Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter B, Problem B9.3MBD
Explanation of Solution
E-waste and the Environment:
- Yes, participated in a ewaste.
- Environmental impact of e-waste:
- Disassembling and disposing of e-waste cause’s environmental pollution.
- Soil, air, and land are poorly damaged.
- When e-waste is warmed up, toxic chemicals are released in to the air and then affecting the atmosphere.
- So, people needs to safely dispose the electronic equipment.
Ensuring safely disposing of electronic equipment:
- Some recycling company websites details the recycling information and facilities based on user state and postal code in order to ensure the right disposal of recyclable materials including e-waste.
Government to encouraging companies to dispose of e-waste safely:
- Governments would create regulatory agencies in each region, which are assigned with the accountability of organizing and combining the controlling functions of the several government authorities concerning unsafe materials.
- Governments should implement strict rules against removing e-waste in the country by outsiders
- Government should implement strict rules and heavy penalties charged on companies, which do not repetition waste avoidance and retrieval in the manufacture services.
- Government should motivate and support non-governmental organizations (NGO) and other organizations to include dynamically in solving the country’s e-waste problems.
- Government should discover chances to collaborate with manufactures and traders to offer recycling facilities.
Protecting poor countries from receiving e-waste:
- Follow the “reduce and recycle” process.
- Increase awareness among those countries.
- Take initiatives to document and maintain e-waste at offices.
- Confirm that e-waste is not varied with other waste.
- Assign a distinct space for e-waste for storage.
- Analyze the nearby e-waste store or e-waste recyclers to dispose e-waste.
- Contribute activity in group and awareness drives...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
The widespread availability of mobile phones now provides enormous convenience, but may its abuse lead to the loss of this benefit? Mobile phones are banned in many classrooms due to the distraction of constant texting and the use of the phone by dishonest students to cheat on exams; similarly, camera phones are now banned in many fitness centers, park restrooms, and other similar facilities because some people have used them inappropriately to take compromising photos. What do you think about these responses to cell phone abuse? Is universally prohibiting cell phone use the only solution, or are there alternative methods to assure responsible usage? Should individuals who exploit technology in a dishonest or immoral way face harsher penalties?
.
Driverless cars have the ability to provide many benefits, from helping the elderly remain independent to reducing the number of road accidents. However, disasters can still happen and someone needs to be held accountable. Who should pay the damages – the car owner, the car producer, the government, some other entity? Discuss your thoughts on this technology, whether you find it useful, necessary, unnerving, interesting, etc. and who you think should be liable for accidents involving driverless cars.
In lecture we discussed the concept of the "good team" and the "bad team." The idea of right and wrong can often get skewed in the minds of individual actors. They may believe they are fighting for the right cause, such as when hackers associated with Anonymous took down the Russian news site RT News, a media outlet largely viewed as propaganda, in response to the Russian invasion of Ukraine. These hackers utilized illegal tactics to take down a government run news agency, in a classic argument of "the ends justifies the means." Although you may agree with what this "hacktivist" team did, consider the second and third order effects. Were people unable to get weather updates? Was any portion of emergency broadcasts disrupted due to this hack? How many more attacks will Russian sponsored hackers execute in response?
Chapter B Solutions
Business Driven Technology
Ch. B - Prob. B1.1MBDCh. B - Prob. B1.2MBDCh. B - Prob. B1.3MBDCh. B - Prob. B1.4MBDCh. B - Prob. B1.5MBDCh. B - Prob. B1.6MBDCh. B - Prob. B2.1MBDCh. B - Modeling a Business Process Do you hate waiting in...Ch. B - Prob. B2.3MBDCh. B - Prob. B2.4MBD
Ch. B - Prob. B2.5MBDCh. B - Prob. B3.1MBDCh. B - Prob. B3.2MBDCh. B - Prob. B4.1MBDCh. B - Prob. B4.2MBDCh. B - Prob. B4.3MBDCh. B - Prob. B4.4MBDCh. B - Prob. B4.5MBDCh. B - Prob. B4.6MBDCh. B - Prob. B4.7MBDCh. B - Prob. B4.8MBDCh. B - Prob. B4.9MBDCh. B - Prob. B4.10MBDCh. B - Prob. B4.11MBDCh. B - Prob. B5.1MBDCh. B - Prob. B5.2MBDCh. B - Prob. B5.3MBDCh. B - Prob. B5.4MBDCh. B - Prob. B5.5MBDCh. B - Prob. B5.6MBDCh. B - Prob. B6.1MBDCh. B - Prob. B6.2MBDCh. B - Prob. B6.3MBDCh. B - Prob. B6.4MBDCh. B - Prob. B6.5MBDCh. B - Prob. B7.1MBDCh. B - Prob. B7.2MBDCh. B - Prob. B7.3MBDCh. B - Prob. B7.4MBDCh. B - Prob. B7.5MBDCh. B - Prob. B7.6MBDCh. B - Prob. B7.7MBDCh. B - Prob. B7.8MBDCh. B - Prob. B7.9MBDCh. B - Prob. B7.10MBDCh. B - Prob. B7.11MBDCh. B - Prob. B8.1MBDCh. B - Prob. B8.2MBDCh. B - Prob. B9.1MBDCh. B - Prob. B9.2MBDCh. B - Prob. B9.3MBDCh. B - Prob. B9.4MBDCh. B - Prob. B9.5MBDCh. B - Prob. B9.6MBDCh. B - Prob. B9.7MBDCh. B - Prob. B9.8MBDCh. B - Prob. B9.9MBDCh. B - Prob. B9.10MBDCh. B - Prob. B10.1MBDCh. B - Prob. B10.2MBDCh. B - Prob. B10.3MBDCh. B - Prob. B10.4MBDCh. B - Prob. B10.5MBDCh. B - Prob. B11.1MBDCh. B - Prob. B11.2MBDCh. B - Prob. B11.3MBDCh. B - Prob. B11.4MBDCh. B - Prob. B12.1MBDCh. B - Prob. B12.2MBDCh. B - Prob. B12.3MBDCh. B - Prob. B12.4MBDCh. B - Prob. B12.5MBDCh. B - Prob. B12.6MBD
Knowledge Booster
Similar questions
- The use of the Internet has evolved to the point where it is now an indispensable instrument for exercising one's right to free speech. It's standard practise for people to use hate speech to spread on social media platforms like Facebook and Twitter. Should there be no restrictions placed on the right to free speech for those who use the internet? The operators of social media platforms need to carefully assess the extent to which they may cut down on the number of negative comments they publish.arrow_forwardMany people believe that the digital world is separated between 'haves' and 'have nots' — those who have access to and can use a computer and the Internet, and others who do not. Some argue that this has major ethical consequences and that there is a moral need to address the discrepancy; the 'have nots' may feel discriminated against or'socially excluded,' and are missing out on numerous life possibilities. Do you believe that everyone, regardless of location, need, competency, or financial ability, should have access to computers and the Internet? If this is the case, who should supply the services and education, and who should foot the bill? If not, please explain why not everyone need access to the internetarrow_forwardIn what ways may they be termed visible radiation? Pick the optimal option. t) Compile a record of your career highlights and hang it in the office hall of fame Using a digital whiteboard, important policies and procedures may be displayed for all employees to see. Keep your employees up-to-date on the latest happenings by posting information on digital displays or whiteboards. Abovearrow_forward
- Robots may be trained to do jobs that might be harmful to human health, insulting to sensitive audiences, or just too monotonous for human workers. If you think robots could eventually outperform humans in some jobs, provide an example. Provide justification for why you think it's preferable for this work to be performed by a computer rather than a human.arrow_forward1. 2020 shook our world in unimaginable ways, forcing us to face multiple public health emergencies. And, while technology isn’t the primary tool to solve for systemic health issues, it can play an important role in partnership with government and civil society efforts. However, for technology to be effective, it must be built responsibly – and no matter how good a tool is, people won’t use it unless it has their trust. Discuss two (2) ethical issues linked to the use of computer technology in healthcare, specifically related to the COVID-19 pandemic.arrow_forwardoung, technically oriented hackers argued that, if the owners of a computer system want to keep outsiders out, it is their responsibility to provide better security. Ken Thompson, one of the inventors of UNIX, said, "The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor’s house. It should not matter that the neighbor’s door is unlocked." Which position do you agree with more? Give your reasonsarrow_forward
- This question relates to the ethical issues associated with information technology. Consider the ten commandments of computer ethics. Select any five ofthese commandments. Then, find one published example that describes a violation of each of theselected commandments.Note: The violation identified should be described.arrow_forwardEthical Decision Making Instead of Charlie being named CISO, suppose instead that Fred hired his son-in-law, an unemployed accountant, to fill the role. Assuming the person had no prior experience or preparation for a job in information security, did Fred make an ethical choice? Explain your answer. Suppose that SLS has implemented the policy prohibiting use of personal USB drives at work. Also, suppose that Davey Martinez brought in the USB drive he had used to store last month’s accounting worksheet. When he plugged in the drive, the worm outbreak started again and infected two servers. It’s obvious that Davey violated policy, but did he commit ethical violations as well?arrow_forwardUsing the scenario, include a one-sentence analysis of the morality from Act Utilitarianism point of view of the following: The EDSP compliance with the FBI request in scenario three. Scenario 3 To address the problem of accidents caused by speeding, the East Dakota State Legislature passes a law authorizing the East Dakota State Police (EDSP) to install video cameras on all its freeway overpasses. The cameras are connected to computers that can reliably detect cars traveling more than five miles per hour above the speed limit. Sophisticated image recognition software enables the system to read license plate numbers and capture high-resolution pictures of vehicle drivers. If the picture of the driver matches the driver's license photo of one of the registered owners of the car, the system issues a speeding ticket to the driver, complete with photo evidence. The new system receives extensive media coverage, and six months after the system is put into operation, the number of people…arrow_forward
- Using the scenario, include a one-sentence analysis of the morality from Act Utilitarianism point of view of the following: The EDSP compliance with the FBI request in scenario three. Scenario 3 To address the problem of accidents caused by speeding, the East Dakota State Legislature passes a law authorizing the East Dakota State Police (EDSP) to install video cameras on all its freeway overpasses. The cameras are connected to computers that can reliably detect cars traveling more than five miles per hour above the speed limit. Sophisticated image recognition software enables the system to read license plate numbers and capture high-resolution pictures of vehicle drivers. If the picture of the driver matches the driver's license photo of one of the registered owners of the car, the system issues a speeding ticket to the driver, complete with photo evidence. The new system receives extensive media coverage, and six months after the system is put into operation, the number of people…arrow_forwardVarious catastrophic natural catastrophes, such as hurricanes and earthquakes, have struck the Caribbean and the rest of the globe in recent years. Climate change, according to many environmentalists, is to blame for the rise in natural catastrophes. Choose two (2) new technologies that can be utilized to combat climate change and explain them briefly.arrow_forwardquestion 8 Enormous State University's Business School is buying computers. The school has two models from which to choose, the Pomegranate and the iZac. Each Pomegranate comes with 400 GB of memory and 80 TB of disk space; each iZac has 300 GB of memory and 100 TB of disk space. For reasons related to its accreditation the school would like to be able to say that it has a total of at least 34,000 GB of memory and at least 9,200 TB of disk space. If the Pomegranate and the iZac cost $2,000 each, how many of each should the school buy to keep the cost as low as possible? HINT [See Example 4.] (If an answer does not exist, enter DNE.) Pomegranate computersiZac computersarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning