SlideShare a Scribd company logo
1 of 22
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1
&paperId=2770842379&&attemptId=e04e… 1/8
ECS5100_202030_CRN194 - COMPUTER SECURITY:
FOUNDATIONS - 202030 - CRN194 - VERMA
Week Eleven Assignment
Ruthvik Reddy Gidde
on Thu, Apr 09 2020, 9:58 PM
75% highest match
Submission ID: e04e812f-f995-4888-aa4e-706edceed872
Attachments (1)
Week #11 Assignment.docx
1
Running Head: 1 IT SECURITY POLICY
4
1 IT SECURITY POLICY
IT SECURITY POLICY
Name: Ruthvik Reddy Gidde
Institution: New England College
Date: 04/09/2020
2 AN IT SECURITY POLICY IDENTIFIES AND OUTLINES
THE PROCEDURES
AND RULES FOR ANY INDIVIDUAL WHO ACCESSES AND
USES AN
ORGANIZATION'S IT RESOURCES AND ASSETS.
(http://safeassign.blackboard.com/)
Week #11 Assignment.docx
Word Count: 401
Attachment ID: 2770842379
75%
http://safeassign.blackboard.com/
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1
&paperId=2770842379&&attemptId=e04e… 2/8
Steps
3 SCOPE AND ACCESSIBILITY: It is the first step where one
needs to deal with all
student’s information, systems, network accessibility.
Data classification: 3 IN THIS STEP, ONE NEEDS TO
SPECIFY ALL THE
INFORMATION WHICH IS CLASSIFIED EITHER AS PUBLIC
OR PRIVATE /
"CONFIDENTIAL."
Managing data: One must handle secured data for classified
category.
Context management: Entails addressing all the required
students’ contexts.
Supporting data: 4 ONE NEEDS TO FOLLOW ALL THE
SUPPORTING DATA OF
THE STUDENT'S STATUS, WHETHER THE STUDENTS ARE
EXISTING /
DROPOUTS / EXPELLED TO FOLLOW THE ROLES AND
RESPONSIBILITIES,
PROCESS, AND PROCEDURES.
Specific data: Used for authenticating student’s data. 3
STUDENTS NEED TO PROVIDE
DATA VERIFICATION WITH SECURE TECHNOLOGY.
Consequences: 5 THEY INCLUDE ALL THE OUTCOMES OF
PROVIDING THE
DATA TO THE DROPOUT STUDENTS.
3 ACCEPTABLE USE OF STUDENT POLICY: 6
ACCEPTABLE USER POLICY IS
ACKNOWLEDGED BY THE ADMINISTRATORS THROUGH
THE STUDENT’S
DATA THAT ARE UPLOADED AND UPDATED
REGULARLY (RAUNIO &
WAGNER 2017).
3 CONFIDENTIAL DATA POLICY: 7 CONFIDENTIAL
DATA POLICY THAT
FACILITATES PRIVATE HANDLING OF ALL THE
STUDENT’S DATA BY THE
ADMINISTRATION AND INDIVIDUAL STUDENT.
4 AUTO-GENERATED EMAIL POLICY: 5 AUTO-
GENERATED EMAIL IS SENT
TO STUDENTS’ EMAIL-ID WHEN THEY LOGIN TO CHECK
ANY STATUS OF
THEIR DATABASE BY THE COMPANY'S EMAIL SYSTEM
TO WEB-BASED
EMAIL APPLICATIONS OR SERVER-SIDE APPLICATIONS.
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1
&paperId=2770842379&&attemptId=e04e… 3/8
4 MOBILE DEVICE POLICY: 8 MOBILE DEVICES ARE
REQUIRED FOR A
FLEXIBLE AND PORTABLE APPLICATION TO ACCESS
STUDENT
INFORMATION BY GENERATING OTP AT THE LOG.
4 NETWORK SECURITY POLICY: 9 A SECURE NETWORK
ARCHITECTURE IS
REQUIRED TO PROTECT THE DATA INTEGRITY HAVING
THE RISK OF
SECURITY MEASURES WITH SOME PROCEDURES, AUTO-
GENERATED OTP,
LOGS AND FIREWALL AUTHENTICATION, RSA
PASSCODE FOR A SECURE
CONNECTION WHEN THE STUDENTS ACCESS THE DATA
REMOTELY.
Password Policy: A password policy is useful in enabling
students to protect their information
against cyber-attack. The students need to set an alphanumeric
password in their user
account.
Responsibility of handling the system in an authenticated way.
References
10 RAUNIO, T., & WAGNER, W. (2017). 10 TOWARDS THE
PARLIAMENTARISATION OF FOREIGN AND SECURITY
POLICY? WEST
EUROPEAN POLITICS, 40(1), 1-19.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information
security policy compliance model
in organizations. computers & security, 56, 70-82.
Citations (10/10)
1 Another student's paper
2 Another student's paper
3 Another student's paper
4 Another student's paper
5 Another student's paper
6 Another student's paper
7 Another student's paper
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1
&paperId=2770842379&&attemptId=e04e… 4/8
Matched Text
8 Another student's paper
9 Another student's paper
10 https://research.vu.nl/en/publications/towards-
parliamentarization-of-foreign-and-security-policy
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
IT SECURITY POLICY
Source - Another student's paper
IT SECURITY POLICY
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
IT SECURITY POLICY
Source - Another student's paper
IT SECURITY POLICY
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
IT SECURITY POLICY
Source - Another student's paper
IT SECURITY POLICY
Suspected Entry: 65% match
Uploaded - Week #11 Assignment.docx
AN IT SECURITY POLICY IDENTIFIES AND
OUTLINES THE PROCEDURES AND RULES FOR
ANY INDIVIDUAL WHO ACCESSES AND USES AN
ORGANIZATION'S IT RESOURCES AND ASSETS
Source - Another student's paper
An IT Security Policy, It distinguishes the rules and
procedures for all the individuals accessing and using
an organization's IT assets and resources
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
SCOPE AND ACCESSIBILITY
Source - Another student's paper
Scope and accessibility
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1
&paperId=2770842379&&attemptId=e04e… 5/8
Suspected Entry: 86% match
Uploaded - Week #11 Assignment.docx
IN THIS STEP, ONE NEEDS TO SPECIFY ALL THE
INFORMATION WHICH IS CLASSIFIED EITHER AS
PUBLIC OR PRIVATE / "CONFIDENTIAL."
Source - Another student's paper
In this step need to specify all the information which
are classified either public or private / “confidential"
Suspected Entry: 84% match
Uploaded - Week #11 Assignment.docx
STUDENTS NEED TO PROVIDE DATA
VERIFICATION WITH SECURE TECHNOLOGY
Source - Another student's paper
for authenticating students data need to provide data
verification with secure technology
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
ACCEPTABLE USE OF STUDENT POLICY
Source - Another student's paper
Acceptable use of student Policy
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
CONFIDENTIAL DATA POLICY
Source - Another student's paper
Confidential Data Policy
Suspected Entry: 89% match
Uploaded - Week #11 Assignment.docx
ONE NEEDS TO FOLLOW ALL THE SUPPORTING
DATA OF THE STUDENT'S STATUS, WHETHER
THE STUDENTS ARE EXISTING / DROPOUTS /
EXPELLED TO FOLLOW THE ROLES AND
RESPONSIBILITIES, PROCESS, AND
PROCEDURES
Source - Another student's paper
Supporting data — need to follow all the supporting
data of student’s status whether the students are
existing / dropouts / expelled to follow the roles and
responsibilities, process and procedures
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
AUTO-GENERATED EMAIL POLICY
Source - Another student's paper
Auto-generated Email Policy
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1
&paperId=2770842379&&attemptId=e04e… 6/8
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
MOBILE DEVICE POLICY
Source - Another student's paper
Mobile Device Policy
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
NETWORK SECURITY POLICY
Source - Another student's paper
Network Security Policy
Suspected Entry: 71% match
Uploaded - Week #11 Assignment.docx
THEY INCLUDE ALL THE OUTCOMES OF
PROVIDING THE DATA TO THE DROPOUT
STUDENTS
Source - Another student's paper
Consequences — which includes all the outcomes for
providing the data to the dropout students
Suspected Entry: 90% match
Uploaded - Week #11 Assignment.docx
AUTO-GENERATED EMAIL IS SENT TO
STUDENTS’ EMAIL-ID WHEN THEY LOGIN TO
CHECK ANY STATUS OF THEIR DATABASE BY
THE COMPANY'S EMAIL SYSTEM TO WEB-
BASED EMAIL APPLICATIONS OR SERVER-SIDE
APPLICATIONS
Source - Another student's paper
Auto-generated email is been sent to students email-
id when they log in to check any status of their
database by the company's email system to web-
based email applications or server-side applications,
Suspected Entry: 67% match
Uploaded - Week #11 Assignment.docx
ACCEPTABLE USER POLICY IS
ACKNOWLEDGED BY THE ADMINISTRATORS
THROUGH THE STUDENT’S DATA THAT ARE
UPLOADED AND UPDATED REGULARLY
(RAUNIO & WAGNER 2017)
Source - Another student's paper
Acceptable User Policy which is the policy while the
administrator acknowledges through the student’s
data that are uploaded and updated regularly
Suspected Entry: 70% match
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1
&paperId=2770842379&&attemptId=e04e… 7/8
Uploaded - Week #11 Assignment.docx
CONFIDENTIAL DATA POLICY THAT FACILITATES
PRIVATE HANDLING OF ALL THE STUDENT’S
DATA BY THE ADMINISTRATION AND INDIVIDUAL
STUDENT
Source - Another student's paper
Confidential data policy is to handle privately all the
student’s data to the administration and individual
student
Suspected Entry: 93% match
Uploaded - Week #11 Assignment.docx
MOBILE DEVICES ARE REQUIRED FOR A
FLEXIBLE AND PORTABLE APPLICATION TO
ACCESS STUDENT INFORMATION BY
GENERATING OTP AT THE LOG
Source - Another student's paper
Mobile devices are required for a growing, flexible
and portable application to access student information
by generating OTP at the time of log in
Suspected Entry: 97% match
Uploaded - Week #11 Assignment.docx
A SECURE NETWORK ARCHITECTURE IS
REQUIRED TO PROTECT THE DATA INTEGRITY
HAVING THE RISK OF SECURITY MEASURES
WITH SOME PROCEDURES, AUTO-GENERATED
OTP, LOGS AND FIREWALL AUTHENTICATION,
RSA PASSCODE FOR A SECURE CONNECTION
WHEN THE STUDENTS ACCESS THE DATA
REMOTELY
Source - Another student's paper
A secure network architecture is required to protect
the data integrity having the risk of a security
measures with some procedures, auto-generated
OTP, logs and firewall authentication, RSA passcode
for secure connection when the student access the
data remotely
Suspected Entry: 71% match
Uploaded - Week #11 Assignment.docx
RAUNIO, T., & WAGNER, W
Source -
https://research.vu.nl/en/publications/towards-
parliamentarization-of-foreign-and-security-policy
Wagner WM, Raunio T
Suspected Entry: 75% match
Uploaded - Week #11 Assignment.docx
TOWARDS THE PARLIAMENTARISATION OF
FOREIGN AND SECURITY POLICY
Source -
https://research.vu.nl/en/publications/towards-
parliamentarization-of-foreign-and-security-policy
Towards parliamentarization of foreign and security
policy
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1
&paperId=2770842379&&attemptId=e04e… 8/8
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
WEST EUROPEAN POLITICS, 40(1), 1-19
Source -
https://research.vu.nl/en/publications/towards-
parliamentarization-of-foreign-and-security-policy
West European Politics, 40(1), 1-19
DemandSimpleMarket Demand
SchedulePriceQuantity1051201548702046202544003041903539
90403810453640503470603160702880802610902360100212011
01890115178012016701251560
DemandDetailDetailed Demand SchedulePriceQuantity
10512015487020462025440030419035399040381045364050347
05533206031606530207028807527408026108524809023609522
30100212010520001101890115178012016701251560130146013
51350140125014511601501060155960160870165780170680175
590180510185420190330195240200160205802100
Analytical Exercise: Equilibrium in an Oligopoly Market with
Capacity Constraints
Consider the economic environment we encountered in the
online exercise on Monday, in
which a set of firms engage in Bertrand competition in four
distinct markets. Each firm
produces a homogeneous good at a constant marginal cost � =
4, up to a capacity constraint �
which determines each firm’s maximum production. The firms
compete in prices: each firm
posts a price in each market, where prices must be in whole
numbers. Capacity constraints and
fixed costs of production vary by market according to the
schedule below:
• Market 1: Capacity � = 1000 per firm, no fixed cost of
production;
• Market 2: Capacity � = 1000 per firm, fixed cost � = 35,000
per firm;
• Market 3: Capacity � = 400 per firm, fixed cost � = 35,000
per firm;
• Market 4: Capacity � = 2000 per firm, fixed cost � = 35,000
per firm.
Demand is identical across markets and described by the
schedule
on the right (also provided in more detail in the Excel file
attached). Consumers buy first from the firm with the lowest
price
until its capacity is exhausted, then buy from the firm with the
second-lowest firm, and so on until no additional consumer
wishes
to purchase at the lowest price charged among firms with
remaining free capacity. If two (or more) firms post the same
price, they split the remaining quantity demanded at that price,
after any firm charging a lower price has already sold the total
quantity it can produce.
You observe data on prices and quantities for a five-firm
oligopoly
in these four markets, given below (generated from play in our
in-
class exercise on Monday). In this particular market, it appears
that four of the five firms are competing actively, while one
firm
(Firm 3) is playing passively. Let us say that the passive Firm 3
is a
“Nonprofit,” while the remaining four firms are “For-profit.”
Using
the models of oligopoly behavior we have discussed, your
assignment is to analyze the behavior of the four “For-profit”
firms
in this market, taking the prices of the “Nonprofit” as given.
Assignment: In 1-2 pages, provide written answers to the
following questions.
1. Analyze the Nash equilibrium of the pricing game between
the four For-Profit players in
each of the four markets above, taking the price charged by the
Nonprofit (Firm 3) in
each market as given. Based on this analysis, what theoretical
predictions can you make
about the price in each market?
Market Demand
Schedule
Price Quantity
10 5120
20 4620
30 4190
40 3810
50 3470
60 3160
70 2880
80 2610
90 2360
100 2120
110 1890
120 1670
2. How do the observed prices charged by the four “For-profit”
players compare with the
Nash equilibrium predictions in Part 1? Which Nash equilibrium
predictions are borne
out in the data? Which predictions are not?
In your answer to Question 1, it may be helpful to consider the
following:
• Should unavoidable fixed costs matter for Nash equilibrium
prices? Why or why not?
(Note: By “unavoidable”, we mean that firms cannot leave the
market this period.)
• If there were no capacity constraints, and ignoring the fact
that price must be an
integer, what would be the Nash equilibrium price in each
market?
• How do capacity constraints change our predictions about
prices in each market? How
would we expect prices to be ranked with high, medium, and
low capacity constraints?
• Consider any potential price � in the demand schedule below.
Suppose that Firm 1’s
three for-profit rivals each charge this price � (holding the
Nonprofit’s price fixed at its
observed value). Consider two strategies for Firm 1: “matching”
the price charged by its
active rivals by setting �. = �, or “undercutting” all three
active rivals by reducing price
by $1 to �. = � − 1. Bearing in mind Firm 1’s capacity
constraints, what is the *highest*
price � on the demand schedule at which Firm 1 prefers to
match than undercut? How
does this price vary with the capacity constraint �? And what
does this tell you about
Nash equilibrium prices in each market?
[Hint: For a price � to be a symmetric Nash equilibrium, it
must be that no for-profit
firm prefers to undercut when all for-profit rivals charge the
given price. In this
particular game there may in general be many Nash equilibria,
but from the firms’
perspective the best equilibrium will be the one with the highest
price.]
Evaluation: This assignment will count for 10 percent of your
final course grade. In your
answers, I will be looking for a clear discussion of both the key
economic and strategic issues
governing competition in this market, and how predictions of
the underlying theory fit (or
don’t!) the actual prices observed. Note that data *will not* line
up with theory on every
dimension, although in some key dimensions it should. Long
answers are not necessarily better;
the key is to identify and analyze the core questions involved.
Submissions are due via Canvas at midnight on Friday, April
10. Late submissions will receive a
one letter grade penalty for each day late.
Data on outcomes for each market is provided on the next page.
Market 1: Moderate capacity, no fixed costs
Firm Price Sales Capacity Revenues
Variable
Costs
Fixed
Costs Profit
1 39 1000 1000 39,000 4,000 0 35,000
2 40 889 1000 35,560 3,556 0 32,004
3 62 0 1000 0 0 0 0
4 38 1000 1000 38,000 4,000 0 34,000
5 40 950 1000 38,000 3,800 0 34,200
Market 2: Moderate capacity with fixed costs
Firm Price Sales Capacity Revenues
Variable
Costs
Fixed
Costs Profit
1 42 1000 1000 42000 4000 35000 3000
2 43 887 1000 38141 3548 35000 -407
3 60 0 1000 0 0 35000 -35000
4 41 1000 1000 41000 4000 35000 2000
5 43 844 1000 36292 3376 35000 -2084
Market 3: Low capacity with fixed costs
Firm Price Sales Capacity Revenues
Variable
Costs
Fixed
Costs Profit
1 119 317 400 37723 1268 35000 1455
2 110 400 400 44000 1600 35000 7400
3 82 400 400 32800 1600 35000 -3800
4 110 400 400 44000 1600 35000 7400
5 118 400 400 47200 1600 35000 10600
Market 4: High capacity with fixed costs
Firm Price Sales Capacity Revenues
Variable
Costs
Fixed
Costs Profit
1 18 2000 2000 36000 8000 35000 -7000
2 19 375 2000 7125 1500 35000 -29375
3 63 0 2000 0 0 35000 -35000
4 17 2000 2000 34000 8000 35000 -9000
5 19 365 2000 6935 1460 35000 -29525
492020 SafeAssign Originality Reporthttpsblackboard.n

More Related Content

Similar to 492020 SafeAssign Originality Reporthttpsblackboard.n

ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!PECB
 
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYTHE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYIRJET Journal
 
Learning analytics as a national initiative
Learning analytics as a national initiativeLearning analytics as a national initiative
Learning analytics as a national initiativePaul Bailey
 
Ritchie Webinar 7.7.22.pptx
Ritchie Webinar 7.7.22.pptxRitchie Webinar 7.7.22.pptx
Ritchie Webinar 7.7.22.pptxKevin995584
 
Academic Integrity and Identity In Online Learning
Academic Integrity and Identity In Online LearningAcademic Integrity and Identity In Online Learning
Academic Integrity and Identity In Online LearningJason Rhode
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09Tammy Clark
 
12 reasons to go for a cloud based solution for k12 schools with mobile apps
12 reasons to go for a cloud based solution for k12 schools with mobile apps12 reasons to go for a cloud based solution for k12 schools with mobile apps
12 reasons to go for a cloud based solution for k12 schools with mobile appsCreatrix Campus (Anubavam LLC)
 
Jisc student digital experience data service walkthrough
Jisc student digital experience data service walkthroughJisc student digital experience data service walkthrough
Jisc student digital experience data service walkthroughSarah Knight
 
BA 632 INFORMATION SYSTEMS SECURITY Instructor Informat.docx
BA 632 INFORMATION SYSTEMS SECURITY  Instructor Informat.docxBA 632 INFORMATION SYSTEMS SECURITY  Instructor Informat.docx
BA 632 INFORMATION SYSTEMS SECURITY Instructor Informat.docxwilcockiris
 
DATA4000 Individual Report and Individual Presentation.docx
DATA4000 Individual Report and Individual Presentation.docxDATA4000 Individual Report and Individual Presentation.docx
DATA4000 Individual Report and Individual Presentation.docxwrite22
 
DATA4000 Individual Report and Individual Presentation.docx
DATA4000 Individual Report and Individual Presentation.docxDATA4000 Individual Report and Individual Presentation.docx
DATA4000 Individual Report and Individual Presentation.docxsdfghj21
 
IRJET - Student Sentiment Analysis using Android Application
IRJET -  	  Student Sentiment Analysis using Android ApplicationIRJET -  	  Student Sentiment Analysis using Android Application
IRJET - Student Sentiment Analysis using Android ApplicationIRJET Journal
 
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAmazon Web Services
 
Information security
Information securityInformation security
Information securitykevin_donovan
 
Secured E-Learning And Assessment Web-Based Application With Parental Control
Secured E-Learning And Assessment Web-Based Application With Parental ControlSecured E-Learning And Assessment Web-Based Application With Parental Control
Secured E-Learning And Assessment Web-Based Application With Parental ControlIRJET Journal
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Future Education Magazine
 
Project report college information management system on Advanced Java
Project report college information management system on Advanced JavaProject report college information management system on Advanced Java
Project report college information management system on Advanced JavaRishabh Kumar ☁️
 
IRJET- College Activity Management System
IRJET-  	  College Activity Management SystemIRJET-  	  College Activity Management System
IRJET- College Activity Management SystemIRJET Journal
 
College Result presentation report pdf and
College Result presentation report pdf andCollege Result presentation report pdf and
College Result presentation report pdf andbhagyavantrajapur88
 

Similar to 492020 SafeAssign Originality Reporthttpsblackboard.n (20)

ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!ISO/IEC 27034 Application Security – How to trust, without paying too much!
ISO/IEC 27034 Application Security – How to trust, without paying too much!
 
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYTHE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
 
Learning analytics as a national initiative
Learning analytics as a national initiativeLearning analytics as a national initiative
Learning analytics as a national initiative
 
Ritchie Webinar 7.7.22.pptx
Ritchie Webinar 7.7.22.pptxRitchie Webinar 7.7.22.pptx
Ritchie Webinar 7.7.22.pptx
 
Academic Integrity and Identity In Online Learning
Academic Integrity and Identity In Online LearningAcademic Integrity and Identity In Online Learning
Academic Integrity and Identity In Online Learning
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
12 reasons to go for a cloud based solution for k12 schools with mobile apps
12 reasons to go for a cloud based solution for k12 schools with mobile apps12 reasons to go for a cloud based solution for k12 schools with mobile apps
12 reasons to go for a cloud based solution for k12 schools with mobile apps
 
Jisc student digital experience data service walkthrough
Jisc student digital experience data service walkthroughJisc student digital experience data service walkthrough
Jisc student digital experience data service walkthrough
 
BA 632 INFORMATION SYSTEMS SECURITY Instructor Informat.docx
BA 632 INFORMATION SYSTEMS SECURITY  Instructor Informat.docxBA 632 INFORMATION SYSTEMS SECURITY  Instructor Informat.docx
BA 632 INFORMATION SYSTEMS SECURITY Instructor Informat.docx
 
DATA4000 Individual Report and Individual Presentation.docx
DATA4000 Individual Report and Individual Presentation.docxDATA4000 Individual Report and Individual Presentation.docx
DATA4000 Individual Report and Individual Presentation.docx
 
DATA4000 Individual Report and Individual Presentation.docx
DATA4000 Individual Report and Individual Presentation.docxDATA4000 Individual Report and Individual Presentation.docx
DATA4000 Individual Report and Individual Presentation.docx
 
IRJET - Student Sentiment Analysis using Android Application
IRJET -  	  Student Sentiment Analysis using Android ApplicationIRJET -  	  Student Sentiment Analysis using Android Application
IRJET - Student Sentiment Analysis using Android Application
 
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
 
RiskAssessmentReport
RiskAssessmentReportRiskAssessmentReport
RiskAssessmentReport
 
Information security
Information securityInformation security
Information security
 
Secured E-Learning And Assessment Web-Based Application With Parental Control
Secured E-Learning And Assessment Web-Based Application With Parental ControlSecured E-Learning And Assessment Web-Based Application With Parental Control
Secured E-Learning And Assessment Web-Based Application With Parental Control
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
 
Project report college information management system on Advanced Java
Project report college information management system on Advanced JavaProject report college information management system on Advanced Java
Project report college information management system on Advanced Java
 
IRJET- College Activity Management System
IRJET-  	  College Activity Management SystemIRJET-  	  College Activity Management System
IRJET- College Activity Management System
 
College Result presentation report pdf and
College Result presentation report pdf andCollege Result presentation report pdf and
College Result presentation report pdf and
 

More from romeliadoan

Chapter 23  What were the stock market crash and the following Depr.docx
Chapter 23  What were the stock market crash and the following Depr.docxChapter 23  What were the stock market crash and the following Depr.docx
Chapter 23  What were the stock market crash and the following Depr.docxromeliadoan
 
Chapter 2The following is provided for use in answering the ne.docx
Chapter 2The following is provided for use in answering the ne.docxChapter 2The following is provided for use in answering the ne.docx
Chapter 2The following is provided for use in answering the ne.docxromeliadoan
 
Chapter 1© 2017 Cengage Learning. All Rights Reserved. .docx
Chapter 1© 2017 Cengage Learning. All Rights Reserved. .docxChapter 1© 2017 Cengage Learning. All Rights Reserved. .docx
Chapter 1© 2017 Cengage Learning. All Rights Reserved. .docxromeliadoan
 
Chapter 12, page 343, P6Find the real return on the following inve.docx
Chapter 12, page 343, P6Find the real return on the following inve.docxChapter 12, page 343, P6Find the real return on the following inve.docx
Chapter 12, page 343, P6Find the real return on the following inve.docxromeliadoan
 
Chapter 17 Chile The democratic socialist alternative.How were.docx
Chapter 17 Chile The democratic socialist alternative.How were.docxChapter 17 Chile The democratic socialist alternative.How were.docx
Chapter 17 Chile The democratic socialist alternative.How were.docxromeliadoan
 
Chapter 15 Cuba The revolutionary socialist alternat.docx
Chapter 15 Cuba The revolutionary socialist alternat.docxChapter 15 Cuba The revolutionary socialist alternat.docx
Chapter 15 Cuba The revolutionary socialist alternat.docxromeliadoan
 
Chapter 13 speaks at length on the topic of Sexual Harassment  b.docx
Chapter 13 speaks at length on the topic of Sexual Harassment  b.docxChapter 13 speaks at length on the topic of Sexual Harassment  b.docx
Chapter 13 speaks at length on the topic of Sexual Harassment  b.docxromeliadoan
 
Chapter 1 Problems and Exercises Solutions (20 points) 1. Why is i.docx
Chapter 1 Problems and Exercises Solutions (20 points) 1. Why is i.docxChapter 1 Problems and Exercises Solutions (20 points) 1. Why is i.docx
Chapter 1 Problems and Exercises Solutions (20 points) 1. Why is i.docxromeliadoan
 
Changing the Culture at British AirwaysAnswer the following questi.docx
Changing the Culture at British AirwaysAnswer the following questi.docxChanging the Culture at British AirwaysAnswer the following questi.docx
Changing the Culture at British AirwaysAnswer the following questi.docxromeliadoan
 
Changes in culture and technology have resulted in patient populatio.docx
Changes in culture and technology have resulted in patient populatio.docxChanges in culture and technology have resulted in patient populatio.docx
Changes in culture and technology have resulted in patient populatio.docxromeliadoan
 
Change Management Strategies Please respond to the followingD.docx
Change Management Strategies Please respond to the followingD.docxChange Management Strategies Please respond to the followingD.docx
Change Management Strategies Please respond to the followingD.docxromeliadoan
 
Ch. 5 The Police History, Structure, and Functions Learning Modu.docx
Ch. 5 The Police History, Structure, and Functions  Learning Modu.docxCh. 5 The Police History, Structure, and Functions  Learning Modu.docx
Ch. 5 The Police History, Structure, and Functions Learning Modu.docxromeliadoan
 
CEOs are important but not sufficient voices for their companies, a.docx
CEOs are important but not sufficient voices for their companies, a.docxCEOs are important but not sufficient voices for their companies, a.docx
CEOs are important but not sufficient voices for their companies, a.docxromeliadoan
 
Certain ways an organization can implement Human Resources practic.docx
Certain ways an organization can implement Human Resources practic.docxCertain ways an organization can implement Human Resources practic.docx
Certain ways an organization can implement Human Resources practic.docxromeliadoan
 
Cesar’s Last Fast movie. .In 1988, Cesar Chavez embarked on what wou.docx
Cesar’s Last Fast movie. .In 1988, Cesar Chavez embarked on what wou.docxCesar’s Last Fast movie. .In 1988, Cesar Chavez embarked on what wou.docx
Cesar’s Last Fast movie. .In 1988, Cesar Chavez embarked on what wou.docxromeliadoan
 
Cell phones are constantly evolving. There are iPhones, Droids, and .docx
Cell phones are constantly evolving. There are iPhones, Droids, and .docxCell phones are constantly evolving. There are iPhones, Droids, and .docx
Cell phones are constantly evolving. There are iPhones, Droids, and .docxromeliadoan
 
Ch. 17Questions # 5; #7.#14;#20;.docx
Ch. 17Questions # 5; #7.#14;#20;.docxCh. 17Questions # 5; #7.#14;#20;.docx
Ch. 17Questions # 5; #7.#14;#20;.docxromeliadoan
 
Cellular respiration and photosynthesis form a critical cycle of ene.docx
Cellular respiration and photosynthesis form a critical cycle of ene.docxCellular respiration and photosynthesis form a critical cycle of ene.docx
Cellular respiration and photosynthesis form a critical cycle of ene.docxromeliadoan
 
Cellular reproduction in Eukaryotes involves either mitosis or, in t.docx
Cellular reproduction in Eukaryotes involves either mitosis or, in t.docxCellular reproduction in Eukaryotes involves either mitosis or, in t.docx
Cellular reproduction in Eukaryotes involves either mitosis or, in t.docxromeliadoan
 
Cellular Communication Autocrine, Paracrine or EndocrineAs you a.docx
Cellular Communication Autocrine, Paracrine or EndocrineAs you a.docxCellular Communication Autocrine, Paracrine or EndocrineAs you a.docx
Cellular Communication Autocrine, Paracrine or EndocrineAs you a.docxromeliadoan
 

More from romeliadoan (20)

Chapter 23  What were the stock market crash and the following Depr.docx
Chapter 23  What were the stock market crash and the following Depr.docxChapter 23  What were the stock market crash and the following Depr.docx
Chapter 23  What were the stock market crash and the following Depr.docx
 
Chapter 2The following is provided for use in answering the ne.docx
Chapter 2The following is provided for use in answering the ne.docxChapter 2The following is provided for use in answering the ne.docx
Chapter 2The following is provided for use in answering the ne.docx
 
Chapter 1© 2017 Cengage Learning. All Rights Reserved. .docx
Chapter 1© 2017 Cengage Learning. All Rights Reserved. .docxChapter 1© 2017 Cengage Learning. All Rights Reserved. .docx
Chapter 1© 2017 Cengage Learning. All Rights Reserved. .docx
 
Chapter 12, page 343, P6Find the real return on the following inve.docx
Chapter 12, page 343, P6Find the real return on the following inve.docxChapter 12, page 343, P6Find the real return on the following inve.docx
Chapter 12, page 343, P6Find the real return on the following inve.docx
 
Chapter 17 Chile The democratic socialist alternative.How were.docx
Chapter 17 Chile The democratic socialist alternative.How were.docxChapter 17 Chile The democratic socialist alternative.How were.docx
Chapter 17 Chile The democratic socialist alternative.How were.docx
 
Chapter 15 Cuba The revolutionary socialist alternat.docx
Chapter 15 Cuba The revolutionary socialist alternat.docxChapter 15 Cuba The revolutionary socialist alternat.docx
Chapter 15 Cuba The revolutionary socialist alternat.docx
 
Chapter 13 speaks at length on the topic of Sexual Harassment  b.docx
Chapter 13 speaks at length on the topic of Sexual Harassment  b.docxChapter 13 speaks at length on the topic of Sexual Harassment  b.docx
Chapter 13 speaks at length on the topic of Sexual Harassment  b.docx
 
Chapter 1 Problems and Exercises Solutions (20 points) 1. Why is i.docx
Chapter 1 Problems and Exercises Solutions (20 points) 1. Why is i.docxChapter 1 Problems and Exercises Solutions (20 points) 1. Why is i.docx
Chapter 1 Problems and Exercises Solutions (20 points) 1. Why is i.docx
 
Changing the Culture at British AirwaysAnswer the following questi.docx
Changing the Culture at British AirwaysAnswer the following questi.docxChanging the Culture at British AirwaysAnswer the following questi.docx
Changing the Culture at British AirwaysAnswer the following questi.docx
 
Changes in culture and technology have resulted in patient populatio.docx
Changes in culture and technology have resulted in patient populatio.docxChanges in culture and technology have resulted in patient populatio.docx
Changes in culture and technology have resulted in patient populatio.docx
 
Change Management Strategies Please respond to the followingD.docx
Change Management Strategies Please respond to the followingD.docxChange Management Strategies Please respond to the followingD.docx
Change Management Strategies Please respond to the followingD.docx
 
Ch. 5 The Police History, Structure, and Functions Learning Modu.docx
Ch. 5 The Police History, Structure, and Functions  Learning Modu.docxCh. 5 The Police History, Structure, and Functions  Learning Modu.docx
Ch. 5 The Police History, Structure, and Functions Learning Modu.docx
 
CEOs are important but not sufficient voices for their companies, a.docx
CEOs are important but not sufficient voices for their companies, a.docxCEOs are important but not sufficient voices for their companies, a.docx
CEOs are important but not sufficient voices for their companies, a.docx
 
Certain ways an organization can implement Human Resources practic.docx
Certain ways an organization can implement Human Resources practic.docxCertain ways an organization can implement Human Resources practic.docx
Certain ways an organization can implement Human Resources practic.docx
 
Cesar’s Last Fast movie. .In 1988, Cesar Chavez embarked on what wou.docx
Cesar’s Last Fast movie. .In 1988, Cesar Chavez embarked on what wou.docxCesar’s Last Fast movie. .In 1988, Cesar Chavez embarked on what wou.docx
Cesar’s Last Fast movie. .In 1988, Cesar Chavez embarked on what wou.docx
 
Cell phones are constantly evolving. There are iPhones, Droids, and .docx
Cell phones are constantly evolving. There are iPhones, Droids, and .docxCell phones are constantly evolving. There are iPhones, Droids, and .docx
Cell phones are constantly evolving. There are iPhones, Droids, and .docx
 
Ch. 17Questions # 5; #7.#14;#20;.docx
Ch. 17Questions # 5; #7.#14;#20;.docxCh. 17Questions # 5; #7.#14;#20;.docx
Ch. 17Questions # 5; #7.#14;#20;.docx
 
Cellular respiration and photosynthesis form a critical cycle of ene.docx
Cellular respiration and photosynthesis form a critical cycle of ene.docxCellular respiration and photosynthesis form a critical cycle of ene.docx
Cellular respiration and photosynthesis form a critical cycle of ene.docx
 
Cellular reproduction in Eukaryotes involves either mitosis or, in t.docx
Cellular reproduction in Eukaryotes involves either mitosis or, in t.docxCellular reproduction in Eukaryotes involves either mitosis or, in t.docx
Cellular reproduction in Eukaryotes involves either mitosis or, in t.docx
 
Cellular Communication Autocrine, Paracrine or EndocrineAs you a.docx
Cellular Communication Autocrine, Paracrine or EndocrineAs you a.docxCellular Communication Autocrine, Paracrine or EndocrineAs you a.docx
Cellular Communication Autocrine, Paracrine or EndocrineAs you a.docx
 

Recently uploaded

Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 

Recently uploaded (20)

Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

492020 SafeAssign Originality Reporthttpsblackboard.n

  • 1. 4/9/2020 SafeAssign Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1 &paperId=2770842379&&attemptId=e04e… 1/8 ECS5100_202030_CRN194 - COMPUTER SECURITY: FOUNDATIONS - 202030 - CRN194 - VERMA Week Eleven Assignment Ruthvik Reddy Gidde on Thu, Apr 09 2020, 9:58 PM 75% highest match Submission ID: e04e812f-f995-4888-aa4e-706edceed872 Attachments (1) Week #11 Assignment.docx 1 Running Head: 1 IT SECURITY POLICY 4 1 IT SECURITY POLICY IT SECURITY POLICY Name: Ruthvik Reddy Gidde
  • 2. Institution: New England College Date: 04/09/2020 2 AN IT SECURITY POLICY IDENTIFIES AND OUTLINES THE PROCEDURES AND RULES FOR ANY INDIVIDUAL WHO ACCESSES AND USES AN ORGANIZATION'S IT RESOURCES AND ASSETS. (http://safeassign.blackboard.com/) Week #11 Assignment.docx Word Count: 401 Attachment ID: 2770842379 75% http://safeassign.blackboard.com/ 4/9/2020 SafeAssign Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1 &paperId=2770842379&&attemptId=e04e… 2/8 Steps 3 SCOPE AND ACCESSIBILITY: It is the first step where one needs to deal with all student’s information, systems, network accessibility.
  • 3. Data classification: 3 IN THIS STEP, ONE NEEDS TO SPECIFY ALL THE INFORMATION WHICH IS CLASSIFIED EITHER AS PUBLIC OR PRIVATE / "CONFIDENTIAL." Managing data: One must handle secured data for classified category. Context management: Entails addressing all the required students’ contexts. Supporting data: 4 ONE NEEDS TO FOLLOW ALL THE SUPPORTING DATA OF THE STUDENT'S STATUS, WHETHER THE STUDENTS ARE EXISTING / DROPOUTS / EXPELLED TO FOLLOW THE ROLES AND RESPONSIBILITIES, PROCESS, AND PROCEDURES. Specific data: Used for authenticating student’s data. 3 STUDENTS NEED TO PROVIDE DATA VERIFICATION WITH SECURE TECHNOLOGY. Consequences: 5 THEY INCLUDE ALL THE OUTCOMES OF PROVIDING THE DATA TO THE DROPOUT STUDENTS. 3 ACCEPTABLE USE OF STUDENT POLICY: 6
  • 4. ACCEPTABLE USER POLICY IS ACKNOWLEDGED BY THE ADMINISTRATORS THROUGH THE STUDENT’S DATA THAT ARE UPLOADED AND UPDATED REGULARLY (RAUNIO & WAGNER 2017). 3 CONFIDENTIAL DATA POLICY: 7 CONFIDENTIAL DATA POLICY THAT FACILITATES PRIVATE HANDLING OF ALL THE STUDENT’S DATA BY THE ADMINISTRATION AND INDIVIDUAL STUDENT. 4 AUTO-GENERATED EMAIL POLICY: 5 AUTO- GENERATED EMAIL IS SENT TO STUDENTS’ EMAIL-ID WHEN THEY LOGIN TO CHECK ANY STATUS OF THEIR DATABASE BY THE COMPANY'S EMAIL SYSTEM TO WEB-BASED EMAIL APPLICATIONS OR SERVER-SIDE APPLICATIONS. 4/9/2020 SafeAssign Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1 &paperId=2770842379&&attemptId=e04e… 3/8
  • 5. 4 MOBILE DEVICE POLICY: 8 MOBILE DEVICES ARE REQUIRED FOR A FLEXIBLE AND PORTABLE APPLICATION TO ACCESS STUDENT INFORMATION BY GENERATING OTP AT THE LOG. 4 NETWORK SECURITY POLICY: 9 A SECURE NETWORK ARCHITECTURE IS REQUIRED TO PROTECT THE DATA INTEGRITY HAVING THE RISK OF SECURITY MEASURES WITH SOME PROCEDURES, AUTO- GENERATED OTP, LOGS AND FIREWALL AUTHENTICATION, RSA PASSCODE FOR A SECURE CONNECTION WHEN THE STUDENTS ACCESS THE DATA REMOTELY. Password Policy: A password policy is useful in enabling students to protect their information against cyber-attack. The students need to set an alphanumeric password in their user account. Responsibility of handling the system in an authenticated way. References
  • 6. 10 RAUNIO, T., & WAGNER, W. (2017). 10 TOWARDS THE PARLIAMENTARISATION OF FOREIGN AND SECURITY POLICY? WEST EUROPEAN POLITICS, 40(1), 1-19. Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. computers & security, 56, 70-82. Citations (10/10) 1 Another student's paper 2 Another student's paper 3 Another student's paper 4 Another student's paper 5 Another student's paper 6 Another student's paper 7 Another student's paper 4/9/2020 SafeAssign Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1 &paperId=2770842379&&attemptId=e04e… 4/8 Matched Text
  • 7. 8 Another student's paper 9 Another student's paper 10 https://research.vu.nl/en/publications/towards- parliamentarization-of-foreign-and-security-policy Suspected Entry: 100% match Uploaded - Week #11 Assignment.docx IT SECURITY POLICY Source - Another student's paper IT SECURITY POLICY Suspected Entry: 100% match Uploaded - Week #11 Assignment.docx IT SECURITY POLICY Source - Another student's paper IT SECURITY POLICY Suspected Entry: 100% match Uploaded - Week #11 Assignment.docx IT SECURITY POLICY Source - Another student's paper IT SECURITY POLICY Suspected Entry: 65% match Uploaded - Week #11 Assignment.docx AN IT SECURITY POLICY IDENTIFIES AND
  • 8. OUTLINES THE PROCEDURES AND RULES FOR ANY INDIVIDUAL WHO ACCESSES AND USES AN ORGANIZATION'S IT RESOURCES AND ASSETS Source - Another student's paper An IT Security Policy, It distinguishes the rules and procedures for all the individuals accessing and using an organization's IT assets and resources Suspected Entry: 100% match Uploaded - Week #11 Assignment.docx SCOPE AND ACCESSIBILITY Source - Another student's paper Scope and accessibility 4/9/2020 SafeAssign Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1 &paperId=2770842379&&attemptId=e04e… 5/8 Suspected Entry: 86% match Uploaded - Week #11 Assignment.docx IN THIS STEP, ONE NEEDS TO SPECIFY ALL THE INFORMATION WHICH IS CLASSIFIED EITHER AS PUBLIC OR PRIVATE / "CONFIDENTIAL." Source - Another student's paper In this step need to specify all the information which are classified either public or private / “confidential"
  • 9. Suspected Entry: 84% match Uploaded - Week #11 Assignment.docx STUDENTS NEED TO PROVIDE DATA VERIFICATION WITH SECURE TECHNOLOGY Source - Another student's paper for authenticating students data need to provide data verification with secure technology Suspected Entry: 100% match Uploaded - Week #11 Assignment.docx ACCEPTABLE USE OF STUDENT POLICY Source - Another student's paper Acceptable use of student Policy Suspected Entry: 100% match Uploaded - Week #11 Assignment.docx CONFIDENTIAL DATA POLICY Source - Another student's paper Confidential Data Policy Suspected Entry: 89% match Uploaded - Week #11 Assignment.docx ONE NEEDS TO FOLLOW ALL THE SUPPORTING DATA OF THE STUDENT'S STATUS, WHETHER THE STUDENTS ARE EXISTING / DROPOUTS / EXPELLED TO FOLLOW THE ROLES AND RESPONSIBILITIES, PROCESS, AND PROCEDURES
  • 10. Source - Another student's paper Supporting data — need to follow all the supporting data of student’s status whether the students are existing / dropouts / expelled to follow the roles and responsibilities, process and procedures Suspected Entry: 100% match Uploaded - Week #11 Assignment.docx AUTO-GENERATED EMAIL POLICY Source - Another student's paper Auto-generated Email Policy 4/9/2020 SafeAssign Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1 &paperId=2770842379&&attemptId=e04e… 6/8 Suspected Entry: 100% match Uploaded - Week #11 Assignment.docx MOBILE DEVICE POLICY Source - Another student's paper Mobile Device Policy Suspected Entry: 100% match Uploaded - Week #11 Assignment.docx NETWORK SECURITY POLICY Source - Another student's paper
  • 11. Network Security Policy Suspected Entry: 71% match Uploaded - Week #11 Assignment.docx THEY INCLUDE ALL THE OUTCOMES OF PROVIDING THE DATA TO THE DROPOUT STUDENTS Source - Another student's paper Consequences — which includes all the outcomes for providing the data to the dropout students Suspected Entry: 90% match Uploaded - Week #11 Assignment.docx AUTO-GENERATED EMAIL IS SENT TO STUDENTS’ EMAIL-ID WHEN THEY LOGIN TO CHECK ANY STATUS OF THEIR DATABASE BY THE COMPANY'S EMAIL SYSTEM TO WEB- BASED EMAIL APPLICATIONS OR SERVER-SIDE APPLICATIONS Source - Another student's paper Auto-generated email is been sent to students email- id when they log in to check any status of their database by the company's email system to web- based email applications or server-side applications, Suspected Entry: 67% match Uploaded - Week #11 Assignment.docx ACCEPTABLE USER POLICY IS ACKNOWLEDGED BY THE ADMINISTRATORS THROUGH THE STUDENT’S DATA THAT ARE UPLOADED AND UPDATED REGULARLY
  • 12. (RAUNIO & WAGNER 2017) Source - Another student's paper Acceptable User Policy which is the policy while the administrator acknowledges through the student’s data that are uploaded and updated regularly Suspected Entry: 70% match 4/9/2020 SafeAssign Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1 &paperId=2770842379&&attemptId=e04e… 7/8 Uploaded - Week #11 Assignment.docx CONFIDENTIAL DATA POLICY THAT FACILITATES PRIVATE HANDLING OF ALL THE STUDENT’S DATA BY THE ADMINISTRATION AND INDIVIDUAL STUDENT Source - Another student's paper Confidential data policy is to handle privately all the student’s data to the administration and individual student Suspected Entry: 93% match Uploaded - Week #11 Assignment.docx MOBILE DEVICES ARE REQUIRED FOR A FLEXIBLE AND PORTABLE APPLICATION TO ACCESS STUDENT INFORMATION BY GENERATING OTP AT THE LOG
  • 13. Source - Another student's paper Mobile devices are required for a growing, flexible and portable application to access student information by generating OTP at the time of log in Suspected Entry: 97% match Uploaded - Week #11 Assignment.docx A SECURE NETWORK ARCHITECTURE IS REQUIRED TO PROTECT THE DATA INTEGRITY HAVING THE RISK OF SECURITY MEASURES WITH SOME PROCEDURES, AUTO-GENERATED OTP, LOGS AND FIREWALL AUTHENTICATION, RSA PASSCODE FOR A SECURE CONNECTION WHEN THE STUDENTS ACCESS THE DATA REMOTELY Source - Another student's paper A secure network architecture is required to protect the data integrity having the risk of a security measures with some procedures, auto-generated OTP, logs and firewall authentication, RSA passcode for secure connection when the student access the data remotely Suspected Entry: 71% match Uploaded - Week #11 Assignment.docx RAUNIO, T., & WAGNER, W Source - https://research.vu.nl/en/publications/towards- parliamentarization-of-foreign-and-security-policy Wagner WM, Raunio T
  • 14. Suspected Entry: 75% match Uploaded - Week #11 Assignment.docx TOWARDS THE PARLIAMENTARISATION OF FOREIGN AND SECURITY POLICY Source - https://research.vu.nl/en/publications/towards- parliamentarization-of-foreign-and-security-policy Towards parliamentarization of foreign and security policy 4/9/2020 SafeAssign Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1 &paperId=2770842379&&attemptId=e04e… 8/8 Suspected Entry: 100% match Uploaded - Week #11 Assignment.docx WEST EUROPEAN POLITICS, 40(1), 1-19 Source - https://research.vu.nl/en/publications/towards- parliamentarization-of-foreign-and-security-policy West European Politics, 40(1), 1-19 DemandSimpleMarket Demand SchedulePriceQuantity1051201548702046202544003041903539 90403810453640503470603160702880802610902360100212011
  • 15. 01890115178012016701251560 DemandDetailDetailed Demand SchedulePriceQuantity 10512015487020462025440030419035399040381045364050347 05533206031606530207028807527408026108524809023609522 30100212010520001101890115178012016701251560130146013 51350140125014511601501060155960160870165780170680175 590180510185420190330195240200160205802100 Analytical Exercise: Equilibrium in an Oligopoly Market with Capacity Constraints Consider the economic environment we encountered in the online exercise on Monday, in which a set of firms engage in Bertrand competition in four distinct markets. Each firm produces a homogeneous good at a constant marginal cost � = 4, up to a capacity constraint � which determines each firm’s maximum production. The firms compete in prices: each firm posts a price in each market, where prices must be in whole numbers. Capacity constraints and fixed costs of production vary by market according to the schedule below: • Market 1: Capacity � = 1000 per firm, no fixed cost of production; • Market 2: Capacity � = 1000 per firm, fixed cost � = 35,000 per firm; • Market 3: Capacity � = 400 per firm, fixed cost � = 35,000 per firm; • Market 4: Capacity � = 2000 per firm, fixed cost � = 35,000 per firm.
  • 16. Demand is identical across markets and described by the schedule on the right (also provided in more detail in the Excel file attached). Consumers buy first from the firm with the lowest price until its capacity is exhausted, then buy from the firm with the second-lowest firm, and so on until no additional consumer wishes to purchase at the lowest price charged among firms with remaining free capacity. If two (or more) firms post the same price, they split the remaining quantity demanded at that price, after any firm charging a lower price has already sold the total quantity it can produce. You observe data on prices and quantities for a five-firm oligopoly in these four markets, given below (generated from play in our in- class exercise on Monday). In this particular market, it appears that four of the five firms are competing actively, while one firm (Firm 3) is playing passively. Let us say that the passive Firm 3 is a “Nonprofit,” while the remaining four firms are “For-profit.” Using the models of oligopoly behavior we have discussed, your assignment is to analyze the behavior of the four “For-profit” firms in this market, taking the prices of the “Nonprofit” as given. Assignment: In 1-2 pages, provide written answers to the following questions. 1. Analyze the Nash equilibrium of the pricing game between
  • 17. the four For-Profit players in each of the four markets above, taking the price charged by the Nonprofit (Firm 3) in each market as given. Based on this analysis, what theoretical predictions can you make about the price in each market? Market Demand Schedule Price Quantity 10 5120 20 4620 30 4190 40 3810 50 3470 60 3160 70 2880 80 2610 90 2360 100 2120 110 1890 120 1670
  • 18. 2. How do the observed prices charged by the four “For-profit” players compare with the Nash equilibrium predictions in Part 1? Which Nash equilibrium predictions are borne out in the data? Which predictions are not? In your answer to Question 1, it may be helpful to consider the following: • Should unavoidable fixed costs matter for Nash equilibrium prices? Why or why not? (Note: By “unavoidable”, we mean that firms cannot leave the market this period.) • If there were no capacity constraints, and ignoring the fact that price must be an integer, what would be the Nash equilibrium price in each market? • How do capacity constraints change our predictions about prices in each market? How would we expect prices to be ranked with high, medium, and low capacity constraints? • Consider any potential price � in the demand schedule below. Suppose that Firm 1’s three for-profit rivals each charge this price � (holding the Nonprofit’s price fixed at its
  • 19. observed value). Consider two strategies for Firm 1: “matching” the price charged by its active rivals by setting �. = �, or “undercutting” all three active rivals by reducing price by $1 to �. = � − 1. Bearing in mind Firm 1’s capacity constraints, what is the *highest* price � on the demand schedule at which Firm 1 prefers to match than undercut? How does this price vary with the capacity constraint �? And what does this tell you about Nash equilibrium prices in each market? [Hint: For a price � to be a symmetric Nash equilibrium, it must be that no for-profit firm prefers to undercut when all for-profit rivals charge the given price. In this particular game there may in general be many Nash equilibria, but from the firms’ perspective the best equilibrium will be the one with the highest price.] Evaluation: This assignment will count for 10 percent of your final course grade. In your answers, I will be looking for a clear discussion of both the key economic and strategic issues governing competition in this market, and how predictions of the underlying theory fit (or don’t!) the actual prices observed. Note that data *will not* line up with theory on every dimension, although in some key dimensions it should. Long answers are not necessarily better; the key is to identify and analyze the core questions involved. Submissions are due via Canvas at midnight on Friday, April 10. Late submissions will receive a
  • 20. one letter grade penalty for each day late. Data on outcomes for each market is provided on the next page. Market 1: Moderate capacity, no fixed costs Firm Price Sales Capacity Revenues Variable Costs Fixed Costs Profit 1 39 1000 1000 39,000 4,000 0 35,000 2 40 889 1000 35,560 3,556 0 32,004 3 62 0 1000 0 0 0 0 4 38 1000 1000 38,000 4,000 0 34,000 5 40 950 1000 38,000 3,800 0 34,200 Market 2: Moderate capacity with fixed costs Firm Price Sales Capacity Revenues Variable Costs Fixed Costs Profit 1 42 1000 1000 42000 4000 35000 3000 2 43 887 1000 38141 3548 35000 -407
  • 21. 3 60 0 1000 0 0 35000 -35000 4 41 1000 1000 41000 4000 35000 2000 5 43 844 1000 36292 3376 35000 -2084 Market 3: Low capacity with fixed costs Firm Price Sales Capacity Revenues Variable Costs Fixed Costs Profit 1 119 317 400 37723 1268 35000 1455 2 110 400 400 44000 1600 35000 7400 3 82 400 400 32800 1600 35000 -3800 4 110 400 400 44000 1600 35000 7400 5 118 400 400 47200 1600 35000 10600 Market 4: High capacity with fixed costs Firm Price Sales Capacity Revenues Variable Costs Fixed Costs Profit 1 18 2000 2000 36000 8000 35000 -7000 2 19 375 2000 7125 1500 35000 -29375 3 63 0 2000 0 0 35000 -35000 4 17 2000 2000 34000 8000 35000 -9000 5 19 365 2000 6935 1460 35000 -29525