Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: Business Intelligence, Mobile payments, Mobile advertising and Personalisation

Assume that you are the developer of mobile phone application.

A) List all the mobile payments you know (e.g. credit card, Vouchers, PayPal, fingerprint,….) and describe how each of them they work and what you need to do as an application developer to be able to use them.

B) How would you personalise the application to the individual users? And why?

C) What would be your strategy to advertise for your app? Content, where, when and why?

D) How can you include external advertising in your mobile phone app? Where do you get the ads from and under what criteria - be precise?

E) How would you use business intelligence and data mining for your application? Be precise

problem 2: Security

A) describe the terms‘physical security’, ‘information security’ and ‘security management’

B) The three (3) basic principles for security are Confidentiality, Integrity and Availability.

i) Define what Confidentiality; describe why it is important for security and how would this be implemented (What technology(ies) can be used)?

ii) Define what Integrity; describe why it is important for security and how would this be implemented (What technology(ies) can be used)?

iii) Define what Availability; describe why it is important for security and how would this be implemented (What technology(ies) can be used)?

C) Phishing and Spear Phishing:

i) Describe a scenario for each

ii) In what way(s) can phishing be reduced?

iii) How might an online company protect their customers from phishing attacks?

iv) What is a vertical handover?

v) What is a horizontal handover?

vi) Give a list (as complete as possible) of what needs to be managed during a handover.

problem 3: Ubiquitous Computing – Smart Devices

a) What is a WLAN and describe the technologiesto implement it in 2009.

b) What is a WPAN and describe the technologiesto implement it in 2009.

c) Illustrate the combined useof WLANs and WPANs (Not WAN) in a scenario where you commutefrom your home to the office in 2020. Choose the way you want to commute (walk, cycle, train, bus …) and use a smart object to have access to 3 different ‘futuristic’ services using WLAN and/or WPAN. Include at least one service that is used by several persons at the same time.

d) For each of the 3 services presented in problem C, describe how it works in technical terms and justify the technologies chosen.

e) Focus now on the smart object you used in problem C. Whatwill be the impact (positive and negative) of that smart object on your daily life and your privacy?

f) Provide possible solutions to avoid the negative impacts.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91147

Have any Question? 


Related Questions in Computer Engineering

For this assignment you will be creating a package delivery

For this assignment, you will be creating a package delivery system. You need to think in terms of objects. The first object is the delivery truck that can store 50 liters of petrol. The cost per liter of petrol is 2.73$ ...

1 what is machine learning2 what is the relationship

1) What is machine learning? 2) What is the relationship between Machine Learning & Big Data? 3) Provide a few business cases where Machine Learning would help. (Extra credit) What are the different types of Machine Lear ...

1 discuss four access methods giving the weaknesses of

1. Discuss four access methods, giving the weaknesses of each. 2. Discuss the many ways in which access can be abused. 3. Is it possible to implement full distributed authorization? What will be involved? 4. Web authoriz ...

Using the web identify the chief information officer chief

Using the Web, identify the chief information officer, chief information security officer, and systems administrator for your school. Which of these individuals represents the data owner? Data custodian?

Note solving this problem is best done with use of

(Note: solving this problem is best done with use of probability through the level of Markov chains.) You are designing a computer system to control the power grid for the Northeastern United States. If your system goes ...

Enhancement of a low-contrast image take a 25cent coin scan

(Enhancement of a low-contrast image) Take a 25¢ coin; scan and digitize it to obtain a 512 x 512 image. a. Enhance it by a suitable contrast stretching transformation and compare it with histogram equalization. b. Perfo ...

1 what is the total execution time of this instruction

1. What is the total execution time of this instruction sequence without forwarding and with full forwarding? What is the speedup achieved by adding full forwarding to a pipeline that had no forwarding? 2. Add nop instru ...

1 study the history of the development of computer products

1. Study the history of the development of computer products security evaluation and suggest the reasons that led to the development of ISO-based CC. 2. Study and give the effects of ISO on a criterion. Does ISO affiliat ...

1 assume a private internet uses a protocol suite totally

1. Assume a private internet uses a protocol suite totally different from the TCP/ IP protocol suite. Can this internet still use the services of UDP or TCP as an end-to-end vehicle of message communication? 2. Can you e ...

In an 80211 network three stations a b and c are contending

In an 802.11 network, three stations (A, B, and C) are contending to access the medium. The contention window for each station has 31 slots. Station A randomly picks up the first slot; station B picks up the fifth slot; ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro