Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 4.6, Problem 1EGDQ
a)
Explanation of Solution
“Yes”, the decision to develop the free app for harvesting the individual data is ethical according to categorical imperative.
Reason:
Categorical imperative is that in all situations the complete requirements must be followed and it should be acceptable as an end in it...
b)
Explanation of Solution
“Yes”, the decision to develop the free app for harvesting the individual data is ethical according to utilitarian perspective.
Reason:
Utilitarianism is nothing but a moral theory that states that the greatest act is the one that increases utility...
c)
Explanation of Solution
Reaction of the user to harvest the data to free app:
The user reaction at the time of the harvest the data while exchange of free app comes under in two cases; they are as follows:
- Some user may think it as optimis...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
(e) Based on the type of hacker you select, explain whether a hacker should be legally prosecuted in they break into a device and review or perhaps revise or destroy the data in the device.
(f) If you feel the hacker is doing something of benefit, explain your thoughts.
(g) Every person in the class must present their own unique situation regarding ergonomics so there should be no duplicates from anyone in the class when they present their Discussion entry.
Is it OK, in your view, to give up a negligible amount of personal information in exchange for free or almost free software? Is there a way to make them responsible for the data that they gather and how they utilise it, and is this technique even possible? Always be prepared to provide an argument in support of your stance. Your assertion has to be backed up by some kind of proof.
Study the scenario and complete the question(s) that follow:
Pearson Institute of Higher Education Library BooksThe Pearson Institute Library is comprised of many books covering various subjects. Students borrow these books to aid them in their studies. The Pearson Library team would like to know the ten most borrowed books by students. They have approached you as a Java Developer to help them to develop an app that will provide them with these statistics. They keep records of the borrowed books and the number of times they have been borrowed. Below is sample data from the Books.txt file that you have been provided with:
Sample data – Books.txtIntroduction to Java programming; Daniel Liang; 25The C# Programming Yellow Book; Robert Miles; 12Learning Python; David Ascher; 10The C++ Programming Language; Bjarne Stroustrup; 21Programming PHP; Rasmus Lerdorf; 15
Create a Java application for the Pearson Library. The application must consist of a Book class that is composed of the book…
Chapter 4 Solutions
Using MIS (10th Edition)
Ch. 4.4 - Prob. 1NFCQCh. 4.4 - Prob. 2NFCQCh. 4.4 - Why might doctors and nutritionists be interested...Ch. 4.4 - Prob. 4NFCQCh. 4.4 - Prob. 5NFCQCh. 4.4 - Prob. 6NFCQCh. 4.6 - Prob. 1EGDQCh. 4.6 - Prob. 3EGDQCh. 4.6 - Prob. 4EGDQCh. 4.8 - Prob. 1SGDQ
Ch. 4.8 - Prob. 2SGDQCh. 4.8 - Prob. 3SGDQCh. 4.8 - Prob. 4SGDQCh. 4.8 - Prob. 4.1ARQCh. 4.8 - Prob. 4.2ARQCh. 4.8 - Prob. 4.3ARQCh. 4.8 - Prob. 4.4ARQCh. 4.8 - Prob. 4.5ARQCh. 4.8 - Prob. 4.6ARQCh. 4.8 - Prob. 4.7ARQCh. 4.8 - Prob. 4.8ARQCh. 4 - Prob. 4.1UYKCh. 4 - Prob. 4.2UYKCh. 4 - Prob. 4.3UYKCh. 4 - Prob. 4.4UYKCh. 4 - Prob. 4.5UYKCh. 4 - Prob. 4.6UYKCh. 4 - Prob. 4.7CE4Ch. 4 - Prob. 4.8CE4Ch. 4 - Prob. 4.9CE4Ch. 4 - Prob. 4.1CE4Ch. 4 - Prob. 4.11CE4Ch. 4 - Prob. 4.12CS4Ch. 4 - Prob. 4.13CS4Ch. 4 - Prob. 4.14CS4Ch. 4 - Prob. 4.15CS4Ch. 4 - Prob. 4.16CS4Ch. 4 - Prob. 4.17MMLCh. 4 - Prob. 4.18MML
Knowledge Booster
Similar questions
- For this assignment you are to find 3 real-world examples of identity theft, preferably medical id theft, but any type will be accepted. One of the examples should be your own if you were an id theft victim (I personally have been a financial id theft victim twice) or someone you know. This will allow you to know the details of how the theft occurred and how it was handled. One of the examples must come from research news stories and other resources found on the Web. Provide a link to each website in your report.. The final example may be personal or a news story. For each case, identify the type of ID theft that occurred, and answer these questions: what did the thief do (if known) to acquire the information, how was it discovered, what were the damages incurred, how long did it take to resolve the problems caused by the id theft?.arrow_forwardSET 1 a) Discuss and describe an important idea or hypothesis from the course. b) How can you use this explanation to explain a personal experience? Please be as specific as possible. The aim of this written submission is for you to focus on the events of your life (work/school/family/friends) and use them as an excuse to put what you've learned in class into reality. Try to answer the following questions when you write your submissions 3) In your view, what elements of the idea, hypothesis, or suggestion fit well?arrow_forwardSET 1 a) Discuss and describe an important idea or hypothesis from the course. b) How can you use this explanation to explain a personal experience? Please be as specific as possible. The aim of this written submission is for you to focus on the events of your life (work/school/family/friends) and use them as an excuse to put what you've learned in class into reality. Try to answer the following questions when you write your submissions. 1) What did you take away from the encounter?arrow_forward
- Please paraphrase the text below and rewrite it in your own words. Since the enactment of the Bayh–Dole Act in the USA in 1980, there has been a substantial rise in the commercialization of science and other forms of university technology transfer. According to the Bayh-Dole Act, universities are allowed to get the intellectual property rights of inventions made through the employees on their campus. An increase in university licensing, patenting and start-up creation in the USA has also been observed in many countries in Europe and Asia, as well as in Australia and Canada. These commercialization activities have come to be known in some circles as ‘academic entrepreneurship’. Academic entrepreneurship has certain distinctive features more traditional forms of entrepreneurship, notably regarding the emergence of entrepreneurial ventures from traditionally non- commercial contexts, where the academic usually continues to work for the university, and the ownership of intellectual…arrow_forwardWith the advent of various technological advancements, law enforcement efforts in the investigation and prosecution of crime have been met with positive results. However, with every advantage comes a disadvantage. Criminals have also benefited from these technologies and use the same advancements that law enforcement employs during the commission of their crimes, or as a tool for their crimes (this is evidenced in computer-related offenses and the misuse of the internet). In a 3 – 4 page paper (excluding title and reference pages), address the following areas in full detail: summarize the advantages of computers/software and the use of computer technology in investigations, summarize the disadvantages to law enforcement with respect to the advancements of computers, research a case where the computer was used to aid in the commission of a crime, research a case where the use of the computer was beneficial to the prosecution in a criminal case, and provide a final…arrow_forwardLearn all you can about Patents.: Then: 1) define patent; 2) what government agency grants patents and how long does a patent last; 3) what does it cost; 4) what can be patented (see the Patent Act of 1952); 5) what are the three types of patents; 6) do U.S. patents provide protection or rights only within the US and its territories; 7) what did Congress do in 1984 to protect patent holders from the exporting of patented components for assembly abroad; 8) what does the Bayh-Dole Act of 1980 address?arrow_forward
- Could you assist me with question 2.7, specifically parts A and B? I'm finding this problem difficult and would appreciate your help, as I'm unsure of the steps. If possible, please provide a step-by-step explanation so I can understand the process. Can you label both parts so I can know which one is part A and which one is part B.arrow_forwardIs it impossible to provide opposing views on the topic of IT?arrow_forwardChoose any video about either of the first two Midterm topics. Cite the video as reference for your output. From the content of the video, answer these questions: End-User Computing How does end-user computing help in optimizing end-users in an organization or business? What aspects of end-user computing and development would use consider if you are to make an information system for end-users? What possible applications for end-user computing can you think of for a specific organization or business? Electronic Communications System How do the concepts/aspects/components from electronic communication systems improve upon a management information system? Can the discussed concepts/aspects/components for electronic communication systems be implemented across all possible businesses and/or organizations? How? Are there possible risks and/or limitations to consider before implementing electronic communication system concepts/aspects/components?arrow_forward
- Are you able to offer a definition for each of the terms "data," "information," and "knowledge," as well as some examples?arrow_forwardA wide variety of everyday objects (including attractions at amusement parks, autos, elevators, and ovens) are really computers or information systems these days. The typical person would not connect them to a computer or database. The benefits are obvious, but are there any downsides to consider? As an example, if you rode a computer-controlled roller coaster, how confident would you be in its safety? As more and more mundane tasks are automated by computers, we have to ask whether the benefits are worth the cons. If so, then explain why.arrow_forwardConsider the following scenario: you've been tasked with developing a logical model of a school or college's registration system. Is a top-down strategy preferable, or is a bottom-up approach preferable in this situation? What considerations could have an influence on your decision?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education