Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: Business Intelligence, Mobile payments, Mobile advertising and Personalisation

Assume that you are the developer of mobile phone application.

A) List all the mobile payments you know (e.g. credit card, Vouchers, PayPal, fingerprint,….) and describe how each of them they work and what you need to do as an application developer to be able to use them.

B) How would you personalise the application to the individual users? And why?

C) What would be your strategy to advertise for your app? Content, where, when and why?

D) How can you include external advertising in your mobile phone app? Where do you get the ads from and under what criteria - be precise?

E) How would you use business intelligence and data mining for your application? Be precise

problem 2: Security

A) describe the terms‘physical security’, ‘information security’ and ‘security management’

B) The three (3) basic principles for security are Confidentiality, Integrity and Availability.

i) Define what Confidentiality; describe why it is important for security and how would this be implemented (What technology(ies) can be used)?

ii) Define what Integrity; describe why it is important for security and how would this be implemented (What technology(ies) can be used)?

iii) Define what Availability; describe why it is important for security and how would this be implemented (What technology(ies) can be used)?

C) Phishing and Spear Phishing:

i) Describe a scenario for each

ii) In what way(s) can phishing be reduced?

iii) How might an online company protect their customers from phishing attacks?

iv) What is a vertical handover?

v) What is a horizontal handover?

vi) Give a list (as complete as possible) of what needs to be managed during a handover.

problem 3: Ubiquitous Computing – Smart Devices

a) What is a WLAN and describe the technologiesto implement it in 2009.

b) What is a WPAN and describe the technologiesto implement it in 2009.

c) Illustrate the combined useof WLANs and WPANs (Not WAN) in a scenario where you commutefrom your home to the office in 2020. Choose the way you want to commute (walk, cycle, train, bus …) and use a smart object to have access to 3 different ‘futuristic’ services using WLAN and/or WPAN. Include at least one service that is used by several persons at the same time.

d) For each of the 3 services presented in problem C, describe how it works in technical terms and justify the technologies chosen.

e) Focus now on the smart object you used in problem C. Whatwill be the impact (positive and negative) of that smart object on your daily life and your privacy?

f) Provide possible solutions to avoid the negative impacts.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91147

Have any Question?


Related Questions in Computer Engineering

1 investment risk and default risk are interchangeable

1. Investment risk and default risk are interchangeable terms and essentially mean the same thing.   2. Disadvantages of the Capital Asset Pricing Model include that you are using the past to predict the future and that ...

Sql transactions exercisesperform the test for the

SQL Transactions Exercises Perform the test for the non-additive join property (lossless join) for the relation R(A 1 , A 2 , A 3 , A 4 , A 5 ), and the decompositions D a , D b , D c , D d  and set of functional depende ...

Create login form to enter user name and a password textbox

Create login form to enter user name and a password textbox to enter password, and write procedure to simulate the process of triggering the login process after hitting the Enter Key.

Question suppose you have created a program that creates

Question : Suppose you have created a program that creates instances of different types of cars. Now you are creating a program that keeps track of different types of cars. Choose the abstract classes and concrete classe ...

Subject digital securityprovide an fidm authentication

Subject : Digital Security Provide an FIdM authentication system that you have used (being subjet to). Tell the name of the organizations acted as the IdP (Identity Provider) and SP (Service Provider)?

Suppose the information content of a packet is the ascii

Suppose the information content of a packet is the ASCII (8-bit code) representation of "OK" and an even parity scheme is being used. What would the value of the field containing the parity bits be for the case of a two- ...

Analytic reportpurpose the purpose of this task is to

Analytic Report: Purpose: The purpose of this task is to provide students with practical experience in working in teams to write a Data Analytical report to provide useful insights, pattern and trends in the chosen/given ...

What is the current balance of trade for the united states

What is the current balance of trade for the United States? Has this balance been increasing or decreasing? Based on the current economic conditions, how do you think this balance will move in the near future, and why?

Qnbspvirtualbox aside what steps do you think are required

Q) VirtualBox aside, what steps do you think are required if we bought a brand new drive and plugged it into our system internally? a. Internally / externally, does it matter? b. If we plug it into the system, will it ju ...

Suppose that a data warehouse consists of the four

Suppose that a data warehouse consists of the four dimensions date, spectator, location, and game, and the two measures count and charge, where charge is the fare that a spectator pays when watching a game on a given dat ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As