EBK USING MIS
10th Edition
ISBN: 9780134658919
Author: KROENKE
Publisher: YUZU
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 12.7, Problem 1SGDQ
Explanation of Solution
Mention whether a person can possibly know that his roommate has used his computer to copy MIS project into a flash drive:
It can said that it is very difficult to know that using a person’s computer; another person has copied his file. The scenario cannot compared to the daily life case when the roommate eats the top layer of chocolate, as in this case the effects are clearly visible as the user had an idea of the quantity of chocolates present earlier.
- However, in cases like copying a project into his or her flash drive, it is unlikely that the person will not notice as he may have logged on security logging for computer access...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Which of the following activities do you think should be fair use? Give reasons using copyright law and/or court cases. (If you think the ethically right decision differs from the result that follows from applying fair use guidelines, explain how and why.)
a) Making a copy of a friend's spreadsheet software to try out for two weeks and then either deleting it or buying your own copy.
b) Making a copy of a computer game, playing it for two weeks, and then deleting it.
Consider all of the information that is currently saved on the hard disc of your computer right now. Do you need to have a quick look at confidential information that's saved on your computer? What are some of the possible implications that might arise as a result of this information being lost or stolen? What preventative measures can you take to keep your electrical gadget safe?
Your employer has granted you a project to design a collision-avoidance system. Three months earlier, a rival of the client implemented a similar system, and their sales climbed significantly. The system is now available on the market, and your organization has also obtained the user manual for the competitor's collision avoidance system. The technology must be capable of identifying individuals going to the road from the roadside. These pedestrians might pose a danger to the motorist. As a result, the collision avoidance system must minimize hazard to the driver by issuing early warnings. There must be many sorts of warnings accessible; they should be triggered in response to the danger posed by the pedestrian. To determine the threat category, the distance between the pedestrian and the automobile must be known. Additionally, there is a substantial body of literature devoted to distance computation algorithms. The new technology will make use of the distance sensors currently built…
Chapter 12 Solutions
EBK USING MIS
Ch. 12.4 - Prob. 1EGDQCh. 12.4 - Prob. 2EGDQCh. 12.4 - Prob. 3EGDQCh. 12.4 - Prob. 4EGDQCh. 12.4 - Prob. 6EGDQCh. 12.4 - Prob. 7EGDQCh. 12.4 - Prob. 8EGDQCh. 12.4 - Prob. 9EGDQCh. 12.4 - Prob. 10EGDQCh. 12.6 - Sports are one area in which the collection and...
Ch. 12.6 - Prob. 2BOIQCh. 12.6 - Prob. 3BOIQCh. 12.6 - Prob. 4BOIQCh. 12.7 - Prob. 1SGDQCh. 12.7 - Prob. 2SGDQCh. 12.7 - Prob. 3SGDQCh. 12.7 - Prob. 4SGDQCh. 12.7 - Prob. 5SGDQCh. 12.7 - Prob. 6SGDQCh. 12.7 - Prob. 7SGDQCh. 12.7 - Prob. 1CGDQCh. 12.7 - Prob. 2CGDQCh. 12.7 - Prob. 3CGDQCh. 12.7 - Prob. 4CGDQCh. 12.7 - Prob. 5CGDQCh. 12.7 - Prob. 12.1ARQCh. 12.7 - Prob. 12.2ARQCh. 12.7 - Prob. 12.3ARQCh. 12.7 - What are the phases in the systems development...Ch. 12.7 - What are the keys for successful SDLC projects?...Ch. 12.7 - How can scrum overcome the problems of the SDLC?...Ch. 12.7 - Prob. 12.7ARQCh. 12 - Prob. 12.1UYKCh. 12 - Prob. 12.4UYKCh. 12 - Prob. 12.5UYKCh. 12 - Prob. 12.6CE12Ch. 12 - Prob. 12.7CE12Ch. 12 - Prob. 12.8CE12Ch. 12 - Prob. 12.9CE12Ch. 12 - Describe three reasons why cases like this will...Ch. 12 - Prob. 12.11CS12Ch. 12 - Prob. 12.12CS12Ch. 12 - The project was known to be in trouble, but it...Ch. 12 - Prob. 12.14CS12
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Word limit: 1000 wordsarrow_forwardDO NOT COPY FROM OTHER WEBSITES Write your own answer. Thank you soo much!arrow_forwardConsider the data on the hard disk of your computer as an example. Do you have access to any personal information on your computer that is vital to you at all times? What would happen if that data was compromised or lost, and what would the consequences be? What precautions ought you to take to protect your computer?arrow_forward
- Several credit card firms now give users one-time-use credit card numbers as an extra layer of security for online purchases. There is just one purpose for these numerals. Customers may get the one-time-use number by visiting the website of the organization that issued their credit card. What are the advantages of employing this technology as opposed to more traditional methods of utilising credit card numbers? What are the advantages and disadvantages of employing this approach as opposed to using an electronic payment gateway for your own authentication?arrow_forwardConsider the following scenario: The mail server at your employer sends you an email alerting you that your password has been changed and that you must confirm it. But you haven't updated your password, have you? So what? What may have prompted the password change? How did an attacker obtain the information required to change the password? What systems were infected by a virus?arrow_forwardHave you ever seen someone being harassed or bullied by someone else over the internet? When you initially learned of the issue, what was the very first thing that went through your head? How did you get at the conclusion that the individual had been the target of bullying conduct prior to your intervention? In other words, how did you come to that conclusion?arrow_forward
- How does the algorithm for fingerprinting work? To accomplish your goals, one of three options is chosen: block, remove, or allow material use.arrow_forwardConsider that your two brother’s Mr Said and Mr Mohammed wants to access your computer, hence create a separate a user account for Mr Said and Mr Mohammed in your computer and attach the screenshot below.arrow_forwardConsider the following scenario: you receive an email from your company's mail server alerting you that your password has been changed and that you must take action to confirm this. However, as far as you are aware, you have not changed the password. What gives? Why was the password changed, and what could have caused it to be changed? How did an attacker obtain the information they required to successfully reset the password? Was it a virus, and on what systems did it infect?arrow_forward
- oung, technically oriented hackers argued that, if the owners of a computer system want to keep outsiders out, it is their responsibility to provide better security. Ken Thompson, one of the inventors of UNIX, said, "The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor’s house. It should not matter that the neighbor’s door is unlocked." Which position do you agree with more? Give your reasonsarrow_forwardYour employer has just implemented a new security policy that requires all workers to utilize fingerprint readers in place of their login and password while accessing their personal computers. On the weekend, you were trying to access your account when you sliced your finger. It's for this reason that your computer can't read your fingerprint. Your inability to use the computer right now is a direct effect of this issue. To what do you hope your future holds?arrow_forwardAccording to the courts, what does the First Amendment of the U.S. Constitution allow for internet free "speech?" May the Government browse Web sites without a warrant in order to nip terrorism plots in the bud? What does the Fourth Amendment's search and seizure provisions allow with regard to shutting down objectionable web sites? What about sites that are hosted overseas?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- C++ for Engineers and ScientistsComputer ScienceISBN:9781133187844Author:Bronson, Gary J.Publisher:Course Technology Ptr
C++ for Engineers and Scientists
Computer Science
ISBN:9781133187844
Author:Bronson, Gary J.
Publisher:Course Technology Ptr