Business Driven Technology
6th Edition
ISBN: 9780073376905
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 16, Problem 4MBD
Explanation of Solution
Selection of music:
The selection of music is entirely depends on the personal opinion. Some people may like Jazz, others may like Rock while other part of people may like Hip Hop and moreover selecting this is the personal like or dislike of an individual people.
Therefore, selection of music is private information of the people.
Usage of personal information unethically:
The private information is accessed by the unauthorized person that can be unethical one. The below mentioned points are unethically used the private information by the people.
- The un-social element can find this information and use to cheat the other people by pretending them that they shares the same music and creating a links with them which can further result in some criminal activities.
- Depending upon the music preferences a lot of personal information can be found about the listeners and this making them disposed to many unwanted marketing and other activities.
- This information can be sold to many music companies without the permission of the listeners so that these companies can directly contact these people for the promotion of their music albums.
Justification for threatening the information from Pandora:
“Yes”, it is threat to Pandora online musical company...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
FolderHomework 1InstructionsHomework 1 emphasizes using professional networking sites such as facebook. In this homework, you will:create and use a fb to interact with friendsNote: For these activities within fb, you are welcome to include your professor and other students in the class. However, you do not have to. You are welcome to just use your known friends.specific activities for this homework include:If needed, create yourfbLogin and complete and personalize your profile.While completing your profile, be sure to include current and previous position, education, personal and additional information as appropriate.Find connections to your friendsResearch a couple of companies you might be interested in seeking employment with in the future.Configure and customize your privacy settings in fb
JavaScript
Create a non-predictive T9-like keypad. For those who do not know what a T9 keypad is, it is essentially a more compact keyboard for mobile phones that requires you to perform multi-presses to choose letters you want to spell your words with (technology that may be older than some of students). If you are unfamiliar with the user interface, use the following shell in an html file to get a sense of what it looked like on older mobile phones:
// html
T9 Keypad
abc
def
ghi
jkl
mno
pqrs
tuv
wxyz
How it functions for the assignment:
If a button contains a letter you want to type, click on the button N number of times associated to the order the letters are in. So if you wanted "c", you push the second button 3 times.
If you push the button more than the number of letters in the button, it will wrap-around and return the letter after. For example, clicking the first button (that has letters a, b, and c) 5 times returns "b".
The input field only appends the letter to once…
Facebook is one of the most popular social networks where users can post posts to different (text or image) and comment on them • Each user must register beforehand in order to use the system. The user is identified by a name, surname, date of birth, email address (which will also serve for authentication) and a password. • Any user can make a post which contains a text and/or image. Post is identified by a unique code, text used, an identification code for the image and date of post. • A user (including the author of the post) can comment on the post. The comment is characterized by an identification code, text, and date of post. Also, a user may like a comment or post. The system should keep track which user has liked the post/comment, etc. • Users can also exchange messages with each other. Each message is characterized from the unique code, text, date and time of sending as well as information if the recipient has seen the message or not. Write the rational schema, normalization -…
Chapter 16 Solutions
Business Driven Technology
Ch. 16 - Prob. 1OCCh. 16 - Prob. 2OCCh. 16 - Prob. 1CQCh. 16 - Prob. 2CQCh. 16 - Prob. 3CQCh. 16 - Prob. 4CQCh. 16 - Prob. 5CQCh. 16 - Prob. 1CCOCh. 16 - Prob. 2CCOCh. 16 - Prob. 3CCO
Ch. 16 - Prob. 4CCOCh. 16 - Prob. 5CCOCh. 16 - Prob. 1CCTCh. 16 - Prob. 2CCTCh. 16 - Prob. 3CCTCh. 16 - Prob. 4CCTCh. 16 - Prob. 5CCTCh. 16 - Prob. 6CCTCh. 16 - Prob. 1MBDCh. 16 - Prob. 3MBDCh. 16 - Prob. 4MBDCh. 16 - Prob. 5MBDCh. 16 - Prob. 6MBDCh. 16 - Prob. 7MBDCh. 16 - Prob. 8MBDCh. 16 - Prob. 14MBDCh. 16 - Prob. 15MBDCh. 16 - Prob. 16MBDCh. 16 - Prob. 1AYKCh. 16 - Prob. 2AYKCh. 16 - Prob. 3AYKCh. 16 - Prob. 4AYKCh. 16 - Prob. 5AYKCh. 16 - Prob. 6AYKCh. 16 - Prob. 8AYKCh. 16 - Prob. 12AYKCh. 16 - Prob. 13AYK
Knowledge Booster
Similar questions
- Spotivity (https://www.spotivity.com) is a platform where teenagers, ages 13-17, and their parents can search and find extra-curricular programs for teens to participate in year round, whether it’s during summer vacation or just after school. The online platform was launched in May 2019 and features more than 3,000 activities available for teenagers in Chicago. The programs are available in several categories, including Sports, Education, Mentoring, Arts, Volunteerism, Health, and Jobs, Internships, and Camps. Spotivity is an only platform, offering access to afterschool programming. The owner had identified three user segments to target: teens, single parents, and high schools. Using 3Vs framework, explain how Spotovity creates value for the single parents segment.arrow_forwardCreate an Access app Post to this discussion. Once you have posted, you will be able to see posts from your classmates. Be sure to return to this forum to engage in a discussion with your classmates by responding thoughtfully to at least one other post. Your Reply post should contain information showing you have read the information in a classmates post.arrow_forwardJava SMS enables phones send 160-character texts. Poor nations use SMS to express opinions and report natural disasters. SMS language—abbreviations of common terminology and phrases in mobile texts, emails, instant chatting, etc.—is used because SMS messages are brief. SMS says "imo". SMS research online. design a GUI that allows users enter SMS messages and click a button to translate them into English (or your language). English and other language SMS translation tool. IMO may refer to international maritime groups, memorials, etc.arrow_forward
- Twitter uses JavaScript to create cascading tweets, customizable tweet blasts, and the ability to attach external links, images, and videos to tweets. Critique this example being used for use of java and ups. Is it an enhancement or intrusive? (Please give correct answer with explanation)arrow_forwardInstant messaging is an online chat that offers real-time text transmission over the Internet. The system contains the following requirements: A user can: Set profile including change profile picture, change name, and change status. Manage account through either change privacy settings, change SIM number, or delete account Send broadcast message by selecting a list of contacts Create a group including choose a group name, choose the contacts to add, and choose a group picture. Chat with a contact including send text, send an attachment, send contact, and send location. Mute a conversation. Choose the duration to mute either one week, one month, or one year. Make a voice/video call with a contact. Search for a contact either through contacts chats or through contacts list Invite friend Model the use case diagram for the above system. Write the use case narrative of the “Send Location” use case Use-Case Name: Use-Case ID: Priority:…arrow_forwardFacebook is one of many online companies that employ databases. In 2011, Facebook announced that it was adding a new feature—facial recognition. Photos added to a Facebook post or wall are often tagged. When a person is tagged in a photo, the person is identified and a link is created to that user’s Facebook account. To make this job easier, Facebook is using facial recognition software to identify people in the photos. Critics of this say that this is an invasion of privacy. Research the debate online. Write a short paper discussing the implications this could have on a Facebook user’s privacy. Suggested source website: https://abcnews.go.com/Technology/facebook-facial-recognition-feature-raises-eyebrows/story?id=13792666 https://www.pcworld.com/article/485225/facebook_photo_tagging_a_privacy_guide.html#tk.hp_pop https://www.pcworld.com/article/485206/facebook_on_face_recognition_sorry_we_screwed_up.htmlarrow_forward
- Use APA IN TEXT REFERENCING In 2013, chat app Mxit a South African social networking platform reported that its monthly active user base was 7.5 million – but this figure dropped to just 1.2 million monthly active users in July 2015. In October 2015, Mxit announced that it was finally shutting down its corporate operations but would still leave the app available for download and use. Yet, a year later in October 2016, the app users couldn’t send and receive anymore. The start-up was founded in 2004. Mxit rode the instant messaging wave before the likes of BlackBerry Messenger and WhatsApp took off with the advent of smartphones and was a popular app of choice among South African teens and twenty-somethings when it entered the presmartphone era in 2005. In 2012, it acquired Motribe - a platform that allowed anyone, anywhere to build, manage and generate revenue from their own social mobile website. However, it fell victim to the rise of intense competition from…arrow_forwardAs you read in Chapter 11, Facebook is one of many online companies that employ databases. In 2011, Facebook announced that it was adding a new feature—facial recognition. Photos added to a Facebook post or wall are often tagged. When a person is tagged in a photo, the person is identified and a link is created to that user’s Facebook account. To make this job easier, Facebook is using facial recognition software to identify people in the photos. Critics of this say that this is an invasion of privacy. Research the debate online. Write a short paper discussing the implications this could have on a Facebook user’s privacy. Please use these sources: https://www.pcworld.com/article/485206/facebook_on_face_recognition_sorry_we_screwed_up.html https://www.pcworld.com/article/485225/facebook_photo_tagging_a_privacy_guide.html#tk.hp_pop https://abcnews.go.com/Technology/facebook-facial-recognition-feature-raises-eyebrows/story?id=13792666arrow_forwardSocial networking sites like Facebook invite the users to generate more data in order to increase the value of the site. Users may not even be aware of what information that have been shared and shared to another thereby making privacy at stake. What is your opinion of the matter?arrow_forward
- hi i want a simple java code for vaccum macchine + i dont want copy paste from sitesarrow_forwardTwitter (http://www.twitter.com) is a social networking website for microblogging, or frequently communicating with a brief message (140 characters of less) called a tweet. Twitter users (referred to as twitterers) tweet to update a network of friends and followers about their daily activities, observations, and information related to topics of interest. A hashtag (the #symbol) can be placed in front of a word or term within atweet to categorize the topic, such as typing the hashtag #SXSWi in all tweets about the SXSW Interactive Conference for the web design industry. The use of a hashtag makes it easy to search for tweets about a category or event in Twitter. If you don’t already use Twitter, sign up for free account at http://www.twitter.com. Use your Twitter account to share information about websites that you find useful or interesting. Post at least three tweets. You might tweet about websites that contain useful web design resources. You might describe sites that have…arrow_forwardThere are no privacy issues for those who purchase on Facebook since the social networking site already has access to a large amount of personal information.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning