Computer Science: An Overview (12th Edition)
12th Edition
ISBN: 9780133760064
Author: Glenn Brookshear, Dennis Brylow
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 4, Problem 7SI
Explanation of Solution
Software registration process on ethical viewpoint:
The user provides some personal information before using the software services such as his name, age, profession, etc. The user should be very careful while giving personal information to software’s developers. The misuse of the personal information can be avoided by taking some preventive actions.
The users are entitled to certain agreements while registering any software services which are given as:
- The developers can access the personal information such as name age profession of the user for any kind of genuine purpose.
- The trust factor should be there before providing any personal information during the software registration process...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
When you hear the word "email," what are some of the first things that pop into your head? What takes place after an email has been delivered after it has been sent from the sender's inbox? Make a list of everything that you are aware of today that you were unaware of in the past. It would pique my curiosity to find out if anyone has any insight into the circumstances that lead to these inequalities, as it would pique my interest to see if anybody does. Within your firm, is there a variation in the level of complexity from one model to the next?
A user interface can be extremely constraining in its capabilities. The interface design, for example, may prevent users from leaving the application and returning to the Windows desktop or from logging on to the Internet. Such limitations in a user interface should be avoided. How do you feel about it, and why do you feel that way?
There is a need to create a privacy policy for a paking software. A privacy policy specifies key points on how privacy and security with regards to the application , user data and system flow is achieved. It focuses on privacy and security for the software and not for other entities(i.e vehicle, parking office etc..)
From a high level our parking software has the following rules
The system has several parking lots and the parking fees are different for each parking lot.
Customers must have registered with the parking office in order to use any parking lot. Customers can use any parking lot. Each parking transaction will incur a charge to their account.
Customers can have more than one car, and they may request more than one parking permit for each car.
The system provides a 20% discount to compact cars compared with SUVs.
For simplicity, assume that the Parking Office sends a monthly bill to customers and customers pay it outside of the parking system.
Privacy policies generally…
Chapter 4 Solutions
Computer Science: An Overview (12th Edition)
Ch. 4.1 - What is an open network?Ch. 4.1 - Prob. 2QECh. 4.1 - What is a router?Ch. 4.1 - Prob. 4QECh. 4.1 - Prob. 5QECh. 4.1 - Prob. 6QECh. 4.2 - Prob. 1QECh. 4.2 - Prob. 2QECh. 4.2 - Prob. 3QECh. 4.2 - Prob. 4QE
Ch. 4.2 - Prob. 5QECh. 4.2 - Prob. 6QECh. 4.2 - Prob. 7QECh. 4.2 - Prob. 8QECh. 4.3 - Prob. 1QECh. 4.3 - Prob. 2QECh. 4.3 - Prob. 3QECh. 4.3 - Prob. 4QECh. 4.3 - Prob. 5QECh. 4.4 - Prob. 1QECh. 4.4 - Prob. 2QECh. 4.4 - Prob. 3QECh. 4.4 - What keeps a computer on the Internet from...Ch. 4.5 - Prob. 1QECh. 4.5 - Prob. 2QECh. 4.5 - Prob. 3QECh. 4.5 - Prob. 4QECh. 4.5 - Prob. 5QECh. 4 - Prob. 1CRPCh. 4 - Prob. 2CRPCh. 4 - Prob. 3CRPCh. 4 - Prob. 4CRPCh. 4 - Prob. 5CRPCh. 4 - Prob. 6CRPCh. 4 - Prob. 7CRPCh. 4 - Prob. 8CRPCh. 4 - Prob. 9CRPCh. 4 - Prob. 10CRPCh. 4 - Prob. 11CRPCh. 4 - Prob. 12CRPCh. 4 - Prob. 13CRPCh. 4 - Prob. 14CRPCh. 4 - Prob. 15CRPCh. 4 - Prob. 16CRPCh. 4 - Prob. 17CRPCh. 4 - Prob. 18CRPCh. 4 - Prob. 19CRPCh. 4 - Prob. 20CRPCh. 4 - Prob. 21CRPCh. 4 - Prob. 22CRPCh. 4 - Prob. 23CRPCh. 4 - Prob. 24CRPCh. 4 - Prob. 25CRPCh. 4 - Prob. 26CRPCh. 4 - Prob. 27CRPCh. 4 - Prob. 28CRPCh. 4 - Prob. 29CRPCh. 4 - Prob. 30CRPCh. 4 - Prob. 31CRPCh. 4 - Prob. 32CRPCh. 4 - Prob. 33CRPCh. 4 - Prob. 34CRPCh. 4 - Prob. 35CRPCh. 4 - Prob. 36CRPCh. 4 - Prob. 37CRPCh. 4 - Prob. 38CRPCh. 4 - Prob. 39CRPCh. 4 - Prob. 40CRPCh. 4 - Prob. 41CRPCh. 4 - Prob. 42CRPCh. 4 - Prob. 43CRPCh. 4 - Prob. 44CRPCh. 4 - Prob. 45CRPCh. 4 - Prob. 46CRPCh. 4 - Prob. 47CRPCh. 4 - Prob. 48CRPCh. 4 - Prob. 49CRPCh. 4 - Prob. 50CRPCh. 4 - Prob. 1SICh. 4 - Prob. 2SICh. 4 - Prob. 3SICh. 4 - Prob. 4SICh. 4 - Prob. 5SICh. 4 - Prob. 6SICh. 4 - Prob. 7SICh. 4 - Prob. 8SICh. 4 - Prob. 9SICh. 4 - Prob. 10SICh. 4 - Prob. 11SICh. 4 - Prob. 12SI
Knowledge Booster
Similar questions
- More Malware! Ugh! For this question select a specific type of malware (Trojans Horses, Viruses, Worms, Ransomware) and identify the following (Do not use examples in the book!): What type it is (name the category of malware (see the parenthesis above). How does it infect a computer? How does it get into the computer (most common ways – not an exhaustive list); what does it do once it is there? Are there any well-known examples of this type of malware? Name at least one. Describe the damage done by it (cost of loss or number of systems affected or hack that occurred). What is the best defense against this type of malware? Explain.arrow_forwardThere is a need to create a privacy policy for a parking software. A privacy policy specifies key points on how privacy and security with regards to the application , user data and system flow are achieved. It focuses on privacy and security for the software and not for other entities(i.e vehicle, parking office etc..) From a high level our parking software has the following rules The system has several parking lots and the parking fees are different for each parking lot. Customers must have registered with the parking office in order to use any parking lot. Customers can use any parking lot. Each parking transaction will incur a charge to their account. Customers can have more than one car, and they may request more than one parking permit for each car. The system provides a 20% discount to compact cars compared with SUVs. For simplicity, assume that the Parking Office sends a monthly bill to customers and customers pay it outside of the parking system. Based on the information…arrow_forwardonline Application Design in ppt The main "point" that has to be made with application design is that application design can be a performance issue. That is right, the way that your front-end and back-end interact can change how good the efficiency of your system is the biggest thing is that we need to make sure that our front end has spaces for each one of these fields. the front end is the way your user interacts with your database....period. If there isn't a screen to enter grades, then that student is not going to be entering a grade. On the flip side, you can't see that your system is going to generate a schedule for a student and not have the fields in the back end, it just doesn't work. Thinking about an application is very much an HCI (human computer interaction) way of thinking. Make sure you include a "clean" page of the screen you are designing as well as a "marked up" version that shows which field the text field (or other thing) is related to as well as a description…arrow_forward
- Assume that, you have been recruited as a software engineer to develop a biometric based (fingerprint) voting system. The new voting system comprises of the following steps for the administrators: (a) Register the details of the nominated candidates with name and photograph. (b) Register the voters' details with name, photograph and fingerprint. (c) Verify the voters identity proof and match the fingerprint for allowing them to cast their vote. (d) Count the number of votes casted for the corresponding candidates and to publish the results. Assume that, call and return architecture is recommended to represent the above scenario. Map the given scenario with the recommended architecture. Illustrate its pros and cons in detail.arrow_forwardWhen it comes to using software, what is the biggest difference between owning the copyright and having a license?arrow_forwardRei computer program was published by distributed by her company without her consent. This happened a year after Rei resigned from her position. Do you think a cybercrime was committed? * No, there wasn't what the company did was in their jurisdiction considering that Rei was their former employee Yes there was, Rei is a victim of social engineering since they published the program without the distribution rights or even consent given by Rei No, there wasn't since it is a computer program and copyright only applies to materials that are literary Yes there was, Rei was a victim of copy right infringement since the creative right of the program is own by its developer or the programmer and without Rei consent what the company did was unlawfularrow_forward
- Why copying someone else work is plagiarism? What are things to do to ensure you do not plagiarize?arrow_forwardWhat kind of maintenance do you recommend for a software system used by a well-known furniture manufacturing company? Also, be sure you have enough facts to back up your answer. If the customer had just purchased a new computer-based application, they may have encountered elements that had never worked properly before, such as a broken order placement module or an inaccurately created invoice. These concerns emerged quickly after installation and are often critical, requiring immediate attention to prevent disrupting normal business operations.arrow_forwardWhat kind of maintenance do you recommend for a software system used by a well-known company in the furniture manufacturing industry? Additionally, give sufficient supporting facts to back up your answer. If the customer had just purchased a new computer-based application, it is possible that they encountered aspects that had never worked properly before, such as a faulty order placement module or an erroneously created invoice. These difficulties emerged quickly after installation and are often time-sensitive, necessitating immediate attention in order to minimize interruptions to routine corporate activities.arrow_forward
- Failure of a software application might cause serious problems for its users. When companies release software to the public, it is possible that it contains bugs that might cause the software to crash. Should these companies be held to an ethical standard that requires them to provide this information? Should they be required to compensate clients when their software malfunctions and results in financial loss? The software business should follow suit and provide guarantees, just like retailers must do with their products, for consumers.arrow_forwardWhy do bugs exist, exactly? How may a bug come into a piece of software? Provide some specific examples.arrow_forwardWhich technique of access control limits a user's ability to access the information that is necessary for them to execute their job?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengageEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningCOMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE L
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L