preview

Blown To Bits: Digital Explosion Questions

Decent Essays

Blown to Bits Chapter 2 Questions
This chapter describes the various ways in which our personal privacy is compromised by the digital explosion.
Reading Questions:
Keep these questions in mind as you read chapter 2 .
Copy this document into Word or Google docs and for each question, write a short answer or paragraph as specified. Please use complete sentences. Upload your completed assignment to CANVAS.
Questions for pages 19-55
Short answer:
1. What is an RFID tag and what does it do? A Radio Frequency Identification tag; Indentifies things using radio waves

2. What is an EDR and what does it do?
“event data recorder” records event data

3. What is the difference between "big brotherism" and "little brotherism"?
Little Brotherism is where your neighbors and people just like you are able to access your information through the bits of information you leave on the internet. Big Brotherism is when it's more official people like governments, or the CIA who are using more intense tracking in order to catch criminals etc
.
4. …show more content…

4. How do “we leave digital footprints and fingerprints?” Do you think this is important for everyone to know? Why or why Not?
We leave digital footprints and fingerprints pretty much every time we use technology in general. Downloading, uploading, messaging, copying things like files, music, documents, and etc. all leave digital footprints and finger prints. I think it is important for everyone to know that because they should be aware that when they leave digital footprints and fingerprints that like in real life it can be tracked. Everyone should have the right to know when their privacy is at

Get Access