Download as:
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Language:EN
Pages: 11

You promptly download and install the program

Learning Objectives
A1: Consider an IoT Application with AI/ML Technology
A2: Design Components Required for an IoT Application with AI/ML Technology A3: Describe the Process and Operation for the IoT Application with Flowcharts

Background/ Scenario

1.List the desired features and function for such a device.

2.List the factors that may influence the perception of temperature.

1.What are the key components for a smart thermostat/controller?

2.List the process and operation of the smart thermostat/controller?

2.Using a flowchart to illustrate the general operation of the smart thermostat/controller

Reflection

Learning Objectives
B1: Explore the Cisco Intent-Based Networking (IBN) website B2: Introduction to Intent-Based Networking with Cisco DevNet B3: Explore IBN Community Requests and Share Your Own

Background / Scenario

2

Lab Workshop/Lab 4 Embedded Systems and the IoT EEE_6_ESI

In B2, you will be introduced to Intent-Based Networking with Cisco DevNet. While reading through this blog you’ll learn about networks being programmable and how Intent-Based networking can be integrated via code. Click on the link below to access the Cisco blog.

ollowing questions in your Logbook:

veloped by the community.

(a)After reading through some of the intents built by community members, pick 2 intents that interest you and list them below.

Reflection (answer the questions in your Logbook)

1.Can you think of other use cases for Intent-Based Networking (IBN) than what

Part C

Types of Data (IoT Security)

C1: Select 1 or 2 more objects or places that already (or could) contain sensors.

1.Car GPS

4

The purpose of this lab is to introduce the aspect of “fingerprinting” an individual using the worldwide web. The objective is to introduce various methods to extract as much information as possible using only the internet browser and various sites effectively.

D1: Obtain as much information about yourself using the Internet Edge, Google Chrome and Firefox through the use of the Google search engine.

Whenever a person browses the internet, your various details like your background, politics, ethnicity, preferences, etc. are gathered by the various sites one visit. As you

visit sites small “cookies” are planted into your PC in relation to the web browser and sites visited. These cookies contain small pieces of data based on your browsing patterns and sites visited. The social media sites gather a vast volume of your personal data prior to allowing you access to use the sites. All this personal information can be mined by anyone who may choose to do so. Thus, browsing the internet is like leaving a sprinkling trail of cookie crumbs that will lead to a more detailed picture of yourself available to anyone searching the internet about you.

(a)Open up Mozilla Firefox and navigate to the https:/google.com site.

5

(e)You can also search for people by face, search for them on Google Images to get a quick visual - especially useful for people with common names, or to
determine the gender of a name you never heard before. Search all the social media sites that are exposed linked to your search.

(f)Document, in your logbook, all the information you have gathered from this search.

D3.1: Use Zabbasearch

Zabbasearch- this is a comprehensive people search engine.

Lab Workshop/Lab 4 Embedded Systems and the IoT EEE_6_ESI

D3.3: Use PeekYou

2.What social media sites were reveled in your searches that you were a member of?

3.On reflection what data would you omit from being displayed for public knowledge and why?

The Internet is a hostile environment, and you must be vigilant to ensure your data is not compromised. Attackers are creative and will attempt many different techniques to trick users. This lab helps you identify risky online behaviour and provide tips on how to become safer online.

E1: Explore the Terms of Service Policy

7

Lab Workshop/Lab 4 Embedded Systems and the IoT EEE_6_ESI

1) You click, download, and install the program to keep your computer safe. (3 points) 2) You inspect the pop-up windows and hover over the link to verify its validity. (3 points)
3) Ignore the message, making sure you don’t click it or download the program and close the website. (0 points)

e. When you need to log into your financial institution’s website to perform a task, you: ____________

8

Lab Workshop/Lab 4 Embedded Systems and the IoT EEE_6_ESI

1) Connect to it and use the Internet. (3 points)

2) Don’t connect to it and wait until you have a trusted connection. (0 points) 3) Connect to it and establishes a VPN to a trusted server before sending any information. (0 points)

0 – 3: You are somewhat safe online but should still change your behaviour to be completely safe.

3 – 17: You have unsafe behaviour online and have a high risk of becoming compromised.

attackers’ control, they may be successful when attempting to log in as you in other services.

c. Emails can be easily forged to look legitimate. Forged emails often contain links to malicious sites or malware. As a general rule, do not click embedded links received via email.

f. When you allow a program to run on your computer, you give it a lot of power. Choose wisely before allowing a program to run. Research to make sure the company or individual behind the program is a serious and legitimate author. Also, only download the program from the official website of the company or individual.

g. USB drives and thumb drives include a tiny controller to allow computers to communicate with it. It is possible to infect that controller and instruct it to install malicious software on the host computer. Because the malware is hosted in the USB controller itself and not in the data area, no amount of erasing or anti-virus scanning will detect the malware.

1.Write a Python 3 program for calculating the Factorial of a number. In mathematics, the notation n! represents the factorial of the nonnegative integer n. The factorial of n is the product of all the nonnegative integers from 1 to n. For example,

4! = 1 x 2 x 3 x 4 and 6! = 1 x 2 x 3 x 4 x 5 x 6

Lab Workshop/Lab 4 Embedded Systems and the IoT EEE_6_ESI

2.A junior magician has picked a secret number. He has hidden it in a variable named secret number. He wants everyone who run his program to play the Guess the secret number game, and guess what number he has picked for them. Those who don't guess the number will be stuck in an endless loop forever! Unfortunately, he does not know how to complete the code.

The magician is counting on you! Don't disappoint him.

EXTRA INFO

11

Copyright © 2009-2023 UrgentHomework.com, All right reserved.