menu
bartleby
search
close search
Hit Return to see all results
close solutoin list

Do research to identify the latest findings on the negative effects of sitting for long hours working at a computer. Find recommendations on how to arrange your desk and computer to avoid health problems. Prepare a brief presentation that summarizes your findings and identifies what can be done to offset these negative effects.

BuyFindarrow_forward

Principles of Information Systems ...

12th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781285867168

Solutions

Chapter
Section
BuyFindarrow_forward

Principles of Information Systems ...

12th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781285867168
Chapter 14, Problem 1PSE
Textbook Problem
75 views

Do research to identify the latest findings on the negative effects of sitting for long hours working at a computer. Find recommendations on how to arrange your desk and computer to avoid health problems. Prepare a brief presentation that summarizes your findings and identifies what can be done to offset these negative effects.

Program Plan Intro

Heavy computer usage:

  • The heavy usage of computers can cause damage to eyes.
  • It can create various physical issues such as eye sight problem and headache problems.
  • The continuous usages may lead to diseases such as migraine.
  • The heavy usage of computers may create physical as well as mental stress in a person.

Explanation of Solution

Negative effects of sitting for long hours:

  • The continuous usages may lead to diseases such as migraine.
  • The primary causes of computer related health problems are due to poor work environment as well as failure in taking regular breaks.
  • The heavy usage of computers may create physical as well as mental stress in a person.
  • Sitting for long hours is hazardous to health.
  • It can cause heart disease.
  • It can cause diabetes, stroke, high blood pressure and high cholesterol.

Recommendation for sitting arrangement:

  • The glare and poor contrast in computer screens can make it hard to read.
    • The screen resolution of computer should be adjusted properly.
  • The desks and chairs in office environments may be uncomfortable...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 14 Solutions

Principles of Information Systems (MindTap Course List)
Show all chapter solutions
add
Ch. 14 - Convincing someone to divulge his or her logon...Ch. 14 - It is thought that the United States and...Ch. 14 - Child identity theft is a rapidly growing area of...Ch. 14 - It is estimated that over ____________ U.S....Ch. 14 - The LeadsOnline Web-based service uses Geographic...Ch. 14 - ____________ is a type of Trojan horse that...Ch. 14 - ____________ refers to the use of any of several...Ch. 14 - The ____________ is a fundamental concept of good...Ch. 14 - As opposed to the European Union, the United...Ch. 14 - __________ is a tool used by the NSA and FBI to...Ch. 14 - Heavy computer use can negatively affect ones...Ch. 14 - The study of designing and positioning computer...Ch. 14 - Just because an activity is defined as legal does...Ch. 14 - Founded in 1977, the Association for Computing...Ch. 14 - What issues and problems are raised by the use of...Ch. 14 - What is US-CERT and what does it do?Ch. 14 - Define the term cyberterrorism. For how long has...Ch. 14 - What is a managed security service provider? What...Ch. 14 - What is social engineering? What is dumpster...Ch. 14 - Why might some people consider a contractor to be...Ch. 14 - Give two reasons that smartphones are such a ripe...Ch. 14 - How do you distinguish between a hacker and a...Ch. 14 - What measures can you take to avoid becoming a...Ch. 14 - What is a security dashboard? How is it used?Ch. 14 - What is smishing? What actions can you take to...Ch. 14 - What is filtering software? Why would...Ch. 14 - What does intrusion detection software do? What...Ch. 14 - What is ergonomics? How can it be applied to...Ch. 14 - What is digital rights management?Ch. 14 - What is a code of ethics? Give an example.Ch. 14 - Identify and briefly discuss four specific...Ch. 14 - Briefly discuss software piracy. What is it, how...Ch. 14 - Imagine that you are starting a dating Web site to...Ch. 14 - Outline an approach, including specific techniques...Ch. 14 - Your 12-year-old niece shows you a dozen or so...Ch. 14 - What measures can you suggest to beef up the...Ch. 14 - Briefly discuss the potential for cyberterrorism...Ch. 14 - What is meant by the separation of duties? When...Ch. 14 - What measures must one take to avoid being a...Ch. 14 - Do you think that there is a difference between...Ch. 14 - Do research to identify the latest findings on the...Ch. 14 - Imagine that your team has been hired to conduct a...Ch. 14 - Have each member of your team access six different...Ch. 14 - Request a current copy of your credit report from...Ch. 14 - You have been approached by the NSA to work in an...Ch. 14 - Do research to find any professional organization...Ch. 14 - What is net neutrality, and what does it mean for...Ch. 14 - What does net neutrality mean for governments?...Ch. 14 - Is the agreement of Comcast and Netflix in the...Ch. 14 - Is Comcasts purported practice of surreptitiously...Ch. 14 - What privacy concerns does transmitting healthcare...Ch. 14 - What requirement does HIPAA institute to safeguard...Ch. 14 - Universities use email to communicate private...Ch. 14 - How does Proofpoint safeguard patient privacy?...Ch. 14 - Why do you think extending access to a corporate...Ch. 14 - What tools and policies can be used to minimize...Ch. 14 - Why does information security usually come at the...

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions add
Name the three different types of tooth patterns.

Precision Machining Technology (MindTap Course List)

How would you model Question 6 with an OODM? (Use Figure 2.4 as your guide.)

Database Systems: Design, Implementation, & Management

Define each of the following terms: a. data b. field c. record d. file

Database Systems: Design, Implementation, & Management

Present Example 13.9 in Chapter 13 using the format discussed in Section 4.2. Divide the example problem into G...

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

5. Describe a data dictionary and list the types of information it contains.

Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)

Cloud Services Virtualization (IaaS) An online businesss website receives higher traffic during peak holiday sh...

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)