5.1

1. ( three benefits and effects )

Benefical effects: The Increase of productivity and efficiency in many industries.

Harmful effects: The loss of jobs and automation of certain occupations.

Benefical effects: Improved communication and connectivity around the globe.

Harmful effects: The Increase of dependence on technology and potential loss of privacy.

Benefical effects: Improved access to education and information through the internet.

Harmful effects: The Spread of misinformation and the erosion of critical thinking skills.

2.

Whats the problem with Dopamine? Well having too much dopmaine is not good for you because it is linked to being more competitive, aggressive and having poor impulse control. It can also lead to conditions that include ADHD, binge eating, and addiction. It is not a parent conspiracy, Dopamine is a real neurotransmitter. Dopamine imbalances can be caused by genetic or environmental factors, such as drug use or certain medical conditions. For me personal I don’t find an issue with dopmaine but I know some people who do which leads to them not paying attention and hard time staying focused.

5.2

1.

Learn about technology: Understanding how technology works and how to use it effectively can give you more control over your digital life.

Get involved in online communities: Joining online communities that share your interests can be a great way to connect with like-minded people and learn new things.

Learn how to code: Understanding how to code can give you more control over the technology you use and enable you to create your own digital tools and apps.

2.

Share knowledge and resources: Offer guidance and provide resources that can help the person gain the skills and knowledge they need to become more empowered.

Provide mentorship: Offer support and guidance as the person navigates the digital world.

Offer technical assistance: Provide hands-on help with setting up accounts, using software, or troubleshooting problems.

3.

paper-based systems and bureaucracy can be a barrier to digital empowerment. Say For example, if a government or organization still relies heavily on paper-based systems, it can make it difficult for citizens or employees to access services or information digitally. This can be due to a lack of digitization of official documents, or not having the infrastructure for digital systems.

Additionally, in some countries or regions with restricted internet access, lack of infrastructure, or government censorship can also be a barrier to digital empowerment.

5.3

Intentional or Purposeful bias

HP Computers are racist

5.4

Describe a crowdsource idea and how you might initiate it in our environment?

What about Del Norte crowdsourcing? Could your project be better with crowdsourcing?

What kind of data could you capture at N@tM to make evening interesting?

5.5

  1. There are several types of open-source licenses, and choosing the right one can have a significant impact on how your code is used and what others are able to do with it. Here are some of the most popular open-source licenses;
    • MIT License: The MIT License is one of the most permissive open-source licenses. It allows others to use, modify, and distribute your code for any purpose, as long as they include a copy of the license and preserve the copyright notice.

    • Apache License 2.0: The Apache License 2.0 is a more restrictive license than the MIT License. It requires that users of your code include a copy of the license, preserve the copyright notice, and state any changes they have made to your code.

    • GNU General Public License (GPL): The GPL is a copyleft license, meaning that derivative works must also be released under the GPL. This means that if someone uses your code to create a new project, they must also open source that project under the GPL.

    • BSD 3-Clause License: The BSD 3-Clause License is similar to the MIT License but has some additional restrictions. For example, it requires that users of your code include a copy of the license and preserve the copyright notice.

  2. The text discusses the impact of software licenses, specifically the General Public License (GPL), on businesses like Qualcomm. The GPL requires any derivative work to be free and open source, which could potentially void a company’s rights to charge for software and patents. The author highlights the importance of knowing the type of software license one is using, as it could have a significant impact on business. The text mentions different types of licenses, including the Creative Commons Zero v1.0 Universal, Open Source MIT License, and Open Source GPL License. The author discusses the requirement to comply with the terms of licenses and the need to cite sources. The text also touches on the concept of Digital Rights Management (DRM) and the challenge of understanding the impact of Creative Commons licenses on individuals and businesses.

  3. I am going to keep the apache license 2.0 because its A permissive license whose main conditions require preservation of copyright and license notices. Contributors provide an express grant of patent rights. Licensed works, modifications, and larger works may be distributed under different terms and without source code. This works for me. For my Group’s license we used the MIT license because its free to us first of all, also the Permissions is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files, to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

5.6

  1. Phone number Email address Date of birth Full name

  2. I think that The protection of PII is an important issue and it’s important to take appropriate measures to secure personal information and prevent unauthorized access, use, or disclosure. It is very important to keep the right information disclosed and not able to be seen.

  3. Good Passwords:
    • Length: A minimum length of 12 characters or more. Complexity: A mix of uppercase and lowercase letters, numbers, and special characters is ideal. Uniqueness: The password should not be a word found in a dictionary or a commonly used password.

    Bad Passwords

    • Length: Short passwords that are less than 8 characters are easily guessable. Simplicity: Passwords that are just a word or a simple combination of words (“password123”) are easily crackable. Predictability: Passwords that are based on easily accessible personal information (name, birthdate, address) are also not secure.
  4. Symmetric encryption, also known as shared secret encryption, uses a single key to encrypt and decrypt the data. In this type of encryption, both the sender and the receiver have the same key, and this key is used to encrypt the data before transmission and decrypt the data upon receipt. The key must be kept confidential and must be securely exchanged between the sender and the receiver before any data transmission can occur.

  5. AWS Key Management Service (KMS) managed keys: With KMS, you can create, manage, and use encryption keys to encrypt your data in AWS services. KMS provides a highly available key management service that makes it easy to create, rotate, and manage encryption keys used to encrypt data at rest.

  6. one phishing technique is called “spear phishing,” where the attacker targets a specific individual or group with a personalized email that is designed to trick the recipient into divulging sensitive information. The email may contain personal information about the recipient, such as their name, job title, or interests, in an attempt to build trust and convince them to take the desired action.