Computer Science: An Overview (13th Edition) (What's New in Computer Science)
13th Edition
ISBN: 9780134875460
Author: Glenn Brookshear, Dennis Brylow
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 4, Problem 7SI
Explanation of Solution
Software registration process on ethical viewpoint:
The user provides some personal information before using the software services such as his name, age, profession, etc. The user should be very careful while giving personal information to software’s developers. The misuse of the personal information can be avoided by taking some preventive actions.
The users are entitled to certain agreements while registering any software services which are given as:
- The developers can access the personal information such as name age profession of the user for any kind of genuine purpose.
- The trust factor should be there before providing any personal information during the software registration process...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
A newly opened university would like to develop a student registration system (SRS) that can bedeployed on any operating system.The new system will allow students to register for courses and view their semester results fromany type of computer device. Lecturers will be able to access the system to sign in to access thecourses that have been assigned to them as well as to record grades. The system should allow allcourses offered by the university to be maintained up-to-date and can be accessible through theInternet.The registrar’s office will maintain course information and grades. At the beginning of eachsemester, students may request/ access a list of course offerings for the semester. Informationabout each course, such as lecturers, departments, and any prerequisites, will be included (byregistrar’s office) to help students make informed decisions.The university should be able to allow students to sign in to select a number of course offeringsfor the semester. Each course offering…
ScenarioThe questions in this assignment all relate to the following case study:A newly opened university would like to develop a student registration system (SRS) that can be deployed on any operating system.The new system will allow students to register for courses and view their semester results from any type of computer device. Lecturers will be able to access the system to sign in to access the courses that have been assigned to them as well as to record grades. The system should allow all courses offered by the university to be maintained up-to-date and can be accessible through the Internet.The registrar’s office will maintain course information and grades. At the beginning of each semester, students may request/ access a list of course offerings for the semester. Information about each course, such as lecturers, departments, and any prerequisites, will be included (by registrar’s office) to help students make informed decisions.The university should be able to allow students to…
ScenarioThe questions in this assignment all relate to the following case study:A newly opened university would like to develop a student registration system (SRS) that can be deployed on any operating system.The new system will allow students to register for courses and view their semester results from any type of computer device. Lecturers will be able to access the system to sign in to access the courses that have been assigned to them as well as to record grades. The system should allow all courses offered by the university to be maintained up-to-date and can be accessible through the Internet.The registrar’s office will maintain course information and grades. At the beginning of each semester, students may request/ access a list of course offerings for the semester. Information about each course, such as lecturers, departments, and any prerequisites, will be included (by registrar’s office) to help students make informed decisions.The university should be able to allow students to…
Chapter 4 Solutions
Computer Science: An Overview (13th Edition) (What's New in Computer Science)
Ch. 4.1 - What is an open network?Ch. 4.1 - Prob. 2QECh. 4.1 - What is a router?Ch. 4.1 - Prob. 4QECh. 4.1 - Prob. 5QECh. 4.1 - Prob. 6QECh. 4.2 - Prob. 1QECh. 4.2 - Prob. 2QECh. 4.2 - Prob. 3QECh. 4.2 - Prob. 4QE
Ch. 4.2 - Prob. 5QECh. 4.2 - Prob. 6QECh. 4.2 - Prob. 7QECh. 4.2 - Prob. 8QECh. 4.3 - Prob. 1QECh. 4.3 - Prob. 2QECh. 4.3 - Prob. 3QECh. 4.3 - Prob. 4QECh. 4.3 - Prob. 5QECh. 4.4 - Prob. 1QECh. 4.4 - Prob. 2QECh. 4.4 - Prob. 3QECh. 4.4 - What keeps a computer on the Internet from...Ch. 4.5 - Prob. 1QECh. 4.5 - Prob. 2QECh. 4.5 - Prob. 3QECh. 4.5 - Prob. 4QECh. 4.6 - Prob. 1QECh. 4.6 - Prob. 2QECh. 4.6 - Prob. 3QECh. 4.6 - Prob. 4QECh. 4.6 - Prob. 5QECh. 4 - Prob. 1CRPCh. 4 - Prob. 2CRPCh. 4 - Prob. 3CRPCh. 4 - Prob. 4CRPCh. 4 - Prob. 5CRPCh. 4 - Prob. 6CRPCh. 4 - Prob. 7CRPCh. 4 - Prob. 8CRPCh. 4 - Prob. 9CRPCh. 4 - Prob. 10CRPCh. 4 - Prob. 11CRPCh. 4 - Prob. 12CRPCh. 4 - Prob. 13CRPCh. 4 - Prob. 14CRPCh. 4 - Prob. 15CRPCh. 4 - Prob. 16CRPCh. 4 - Prob. 17CRPCh. 4 - Prob. 18CRPCh. 4 - Prob. 19CRPCh. 4 - Prob. 20CRPCh. 4 - Prob. 21CRPCh. 4 - Prob. 22CRPCh. 4 - Prob. 23CRPCh. 4 - Prob. 24CRPCh. 4 - Prob. 25CRPCh. 4 - Prob. 26CRPCh. 4 - Prob. 27CRPCh. 4 - Prob. 28CRPCh. 4 - Prob. 29CRPCh. 4 - Prob. 30CRPCh. 4 - Prob. 31CRPCh. 4 - Prob. 32CRPCh. 4 - Prob. 33CRPCh. 4 - Prob. 34CRPCh. 4 - Prob. 35CRPCh. 4 - Prob. 36CRPCh. 4 - Prob. 37CRPCh. 4 - Prob. 38CRPCh. 4 - Prob. 39CRPCh. 4 - Prob. 40CRPCh. 4 - Prob. 41CRPCh. 4 - Prob. 42CRPCh. 4 - Prob. 43CRPCh. 4 - Prob. 44CRPCh. 4 - Prob. 45CRPCh. 4 - Prob. 46CRPCh. 4 - Prob. 47CRPCh. 4 - Prob. 48CRPCh. 4 - Prob. 49CRPCh. 4 - Prob. 50CRPCh. 4 - Prob. 1SICh. 4 - Prob. 2SICh. 4 - Prob. 3SICh. 4 - Prob. 4SICh. 4 - Prob. 5SICh. 4 - Prob. 6SICh. 4 - Prob. 7SICh. 4 - Prob. 8SICh. 4 - Prob. 9SICh. 4 - Prob. 10SICh. 4 - Prob. 11SICh. 4 - Prob. 12SI
Knowledge Booster
Similar questions
- Failure of a software application might cause serious problems for its users. When companies release software to the public, it is possible that it contains bugs that might cause the software to crash. Should these companies be held to an ethical standard that requires them to provide this information? Should they be required to compensate clients when their software malfunctions and results in financial loss? The software business should follow suit and provide guarantees, just like retailers must do with their products, for consumers.arrow_forwardThe Issue: You're working on a bunch of code that you're not familiar with and want to go through it step by step. You've come across a call to do_the_funny_bird and want to know what it does, but you don't know where it's defined. In such instances, how can you browse the code effectively?arrow_forwardJoe Green, a system administrator for a large corporation, is installing a new software package on Chuck Dennis’ personal computer. The company has not authorized Joe to read the employees’ e-mail, Web logs, or personal files. However, in the course of installing the software, he accidentally comes across directories containing files with suspicious-looking names. He opens a few files and discovers they contain child pornography. Joe believes possessing such images is unethical for their profession. What should he do? Acme Corporation licenses a sophisticated software package to many private and government agencies. Kyla is one of Acme's employees who works in the support organization. She mostly provides phone support but also teaches an on-site class from time to time. In fact, she created many of the instructional materials used in these classes. One day Kyla gets a call from Maria, who works for a government agency that uses Acme's software package. Maria offers to pay Kyla Php…arrow_forward
- Intro to software engineering: Q5- A company supplies a Tax Returns Automation process to its clients, visiting their sitesand inspecting their revenues for a given year, giving advice and completing the necessaryforms for Tax Returns purposes. Once the forms have been completed, they are saved aspaper copies; one is kept by the client, the other is filed locally within the company’s paper-based archives. The corresponding electronic copies are also saved in a word-processorformat and saved on a local computer.The company is seeking to develop a more fully automated process: the tax consultantvisiting the client's premises periodically would log-in to an on-line application (within thecompany website) and input the data to an on-line form. The data collected would be used tokeep the clients informed of the results of the consultant’s visits and the date of the next visit.Considering the above scenario:a) List and describe at least THREE possible risks that the company will be…arrow_forwardA law firm wanted to develop an online system to archive and keep track of their legal documents. The firm have a list of clients’ details and each of these clients has one or more cases filed with the firm. A case can have unlimited number of documents uploaded. The firm has some staff that handles and uses these legal documents. The lawyers that are assigned to certain cases are allowed to access the documents related to their cases. The legal clerks have access to all these documents and are responsible to upload or update these documents in the system as per the lawyers’ instructions. Any update of documents by each clerk should be recorded for tracking purpose so that the latest document can be identified and the clerk is held responsible for any irregularity to the document management. Draw the Class diagram to illustrate the above case study. Surface all the possible entities and their associations. Each entity should have at least 2 attributes and 1 behaviour. Include at least…arrow_forwardWhat are some instances of P2P being used in a legal and suitable manner? Torrent-based P2P file sharing is always brought up by students when we discuss P2P. It's important to know what sorts of programs have been produced, and what kinds of interfaces they have. Why should you avoid them?arrow_forward
- Alisa works at a Medical Insurance Company. She oversees the claims department and her objective is to increase efficiency in the company - each unit must process a minimum number of claims per day. To achieve this goal, she installed a software system that monitors: Number of claims processed by each clerk Number of keystrokes performed by each clerk Log information when each clerk is in or out of his post. This system allows her to check all the above information in real-time on her screen. She can also see all emails sent by each clerk regardless of whether the email is business related or not. Should she use this system and if so, does every clerk need to be notified? Do you think any limits should be placed on companies using such systems? discuss. 1. ICT ethical principles and professional responsibilities 2. Relate social and ethical issues 3. Organization & Structure of Report 4. Plagiarismarrow_forwardYour employer has just implemented a new security policy that requires all workers to utilize fingerprint readers, rather than their login and password, whenever they use company-issued computers. In an effort to access your account over the weekend, you sliced your finger while entering your password. The result is that your fingerprint cannot be read by the computer. You can't use the computer right now because of this issue. What do you see in store for yourself down the road?arrow_forwardLet's imagine that your organisation has decided to construct a server room that is capable of operating totally on its own. When there is no lighting present in a server room, we refer to it as being "lights-out." Just specify what type of locks and alarms you would place on the doors and windows to protect yourself and your belongings from potential intruders.arrow_forward
- There are a limited number of repair services that PEAR can perform. Foreach repair service, there is a service ID number, description, and charge.“Charge” is how much the customer is charged for the shop to perform theservice, including any parts used. The actual repair of a device is theperformance of the services necessary to address the problems described bythe customer. Completing a repair request may require the performance ofmany services. Each service can be performed many different times duringthe repair of different devices, but each service will be performed only onceduring a given repair request.arrow_forwardThe Department of computer science is used to face students' course registration problem at the start of every semester. There are two categories of the students in terms of course registration i.e. regular and non-regular students. Regular students download their courses registration form from online student portal and after filling it (by mentioning courses choices) they are required to submit signed hard copy of it to the department. The registration process often delays due to some reasons which affects the whole academic process. Some of the reasons include • Due to the failure or low grades in upcoming courses prerequisite, some students are required to repeat the prerequisite. • Whenever any section exceed to students' limit of 50, students are forced to swap the sections. On the other hand non- regular students, simply go to the front office and manually tell their subjects choices to register and then according to the timetable of offered courses they are asked to fill the…arrow_forward(Taken from Ethics for the Information Age book) • Adam and Charlene are good friends. Both attend East Dakota State University. One day when Adam is off campus interviewing for a part-time job, someone asks him how many credit hours of computer science courses he has completed. Adam calls Charlene and asks her to access his student records by logging into the campus mainframe as if she were Adam. He provides Charlene with his student identification number and password so that she can do this. Is it wrong for Adam to share this information with Charlene? Is it wrong for Charlene to retrieve this information for Adam?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,