SlideShare a Scribd company logo
you have to respond to bellow paper
I also give example of someone who already rrspond to Baker
Baker Post
Data becomes useful information when it is provided with
context. A single piece of data is useless without being
included with a way to relate that data to something else. For
instance, a number by itself means nothing without some type of
context applied to it. Boyle gives this example: “Take the
number 37…now give it some context: 37 degrees C is normal
body temperature” (Boyle, 2011). The number by itself is
merely a data point, but when provided context it becomes a
useful piece of information that can be put to use. However, as
our society has become so reliant on the internet, data is often
pushed out instantly without any chance to provide a true
context to the situation. There have been an unprecedented
amount of controversial situations in recent memory that were
brought to public attention without proper context being
provided. This has the effect of allowing the public to form
opinions without all the information necessary to have a truly
informed opinion. Fayoyin and Ngwainmbi wrote, “Data and
social statistics have been misinterpreted and misrepresented
causing major misinformation within interpersonal and mass
communication” (Fayoyin and Ngwainmbi, 2014). This is a
problem that has been constant for a long time but has only
been made significantly worse with the emergence of social
media.
A primary source is an original document or source
of some kind. If the source of information is an eyewitness or
you get the information directly from an expert in a given field
it would be considered a primary source. An example would be
an autobiography as an individual is writing about their
experiences first hand. A secondary source is when the
information is derived from someone who was either told about
or heard about the information from the primary source. A good
example for a secondary source would be a biography that either
takes the information from the individual themselves or from
things they have written.
For my paper I have found a primary source that was
written by one of the most wanted hackers of all time: Kevin
Mitnick titled Famed Hacker Kevin Mitnick Shows You How to
Go Invisible Online. Mitnick here gives a common example of
how hackers today are able to ensure they cover their tracks and
are not detected, at least with any certainty. Another primary
source I will use was written by Richard Hummel from the
SANS Institute who wrote a paper entitled, Securing Against the
Most Common Vectors o Cyber Attacks. A secondary source
that I will be utilizing is one that discusses many of the biggest
known cyber attacks written by Bruce Middleton titled A
History of Cyber Security Attacks: 1980 to Present.
1. Boyle, Rebecca. Data Harmony: How We Can Turn Piles
of Raw Data into Usable Knowledge,
https://www.popsci.com/science/article/2011-11/turning-raw-
data-useful-ingredients (Accessed 27 June 2018)
2. Fayoyin, Adebayo and Ngwainmbi, Emmanuel. Use and
Misuse of Data in Advocacy, Media and Opinion Polls in
Africa: Realities, Challenges and Opportunities,
https://www.ajol.info/index.php/jdcs/article/view/112465/10221
6 (Accessed 27 June 2018)
3. Hummel, Richard. Securing Against the Most Common
Vectors of Cyber Attacks, https://www.sans.org/reading-
Example of someone who response to Baker post
enjoyed reading your statement in regard on when data can
become usable. I do agree with you a single data with no access
for dissemination does not provide a chance for others to
dispute data validity. Data with no verification is just data that
it cannot be use. Last year during US senator’s election many
television outlets started informing the audience unverified
information on the news and after too many allegations many of
those candidates just decided to drop their names from the list
of participants even if they only had the best intention to serve
their communities. The Television news that it supposed to
report after information has been verified. Hackers do the same
when they get a hold a new phone number usually they start
calling to phishing for verifying to whom belongs the phone
number and try to get as much information as possible for them
to used data for future attack or financial gain. Great primary
source for your paper, I am sure you will do well. Thanks for
sharing your ideas.
Our country remains divided in so many issues like some states
approving drugs into their states with the idea to build revenue
for their states on behaves of the youth. Many senators openly
promotes approving marihuana in their states. We have at least
11 states who openly proclaims to be openly to try into their
states and we are glad that the majority of people are against
this idea. The news outlets needs to become more responsible
in telling the people the truth in regards how drugs is affecting
our way of life and the future of our teens.
**** Please response to Baker ****

More Related Content

More from laquandabignell

Give an example of a parent conference to explain to the parents the.docx
Give an example of a parent conference to explain to the parents the.docxGive an example of a parent conference to explain to the parents the.docx
Give an example of a parent conference to explain to the parents the.docx
laquandabignell
 
Gender and sexuality are intertwined in many cultures. (Gardiner & K.docx
Gender and sexuality are intertwined in many cultures. (Gardiner & K.docxGender and sexuality are intertwined in many cultures. (Gardiner & K.docx
Gender and sexuality are intertwined in many cultures. (Gardiner & K.docx
laquandabignell
 
General Directions The length of the essay is roughly 750 words. .docx
General Directions The length of the essay is roughly 750 words. .docxGeneral Directions The length of the essay is roughly 750 words. .docx
General Directions The length of the essay is roughly 750 words. .docx
laquandabignell
 
Give an example of technological innovation from the last two decade.docx
Give an example of technological innovation from the last two decade.docxGive an example of technological innovation from the last two decade.docx
Give an example of technological innovation from the last two decade.docx
laquandabignell
 
Give A Description of the selected disorder (Identify the DSM di.docx
Give A Description of the selected disorder (Identify the DSM di.docxGive A Description of the selected disorder (Identify the DSM di.docx
Give A Description of the selected disorder (Identify the DSM di.docx
laquandabignell
 
Generating Ideas for WritingWriting is a selection of words and .docx
Generating Ideas for WritingWriting is a selection of words and .docxGenerating Ideas for WritingWriting is a selection of words and .docx
Generating Ideas for WritingWriting is a selection of words and .docx
laquandabignell
 
Geography Project – Rationale InstructionsYou will identify a .docx
Geography Project – Rationale InstructionsYou will identify a .docxGeography Project – Rationale InstructionsYou will identify a .docx
Geography Project – Rationale InstructionsYou will identify a .docx
laquandabignell
 
Geography Project – Project Plan InstructionsFollowing your Module.docx
Geography Project – Project Plan InstructionsFollowing your Module.docxGeography Project – Project Plan InstructionsFollowing your Module.docx
Geography Project – Project Plan InstructionsFollowing your Module.docx
laquandabignell
 
Geographic LocationThey are found throughout the Pacific, Atlan.docx
Geographic LocationThey are found throughout the Pacific, Atlan.docxGeographic LocationThey are found throughout the Pacific, Atlan.docx
Geographic LocationThey are found throughout the Pacific, Atlan.docx
laquandabignell
 
Geographers have been working with geographic information systems (G.docx
Geographers have been working with geographic information systems (G.docxGeographers have been working with geographic information systems (G.docx
Geographers have been working with geographic information systems (G.docx
laquandabignell
 
General Moters was selected for week 2.Find the company select.docx
General Moters was selected for week 2.Find the company select.docxGeneral Moters was selected for week 2.Find the company select.docx
General Moters was selected for week 2.Find the company select.docx
laquandabignell
 
Geography Project – Outline InstructionsReferencing the Geograph.docx
Geography Project – Outline InstructionsReferencing the Geograph.docxGeography Project – Outline InstructionsReferencing the Geograph.docx
Geography Project – Outline InstructionsReferencing the Geograph.docx
laquandabignell
 
give a general historical background on CongoWhich European Count.docx
give a general historical background on CongoWhich European Count.docxgive a general historical background on CongoWhich European Count.docx
give a general historical background on CongoWhich European Count.docx
laquandabignell
 
Geneticists compare DNA base sequences among organisms and from th.docx
Geneticists compare DNA base sequences among organisms and from th.docxGeneticists compare DNA base sequences among organisms and from th.docx
Geneticists compare DNA base sequences among organisms and from th.docx
laquandabignell
 
Gene A crosses over 16.5 percent of the time with gene B. Gene B c.docx
Gene A crosses over 16.5 percent of the time with gene B. Gene B c.docxGene A crosses over 16.5 percent of the time with gene B. Gene B c.docx
Gene A crosses over 16.5 percent of the time with gene B. Gene B c.docx
laquandabignell
 
Generations in the WorkplaceFor the first time in history, four .docx
Generations in the WorkplaceFor the first time in history, four .docxGenerations in the WorkplaceFor the first time in history, four .docx
Generations in the WorkplaceFor the first time in history, four .docx
laquandabignell
 
geo 101 Q&A1. We see may cultures disappearing today. Will there c.docx
geo 101 Q&A1. We see may cultures disappearing today. Will there c.docxgeo 101 Q&A1. We see may cultures disappearing today. Will there c.docx
geo 101 Q&A1. We see may cultures disappearing today. Will there c.docx
laquandabignell
 
Genre, a category of artistic production characterized by similariti.docx
Genre, a category of artistic production characterized by similariti.docxGenre, a category of artistic production characterized by similariti.docx
Genre, a category of artistic production characterized by similariti.docx
laquandabignell
 
Geert Hofstede is one of the leading experts on intercultural commun.docx
Geert Hofstede is one of the leading experts on intercultural commun.docxGeert Hofstede is one of the leading experts on intercultural commun.docx
Geert Hofstede is one of the leading experts on intercultural commun.docx
laquandabignell
 
Gen499Discussion #1 Examine the relationship between adva.docx
Gen499Discussion #1 Examine the relationship between adva.docxGen499Discussion #1 Examine the relationship between adva.docx
Gen499Discussion #1 Examine the relationship between adva.docx
laquandabignell
 

More from laquandabignell (20)

Give an example of a parent conference to explain to the parents the.docx
Give an example of a parent conference to explain to the parents the.docxGive an example of a parent conference to explain to the parents the.docx
Give an example of a parent conference to explain to the parents the.docx
 
Gender and sexuality are intertwined in many cultures. (Gardiner & K.docx
Gender and sexuality are intertwined in many cultures. (Gardiner & K.docxGender and sexuality are intertwined in many cultures. (Gardiner & K.docx
Gender and sexuality are intertwined in many cultures. (Gardiner & K.docx
 
General Directions The length of the essay is roughly 750 words. .docx
General Directions The length of the essay is roughly 750 words. .docxGeneral Directions The length of the essay is roughly 750 words. .docx
General Directions The length of the essay is roughly 750 words. .docx
 
Give an example of technological innovation from the last two decade.docx
Give an example of technological innovation from the last two decade.docxGive an example of technological innovation from the last two decade.docx
Give an example of technological innovation from the last two decade.docx
 
Give A Description of the selected disorder (Identify the DSM di.docx
Give A Description of the selected disorder (Identify the DSM di.docxGive A Description of the selected disorder (Identify the DSM di.docx
Give A Description of the selected disorder (Identify the DSM di.docx
 
Generating Ideas for WritingWriting is a selection of words and .docx
Generating Ideas for WritingWriting is a selection of words and .docxGenerating Ideas for WritingWriting is a selection of words and .docx
Generating Ideas for WritingWriting is a selection of words and .docx
 
Geography Project – Rationale InstructionsYou will identify a .docx
Geography Project – Rationale InstructionsYou will identify a .docxGeography Project – Rationale InstructionsYou will identify a .docx
Geography Project – Rationale InstructionsYou will identify a .docx
 
Geography Project – Project Plan InstructionsFollowing your Module.docx
Geography Project – Project Plan InstructionsFollowing your Module.docxGeography Project – Project Plan InstructionsFollowing your Module.docx
Geography Project – Project Plan InstructionsFollowing your Module.docx
 
Geographic LocationThey are found throughout the Pacific, Atlan.docx
Geographic LocationThey are found throughout the Pacific, Atlan.docxGeographic LocationThey are found throughout the Pacific, Atlan.docx
Geographic LocationThey are found throughout the Pacific, Atlan.docx
 
Geographers have been working with geographic information systems (G.docx
Geographers have been working with geographic information systems (G.docxGeographers have been working with geographic information systems (G.docx
Geographers have been working with geographic information systems (G.docx
 
General Moters was selected for week 2.Find the company select.docx
General Moters was selected for week 2.Find the company select.docxGeneral Moters was selected for week 2.Find the company select.docx
General Moters was selected for week 2.Find the company select.docx
 
Geography Project – Outline InstructionsReferencing the Geograph.docx
Geography Project – Outline InstructionsReferencing the Geograph.docxGeography Project – Outline InstructionsReferencing the Geograph.docx
Geography Project – Outline InstructionsReferencing the Geograph.docx
 
give a general historical background on CongoWhich European Count.docx
give a general historical background on CongoWhich European Count.docxgive a general historical background on CongoWhich European Count.docx
give a general historical background on CongoWhich European Count.docx
 
Geneticists compare DNA base sequences among organisms and from th.docx
Geneticists compare DNA base sequences among organisms and from th.docxGeneticists compare DNA base sequences among organisms and from th.docx
Geneticists compare DNA base sequences among organisms and from th.docx
 
Gene A crosses over 16.5 percent of the time with gene B. Gene B c.docx
Gene A crosses over 16.5 percent of the time with gene B. Gene B c.docxGene A crosses over 16.5 percent of the time with gene B. Gene B c.docx
Gene A crosses over 16.5 percent of the time with gene B. Gene B c.docx
 
Generations in the WorkplaceFor the first time in history, four .docx
Generations in the WorkplaceFor the first time in history, four .docxGenerations in the WorkplaceFor the first time in history, four .docx
Generations in the WorkplaceFor the first time in history, four .docx
 
geo 101 Q&A1. We see may cultures disappearing today. Will there c.docx
geo 101 Q&A1. We see may cultures disappearing today. Will there c.docxgeo 101 Q&A1. We see may cultures disappearing today. Will there c.docx
geo 101 Q&A1. We see may cultures disappearing today. Will there c.docx
 
Genre, a category of artistic production characterized by similariti.docx
Genre, a category of artistic production characterized by similariti.docxGenre, a category of artistic production characterized by similariti.docx
Genre, a category of artistic production characterized by similariti.docx
 
Geert Hofstede is one of the leading experts on intercultural commun.docx
Geert Hofstede is one of the leading experts on intercultural commun.docxGeert Hofstede is one of the leading experts on intercultural commun.docx
Geert Hofstede is one of the leading experts on intercultural commun.docx
 
Gen499Discussion #1 Examine the relationship between adva.docx
Gen499Discussion #1 Examine the relationship between adva.docxGen499Discussion #1 Examine the relationship between adva.docx
Gen499Discussion #1 Examine the relationship between adva.docx
 

Recently uploaded

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 

Recently uploaded (20)

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 

you have to respond to bellow paper I also give example of someo.docx

  • 1. you have to respond to bellow paper I also give example of someone who already rrspond to Baker Baker Post Data becomes useful information when it is provided with context. A single piece of data is useless without being included with a way to relate that data to something else. For instance, a number by itself means nothing without some type of context applied to it. Boyle gives this example: “Take the number 37…now give it some context: 37 degrees C is normal body temperature” (Boyle, 2011). The number by itself is merely a data point, but when provided context it becomes a useful piece of information that can be put to use. However, as our society has become so reliant on the internet, data is often pushed out instantly without any chance to provide a true context to the situation. There have been an unprecedented amount of controversial situations in recent memory that were brought to public attention without proper context being provided. This has the effect of allowing the public to form opinions without all the information necessary to have a truly informed opinion. Fayoyin and Ngwainmbi wrote, “Data and social statistics have been misinterpreted and misrepresented causing major misinformation within interpersonal and mass communication” (Fayoyin and Ngwainmbi, 2014). This is a problem that has been constant for a long time but has only been made significantly worse with the emergence of social media. A primary source is an original document or source of some kind. If the source of information is an eyewitness or
  • 2. you get the information directly from an expert in a given field it would be considered a primary source. An example would be an autobiography as an individual is writing about their experiences first hand. A secondary source is when the information is derived from someone who was either told about or heard about the information from the primary source. A good example for a secondary source would be a biography that either takes the information from the individual themselves or from things they have written. For my paper I have found a primary source that was written by one of the most wanted hackers of all time: Kevin Mitnick titled Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online. Mitnick here gives a common example of how hackers today are able to ensure they cover their tracks and are not detected, at least with any certainty. Another primary source I will use was written by Richard Hummel from the SANS Institute who wrote a paper entitled, Securing Against the Most Common Vectors o Cyber Attacks. A secondary source that I will be utilizing is one that discusses many of the biggest known cyber attacks written by Bruce Middleton titled A History of Cyber Security Attacks: 1980 to Present. 1. Boyle, Rebecca. Data Harmony: How We Can Turn Piles of Raw Data into Usable Knowledge, https://www.popsci.com/science/article/2011-11/turning-raw- data-useful-ingredients (Accessed 27 June 2018) 2. Fayoyin, Adebayo and Ngwainmbi, Emmanuel. Use and Misuse of Data in Advocacy, Media and Opinion Polls in
  • 3. Africa: Realities, Challenges and Opportunities, https://www.ajol.info/index.php/jdcs/article/view/112465/10221 6 (Accessed 27 June 2018) 3. Hummel, Richard. Securing Against the Most Common Vectors of Cyber Attacks, https://www.sans.org/reading- Example of someone who response to Baker post enjoyed reading your statement in regard on when data can become usable. I do agree with you a single data with no access for dissemination does not provide a chance for others to dispute data validity. Data with no verification is just data that it cannot be use. Last year during US senator’s election many television outlets started informing the audience unverified information on the news and after too many allegations many of those candidates just decided to drop their names from the list of participants even if they only had the best intention to serve their communities. The Television news that it supposed to report after information has been verified. Hackers do the same when they get a hold a new phone number usually they start calling to phishing for verifying to whom belongs the phone number and try to get as much information as possible for them to used data for future attack or financial gain. Great primary source for your paper, I am sure you will do well. Thanks for
  • 4. sharing your ideas. Our country remains divided in so many issues like some states approving drugs into their states with the idea to build revenue for their states on behaves of the youth. Many senators openly promotes approving marihuana in their states. We have at least 11 states who openly proclaims to be openly to try into their states and we are glad that the majority of people are against this idea. The news outlets needs to become more responsible in telling the people the truth in regards how drugs is affecting our way of life and the future of our teens. **** Please response to Baker ****