SlideShare a Scribd company logo
ATTRIBUTES AND EVALUATION OF DISCUSSION
CONTRIBUTIONS
Due Date: End of weekly
Percentage of Course Grade: 20%.
Learner Guidelines for Evaluation of Discussion Contributions
All discussion contributions will be read by your instructor each
week. The instructor will provide feedback to you regarding
your discussion postings. Expecting that every discussion
posting and response contain all of the attributes of an
exemplary discussion posting is setting a high standard for both
you and the instructor. This level of high performance is the
standard expected of graduate learners at Capella.
Attributes of an Exemplary Discussion Contribution or
Response:
1. The discussion contribution or response clearly addresses the
content issue(s) presented by the question.
2. The discussion contribution or response includes the
appropriate level(s) of critical analysis.
3. The discussion contribution or response includes pertinent
course and disciplinary concepts, theories, or materials, and
applies them correctly.
4. The discussion contribution or response provides validation
and support by including relevant examples and supporting
evidence, as appropriate.
5. The discussion contribution or response stimulates fellow
learners to clarify, extend, and strengthen their dialogue.
6. The discussion contribution or response is concise, clearly
organized, and well structured.
7. The discussion contribution or response uses grammar, usage,
and mechanics expected of graduate level composition and
expression.
8. All citations and references adhere to APA 6th edition style.
9. The discussion contribution or response fosters collaboration
with fellow learners and communicates in a manner that
respects the dignity and integrity of fellow learners and the
instructor.
10. The discussion response meaningfully supplements and
extends consideration of the topic by including one of more of
the following: new information, questions, constructive or
corrective feedback, or alternative viewpoints.
For additional details regarding discussion participation and
contributions, please consult the Professional Communications
and Writing Guide.
Submission UUID: 58593f67-986c-da25-634f-34f2af328387
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/original...
1 of 8 2/14/2020, 4:35 PM
Word Count: 631
Block Chain technology.docx
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/original...
2 of 8 2/14/2020, 4:35 PM
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/original...
3 of 8 2/14/2020, 4:35 PM
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/original...
4 of 8 2/14/2020, 4:35 PM
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/original...
5 of 8 2/14/2020, 4:35 PM
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/original...
6 of 8 2/14/2020, 4:35 PM
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/original...
7 of 8 2/14/2020, 4:35 PM
Originality Report https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/original...
8 of 8 2/14/2020, 4:35 PM
ECS5200_201951_CRN151 - DATABASE SECURITY - 201951
- CRN151 - LAVENTURE-BERNIER
Week 14 Paper
Raviprakash Ganji
on Thu, Feb 13 2020, 4:37 PM
62% highest match
Submission ID: c614fe3f-8808-494d-85e3-865e8c49862f
Attachments (1)
Block chain technology database.docx
2
Running Head: 1 BLOCKCHAIN TECHNOLOGY AND DATA
SECURITY
2
1 BLOCKCHAIN TECHNOLOGY AND DATA SECURITY
BLOCKCHAIN TECHNOLOGY AND DATA SECURITY
New England college.
Professor: Lisa Laventure-Bernier
Student: Raviprakash Ganji
2 BLOCKCHAIN OFFERS AN IMAGINATIVE WAY TO
DEAL WITH KEEPING
DATA, EXECUTING EXCHANGES, PERFORMING
CAPACITIES, AND SETTING
UP TRUST IN AN OPEN SITUATION. MANY CONSIDER
BLOCKCHAIN AS AN
INNOVATION LEAP FORWARD FOR CRYPTOGRAPHY
AND CYBERSECURITY,
WITH USE CASES EXTENDING FROM
COMPREHENSIVELY CONVEYED
(http://safeassign.blackboard.com/)
Block chain technology database.docx
Word Count: 634
Attachment ID: 2573604122
62%
SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/original...
1 of 8 2/13/2020, 4:44 PM
DIGITAL CURRENCY FRAMEWORKS LIKE BITCOIN, TO
SAVVY CONTRACTS,
KEEN LATTICES OVER THE INTERNET OF THINGS, ETC.
EVEN THOUGH
BLOCKCHAIN HAS GOTTEN DEVELOPING INTERESTS IN
BOTH SCHOLARLY
COMMUNITY AND INDUSTRY IN THE ONGOING YEARS,
THE SECURITY AND
PROTECTION OF BLOCKCHAINS KEEP ON BEING AT THE
FOCAL POINT OF
THE DISCUSSION WHILE SENDING BLOCKCHAIN IN
VARIOUS
APPLICATIONS (NOFER, ET AL, 2017). The following is how
blockchain technology
improves data security in different contexts:
How blockchain technology improves data security in military
context
Blockchain technology has numerous utilities in the resistance
division as it offers utility in
both operational and bolster jobs: digital safeguard and
information trustworthiness, inventory
network the board and strong interchanges. Nonetheless, the
improvement of blockchain
technology recommend critical development in any Defense
Budget and require the
advancement of a guard procedure dependent on accessible
assets so as to fulfill the needs of
the evolving condition (Sudhan, A., & Nene, M. J., 2017).
How blockchain technology improves data security in trading
Organization
How blockchain technology basically functions resembles a
huge attached and decentralized
record where new data can be composed onto with new data.
However, the more established
information put away in squares, can't be changed. This is
finished by utilizing cryptography to
timestamp and connect the substance of the recently included
square with each square before
it. 3 AT THE END OF THE DAY, RATHER THAN
TRANSFERRING
INFORMATION TO A CLOUD SERVER LIKE DIFFERENT
FRAMEWORKS OR IN
ANY EVENT, PUTTING AWAY IT IN A SOLITARY AREA,
BLOCKCHAIN BREAKS
EVERYTHING INTO LITTLE PIECES. These smaller than
usual pieces have then
circulated them over the whole system of PCs. Along these
lines, making blockchain a carefully
scrambled record that comes up short on a main issue. 4 EACH
HUB HAS A TOTAL
DUPLICATE OF THIS RECORD, SO UNSETTLING
INFLUENCES IN ONE OR A
COUPLE OF MODES WON'T BRING ABOUT ANY
INFORMATION MISFORTUNE
(FRIDGEN, ET AL, 2018).
How blockchain technology improves data security in education
SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/original...
2 of 8 2/13/2020, 4:44 PM
5 WHILE BLOCKCHAIN WAS INITIALLY MADE WITH A
PUBLIC
CONVEYANCE MODEL AND WITHOUT EXPLICIT ACCESS
CONTROLS, THERE
ARE NUMEROUS BLOCKCHAIN USAGE THAT ADDRESS
THE INFORMATION
SECRECY WHICH IS FUNDAMENTAL IN SCHOOLS.
BLOCKCHAIN
TECHNOLOGIES IMPROVE SECURITY FRAMEWORKS IN
THE SCHOOLS
WHERE INFORMATION CAN WITHOUT MUCH OF A
STRETCH BE
CONTROLLED YET SCRAMBLING THE INFORMATION
WITH BLOCKCHAIN
INFORMATION THAT THIS INFORMATION WON'T BE
OPEN TO UNAPPROVED
PEOPLE. IN THIS MANNER, KEEPING UNDERSTUDY
INFORMATION, FOR
EXAMPLE, NAMES, MONEY RELATED CHARGES
SUBTLETIES, ADDRESSES
AND SO ON SECURE. BLOCKCHAIN IMPROVES
EDUCATIONAL SYSTEM
SECURITY TO VERIFY PRIVATE DATA TRADED IN BY
SCHOOL SPECIALISTS
OR PARENT-EDUCATOR IN TALKS, INFORMING
APPLICATIONS AND
THROUGH INTERNET-BASED LIFE. WHILE OTHER VISIT
MEDIUM OFFER
START TO FINISH ENCRYPTION BLOCKCHAIN CAN
VERIFY CLIENTS' metadata,
which is haphazardly disseminated all through a record and
can't be accumulated from a
singling point making it invulnerable to hackers (Sun, H.,
Wang, X., & Wang, X., 2018).
References
6 FRIDGEN, G., RADSZUWILL, S., URBACH, N., & UTZ, L.
(2018). 7 CROSS-
ORGANIZATIONAL WORKFLOW MANAGEMENT USING
BLOCKCHAIN
TECHNOLOGY-TOWARDS APPLICABILITY,
AUDITABILITY, AND
AUTOMATION.
Nofer, M., Gomber, P., Hinz, O., & Schiereck, D. (2017).
Blockchain. Business & Information
Systems Engineering, 59(3), 183-187.
1 SUDHAN, A., & NENE, M. J. (2017, December). 1
EMPLOYABILITY OF
BLOCKCHAIN TECHNOLOGY IN DEFENCE
APPLICATIONS. IN 2017
INTERNATIONAL CONFERENCE ON INTELLIGENT
SUSTAINABLE SYSTEMS
(ICISS) (PP. 630-637). IEEE.
8 SUN, H., WANG, X., & WANG, X. (2018). 8
APPLICATION OF BLOCKCHAIN
TECHNOLOGY IN ONLINE EDUCATION. 9
INTERNATIONAL JOURNAL OF
EMERGING TECHNOLOGIES IN LEARNING (IJET), 13(10),
252-259.
SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/original...
3 of 8 2/13/2020, 4:44 PM
Citations (9/9)
Matched Text
1 Another student's paper
2 Another student's paper
3 Another student's paper
4 Another student's paper
5 Another student's paper
6 Another student's paper
7 https://www.fit.fraunhofer.de/en/fb/cscw/blockchain.html
8 Another student's paper
9 Another student's paper
Suspected Entry: 63% match
Uploaded - Block chain technology database.docx
BLOCKCHAIN TECHNOLOGY AND DATA
SECURITY
Source - Another student's paper
ENHANCING SECURITY THROUGH THE
BLOCKCHAIN TECHNOLOGY
Suspected Entry: 63% match
Uploaded - Block chain technology database.docx
BLOCKCHAIN TECHNOLOGY AND DATA
SECURITY
Source - Another student's paper
ENHANCING SECURITY THROUGH THE
BLOCKCHAIN TECHNOLOGY
Suspected Entry: 63% match
Uploaded - Block chain technology database.docx
BLOCKCHAIN TECHNOLOGY AND DATA
SECURITY
Source - Another student's paper
ENHANCING SECURITY THROUGH THE
BLOCKCHAIN TECHNOLOGY
Suspected Entry: 100% match
SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/original...
4 of 8 2/13/2020, 4:44 PM
Uploaded - Block chain technology database.docx
SUDHAN, A., & NENE, M
Source - Another student's paper
Sudhan, A., & Nene, M
Suspected Entry: 100% match
Uploaded - Block chain technology database.docx
EMPLOYABILITY OF BLOCKCHAIN TECHNOLOGY
IN DEFENCE APPLICATIONS
Source - Another student's paper
Employability of blockchain technology in defence
applications
Suspected Entry: 100% match
Uploaded - Block chain technology database.docx
IN 2017 INTERNATIONAL CONFERENCE ON
INTELLIGENT SUSTAINABLE SYSTEMS (ICISS)
(PP
Source - Another student's paper
In 2017 International Conference on Intelligent
Sustainable Systems (ICISS) (pp
Suspected Entry: 66% match
Uploaded - Block chain technology database.docx
BLOCKCHAIN OFFERS AN IMAGINATIVE WAY TO
DEAL WITH KEEPING DATA, EXECUTING
EXCHANGES, PERFORMING CAPACITIES, AND
SETTING UP TRUST IN AN OPEN SITUATION
Source - Another student's paper
Blockchain offers an innovative way to deal with
storing information, executing transactions, performing
capacities, and establishing trust in an open domain
Suspected Entry: 62% match
Uploaded - Block chain technology database.docx
MANY CONSIDER BLOCKCHAIN AS AN
INNOVATION LEAP FORWARD FOR
CRYPTOGRAPHY AND CYBERSECURITY, WITH
USE CASES EXTENDING FROM
COMPREHENSIVELY CONVEYED DIGITAL
CURRENCY FRAMEWORKS LIKE BITCOIN, TO
SAVVY CONTRACTS, KEEN LATTICES OVER THE
INTERNET OF THINGS, ETC
Source - Another student's paper
This with use cases ranging from all around conveyed
digital money frameworks like Bitcoin to shrewd
contracts, savvy networks over the Internet of Things,
and so forward
Suspected Entry: 72% match
Uploaded - Block chain technology database.docx
EVEN THOUGH BLOCKCHAIN HAS GOTTEN
Source - Another student's paper
Even though blockchain has gotten growing interests
SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/original...
5 of 8 2/13/2020, 4:44 PM
DEVELOPING INTERESTS IN BOTH SCHOLARLY
COMMUNITY AND INDUSTRY IN THE ONGOING
YEARS, THE SECURITY AND PROTECTION OF
BLOCKCHAINS KEEP ON BEING AT THE FOCAL
POINT OF THE DISCUSSION WHILE SENDING
BLOCKCHAIN IN VARIOUS APPLICATIONS
(NOFER, ET AL, 2017)
in both scholarly community and industry as of late,
the security and privacy of blockchains continue to be
at the focal point of the discussion while deploying
blockchain in various applications
Suspected Entry: 75% match
Uploaded - Block chain technology database.docx
AT THE END OF THE DAY, RATHER THAN
TRANSFERRING INFORMATION TO A CLOUD
SERVER LIKE DIFFERENT FRAMEWORKS OR IN
ANY EVENT, PUTTING AWAY IT IN A SOLITARY
AREA, BLOCKCHAIN BREAKS EVERYTHING INTO
LITTLE PIECES
Source - Another student's paper
Security Rather than transferring information to a cloud
server or putting away it in a solitary area, blockchain
breaks everything into little pieces and conveys them
over the whole system of PCs
Suspected Entry: 68% match
Uploaded - Block chain technology database.docx
EACH HUB HAS A TOTAL DUPLICATE OF THIS
RECORD, SO UNSETTLING INFLUENCES IN ONE
OR A COUPLE OF MODES WON'T BRING ABOUT
ANY INFORMATION MISFORTUNE (FRIDGEN, ET
AL, 2018)
Source - Another student's paper
Every PC, or hub, has a total duplicate of the record,
so a couple of hubs going down won't bring about any
information misfortune
Suspected Entry: 86% match
Uploaded - Block chain technology database.docx
WHILE BLOCKCHAIN WAS INITIALLY MADE WITH
A PUBLIC CONVEYANCE MODEL AND WITHOUT
EXPLICIT ACCESS CONTROLS, THERE ARE
NUMEROUS BLOCKCHAIN USAGE THAT
ADDRESS THE INFORMATION SECRECY WHICH
IS FUNDAMENTAL IN SCHOOLS
Source - Another student's paper
While Blockchain was initially made with an open
dissemination model and without explicit access
controls, there are numerous blockchain usage that
address the data secrecy which is fundamental in
schools
Suspected Entry: 80% match
Uploaded - Block chain technology database.docx
BLOCKCHAIN TECHNOLOGIES IMPROVE
SECURITY FRAMEWORKS IN THE SCHOOLS
Source - Another student's paper
Blockchain innovations improve security frameworks in
the schools where data can without much of a stretch
SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/original...
6 of 8 2/13/2020, 4:44 PM
WHERE INFORMATION CAN WITHOUT MUCH OF A
STRETCH BE CONTROLLED YET SCRAMBLING
THE INFORMATION WITH BLOCKCHAIN
INFORMATION THAT THIS INFORMATION WON'T
BE OPEN TO UNAPPROVED PEOPLE
be controlled however scrambling the data with
blockchain data that this data won't be open to
unapproved people
Suspected Entry: 76% match
Uploaded - Block chain technology database.docx
IN THIS MANNER, KEEPING UNDERSTUDY
INFORMATION, FOR EXAMPLE, NAMES, MONEY
RELATED CHARGES SUBTLETIES, ADDRESSES
AND SO ON SECURE
Source - Another student's paper
In this manner, keeping understudy data, for example,
names, budgetary expenses subtleties, addresses and
so on secure
Suspected Entry: 90% match
Uploaded - Block chain technology database.docx
BLOCKCHAIN IMPROVES EDUCATIONAL SYSTEM
SECURITY TO VERIFY PRIVATE DATA TRADED IN
BY SCHOOL SPECIALISTS OR PARENT-
EDUCATOR IN TALKS, INFORMING APPLICATIONS
AND THROUGH INTERNET-BASED LIFE
Source - Another student's paper
Blockchain improves educational system security to
verify private data traded in by school specialists or
parent-educator in talks, informing applications and
through web-based social networking
Suspected Entry: 92% match
Uploaded - Block chain technology database.docx
WHILE OTHER VISIT MEDIUM OFFER START TO
FINISH ENCRYPTION BLOCKCHAIN CAN VERIFY
CLIENTS&APOS
Source - Another student's paper
While other talk medium offer start to finish encryption
blockchain can verify clients&apos
Suspected Entry: 99% match
Uploaded - Block chain technology database.docx
FRIDGEN, G., RADSZUWILL, S., URBACH, N., &
UTZ, L
Source - Another student's paper
Fridgen, G., Radszuwill, S., Urbach, N., & Utz, L
Suspected Entry: 100% match
Uploaded - Block chain technology database.docx Source -
https://www.fit.fraunhofer.de/en/fb
SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/original...
7 of 8 2/13/2020, 4:44 PM
CROSS-ORGANIZATIONAL WORKFLOW
MANAGEMENT USING BLOCKCHAIN
TECHNOLOGY-TOWARDS APPLICABILITY,
AUDITABILITY, AND AUTOMATION
/cscw/blockchain.html
Cross-Organizational Workflow Management Using
Blockchain Technology – Towards Applicability,
Auditability and Automation
Suspected Entry: 100% match
Uploaded - Block chain technology database.docx
SUN, H., WANG, X., & WANG, X
Source - Another student's paper
Sun, H., Wang, X., & Wang, X
Suspected Entry: 100% match
Uploaded - Block chain technology database.docx
APPLICATION OF BLOCKCHAIN TECHNOLOGY IN
ONLINE EDUCATION
Source - Another student's paper
Application of Blockchain Technology in Online
Education
Suspected Entry: 94% match
Uploaded - Block chain technology database.docx
INTERNATIONAL JOURNAL OF EMERGING
TECHNOLOGIES IN LEARNING (IJET), 13(10),
252-259
Source - Another student's paper
International Journal Of Emerging Technologies In
Learning (Ijet), 13(10), 252
SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/original...
8 of 8 2/13/2020, 4:44 PM

More Related Content

Similar to ATTRIBUTES AND EVALUATION OF DISCUSSION CONTRIBUTIONSDue Date E.docx

Blockchain-based protocol of autonomous business activity for multi-agent sys...
Blockchain-based protocol of autonomous business activity for multi-agent sys...Blockchain-based protocol of autonomous business activity for multi-agent sys...
Blockchain-based protocol of autonomous business activity for multi-agent sys...
eraser Juan José Calderón
 
EduCTX: A Blockchain-Based Higher Education Credit Platform.
EduCTX: A Blockchain-Based Higher Education Credit Platform. EduCTX: A Blockchain-Based Higher Education Credit Platform.
EduCTX: A Blockchain-Based Higher Education Credit Platform.
eraser Juan José Calderón
 
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech..."Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...
IRJET Journal
 
10 Blockchain_Technology_SDP_Report_CE_FH2020 (1).pdf
10 Blockchain_Technology_SDP_Report_CE_FH2020 (1).pdf10 Blockchain_Technology_SDP_Report_CE_FH2020 (1).pdf
10 Blockchain_Technology_SDP_Report_CE_FH2020 (1).pdf
karanThakur305665
 
Improving blockchain security for the internet of things: challenges and sol...
Improving blockchain security for the internet of things:  challenges and sol...Improving blockchain security for the internet of things:  challenges and sol...
Improving blockchain security for the internet of things: challenges and sol...
IJECEIAES
 
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENT
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENTAN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENT
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENT
csandit
 
Strategy of training blockchain talents in application oriented universities:...
Strategy of training blockchain talents in application oriented universities:...Strategy of training blockchain talents in application oriented universities:...
Strategy of training blockchain talents in application oriented universities:...
eraser Juan José Calderón
 
Cse443 Project Report - LPU (Modern Big Data Analysis with SQL Specialization)
Cse443 Project Report - LPU (Modern Big Data Analysis with SQL Specialization)Cse443 Project Report - LPU (Modern Big Data Analysis with SQL Specialization)
Cse443 Project Report - LPU (Modern Big Data Analysis with SQL Specialization)
Qazi Maaz Arshad
 
Final Project RequirementsSubmit your final project topic here. .docx
Final Project RequirementsSubmit your final project topic here. .docxFinal Project RequirementsSubmit your final project topic here. .docx
Final Project RequirementsSubmit your final project topic here. .docx
lmelaine
 
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET Journal
 
IEEE project center in nagercoil
IEEE project center in nagercoilIEEE project center in nagercoil
IEEE project center in nagercoil
abtechnology
 
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
eraser Juan José Calderón
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
IRJET Journal
 
USING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & others
USING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & othersUSING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & others
USING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & others
eraser Juan José Calderón
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
sleeperharwell
 
Alumni Tracking System
Alumni Tracking SystemAlumni Tracking System
Alumni Tracking System
Joe Andelija
 
MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2
Abi Reddy
 
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
IJECEIAES
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
ijseajournal
 
Blockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake newsBlockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake news
IRJET Journal
 

Similar to ATTRIBUTES AND EVALUATION OF DISCUSSION CONTRIBUTIONSDue Date E.docx (20)

Blockchain-based protocol of autonomous business activity for multi-agent sys...
Blockchain-based protocol of autonomous business activity for multi-agent sys...Blockchain-based protocol of autonomous business activity for multi-agent sys...
Blockchain-based protocol of autonomous business activity for multi-agent sys...
 
EduCTX: A Blockchain-Based Higher Education Credit Platform.
EduCTX: A Blockchain-Based Higher Education Credit Platform. EduCTX: A Blockchain-Based Higher Education Credit Platform.
EduCTX: A Blockchain-Based Higher Education Credit Platform.
 
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech..."Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...
"Unravelling the Challenges: A Deep Dive into the Problems of Blockchain Tech...
 
10 Blockchain_Technology_SDP_Report_CE_FH2020 (1).pdf
10 Blockchain_Technology_SDP_Report_CE_FH2020 (1).pdf10 Blockchain_Technology_SDP_Report_CE_FH2020 (1).pdf
10 Blockchain_Technology_SDP_Report_CE_FH2020 (1).pdf
 
Improving blockchain security for the internet of things: challenges and sol...
Improving blockchain security for the internet of things:  challenges and sol...Improving blockchain security for the internet of things:  challenges and sol...
Improving blockchain security for the internet of things: challenges and sol...
 
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENT
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENTAN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENT
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENT
 
Strategy of training blockchain talents in application oriented universities:...
Strategy of training blockchain talents in application oriented universities:...Strategy of training blockchain talents in application oriented universities:...
Strategy of training blockchain talents in application oriented universities:...
 
Cse443 Project Report - LPU (Modern Big Data Analysis with SQL Specialization)
Cse443 Project Report - LPU (Modern Big Data Analysis with SQL Specialization)Cse443 Project Report - LPU (Modern Big Data Analysis with SQL Specialization)
Cse443 Project Report - LPU (Modern Big Data Analysis with SQL Specialization)
 
Final Project RequirementsSubmit your final project topic here. .docx
Final Project RequirementsSubmit your final project topic here. .docxFinal Project RequirementsSubmit your final project topic here. .docx
Final Project RequirementsSubmit your final project topic here. .docx
 
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
 
IEEE project center in nagercoil
IEEE project center in nagercoilIEEE project center in nagercoil
IEEE project center in nagercoil
 
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
 
USING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & others
USING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & othersUSING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & others
USING BLOCKCHAIN TECHNOLOGY FOR E-LEARNING. V.A. TOLBATOV & others
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
 
Alumni Tracking System
Alumni Tracking SystemAlumni Tracking System
Alumni Tracking System
 
MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2
 
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
 
Blockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake newsBlockchain based News Application to combat Fake news
Blockchain based News Application to combat Fake news
 

More from rosemaryralphs52525

attached assignment requirements as well as will attach below my not.docx
attached assignment requirements as well as will attach below my not.docxattached assignment requirements as well as will attach below my not.docx
attached assignment requirements as well as will attach below my not.docx
rosemaryralphs52525
 
Attached below is the template on the research paper. You have to ch.docx
Attached below is the template on the research paper. You have to ch.docxAttached below is the template on the research paper. You have to ch.docx
Attached below is the template on the research paper. You have to ch.docx
rosemaryralphs52525
 
Attributes of a Transformational Healthcare System - Collaborati.docx
Attributes of a Transformational Healthcare System - Collaborati.docxAttributes of a Transformational Healthcare System - Collaborati.docx
Attributes of a Transformational Healthcare System - Collaborati.docx
rosemaryralphs52525
 
Audience PurposeThey [chickens] know nothing from the mome.docx
Audience PurposeThey [chickens] know nothing from the mome.docxAudience PurposeThey [chickens] know nothing from the mome.docx
Audience PurposeThey [chickens] know nothing from the mome.docx
rosemaryralphs52525
 
Be sure to read the reading assignment in your text first!Read t.docx
Be sure to read the reading assignment in your text first!Read t.docxBe sure to read the reading assignment in your text first!Read t.docx
Be sure to read the reading assignment in your text first!Read t.docx
rosemaryralphs52525
 
Be sure to write complete sentences, double space, set one-inch .docx
Be sure to write complete sentences, double space, set one-inch .docxBe sure to write complete sentences, double space, set one-inch .docx
Be sure to write complete sentences, double space, set one-inch .docx
rosemaryralphs52525
 
BC Chemistry 162 Laboratory Manual Experiment 6 Vapor Press.docx
BC Chemistry 162 Laboratory Manual Experiment 6 Vapor Press.docxBC Chemistry 162 Laboratory Manual Experiment 6 Vapor Press.docx
BC Chemistry 162 Laboratory Manual Experiment 6 Vapor Press.docx
rosemaryralphs52525
 
BCO127Applied Management Statistics Task br.docx
BCO127Applied Management Statistics                      Task br.docxBCO127Applied Management Statistics                      Task br.docx
BCO127Applied Management Statistics Task br.docx
rosemaryralphs52525
 
BCOM - CarrCrisis Communication Project CarrThe Scenario.docx
BCOM - CarrCrisis Communication Project CarrThe Scenario.docxBCOM - CarrCrisis Communication Project CarrThe Scenario.docx
BCOM - CarrCrisis Communication Project CarrThe Scenario.docx
rosemaryralphs52525
 
Battleground Medical Center is requiring that all Departments partic.docx
Battleground Medical Center is requiring that all Departments partic.docxBattleground Medical Center is requiring that all Departments partic.docx
Battleground Medical Center is requiring that all Departments partic.docx
rosemaryralphs52525
 
Basic concept and system disorder assignment.This a research.docx
Basic concept and system disorder assignment.This a research.docxBasic concept and system disorder assignment.This a research.docx
Basic concept and system disorder assignment.This a research.docx
rosemaryralphs52525
 
Based upon your research from this topic, propose a set of security .docx
Based upon your research from this topic, propose a set of security .docxBased upon your research from this topic, propose a set of security .docx
Based upon your research from this topic, propose a set of security .docx
rosemaryralphs52525
 
BASIC SAMPLE COVER LETTER Your Street Address BLOCK SYLE-.docx
BASIC SAMPLE COVER LETTER  Your Street Address BLOCK SYLE-.docxBASIC SAMPLE COVER LETTER  Your Street Address BLOCK SYLE-.docx
BASIC SAMPLE COVER LETTER Your Street Address BLOCK SYLE-.docx
rosemaryralphs52525
 
Basic Bookkeeping – Level 1 F I N A L E X A M V4.0 CU07.docx
Basic Bookkeeping – Level 1 F I N A L  E X A M V4.0 CU07.docxBasic Bookkeeping – Level 1 F I N A L  E X A M V4.0 CU07.docx
Basic Bookkeeping – Level 1 F I N A L E X A M V4.0 CU07.docx
rosemaryralphs52525
 
Basically, answer any and all case questions you like. Format prefer.docx
Basically, answer any and all case questions you like. Format prefer.docxBasically, answer any and all case questions you like. Format prefer.docx
Basically, answer any and all case questions you like. Format prefer.docx
rosemaryralphs52525
 
auto- attendant 800 wordsINTRO  Business phone system.docx
auto- attendant 800 wordsINTRO  Business phone system.docxauto- attendant 800 wordsINTRO  Business phone system.docx
auto- attendant 800 wordsINTRO  Business phone system.docx
rosemaryralphs52525
 
Based on your research, what is negligent security300 Word Discus.docx
Based on your research, what is negligent security300 Word Discus.docxBased on your research, what is negligent security300 Word Discus.docx
Based on your research, what is negligent security300 Word Discus.docx
rosemaryralphs52525
 
Autism spectrum DisorDersFoundations, CharaCteristiC.docx
Autism spectrum DisorDersFoundations, CharaCteristiC.docxAutism spectrum DisorDersFoundations, CharaCteristiC.docx
Autism spectrum DisorDersFoundations, CharaCteristiC.docx
rosemaryralphs52525
 
Attached Files Personal data breaches and securing IoT device.docx
Attached Files Personal data breaches and securing IoT device.docxAttached Files Personal data breaches and securing IoT device.docx
Attached Files Personal data breaches and securing IoT device.docx
rosemaryralphs52525
 
Attached FilesIT Governance at University of the SoutheastU.docx
Attached FilesIT Governance at University of the SoutheastU.docxAttached FilesIT Governance at University of the SoutheastU.docx
Attached FilesIT Governance at University of the SoutheastU.docx
rosemaryralphs52525
 

More from rosemaryralphs52525 (20)

attached assignment requirements as well as will attach below my not.docx
attached assignment requirements as well as will attach below my not.docxattached assignment requirements as well as will attach below my not.docx
attached assignment requirements as well as will attach below my not.docx
 
Attached below is the template on the research paper. You have to ch.docx
Attached below is the template on the research paper. You have to ch.docxAttached below is the template on the research paper. You have to ch.docx
Attached below is the template on the research paper. You have to ch.docx
 
Attributes of a Transformational Healthcare System - Collaborati.docx
Attributes of a Transformational Healthcare System - Collaborati.docxAttributes of a Transformational Healthcare System - Collaborati.docx
Attributes of a Transformational Healthcare System - Collaborati.docx
 
Audience PurposeThey [chickens] know nothing from the mome.docx
Audience PurposeThey [chickens] know nothing from the mome.docxAudience PurposeThey [chickens] know nothing from the mome.docx
Audience PurposeThey [chickens] know nothing from the mome.docx
 
Be sure to read the reading assignment in your text first!Read t.docx
Be sure to read the reading assignment in your text first!Read t.docxBe sure to read the reading assignment in your text first!Read t.docx
Be sure to read the reading assignment in your text first!Read t.docx
 
Be sure to write complete sentences, double space, set one-inch .docx
Be sure to write complete sentences, double space, set one-inch .docxBe sure to write complete sentences, double space, set one-inch .docx
Be sure to write complete sentences, double space, set one-inch .docx
 
BC Chemistry 162 Laboratory Manual Experiment 6 Vapor Press.docx
BC Chemistry 162 Laboratory Manual Experiment 6 Vapor Press.docxBC Chemistry 162 Laboratory Manual Experiment 6 Vapor Press.docx
BC Chemistry 162 Laboratory Manual Experiment 6 Vapor Press.docx
 
BCO127Applied Management Statistics Task br.docx
BCO127Applied Management Statistics                      Task br.docxBCO127Applied Management Statistics                      Task br.docx
BCO127Applied Management Statistics Task br.docx
 
BCOM - CarrCrisis Communication Project CarrThe Scenario.docx
BCOM - CarrCrisis Communication Project CarrThe Scenario.docxBCOM - CarrCrisis Communication Project CarrThe Scenario.docx
BCOM - CarrCrisis Communication Project CarrThe Scenario.docx
 
Battleground Medical Center is requiring that all Departments partic.docx
Battleground Medical Center is requiring that all Departments partic.docxBattleground Medical Center is requiring that all Departments partic.docx
Battleground Medical Center is requiring that all Departments partic.docx
 
Basic concept and system disorder assignment.This a research.docx
Basic concept and system disorder assignment.This a research.docxBasic concept and system disorder assignment.This a research.docx
Basic concept and system disorder assignment.This a research.docx
 
Based upon your research from this topic, propose a set of security .docx
Based upon your research from this topic, propose a set of security .docxBased upon your research from this topic, propose a set of security .docx
Based upon your research from this topic, propose a set of security .docx
 
BASIC SAMPLE COVER LETTER Your Street Address BLOCK SYLE-.docx
BASIC SAMPLE COVER LETTER  Your Street Address BLOCK SYLE-.docxBASIC SAMPLE COVER LETTER  Your Street Address BLOCK SYLE-.docx
BASIC SAMPLE COVER LETTER Your Street Address BLOCK SYLE-.docx
 
Basic Bookkeeping – Level 1 F I N A L E X A M V4.0 CU07.docx
Basic Bookkeeping – Level 1 F I N A L  E X A M V4.0 CU07.docxBasic Bookkeeping – Level 1 F I N A L  E X A M V4.0 CU07.docx
Basic Bookkeeping – Level 1 F I N A L E X A M V4.0 CU07.docx
 
Basically, answer any and all case questions you like. Format prefer.docx
Basically, answer any and all case questions you like. Format prefer.docxBasically, answer any and all case questions you like. Format prefer.docx
Basically, answer any and all case questions you like. Format prefer.docx
 
auto- attendant 800 wordsINTRO  Business phone system.docx
auto- attendant 800 wordsINTRO  Business phone system.docxauto- attendant 800 wordsINTRO  Business phone system.docx
auto- attendant 800 wordsINTRO  Business phone system.docx
 
Based on your research, what is negligent security300 Word Discus.docx
Based on your research, what is negligent security300 Word Discus.docxBased on your research, what is negligent security300 Word Discus.docx
Based on your research, what is negligent security300 Word Discus.docx
 
Autism spectrum DisorDersFoundations, CharaCteristiC.docx
Autism spectrum DisorDersFoundations, CharaCteristiC.docxAutism spectrum DisorDersFoundations, CharaCteristiC.docx
Autism spectrum DisorDersFoundations, CharaCteristiC.docx
 
Attached Files Personal data breaches and securing IoT device.docx
Attached Files Personal data breaches and securing IoT device.docxAttached Files Personal data breaches and securing IoT device.docx
Attached Files Personal data breaches and securing IoT device.docx
 
Attached FilesIT Governance at University of the SoutheastU.docx
Attached FilesIT Governance at University of the SoutheastU.docxAttached FilesIT Governance at University of the SoutheastU.docx
Attached FilesIT Governance at University of the SoutheastU.docx
 

Recently uploaded

How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 

Recently uploaded (20)

How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 

ATTRIBUTES AND EVALUATION OF DISCUSSION CONTRIBUTIONSDue Date E.docx

  • 1. ATTRIBUTES AND EVALUATION OF DISCUSSION CONTRIBUTIONS Due Date: End of weekly Percentage of Course Grade: 20%. Learner Guidelines for Evaluation of Discussion Contributions All discussion contributions will be read by your instructor each week. The instructor will provide feedback to you regarding your discussion postings. Expecting that every discussion posting and response contain all of the attributes of an exemplary discussion posting is setting a high standard for both you and the instructor. This level of high performance is the standard expected of graduate learners at Capella. Attributes of an Exemplary Discussion Contribution or Response: 1. The discussion contribution or response clearly addresses the content issue(s) presented by the question. 2. The discussion contribution or response includes the appropriate level(s) of critical analysis. 3. The discussion contribution or response includes pertinent course and disciplinary concepts, theories, or materials, and applies them correctly. 4. The discussion contribution or response provides validation and support by including relevant examples and supporting evidence, as appropriate. 5. The discussion contribution or response stimulates fellow learners to clarify, extend, and strengthen their dialogue. 6. The discussion contribution or response is concise, clearly organized, and well structured. 7. The discussion contribution or response uses grammar, usage, and mechanics expected of graduate level composition and expression. 8. All citations and references adhere to APA 6th edition style. 9. The discussion contribution or response fosters collaboration with fellow learners and communicates in a manner that
  • 2. respects the dignity and integrity of fellow learners and the instructor. 10. The discussion response meaningfully supplements and extends consideration of the topic by including one of more of the following: new information, questions, constructive or corrective feedback, or alternative viewpoints. For additional details regarding discussion participation and contributions, please consult the Professional Communications and Writing Guide. Submission UUID: 58593f67-986c-da25-634f-34f2af328387 Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/original... 1 of 8 2/14/2020, 4:35 PM Word Count: 631 Block Chain technology.docx Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/original... 2 of 8 2/14/2020, 4:35 PM Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/original...
  • 3. 3 of 8 2/14/2020, 4:35 PM Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/original... 4 of 8 2/14/2020, 4:35 PM Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/original... 5 of 8 2/14/2020, 4:35 PM Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/original... 6 of 8 2/14/2020, 4:35 PM Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/original... 7 of 8 2/14/2020, 4:35 PM Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/original... 8 of 8 2/14/2020, 4:35 PM
  • 4. ECS5200_201951_CRN151 - DATABASE SECURITY - 201951 - CRN151 - LAVENTURE-BERNIER Week 14 Paper Raviprakash Ganji on Thu, Feb 13 2020, 4:37 PM 62% highest match Submission ID: c614fe3f-8808-494d-85e3-865e8c49862f Attachments (1) Block chain technology database.docx 2 Running Head: 1 BLOCKCHAIN TECHNOLOGY AND DATA SECURITY 2 1 BLOCKCHAIN TECHNOLOGY AND DATA SECURITY BLOCKCHAIN TECHNOLOGY AND DATA SECURITY New England college. Professor: Lisa Laventure-Bernier Student: Raviprakash Ganji
  • 5. 2 BLOCKCHAIN OFFERS AN IMAGINATIVE WAY TO DEAL WITH KEEPING DATA, EXECUTING EXCHANGES, PERFORMING CAPACITIES, AND SETTING UP TRUST IN AN OPEN SITUATION. MANY CONSIDER BLOCKCHAIN AS AN INNOVATION LEAP FORWARD FOR CRYPTOGRAPHY AND CYBERSECURITY, WITH USE CASES EXTENDING FROM COMPREHENSIVELY CONVEYED (http://safeassign.blackboard.com/) Block chain technology database.docx Word Count: 634 Attachment ID: 2573604122 62% SafeAssign Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/original... 1 of 8 2/13/2020, 4:44 PM DIGITAL CURRENCY FRAMEWORKS LIKE BITCOIN, TO SAVVY CONTRACTS, KEEN LATTICES OVER THE INTERNET OF THINGS, ETC.
  • 6. EVEN THOUGH BLOCKCHAIN HAS GOTTEN DEVELOPING INTERESTS IN BOTH SCHOLARLY COMMUNITY AND INDUSTRY IN THE ONGOING YEARS, THE SECURITY AND PROTECTION OF BLOCKCHAINS KEEP ON BEING AT THE FOCAL POINT OF THE DISCUSSION WHILE SENDING BLOCKCHAIN IN VARIOUS APPLICATIONS (NOFER, ET AL, 2017). The following is how blockchain technology improves data security in different contexts: How blockchain technology improves data security in military context Blockchain technology has numerous utilities in the resistance division as it offers utility in both operational and bolster jobs: digital safeguard and information trustworthiness, inventory network the board and strong interchanges. Nonetheless, the improvement of blockchain technology recommend critical development in any Defense Budget and require the advancement of a guard procedure dependent on accessible assets so as to fulfill the needs of
  • 7. the evolving condition (Sudhan, A., & Nene, M. J., 2017). How blockchain technology improves data security in trading Organization How blockchain technology basically functions resembles a huge attached and decentralized record where new data can be composed onto with new data. However, the more established information put away in squares, can't be changed. This is finished by utilizing cryptography to timestamp and connect the substance of the recently included square with each square before it. 3 AT THE END OF THE DAY, RATHER THAN TRANSFERRING INFORMATION TO A CLOUD SERVER LIKE DIFFERENT FRAMEWORKS OR IN ANY EVENT, PUTTING AWAY IT IN A SOLITARY AREA, BLOCKCHAIN BREAKS EVERYTHING INTO LITTLE PIECES. These smaller than usual pieces have then circulated them over the whole system of PCs. Along these lines, making blockchain a carefully scrambled record that comes up short on a main issue. 4 EACH HUB HAS A TOTAL
  • 8. DUPLICATE OF THIS RECORD, SO UNSETTLING INFLUENCES IN ONE OR A COUPLE OF MODES WON'T BRING ABOUT ANY INFORMATION MISFORTUNE (FRIDGEN, ET AL, 2018). How blockchain technology improves data security in education SafeAssign Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/original... 2 of 8 2/13/2020, 4:44 PM 5 WHILE BLOCKCHAIN WAS INITIALLY MADE WITH A PUBLIC CONVEYANCE MODEL AND WITHOUT EXPLICIT ACCESS CONTROLS, THERE ARE NUMEROUS BLOCKCHAIN USAGE THAT ADDRESS THE INFORMATION SECRECY WHICH IS FUNDAMENTAL IN SCHOOLS. BLOCKCHAIN TECHNOLOGIES IMPROVE SECURITY FRAMEWORKS IN THE SCHOOLS WHERE INFORMATION CAN WITHOUT MUCH OF A STRETCH BE
  • 9. CONTROLLED YET SCRAMBLING THE INFORMATION WITH BLOCKCHAIN INFORMATION THAT THIS INFORMATION WON'T BE OPEN TO UNAPPROVED PEOPLE. IN THIS MANNER, KEEPING UNDERSTUDY INFORMATION, FOR EXAMPLE, NAMES, MONEY RELATED CHARGES SUBTLETIES, ADDRESSES AND SO ON SECURE. BLOCKCHAIN IMPROVES EDUCATIONAL SYSTEM SECURITY TO VERIFY PRIVATE DATA TRADED IN BY SCHOOL SPECIALISTS OR PARENT-EDUCATOR IN TALKS, INFORMING APPLICATIONS AND THROUGH INTERNET-BASED LIFE. WHILE OTHER VISIT MEDIUM OFFER START TO FINISH ENCRYPTION BLOCKCHAIN CAN VERIFY CLIENTS' metadata, which is haphazardly disseminated all through a record and can't be accumulated from a singling point making it invulnerable to hackers (Sun, H., Wang, X., & Wang, X., 2018). References 6 FRIDGEN, G., RADSZUWILL, S., URBACH, N., & UTZ, L.
  • 10. (2018). 7 CROSS- ORGANIZATIONAL WORKFLOW MANAGEMENT USING BLOCKCHAIN TECHNOLOGY-TOWARDS APPLICABILITY, AUDITABILITY, AND AUTOMATION. Nofer, M., Gomber, P., Hinz, O., & Schiereck, D. (2017). Blockchain. Business & Information Systems Engineering, 59(3), 183-187. 1 SUDHAN, A., & NENE, M. J. (2017, December). 1 EMPLOYABILITY OF BLOCKCHAIN TECHNOLOGY IN DEFENCE APPLICATIONS. IN 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS) (PP. 630-637). IEEE. 8 SUN, H., WANG, X., & WANG, X. (2018). 8 APPLICATION OF BLOCKCHAIN TECHNOLOGY IN ONLINE EDUCATION. 9 INTERNATIONAL JOURNAL OF EMERGING TECHNOLOGIES IN LEARNING (IJET), 13(10), 252-259. SafeAssign Originality Report
  • 11. https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/original... 3 of 8 2/13/2020, 4:44 PM Citations (9/9) Matched Text 1 Another student's paper 2 Another student's paper 3 Another student's paper 4 Another student's paper 5 Another student's paper 6 Another student's paper 7 https://www.fit.fraunhofer.de/en/fb/cscw/blockchain.html 8 Another student's paper 9 Another student's paper Suspected Entry: 63% match Uploaded - Block chain technology database.docx BLOCKCHAIN TECHNOLOGY AND DATA SECURITY
  • 12. Source - Another student's paper ENHANCING SECURITY THROUGH THE BLOCKCHAIN TECHNOLOGY Suspected Entry: 63% match Uploaded - Block chain technology database.docx BLOCKCHAIN TECHNOLOGY AND DATA SECURITY Source - Another student's paper ENHANCING SECURITY THROUGH THE BLOCKCHAIN TECHNOLOGY Suspected Entry: 63% match Uploaded - Block chain technology database.docx BLOCKCHAIN TECHNOLOGY AND DATA SECURITY Source - Another student's paper ENHANCING SECURITY THROUGH THE BLOCKCHAIN TECHNOLOGY Suspected Entry: 100% match
  • 13. SafeAssign Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/original... 4 of 8 2/13/2020, 4:44 PM Uploaded - Block chain technology database.docx SUDHAN, A., & NENE, M Source - Another student's paper Sudhan, A., & Nene, M Suspected Entry: 100% match Uploaded - Block chain technology database.docx EMPLOYABILITY OF BLOCKCHAIN TECHNOLOGY IN DEFENCE APPLICATIONS Source - Another student's paper Employability of blockchain technology in defence applications Suspected Entry: 100% match Uploaded - Block chain technology database.docx IN 2017 INTERNATIONAL CONFERENCE ON
  • 14. INTELLIGENT SUSTAINABLE SYSTEMS (ICISS) (PP Source - Another student's paper In 2017 International Conference on Intelligent Sustainable Systems (ICISS) (pp Suspected Entry: 66% match Uploaded - Block chain technology database.docx BLOCKCHAIN OFFERS AN IMAGINATIVE WAY TO DEAL WITH KEEPING DATA, EXECUTING EXCHANGES, PERFORMING CAPACITIES, AND SETTING UP TRUST IN AN OPEN SITUATION Source - Another student's paper Blockchain offers an innovative way to deal with storing information, executing transactions, performing capacities, and establishing trust in an open domain Suspected Entry: 62% match Uploaded - Block chain technology database.docx MANY CONSIDER BLOCKCHAIN AS AN
  • 15. INNOVATION LEAP FORWARD FOR CRYPTOGRAPHY AND CYBERSECURITY, WITH USE CASES EXTENDING FROM COMPREHENSIVELY CONVEYED DIGITAL CURRENCY FRAMEWORKS LIKE BITCOIN, TO SAVVY CONTRACTS, KEEN LATTICES OVER THE INTERNET OF THINGS, ETC Source - Another student's paper This with use cases ranging from all around conveyed digital money frameworks like Bitcoin to shrewd contracts, savvy networks over the Internet of Things, and so forward Suspected Entry: 72% match Uploaded - Block chain technology database.docx EVEN THOUGH BLOCKCHAIN HAS GOTTEN Source - Another student's paper Even though blockchain has gotten growing interests SafeAssign Originality Report
  • 16. https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/original... 5 of 8 2/13/2020, 4:44 PM DEVELOPING INTERESTS IN BOTH SCHOLARLY COMMUNITY AND INDUSTRY IN THE ONGOING YEARS, THE SECURITY AND PROTECTION OF BLOCKCHAINS KEEP ON BEING AT THE FOCAL POINT OF THE DISCUSSION WHILE SENDING BLOCKCHAIN IN VARIOUS APPLICATIONS (NOFER, ET AL, 2017) in both scholarly community and industry as of late, the security and privacy of blockchains continue to be at the focal point of the discussion while deploying blockchain in various applications Suspected Entry: 75% match Uploaded - Block chain technology database.docx AT THE END OF THE DAY, RATHER THAN TRANSFERRING INFORMATION TO A CLOUD
  • 17. SERVER LIKE DIFFERENT FRAMEWORKS OR IN ANY EVENT, PUTTING AWAY IT IN A SOLITARY AREA, BLOCKCHAIN BREAKS EVERYTHING INTO LITTLE PIECES Source - Another student's paper Security Rather than transferring information to a cloud server or putting away it in a solitary area, blockchain breaks everything into little pieces and conveys them over the whole system of PCs Suspected Entry: 68% match Uploaded - Block chain technology database.docx EACH HUB HAS A TOTAL DUPLICATE OF THIS RECORD, SO UNSETTLING INFLUENCES IN ONE OR A COUPLE OF MODES WON'T BRING ABOUT ANY INFORMATION MISFORTUNE (FRIDGEN, ET AL, 2018) Source - Another student's paper Every PC, or hub, has a total duplicate of the record,
  • 18. so a couple of hubs going down won't bring about any information misfortune Suspected Entry: 86% match Uploaded - Block chain technology database.docx WHILE BLOCKCHAIN WAS INITIALLY MADE WITH A PUBLIC CONVEYANCE MODEL AND WITHOUT EXPLICIT ACCESS CONTROLS, THERE ARE NUMEROUS BLOCKCHAIN USAGE THAT ADDRESS THE INFORMATION SECRECY WHICH IS FUNDAMENTAL IN SCHOOLS Source - Another student's paper While Blockchain was initially made with an open dissemination model and without explicit access controls, there are numerous blockchain usage that address the data secrecy which is fundamental in schools Suspected Entry: 80% match Uploaded - Block chain technology database.docx
  • 19. BLOCKCHAIN TECHNOLOGIES IMPROVE SECURITY FRAMEWORKS IN THE SCHOOLS Source - Another student's paper Blockchain innovations improve security frameworks in the schools where data can without much of a stretch SafeAssign Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/original... 6 of 8 2/13/2020, 4:44 PM WHERE INFORMATION CAN WITHOUT MUCH OF A STRETCH BE CONTROLLED YET SCRAMBLING THE INFORMATION WITH BLOCKCHAIN INFORMATION THAT THIS INFORMATION WON'T BE OPEN TO UNAPPROVED PEOPLE be controlled however scrambling the data with blockchain data that this data won't be open to unapproved people Suspected Entry: 76% match
  • 20. Uploaded - Block chain technology database.docx IN THIS MANNER, KEEPING UNDERSTUDY INFORMATION, FOR EXAMPLE, NAMES, MONEY RELATED CHARGES SUBTLETIES, ADDRESSES AND SO ON SECURE Source - Another student's paper In this manner, keeping understudy data, for example, names, budgetary expenses subtleties, addresses and so on secure Suspected Entry: 90% match Uploaded - Block chain technology database.docx BLOCKCHAIN IMPROVES EDUCATIONAL SYSTEM SECURITY TO VERIFY PRIVATE DATA TRADED IN BY SCHOOL SPECIALISTS OR PARENT- EDUCATOR IN TALKS, INFORMING APPLICATIONS AND THROUGH INTERNET-BASED LIFE Source - Another student's paper Blockchain improves educational system security to
  • 21. verify private data traded in by school specialists or parent-educator in talks, informing applications and through web-based social networking Suspected Entry: 92% match Uploaded - Block chain technology database.docx WHILE OTHER VISIT MEDIUM OFFER START TO FINISH ENCRYPTION BLOCKCHAIN CAN VERIFY CLIENTS&APOS Source - Another student's paper While other talk medium offer start to finish encryption blockchain can verify clients&apos Suspected Entry: 99% match Uploaded - Block chain technology database.docx FRIDGEN, G., RADSZUWILL, S., URBACH, N., & UTZ, L Source - Another student's paper Fridgen, G., Radszuwill, S., Urbach, N., & Utz, L Suspected Entry: 100% match
  • 22. Uploaded - Block chain technology database.docx Source - https://www.fit.fraunhofer.de/en/fb SafeAssign Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/original... 7 of 8 2/13/2020, 4:44 PM CROSS-ORGANIZATIONAL WORKFLOW MANAGEMENT USING BLOCKCHAIN TECHNOLOGY-TOWARDS APPLICABILITY, AUDITABILITY, AND AUTOMATION /cscw/blockchain.html Cross-Organizational Workflow Management Using Blockchain Technology – Towards Applicability, Auditability and Automation Suspected Entry: 100% match Uploaded - Block chain technology database.docx SUN, H., WANG, X., & WANG, X Source - Another student's paper
  • 23. Sun, H., Wang, X., & Wang, X Suspected Entry: 100% match Uploaded - Block chain technology database.docx APPLICATION OF BLOCKCHAIN TECHNOLOGY IN ONLINE EDUCATION Source - Another student's paper Application of Blockchain Technology in Online Education Suspected Entry: 94% match Uploaded - Block chain technology database.docx INTERNATIONAL JOURNAL OF EMERGING TECHNOLOGIES IN LEARNING (IJET), 13(10), 252-259 Source - Another student's paper International Journal Of Emerging Technologies In Learning (Ijet), 13(10), 252 SafeAssign Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/original...
  • 24. 8 of 8 2/13/2020, 4:44 PM