Nt1310 Unit 1 Assignment 1

Great Essays
“What could it be?” I wondered, my 7 year old hands furiously typing on the keyboard. I had spent the course of several month putting in every password I could think to guess. Why I was doing all of this? To have unlimited access to video games, of course. If I could get the password to my internet, I would be able to play anytime I wanted. I had given so many words to my computer; it was like we were having a conversation. A very shallow and frustrating conversation. “Is it Password123?” I imagined asking my computer. “Nope, try again.” It responded smugly. “Is it 123456?” I said. “That’s not even long enough.” The computer quipped. “It’s only a password after all.” I grumbled to myself.
The best way to solve a problem is to start asking questions. What’s a password? What makes a one password
…show more content…
So when I got into high school, I found out I really enjoyed playing this game called Foldit. Foldit was a game where players collaborated to find the most efficient protein structure. These structures ended up being more efficient than those generated by supercomputers. In fact, one of the structures solved by the players, could be used to generate an antivirus that would stop an “Aids-like” virus in monkeys. While I wasn’t able to participate in that, biology had become a major interest for me. I started looking up and learning all I could in the field of biology all of my junior and senior year. Then, I learned about CRISPR, a gene editing tool, which could be used to change and replace DNA. Gene editing tools have been around for a while, but CRISPR’s ease of use and efficiency made it more groundbreaking. According to some experts, CRISPR will be used to cure genetic diseases and help us terraform planets. It was that moment I realize where I wanted to go. I wanted to help pave the future and just like my internet

Related Documents

  • Improved Essays

    Sara Ann Thornley 2/3/17 Macronutrients Dr. Huggins Assignment #1 1. A reducing sugar is a sugar that is capable of breaking down certain substances. They have a free ketone or aldehyde group which allows them to become hemiacetale and hemiketals (Gropper, 65).…

    • 528 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    BankID [11] allows users to log in into different merchants by using the same password and two-factor authentication. With this, it helps people to save their bank account. This is used in a web site (merchant) when it needs to securely identify its users. Overall the user need to enter their SSN (Social security number), a password, and at the end a one-time password.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Due to the age of the existing equipment, four new Cisco Catalyst 3560 V2 24 port switches will be use and configure for network redundancy by connecting each switch in a multiple links, single IP address with routing protocol Border Gateway Protocol (BGP). This multi-homing will detect when one of the links fail and not send traffic over that link anymore until the issue is resolved. This redundancy configuration will meet Western County Bank management requirement reducing unplanned outages and regular maintenance performed on the network equipment supporting 10 GB links as well as static or LACP-based (link aggregation control protocol) network interface controller (NIC) teaming. The Time Warner Cable, Business, Dedicated Internet Access, and AT&T Uverse Business Internet service will provide redundancy to the Internet…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 1 Assignment 1

    • 1566 Words
    • 7 Pages

    C. Services & Applications 1. TRUSTED a) Microsoft Active Directory (AD) Domain: In order to resolve the issues inherent in a peer-to-peer network, a centralized means of user authentication and resource sharing must be implemented. Microsoft Active Directory (AD) is a centrally administered, hierarchical structure designed to manage user access to shared network resources in a domain. Windows Server 2012 R2 Datacenter edition operating system (OS) is required to establish and manage the company’s AD domain.…

    • 1566 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Policy-based management: SQL server has a feature called policy-based management which is used to define and also implement policies in SQL server. It is used if we want to apply any policy against a table or database and then checks whether the database or table satisfies with the given policy. If target database objects are not satisfied with the policies then either a trigger should be fired or we can enforce it so that an administrator will come to know that there is some policy violation. It will manage one or more instances of SQL server.…

    • 391 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    WSUS is a Windows Server Update Service, that allows the administrators to have a server with Windows updates on site. Administrators can test new updates and approve the successfully tested Windows updates for release. Only the approved updates will be applied to the client computers. Using Group Policy, the administrators can point client computers to WSUS server, so the client computers will only receive the tested and approved updates from this server, instead of receiving all the updates (including potentially harmful updates) from the Windows update web site. This assures, that none of the new Windows updates will create unexpected issues with the clients' systems.…

    • 572 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The main purpose of such record is to categorization and timeless storage of the patient information along with maximizing interoperability between easily shareable system and secured electronic records. For a successful implementation of EHR system, there are six basic areas which need to be taken into account. The foremost being the appropriate leadership. For any kind of transformation or change implementation in an organization, influence should be in “top to down” form so as to create maximum impact on the majority class of people (Nguyen, Bellucci, & Nguyen, 2014). The leadership should be highly committed to make the implementation as an organizational priority.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Madame Defarge Quotes

    • 723 Words
    • 3 Pages

    Before I knew it I was hooked and, the day had already gone by, and it was nine o’clock. I did not eat, move, or even respond when I was questioned. I had only started homework after playing to my heart’s content but it did not stop and the hunger of gaming, and only strengthened as days past. My mother had foresaw this happening, and pronounced that we were not allowed to use the internet until we finish our homework. My brother did not care and continued to play, but I still did not realize she was doing this for our own good.…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    He spent a large sum of time in his teenage years submerged in an online video game known as EVO. He uses his past to shed light on his belief that virtual theft is simply part of online games. In fact, Evo actually supported in-game theft (732) He was often the offender in these scenarios and states, “A few years ago, I could have been one of those pirates.” (733) He mentions many forms of his own thievery such as: fake investments, corporation thievery, pretending to be a girl in e-relationships, etc.…

    • 714 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Think like a Hacker, Defend like a Professional The theme of this article might sounds confusing due to the fact that most people will interpret the word “hacker” as a term used to refer to the malicious guys who always find ways to steal user information and financial details. We are not trying to give you any bad intentions about the actual meaning of “hacker” whatsoever. The original meaning is neutral and does not identify anyone as a bad person. Literally, any technology enthusiasts who enjoy analyzing technology and tricking the process to perform functions that is different from the original function can be referred to as a hacker. Of course, their goals might be different, which is the reason why hackers are categorized into three…

    • 803 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Title: Brute-forcing a Password Topic: The experiment will be used to determine the effectivity of several lengths and arrangements of encryptions. Introduction: In this age of revolutionary technologies, our lives are essentially saved to the Internet and upon electronic devices.…

    • 452 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ives, B., Walsh, K. R., & Schneider, H. (2004). The domino effect of password reuse. Communications Of The ACM, 47(4), 75-78. doi:10.1145/975817.975820 This is a brief cautionary article on the dangers of reusing a password across multiple applications.…

    • 1436 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Acar, T., Belenkiy, M., & Küpçü, A. (2013). Single password authentication. Computer Networks, 57(13), 2597-2614. doi:10.1016/j.comnet.2013.05.007 This qualitative analysis illustrates the authors’ proposed protocols for a password authentication system requiring the user to remember only one login and password. Their protocols would allow access to either a cloud server or mobile device to handle all authentication needs.…

    • 1856 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    Are Hackers Good Or Bad

    • 1791 Words
    • 7 Pages

    Laptops computers, convenient for its mobile design and Wi-Fi capability, designed for anyone who is on the go, or a luxury device for home. A large number of laptops offer Wi-Fi compatibility and various applications such as music, DVD/CD players, and games. Some even offer camera’s so users can Skype each other from all around the world; these cameras are dangerous as they are susceptible to hackers. A hacker mostly works in the cyberspace and uses information on the web and techniques to influence cyberspace, who can watch your every move and keystroke from your camera, stealing personal information. Our dependency of easy access to internet on the laptop is dangerous to our personal, government files are dependent on our internet connection, and people have found innovative ways to hack into personal files.…

    • 1791 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    This opportunity allows doctors and scientists to investigate the working of human DNA and potentially find cures for the most deadly diseases known to man. There is potential for greatness in this field of study; it’s just the people unwilling to support it. The future of medicine and treatment of diseases relies on the advances made in human genetic engineering studies. The Human Genome Project, an organization devoted to determining the sequence of chemical base pairs that make up human DNA, completed a “rough draft” in the year 2003…

    • 1038 Words
    • 5 Pages
    Improved Essays