Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 12.7, Problem 1SGDQ
Explanation of Solution
Mention whether a person can possibly know that his roommate has used his computer to copy MIS project into a flash drive:
It can said that it is very difficult to know that using a person’s computer; another person has copied his file. The scenario cannot compared to the daily life case when the roommate eats the top layer of chocolate, as in this case the effects are clearly visible as the user had an idea of the quantity of chocolates present earlier.
- However, in cases like copying a project into his or her flash drive, it is unlikely that the person will not notice as he may have logged on security logging for computer access...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Which of the following activities do you think should be fair use? Give reasons using copyright law and/or court cases. (If you think the ethically right decision differs from the result that follows from applying fair use guidelines, explain how and why.)
a) Making a copy of a friend's spreadsheet software to try out for two weeks and then either deleting it or buying your own copy.
b) Making a copy of a computer game, playing it for two weeks, and then deleting it.
There are advantages and disadvantages to downloading software via the internet versus launching it off a DVD. To satisfy the deadline, submit a paper to Canvas by the indicated deadline in MS Word format, double-spaced, no more than two pages, and free of spelling and grammatical errors.
Is it permissible, in your opinion, to trade a small amount of privacy for free or nearly free software? Is there a method to hold them accountable for the data they collect and how they use it? Always be ready to defend your position. There must be evidence to support your claim.
Chapter 12 Solutions
Using MIS (10th Edition)
Ch. 12.4 - Prob. 1EGDQCh. 12.4 - Prob. 2EGDQCh. 12.4 - Prob. 3EGDQCh. 12.4 - Prob. 4EGDQCh. 12.4 - Prob. 6EGDQCh. 12.4 - Prob. 7EGDQCh. 12.4 - Prob. 8EGDQCh. 12.4 - Prob. 9EGDQCh. 12.4 - Prob. 10EGDQCh. 12.6 - Sports are one area in which the collection and...
Ch. 12.6 - Prob. 2BOIQCh. 12.6 - Prob. 3BOIQCh. 12.6 - Prob. 4BOIQCh. 12.7 - Prob. 1SGDQCh. 12.7 - Prob. 2SGDQCh. 12.7 - Prob. 3SGDQCh. 12.7 - Prob. 4SGDQCh. 12.7 - Prob. 5SGDQCh. 12.7 - Prob. 6SGDQCh. 12.7 - Prob. 7SGDQCh. 12.7 - Prob. 1CGDQCh. 12.7 - Prob. 2CGDQCh. 12.7 - Prob. 3CGDQCh. 12.7 - Prob. 4CGDQCh. 12.7 - Prob. 5CGDQCh. 12.7 - Prob. 12.1ARQCh. 12.7 - Prob. 12.2ARQCh. 12.7 - Prob. 12.3ARQCh. 12.7 - What are the phases in the systems development...Ch. 12.7 - What are the keys for successful SDLC projects?...Ch. 12.7 - How can scrum overcome the problems of the SDLC?...Ch. 12.7 - Prob. 12.7ARQCh. 12 - Prob. 12.1UYKCh. 12 - Prob. 12.4UYKCh. 12 - Prob. 12.5UYKCh. 12 - Prob. 12.6CE12Ch. 12 - Prob. 12.7CE12Ch. 12 - Prob. 12.8CE12Ch. 12 - Prob. 12.9CE12Ch. 12 - Describe three reasons why cases like this will...Ch. 12 - Prob. 12.11CS12Ch. 12 - Prob. 12.12CS12Ch. 12 - The project was known to be in trouble, but it...Ch. 12 - Prob. 12.14CS12
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- In general, does playing video games on a computer have a positive or negative impact on a person's health? Are you able to substantiate your allegation with any supporting evidence?arrow_forwardWhen you hear the word "email," what are some of the first things that pop into your head? What takes place after an email has been delivered after it has been sent from the sender's inbox? Make a list of everything that you are aware of today that you were unaware of in the past. It would pique my curiosity to find out if anyone has any insight into the circumstances that lead to these inequalities, as it would pique my interest to see if anybody does. Within your firm, is there a variation in the level of complexity from one model to the next?arrow_forwardIs there an agreed-upon meaning of the word "privacy"? Write out five measures you can take to protect your privacy online.arrow_forward
- Scenario; Janet spent most of her time using the internet to watch online movies, listen to music and most of all she is always connected to communicate with her parents who are OFW. She misses her parents that they communicate most of the time when both Janet and her parents are available for work and school. But one day Janet felt anxious that with her frequent communication with her parents somebody will invade their privacy and be able to access vital information like SSS number, bank account number, and family whereabouts. If you are the developer of the video call platform how will you ensure the safety of those people who are using the platform? What is your opinion regarding the use of information by an online platform? What other problems can you identify aside from security while doing an online platform?arrow_forwardNumerous ordinary devices, such as amusement park attractions, automobiles, elevators, and ovens, among others, are now connected to a computer or information system. While there are certain advantages, are there also risks? For instance, would you feel more or less secure riding a computer-controlled roller coaster? Or would you feel secure enough traveling in a Tesla equipped with auto-drive? Do the advantages of expanding the computerization of common things outweigh the risks? What are your reasons for or against?arrow_forwardPLEASE MAKE SURE THAT YOU ARE ANSWERING THE QUESTIONS USING YOUR OWN THOUGHTS. STRICTLY NO COPY PASTE PLEASE! Answer each questions in not less than 2 paragraphs: 1. What is Heliocentric Model? 2. What is geocentrism?arrow_forward
- Is playing video games on a computer beneficial or harmful to human beings in the long run? What justifications do you have for holding this belief?arrow_forwardDo you believe that reading a piece of writing and judging it based on a preset set of criteria is a helpful strategy to prevent oneself from being misled by fake news and other forms of disinformation? What gives you reason to think that this is the situation?arrow_forwardSeveral credit card firms now give users one-time-use credit card numbers as an extra layer of security for online purchases. There is just one purpose for these numerals. Customers may get the one-time-use number by visiting the website of the organization that issued their credit card. What are the advantages of employing this technology as opposed to more traditional methods of utilising credit card numbers? What are the advantages and disadvantages of employing this approach as opposed to using an electronic payment gateway for your own authentication?arrow_forward
- Here's a plan to make it easier to get to those microfilmed documents when you need them. Micrographics: what exactly are they?arrow_forwardSearch for "steganographic tools" online. What have you learned so far? One of the programs has a trial version that may be downloaded and installed. Insert a brief text document into a picture. In a side-by-side comparison, can you discern the difference between the original picture and the one with the embedded file?arrow_forwardHow does the algorithm for fingerprinting work? To accomplish your goals, one of three options is chosen: block, remove, or allow material use.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,C++ for Engineers and ScientistsComputer ScienceISBN:9781133187844Author:Bronson, Gary J.Publisher:Course Technology Ptr
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
C++ for Engineers and Scientists
Computer Science
ISBN:9781133187844
Author:Bronson, Gary J.
Publisher:Course Technology Ptr