Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: Business Intelligence, Mobile payments, Mobile advertising and Personalisation

Assume that you are the developer of mobile phone application.

A) List all the mobile payments you know (e.g. credit card, Vouchers, PayPal, fingerprint,….) and describe how each of them they work and what you need to do as an application developer to be able to use them.

B) How would you personalise the application to the individual users? And why?

C) What would be your strategy to advertise for your app? Content, where, when and why?

D) How can you include external advertising in your mobile phone app? Where do you get the ads from and under what criteria - be precise?

E) How would you use business intelligence and data mining for your application? Be precise

problem 2: Security

A) describe the terms‘physical security’, ‘information security’ and ‘security management’

B) The three (3) basic principles for security are Confidentiality, Integrity and Availability.

i) Define what Confidentiality; describe why it is important for security and how would this be implemented (What technology(ies) can be used)?

ii) Define what Integrity; describe why it is important for security and how would this be implemented (What technology(ies) can be used)?

iii) Define what Availability; describe why it is important for security and how would this be implemented (What technology(ies) can be used)?

C) Phishing and Spear Phishing:

i) Describe a scenario for each

ii) In what way(s) can phishing be reduced?

iii) How might an online company protect their customers from phishing attacks?

iv) What is a vertical handover?

v) What is a horizontal handover?

vi) Give a list (as complete as possible) of what needs to be managed during a handover.

problem 3: Ubiquitous Computing – Smart Devices

a) What is a WLAN and describe the technologiesto implement it in 2009.

b) What is a WPAN and describe the technologiesto implement it in 2009.

c) Illustrate the combined useof WLANs and WPANs (Not WAN) in a scenario where you commutefrom your home to the office in 2020. Choose the way you want to commute (walk, cycle, train, bus …) and use a smart object to have access to 3 different ‘futuristic’ services using WLAN and/or WPAN. Include at least one service that is used by several persons at the same time.

d) For each of the 3 services presented in problem C, describe how it works in technical terms and justify the technologies chosen.

e) Focus now on the smart object you used in problem C. Whatwill be the impact (positive and negative) of that smart object on your daily life and your privacy?

f) Provide possible solutions to avoid the negative impacts.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91147

Have any Question? 


Related Questions in Computer Engineering

1 how many cycles does it take for all instructions in a

1. How many cycles does it take for all instructions in a single iteration of the above loop to execute? 2. When an instruction in a later iteration of a loop depends upon a data value produced in an earlier iteration of ...

For this project you will write a java program that allows

For this project, you will write a Java program that allows the user to select an animal from a menu and then display information about the animal. Create a new project in your IDE named "AnimalInfo." Create a class call ...

How do you select the primary key from the candidate keys

How do you select the primary key from the candidate keys? How do foreign keys relate to candidate keys? Provide examples from either your workplace or class assignments.

Why are system safety principles not used by all safety

Why are system safety principles not used by all safety professionals? Suggest some ways to overcome the obstacles to wider adoption of system safety. Your response must be at least 75 words in length

1 we would like to execute the loop below as efficiently as

1. We would like to execute the loop below as efficiently as possible. We have two different machines, a MIMD machine and a SIMD machine. 2. For a 4 CPU MIMD machine, show the sequence of MIPS instructions that you would ...

Application jurisdictional aspects of cybercrimeyou are

Application: Jurisdictional Aspects of Cybercrime You are using your wireless device to locate a restaurant. Suddenly, a large flashing skull-and-crossbones appears on your screen and a menacing laugh plays. Seconds late ...

Given is a dhke algorithm the modulus p has 1024 bit and

Given is a DHKE algorithm. The modulus p has 1024 bit and α is a generator of a subgroup where ord(α) ≈ 2160. 1. What is the maximum value that the private keys should have? 2. How long does the computation of the sessio ...

Consider the following problem descriptionemployees receive

Consider the following problem description: Employees receive their biweekly paychecks. They are paid their hourly rates for each hour worked; however, if they worked more than 40 hours per week, they are paid at 150 per ...

1 what is computer forensics when are the results of

1. What is computer forensics? When are the results of computer forensics used? 2. What is an after-action review? When is it performed? Why is it done? 3. List and describe the six continuity strategies identified in th ...

Individual expanded website planexpand your website

Individual: Expanded Website Plan Expand your website plan. Select at least three interactive features that could be added to your site. Identify the following: • What purpose would each feature serve for your site and i ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro