64.99 per day (flat rate) therefore A= x + 64.99 2. Enterprise- $45.87 per day, plus $0.25 per mile above 150. a) x is less than or equal to 150 (miles) 45.87 + ((x-150)(.25)) = 45.87 + .25x + (-37.50) = 8.37 + .25x b) x is greater than 150 (miles) 45.87 + ((x+150)(.25)) = 45.87 + .25x +37.50 = 83.37 + .25x 3. (see attached graph) 4. x and y intercept of A = x + 64.99 and y = 83.37 + .25x (24.51 , 89.49) 5. To decide which car rental is more economical, estimate the number of miles you would drive in one day, and apply to x and y. The lowest value will equal the most economical choice. 6. Auto Saver - $38.59 per day, plus $0.25 per mile above 100. a) x is more than 100 (miles) 38.59 + ((x+100)(.25)) = 38.59 + 25 + .25x = 63.59 + .25x b) x is less than 100 (miles) 38.59 + ((x-100)(.25)) = 38.59 – 25 + .25x = 13.59 + .25x If x is less than or equal to 100, then S=38.59 If x is more than 100, then S=38.59 + ((x-100)(.25)) 7. (see attached graph) 8. Avis – $64.99 Auto Saver – $38.59 64.99 – 38.59 = $26.40 26.40 / .25 = 105.6 miles If miles driven are less than 105.6, then Avis is a better deal. 9. USave - $34.99 per day, plus $0.25 per mile over 200 miles. U = x + 34.99 x is more than 200 (miles) = 34.99 + ((x+200)(.25)) = 34.99 + .25x + 50 = 84.99 +25.x (see attached graph) 10. 125 miles 175......

Words: 361 - Pages: 2

Project 1

...Information Systems Security IT 255 Lionel F. Chatel III Project 1 9/19/2011 ISS Project 1 1. User domain: * Made up of typical IT users and the hardware, software, and data they use. The user domain is the weakest link in an IT infrastructure. Conduct annual security awareness training, implement acceptable use policy, update staff manual and handbook, discuss during performance reviews. 2. Workstation domain: * Roles, tasks, responsibilities and accountability come into play in the workstation domain. Enabling password protection on workstation for access. Enable auto screen lockout for inactive times. 3. LAN domain: * Small network organized by function or department, allowing access to all resources on the LANs. Using NIC cards, Ethernet LAN, LAN switch, UTP cabling are just some ways in connecting to a network. Implementing LAN server and configuration standards procedures and guideline can help a lot in security. 4. LAN-to-WAN domain: * The point at which the IT infrastructure joins a WAN and the Internet.LAN to WAN use different protocols for data transfer. Some are HTTP, FTP, TFTP, Telnet and SSH. A complete list of well know ports numbers from 0 to 1023 is maintained by IANA. Applying file transfer monitoring, scanning and alarming for unknown file types from unknown sources would be a form of security. 5. WAN domain: * The point at which the WAN connects to other WANs via the Internet. What goes on with the...

Words: 366 - Pages: 2

Project 1

...Marshall Law 11 March 2016 Project #1: To Kill a Mockingbird (1962) Music in films before 1970 had a distinct purpose. In the film “To Kill a Mockingbird” the music highlights important material in the film. This music was utilized to enhance the emotion of the film. The musical score was under the direction of Elmer Bernstein, an outstanding musician responsible for many major film scores. This film was produced in 1962, just about the time where avant-garde music was well in effect. Elmer Bernstein implements these new techniques of dissonant harmonious, wide intervals and complex rhythms in his themes throughout the film. There are three points where he utilizes music in this film. He highlights characters, highlights transitions and highlights emotional scenes. Music is not played from beginning to end, as the music is accents key moments. There is no use of source music in this film, allowing all the music to be underscore. To Kill a Mockingbird (1962) is based off of the popular novel with the same name. The film follows the endeavors of two children, Scout and Jem, as well as their father, Atticus. Circulating the time of the Great Depression, this film emphasizes racial inequality. As the film develops, the plot reveals an important case dealing with the allegations of an African American man raping a white women. Tom Robinson, the man accused, is found guilty by the jury, only to suicide by cop. The man responsible for the allegations attacks Scout and...

Words: 1030 - Pages: 5

Project 1

...|Project |IEEE 802.16 Broadband Wireless Access Working Group | |Title |Nonce based TEK Update for Handover | |Date Submitted |2008-01-21 | |Source(s) |Stavros Tzavidas |Voice: +1-847-632-4313 | | | |E-mail: | | |Motorola Inc. | | | | | | | |1501 W. Shure Dr. | | | |Arlington Heights IL 60004...

Words: 4252 - Pages: 18