SlideShare a Scribd company logo
1 of 2
there are 6 questions. Answer in question format not a paper.
Example Question 1 answer
Question 2 answer....
And so on
1. Describe the intricacies of planning for a Windows Media
Services deployment and how the process would differ between
a highly secure installation versus an enterprise without highly
sensitive data to protect, but a need for quick collaboration with
widely varying clients
2. Discuss SharePoint services and various SharePoint options
as well as Windows Media Rights Management to handle the
requirements of different enterprise scenarios, such as one that
requires the use of quick collaboration and the use of video
resource-sharing vs. the needs of collaboration between a
geographically diverse workgroup needing to share sensitive
files and monitor file access and changes.
3. take a position on whether the Windows Media Right
Management (DRM) is similar to the Public Key Infrastructure
(PKI) in server 2008.
4. In January 2012, the U.S. court put the Megaupload site
offline after an operation led by the FBI authorities accused
Megaupload, a site that lets you store files online, of violating
copyright laws and facilitating piracy. At the same time,
YouTube, a similar site, is protected from shutdown and
lawsuits by the "Safe Harbor" provision of the Digital
Millenium Copyright Act. It states that a host is not responsible
for copyrighted materials uploaded by users as long as they can
be taken down when requested by the copyright holders. Take a
stance on the U.S. authorities’ decision and discuss the ethical
concerns of copyrighted materials online. State if this shutdown
will help deter piracy and why YouTube should or should not be
shut down.
5. Imagine you are an administrator for a large corporation that
has just purchased a new company. To access some of the HR
resources, a Website was created. Discuss the manner in which
you can use the purchased company’s usernames and passwords
to provide authentication and authorization to the parent
Website. The goal is to allow employees from the new company
to use their own user account and password to access the new
Website.
6. Using the scenario from question (5) of this discussion,
suppose an additional Website was created that will be used to
input confidential information by users. Your task is to ensure
that when data is entered by the user and sent to the Web server,
the data that is sent over the network is encrypted. Recommend
the approach you would use to secure this information.
Additionally, provide specifics on the manner in which digital
certificates are used in encrypting the data.

More Related Content

Similar to there are 6 questions. Answer in question format not a paper.Examp.docx

Privacy in computing & interlectual property
Privacy in computing & interlectual propertyPrivacy in computing & interlectual property
Privacy in computing & interlectual propertyMutongole Benjamin Benjamin
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYcscpconf
 
Why Portability matters (full presentation)
Why Portability matters (full presentation)Why Portability matters (full presentation)
Why Portability matters (full presentation)Ian Forrester
 
1 3Financial Service Security EngagementLearning Team .docx
1     3Financial Service Security EngagementLearning Team .docx1     3Financial Service Security EngagementLearning Team .docx
1 3Financial Service Security EngagementLearning Team .docxoswald1horne84988
 
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...David Sweigert
 
Paper 3 Draft 3
Paper 3 Draft 3Paper 3 Draft 3
Paper 3 Draft 3Utphala P
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_finalnykobap01
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docxjoyjonna282
 
A2 Media Essay Examples
A2 Media Essay ExamplesA2 Media Essay Examples
A2 Media Essay ExamplesBrenda Lopez
 
A2 Media Essay Examples. Online assignment writing service.
A2 Media Essay Examples. Online assignment writing service.A2 Media Essay Examples. Online assignment writing service.
A2 Media Essay Examples. Online assignment writing service.Ashley Hernandez
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...anthonywong
 
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxRunning head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxtodd271
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?Aparna Sharma
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docxambersalomon88660
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rightsSomerco Research
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is CloudWilliam Lam
 

Similar to there are 6 questions. Answer in question format not a paper.Examp.docx (20)

Privacy in computing & interlectual property
Privacy in computing & interlectual propertyPrivacy in computing & interlectual property
Privacy in computing & interlectual property
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEY
 
Moral And Ethics
Moral And EthicsMoral And Ethics
Moral And Ethics
 
Why Portability matters (full presentation)
Why Portability matters (full presentation)Why Portability matters (full presentation)
Why Portability matters (full presentation)
 
1 3Financial Service Security EngagementLearning Team .docx
1     3Financial Service Security EngagementLearning Team .docx1     3Financial Service Security EngagementLearning Team .docx
1 3Financial Service Security EngagementLearning Team .docx
 
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
Understanding the Computer Abuse and Data Recovery Act, Fla.Stat. §668.801 (“...
 
Paper 3 Draft 3
Paper 3 Draft 3Paper 3 Draft 3
Paper 3 Draft 3
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
 
Cloud
CloudCloud
Cloud
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 
A2 Media Essay Examples
A2 Media Essay ExamplesA2 Media Essay Examples
A2 Media Essay Examples
 
A2 Media Essay Examples. Online assignment writing service.
A2 Media Essay Examples. Online assignment writing service.A2 Media Essay Examples. Online assignment writing service.
A2 Media Essay Examples. Online assignment writing service.
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
 
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxRunning head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 

More from susannr

Theory Into Practice Four Social Work Case Studies In this co.docx
Theory Into Practice Four Social Work Case Studies In this co.docxTheory Into Practice Four Social Work Case Studies In this co.docx
Theory Into Practice Four Social Work Case Studies In this co.docxsusannr
 
Theory applied to informatics – Novice to Expertcjni.netjou.docx
Theory applied to informatics – Novice to Expertcjni.netjou.docxTheory applied to informatics – Novice to Expertcjni.netjou.docx
Theory applied to informatics – Novice to Expertcjni.netjou.docxsusannr
 
Theorizing LeadershipTrait Theory- how tall someone is, hair, .docx
Theorizing LeadershipTrait Theory- how tall someone is, hair, .docxTheorizing LeadershipTrait Theory- how tall someone is, hair, .docx
Theorizing LeadershipTrait Theory- how tall someone is, hair, .docxsusannr
 
THEORY & REVIEWTHEORIZING THE DIGITAL OBJECT1Philip Fa.docx
THEORY & REVIEWTHEORIZING THE DIGITAL OBJECT1Philip Fa.docxTHEORY & REVIEWTHEORIZING THE DIGITAL OBJECT1Philip Fa.docx
THEORY & REVIEWTHEORIZING THE DIGITAL OBJECT1Philip Fa.docxsusannr
 
Theory Analysis Assignment this assignment is another interview…but.docx
Theory Analysis Assignment this assignment is another interview…but.docxTheory Analysis Assignment this assignment is another interview…but.docx
Theory Analysis Assignment this assignment is another interview…but.docxsusannr
 
Theory and the White-Collar OffenderOur previous week’s disc.docx
Theory and the White-Collar OffenderOur previous week’s disc.docxTheory and the White-Collar OffenderOur previous week’s disc.docx
Theory and the White-Collar OffenderOur previous week’s disc.docxsusannr
 
Theory & Research in Social Education, 44 565–607, 2016Copy.docx
Theory & Research in Social Education, 44 565–607, 2016Copy.docxTheory & Research in Social Education, 44 565–607, 2016Copy.docx
Theory & Research in Social Education, 44 565–607, 2016Copy.docxsusannr
 
THEO 650 Book Review Grading RubricCriteriaLevels of Achieveme.docx
THEO 650 Book Review Grading RubricCriteriaLevels of Achieveme.docxTHEO 650 Book Review Grading RubricCriteriaLevels of Achieveme.docx
THEO 650 Book Review Grading RubricCriteriaLevels of Achieveme.docxsusannr
 
Theories of Poverty DiscussionTheories explain phenomena and pre.docx
Theories of Poverty DiscussionTheories explain phenomena and pre.docxTheories of Poverty DiscussionTheories explain phenomena and pre.docx
Theories of Poverty DiscussionTheories explain phenomena and pre.docxsusannr
 
Theories help frame more than presenting problems—they also frame so.docx
Theories help frame more than presenting problems—they also frame so.docxTheories help frame more than presenting problems—they also frame so.docx
Theories help frame more than presenting problems—they also frame so.docxsusannr
 
Theories of LeadershipInstructionsWrite a 4–5 page paper.docx
Theories of LeadershipInstructionsWrite a 4–5 page paper.docxTheories of LeadershipInstructionsWrite a 4–5 page paper.docx
Theories of LeadershipInstructionsWrite a 4–5 page paper.docxsusannr
 
Theories in SociologyAssignment OverviewThis writing assignm.docx
Theories in SociologyAssignment OverviewThis writing assignm.docxTheories in SociologyAssignment OverviewThis writing assignm.docx
Theories in SociologyAssignment OverviewThis writing assignm.docxsusannr
 
Theories of LeadershipMany schools of thought have developed t.docx
Theories of LeadershipMany schools of thought have developed t.docxTheories of LeadershipMany schools of thought have developed t.docx
Theories of LeadershipMany schools of thought have developed t.docxsusannr
 
THEORIES OF INTELLECTUAL DEVELOPMENTPiaget’s TheoryWe begin wi.docx
THEORIES OF INTELLECTUAL DEVELOPMENTPiaget’s TheoryWe begin wi.docxTHEORIES OF INTELLECTUAL DEVELOPMENTPiaget’s TheoryWe begin wi.docx
THEORIES OF INTELLECTUAL DEVELOPMENTPiaget’s TheoryWe begin wi.docxsusannr
 
Theories of Maladaptive BehaviorLocate at least two peer-rev.docx
Theories of Maladaptive BehaviorLocate at least two peer-rev.docxTheories of Maladaptive BehaviorLocate at least two peer-rev.docx
Theories of Maladaptive BehaviorLocate at least two peer-rev.docxsusannr
 
Theories help frame more than presenting problems—they also fram.docx
Theories help frame more than presenting problems—they also fram.docxTheories help frame more than presenting problems—they also fram.docx
Theories help frame more than presenting problems—they also fram.docxsusannr
 
THEORETICAL REVIEW Please read through these extensive assignmen.docx
THEORETICAL REVIEW Please read through these extensive assignmen.docxTHEORETICAL REVIEW Please read through these extensive assignmen.docx
THEORETICAL REVIEW Please read through these extensive assignmen.docxsusannr
 
Theoretical Medicine & Bioethics, 35, 31-42. To Treat a Psyc.docx
Theoretical Medicine & Bioethics, 35, 31-42. To Treat a Psyc.docxTheoretical Medicine & Bioethics, 35, 31-42. To Treat a Psyc.docx
Theoretical Medicine & Bioethics, 35, 31-42. To Treat a Psyc.docxsusannr
 
THEORETICAL FRAMEWORK FOR A FAMILY AND PALLIATIVE NURS.docx
THEORETICAL FRAMEWORK FOR A FAMILY AND PALLIATIVE NURS.docxTHEORETICAL FRAMEWORK FOR A FAMILY AND PALLIATIVE NURS.docx
THEORETICAL FRAMEWORK FOR A FAMILY AND PALLIATIVE NURS.docxsusannr
 
Theoretical PerspectivesSince Childrens Literature is written f.docx
Theoretical PerspectivesSince Childrens Literature is written f.docxTheoretical PerspectivesSince Childrens Literature is written f.docx
Theoretical PerspectivesSince Childrens Literature is written f.docxsusannr
 

More from susannr (20)

Theory Into Practice Four Social Work Case Studies In this co.docx
Theory Into Practice Four Social Work Case Studies In this co.docxTheory Into Practice Four Social Work Case Studies In this co.docx
Theory Into Practice Four Social Work Case Studies In this co.docx
 
Theory applied to informatics – Novice to Expertcjni.netjou.docx
Theory applied to informatics – Novice to Expertcjni.netjou.docxTheory applied to informatics – Novice to Expertcjni.netjou.docx
Theory applied to informatics – Novice to Expertcjni.netjou.docx
 
Theorizing LeadershipTrait Theory- how tall someone is, hair, .docx
Theorizing LeadershipTrait Theory- how tall someone is, hair, .docxTheorizing LeadershipTrait Theory- how tall someone is, hair, .docx
Theorizing LeadershipTrait Theory- how tall someone is, hair, .docx
 
THEORY & REVIEWTHEORIZING THE DIGITAL OBJECT1Philip Fa.docx
THEORY & REVIEWTHEORIZING THE DIGITAL OBJECT1Philip Fa.docxTHEORY & REVIEWTHEORIZING THE DIGITAL OBJECT1Philip Fa.docx
THEORY & REVIEWTHEORIZING THE DIGITAL OBJECT1Philip Fa.docx
 
Theory Analysis Assignment this assignment is another interview…but.docx
Theory Analysis Assignment this assignment is another interview…but.docxTheory Analysis Assignment this assignment is another interview…but.docx
Theory Analysis Assignment this assignment is another interview…but.docx
 
Theory and the White-Collar OffenderOur previous week’s disc.docx
Theory and the White-Collar OffenderOur previous week’s disc.docxTheory and the White-Collar OffenderOur previous week’s disc.docx
Theory and the White-Collar OffenderOur previous week’s disc.docx
 
Theory & Research in Social Education, 44 565–607, 2016Copy.docx
Theory & Research in Social Education, 44 565–607, 2016Copy.docxTheory & Research in Social Education, 44 565–607, 2016Copy.docx
Theory & Research in Social Education, 44 565–607, 2016Copy.docx
 
THEO 650 Book Review Grading RubricCriteriaLevels of Achieveme.docx
THEO 650 Book Review Grading RubricCriteriaLevels of Achieveme.docxTHEO 650 Book Review Grading RubricCriteriaLevels of Achieveme.docx
THEO 650 Book Review Grading RubricCriteriaLevels of Achieveme.docx
 
Theories of Poverty DiscussionTheories explain phenomena and pre.docx
Theories of Poverty DiscussionTheories explain phenomena and pre.docxTheories of Poverty DiscussionTheories explain phenomena and pre.docx
Theories of Poverty DiscussionTheories explain phenomena and pre.docx
 
Theories help frame more than presenting problems—they also frame so.docx
Theories help frame more than presenting problems—they also frame so.docxTheories help frame more than presenting problems—they also frame so.docx
Theories help frame more than presenting problems—they also frame so.docx
 
Theories of LeadershipInstructionsWrite a 4–5 page paper.docx
Theories of LeadershipInstructionsWrite a 4–5 page paper.docxTheories of LeadershipInstructionsWrite a 4–5 page paper.docx
Theories of LeadershipInstructionsWrite a 4–5 page paper.docx
 
Theories in SociologyAssignment OverviewThis writing assignm.docx
Theories in SociologyAssignment OverviewThis writing assignm.docxTheories in SociologyAssignment OverviewThis writing assignm.docx
Theories in SociologyAssignment OverviewThis writing assignm.docx
 
Theories of LeadershipMany schools of thought have developed t.docx
Theories of LeadershipMany schools of thought have developed t.docxTheories of LeadershipMany schools of thought have developed t.docx
Theories of LeadershipMany schools of thought have developed t.docx
 
THEORIES OF INTELLECTUAL DEVELOPMENTPiaget’s TheoryWe begin wi.docx
THEORIES OF INTELLECTUAL DEVELOPMENTPiaget’s TheoryWe begin wi.docxTHEORIES OF INTELLECTUAL DEVELOPMENTPiaget’s TheoryWe begin wi.docx
THEORIES OF INTELLECTUAL DEVELOPMENTPiaget’s TheoryWe begin wi.docx
 
Theories of Maladaptive BehaviorLocate at least two peer-rev.docx
Theories of Maladaptive BehaviorLocate at least two peer-rev.docxTheories of Maladaptive BehaviorLocate at least two peer-rev.docx
Theories of Maladaptive BehaviorLocate at least two peer-rev.docx
 
Theories help frame more than presenting problems—they also fram.docx
Theories help frame more than presenting problems—they also fram.docxTheories help frame more than presenting problems—they also fram.docx
Theories help frame more than presenting problems—they also fram.docx
 
THEORETICAL REVIEW Please read through these extensive assignmen.docx
THEORETICAL REVIEW Please read through these extensive assignmen.docxTHEORETICAL REVIEW Please read through these extensive assignmen.docx
THEORETICAL REVIEW Please read through these extensive assignmen.docx
 
Theoretical Medicine & Bioethics, 35, 31-42. To Treat a Psyc.docx
Theoretical Medicine & Bioethics, 35, 31-42. To Treat a Psyc.docxTheoretical Medicine & Bioethics, 35, 31-42. To Treat a Psyc.docx
Theoretical Medicine & Bioethics, 35, 31-42. To Treat a Psyc.docx
 
THEORETICAL FRAMEWORK FOR A FAMILY AND PALLIATIVE NURS.docx
THEORETICAL FRAMEWORK FOR A FAMILY AND PALLIATIVE NURS.docxTHEORETICAL FRAMEWORK FOR A FAMILY AND PALLIATIVE NURS.docx
THEORETICAL FRAMEWORK FOR A FAMILY AND PALLIATIVE NURS.docx
 
Theoretical PerspectivesSince Childrens Literature is written f.docx
Theoretical PerspectivesSince Childrens Literature is written f.docxTheoretical PerspectivesSince Childrens Literature is written f.docx
Theoretical PerspectivesSince Childrens Literature is written f.docx
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

there are 6 questions. Answer in question format not a paper.Examp.docx

  • 1. there are 6 questions. Answer in question format not a paper. Example Question 1 answer Question 2 answer.... And so on 1. Describe the intricacies of planning for a Windows Media Services deployment and how the process would differ between a highly secure installation versus an enterprise without highly sensitive data to protect, but a need for quick collaboration with widely varying clients 2. Discuss SharePoint services and various SharePoint options as well as Windows Media Rights Management to handle the requirements of different enterprise scenarios, such as one that requires the use of quick collaboration and the use of video resource-sharing vs. the needs of collaboration between a geographically diverse workgroup needing to share sensitive files and monitor file access and changes. 3. take a position on whether the Windows Media Right Management (DRM) is similar to the Public Key Infrastructure (PKI) in server 2008. 4. In January 2012, the U.S. court put the Megaupload site offline after an operation led by the FBI authorities accused Megaupload, a site that lets you store files online, of violating copyright laws and facilitating piracy. At the same time, YouTube, a similar site, is protected from shutdown and lawsuits by the "Safe Harbor" provision of the Digital Millenium Copyright Act. It states that a host is not responsible for copyrighted materials uploaded by users as long as they can be taken down when requested by the copyright holders. Take a stance on the U.S. authorities’ decision and discuss the ethical
  • 2. concerns of copyrighted materials online. State if this shutdown will help deter piracy and why YouTube should or should not be shut down. 5. Imagine you are an administrator for a large corporation that has just purchased a new company. To access some of the HR resources, a Website was created. Discuss the manner in which you can use the purchased company’s usernames and passwords to provide authentication and authorization to the parent Website. The goal is to allow employees from the new company to use their own user account and password to access the new Website. 6. Using the scenario from question (5) of this discussion, suppose an additional Website was created that will be used to input confidential information by users. Your task is to ensure that when data is entered by the user and sent to the Web server, the data that is sent over the network is encrypted. Recommend the approach you would use to secure this information. Additionally, provide specifics on the manner in which digital certificates are used in encrypting the data.