Sign In
Not register? Register Now!
Pages:
2 pages/≈550 words
Sources:
Check Instructions
Style:
APA
Subject:
Creative Writing
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 7.2
Topic:

200 words for each question. Creative Writing Essay

Essay Instructions:

Discuss the opportunities and challenges that will result from the Internet of Things.
Explain how software defects can be exploited by hackers and possible solutions.
Discuss the problems solved by ERP systems in the current business enterprise.

Essay Sample Content Preview:

Title
Your Name
Subject and Section
Professor's Name
Date of Submission
1 Discuss the opportunities and challenges that will result from the Internet of Things.
This new technology has its pros and cons. Its advantages include: 1) Approximately ninety per cent, or even more, of all IoT data are presented on service provider programs as the "cloud" can become less complex by supporting data blending.; 2) It optimizes work making the use of time more efficient.; 3) Manufacturers can save money from hiring workers since the system can act as artificial intelligence.; 4) It can incorporate all the data in the healthcare system, making access to the data more efficient, especially during emergencies.; and 5) It can be utilized for risk reduction management CITATION Aid16 \l 1033 (Aidinyantz, 2016).
Despite having pros, there are also several cons: 1) It has a great security issue from cyberattacks.; 2) There can be a security breach from hackers or even terrorist groups.; 3) The danger from cyberattacks will prompt nations to generate internet walls that will reduce the functionality of IoT.; 3) The rapid growth of technology can benefit the younger population while the older population gets left behind.; and 4) Humans can never be replaced by artificial intelligence. Some decisions do not only need knowledge. Some need empathy and deep understanding of cultures, norms, views, and a person's character CITATION Alb18 \l 1033 (Albert, 2018).
2 Explain how software defects can be exploited by hackers and possible solutions.
This involves bugs found in the software. These bugs consist of errors in coding that allow the system or the person operating it to generate an unsolicited action. Bugs can make systems crash, prohibit connections, or disallowing the login of a person. These can establish an information leakage or grant unauthorized access, thereby perpetuating a security vulnerability. When these software vulnerabilities are not addressed properly, it can lead to a successful attack (Winkler & Gomes, 2017).
An example of a successful attack is when Dylan Houlihan reported to the Panera Bread Director of Information Security, the vulnerability in the delivery API in August 2017. This permits anyone to access the full name, address, e-mail address, username, password, and many others of any Panera Bread consumer CITATION Civ20 \l 1033 (Civa...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to artificial intelligence:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!