01_Intro-Foundations(ice)(002)
.pdf
keyboard_arrow_up
School
North Carolina State University *
*We aren’t endorsed by this school
Course
379
Subject
Computer Science
Date
Feb 20, 2024
Type
Pages
2
Uploaded by BaronMoon13381
CSC 379 Week 1 In-class Exercise, Section 002 Group members: (name & unity id printed clearly) Name Unity ID
*
*
Note that Unity IDs start with a letter, NOT
a number
A social bot is a software AI agent that can communicate autonomously or under partial human control on a social media platform to imitate a legitimate user posting content on the platform. According to the Office of Cyber and Infrastructure Analysis (OCIA) [1], social media bots have a variety of uses, some good and some not so good:
Commercial activity
, used to facilitate company-to-customer relations such as chat bots that can help customers find an item for sale or troubleshoot a product.
Counterterrorism and Terrorism
, used for analyzing online activity using multiple language search terms.
Notifications
, used to automatically distribute information about breaking news, new ideas, emergency alerts, or other events.
Harassment
, used to overwhelm a user's account to deny service or deactivate the account.
Entertainment
, used to build an illusion of online fame or popularity.
Hate Speech
, used to propagate fringe ideas to make them appear to be gaining mainstream acceptance.
Information Operations
, used to spread propaganda to manipulate public opinion.
Social and Civic Engagement
, automated posting to encourage and heighten civic engagement and participation. Note that the last 4 items noted by OCIA involve using bots to intentionally manipulate human users' perception of online information, though for different purposes. An obvious difference lies in the content distributed by the bots. We might also say that there is a difference in intent: urging someone to vote, listen to a podcast, or watch a video are relatively benign, especially compared to misleading information about public figures, government actions, or international events. On the other hand, all 4 of these applications are designed to alter users' views of the world and urge them to take some kind of action. [1] Office of Cyber and Infrastructure Analysis. "Social Media Bots Overview." May, 2018. U.S Department of Homeland Security, National Protection and Programs Directorate. Available at https://niccs.cisa.gov/sites/default/files/documents/pdf/ncsam_socialmediabotsoverview_508.pdf Working in a group of 3-5
, consider the following scenarios:
An advertising company launches a social bot on a platform such as Twitter that pretends to be a person and subtly promotes a political party
’
s position.
A company launches a similar social bot for the purpose of promoting that company's products or services. Briefly compare and contrast these two scenarios with respect to content and intent, culminating in an answer to the question of whether each is ethically acceptable or prohibited. Your response should clearly state a reason for your position on each scenario that is based on your analysis. Your group should leverage your different points of view and strive to consider the broader applications of both scenarios. This is a time-limited activity. One submission per group, please!
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
SQL Injection “OWASP stands for the Open Web Application Security Project, an online community that produces articles, methodologies, documentation, tools, and technologies in the field of web application security.’ – OWASP Foundation, 2020. “The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.” – OWASP Foundation, 2020. “Globally recognized by developers as the first step towards more secure coding.” – OWASP Foundation, 2020.
SQL injection is a prominent vulnerability that results in drastic damage to companies around the world.
1 Discuss, with examples, the concept of SQL injection. 2 Explain, with examples, any two defences against SQL injection that could be employed by database developers.
arrow_forward
Tairiq MinesError! Bookmark not defined.
Tairiq Mines in Texas has several parking lots, which are used by staff. Each parking lot has a unique name, location, capacity, and number of floors (where appropriate). Each parking lot has parking spaces, which are uniquely identified using a space number. Members of staff can request the sole use of a single parking space. Each member of staff has a unique number, name, telephone extension number, and vehicle license number.
1.Represent the above as a single Entity Relation model. Provide any assumptions necessary to support your model
2.Write an SQL query that displays the parking space number, location as well as the name of the staff member to whom the parking space has been allocated.
arrow_forward
Tairiq MinesError! Bookmark not defined. Tairiq Mines in Glen Austin has several parking lots, which are used by staff. Each parking lot has a unique name, location, capacity, and number of floors (where appropriate).Each parking lot has parking spaces, which are uniquely identified using a space number. Members of staff can request the sole use of a single parking space. Each member of staff has a unique number, name, telephone extension number, and vehicle license number.
Write an SQL query that displays the parking space number, location as well as the name of the staff member to whom the parking space has been allocated
arrow_forward
Tairiq MinesError! Bookmark not defined. Tairiq Mines in Glen Austin has several parking lots, which are used by staff. Each parking lot has a unique name, location, capacity, and number of floors (where appropriate).Each parking lot has parking spaces, which are uniquely identified using a space number. Members of staff can request the sole use of a single parking space. Each member of staff has a unique number, name, telephone extension number, and vehicle license number.
Write an SQL query that displays the parking space number, location as well as the name of the staff member to whom the parking space has been allocated. Please make the solution clear.
arrow_forward
Copyright notice: This question is part of a graded exam and cannot be redistributed in any form or fashion. ID: 10-52-01-
5012. This copyright notice does not impact the contents of the question or answer choices. Hosting this question on any
website or service constitutes as an academic integrity violation and is an infringement of copyright.
Selena Gomezz has ventured into e-commerce and her website has a lot of products - so many that
her employees are having a hard time learning about all of the products that they sell which has led
to some struggles with providing excellent customer service. What would you recommend to Selena
to help with this issue? Choose the best answer from the options that are available below.
O Cloud based enterprise system
Customer relationship management system
Knowledge management system
None of the options are correct
O Supply chain management system
0.2 pts
Question 40
Copyright notice: This question is part of a graded exam and cannot be redistributed…
arrow_forward
Privilege users get different instructions.
arrow_forward
Computer Science
Create a code in PHP that connects to a online database. This database needs to be able to establish a connection and give an error if lost. as wells as, search, filter, and add new results to the database as well as the web page(HTML) by its users(genre, name, author, volume, and completed/ongoing). The code must also give a error message if certain parts are left blank when adding to the webpage.
The database is a basic mangalist
arrow_forward
Alert dont submit AI generated answer.
arrow_forward
Systems Analysis and Design
Use any suitable tool, represent, using the proper symbols, the following action:
A young inventors club has decided to implement a website to motivate its members. The website has the following data. Members are requested to fill the application forms. Member details are stored in member file. Accounts department gets the details from member file and decides the membership fees. And it sends the receipt to the member.
arrow_forward
Project: Covid-19 Vaccination Appointment
Group members: 1
You need to follow the MVC architectural pattern to develop an online Covid-19 vaccination appointment system using Java Servlets and JSPs.
Requirements:
The user shall enter his National ID number (then submit the request)
The system shall determine if the user:
Fully vaccinated – boosted (a person who received two doses, and a booster shot).
Fully vaccinated (Two doses) ? (can go for a third shot (vaccine booster shot), see Req 6 below).
Already received the first dose ? Allow the user to book an appointment for the second dose
Didn’t take any dose ? Allow the user to book an appointment for the first dose
The user shall be able to determine the vaccination type (for the first dose only)
The user shall be able to select the date/time for the appointment
If the user is booking an appointment for the second dose, the time between the first and second dose shall not be less than N weeks (N is configurable in the database based…
arrow_forward
DATABASE SYSTEMS:
QUESTION
Do as directed
This describes the business process to publish an academic paper. The author submits a paper to an editor in chief of a journal. The editor first checks whether the paper fit the theme of the journal. If not, the editor rejects the paper. Otherwise, the editor in chief assigns the paper to a number of reviewers. The reviewers review the paper, and write a review. The review is sent to the editor in chief. The editor in chief then assesses the quality of the paper with the help of reviewers’ comments. If the quality is good, the paper will be accepted, and the author notified. Furthermore, the paper is forwarded to the publisher for publication. If the quality is bad, the editor rejects the paper.
Apply query to only access to compile the final decision to editor in chief and only visualized by author not reviewers
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- SQL Injection “OWASP stands for the Open Web Application Security Project, an online community that produces articles, methodologies, documentation, tools, and technologies in the field of web application security.’ – OWASP Foundation, 2020. “The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.” – OWASP Foundation, 2020. “Globally recognized by developers as the first step towards more secure coding.” – OWASP Foundation, 2020. SQL injection is a prominent vulnerability that results in drastic damage to companies around the world. 1 Discuss, with examples, the concept of SQL injection. 2 Explain, with examples, any two defences against SQL injection that could be employed by database developers.arrow_forwardTairiq MinesError! Bookmark not defined. Tairiq Mines in Texas has several parking lots, which are used by staff. Each parking lot has a unique name, location, capacity, and number of floors (where appropriate). Each parking lot has parking spaces, which are uniquely identified using a space number. Members of staff can request the sole use of a single parking space. Each member of staff has a unique number, name, telephone extension number, and vehicle license number. 1.Represent the above as a single Entity Relation model. Provide any assumptions necessary to support your model 2.Write an SQL query that displays the parking space number, location as well as the name of the staff member to whom the parking space has been allocated.arrow_forwardTairiq MinesError! Bookmark not defined. Tairiq Mines in Glen Austin has several parking lots, which are used by staff. Each parking lot has a unique name, location, capacity, and number of floors (where appropriate).Each parking lot has parking spaces, which are uniquely identified using a space number. Members of staff can request the sole use of a single parking space. Each member of staff has a unique number, name, telephone extension number, and vehicle license number. Write an SQL query that displays the parking space number, location as well as the name of the staff member to whom the parking space has been allocatedarrow_forward
- Tairiq MinesError! Bookmark not defined. Tairiq Mines in Glen Austin has several parking lots, which are used by staff. Each parking lot has a unique name, location, capacity, and number of floors (where appropriate).Each parking lot has parking spaces, which are uniquely identified using a space number. Members of staff can request the sole use of a single parking space. Each member of staff has a unique number, name, telephone extension number, and vehicle license number. Write an SQL query that displays the parking space number, location as well as the name of the staff member to whom the parking space has been allocated. Please make the solution clear.arrow_forwardCopyright notice: This question is part of a graded exam and cannot be redistributed in any form or fashion. ID: 10-52-01- 5012. This copyright notice does not impact the contents of the question or answer choices. Hosting this question on any website or service constitutes as an academic integrity violation and is an infringement of copyright. Selena Gomezz has ventured into e-commerce and her website has a lot of products - so many that her employees are having a hard time learning about all of the products that they sell which has led to some struggles with providing excellent customer service. What would you recommend to Selena to help with this issue? Choose the best answer from the options that are available below. O Cloud based enterprise system Customer relationship management system Knowledge management system None of the options are correct O Supply chain management system 0.2 pts Question 40 Copyright notice: This question is part of a graded exam and cannot be redistributed…arrow_forwardPrivilege users get different instructions.arrow_forward
- Computer Science Create a code in PHP that connects to a online database. This database needs to be able to establish a connection and give an error if lost. as wells as, search, filter, and add new results to the database as well as the web page(HTML) by its users(genre, name, author, volume, and completed/ongoing). The code must also give a error message if certain parts are left blank when adding to the webpage. The database is a basic mangalistarrow_forwardAlert dont submit AI generated answer.arrow_forwardSystems Analysis and Design Use any suitable tool, represent, using the proper symbols, the following action: A young inventors club has decided to implement a website to motivate its members. The website has the following data. Members are requested to fill the application forms. Member details are stored in member file. Accounts department gets the details from member file and decides the membership fees. And it sends the receipt to the member.arrow_forward
- Project: Covid-19 Vaccination Appointment Group members: 1 You need to follow the MVC architectural pattern to develop an online Covid-19 vaccination appointment system using Java Servlets and JSPs. Requirements: The user shall enter his National ID number (then submit the request) The system shall determine if the user: Fully vaccinated – boosted (a person who received two doses, and a booster shot). Fully vaccinated (Two doses) ? (can go for a third shot (vaccine booster shot), see Req 6 below). Already received the first dose ? Allow the user to book an appointment for the second dose Didn’t take any dose ? Allow the user to book an appointment for the first dose The user shall be able to determine the vaccination type (for the first dose only) The user shall be able to select the date/time for the appointment If the user is booking an appointment for the second dose, the time between the first and second dose shall not be less than N weeks (N is configurable in the database based…arrow_forwardDATABASE SYSTEMS: QUESTION Do as directed This describes the business process to publish an academic paper. The author submits a paper to an editor in chief of a journal. The editor first checks whether the paper fit the theme of the journal. If not, the editor rejects the paper. Otherwise, the editor in chief assigns the paper to a number of reviewers. The reviewers review the paper, and write a review. The review is sent to the editor in chief. The editor in chief then assesses the quality of the paper with the help of reviewers’ comments. If the quality is good, the paper will be accepted, and the author notified. Furthermore, the paper is forwarded to the publisher for publication. If the quality is bad, the editor rejects the paper. Apply query to only access to compile the final decision to editor in chief and only visualized by author not reviewersarrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education