Concept explainers
A)
Mention the following for an ad-serving company that maintains a log of cookie data for ads:
Click Rate:
The click rate of an ad is the number of times the ad has been clicked by users.
B)
Mention the following for an ad-serving company that maintains a log of cookie data for ads:
Click Rate:
The click rate of an ad is the number of times the ad has been clicked by users.
C)
Mention the following for an ad-serving company that maintains a log of cookie data for ads:
Click Rate:
The click rate of an ad is the number of times the ad has been clicked by users.
D)
Mention the following for an ad-serving company that maintains a log of cookie data for ads:
Click Rate:
The click rate of an ad is the number of times the ad has been clicked by users.
E)
Mention the following for an ad-serving company that maintains a log of cookie data for ads:
Click Rate:
The click rate of an ad is the number of times the ad has been clicked by users.
F)
Mention the following for an ad-serving company that maintains a log of cookie data for ads:
Click Rate:
The click rate of an ad is the number of times the ad has been clicked by users.
Want to see the full answer?
Check out a sample textbook solutionChapter 9 Solutions
Using MIS (10th Edition)
- Hash functions such as SHA256 play an integral role in Bitcoin, which is an application of blockchain technology. Research what role cryptographic hash functions play in Bitcoin and other cryptographic currencies. You may focus on one aspect, such as the word cryptographic, or an actual implementation, or the philosophy behind hash function.arrow_forwardTony, a data analyst for a major casino, is working after normal business hours to finish an important project. He realizes that he is missing data that had been sent to his co-worker Robert. Tony had inadvertently observed Robert typing his password several days ago and decides to log into Robert’s computer and resend the data to himself. Upon doing so, Tony sees an open email regarding gambling bets Robert placed over the last several days with a local sports book. All employees of the casino are forbidden to engage in gambling activities to avoid any hint of conflict of interest. Tony knows he should report this but would have to admit to violating the company’s information technology regulations by logging into Robert’s computer. If he warns Robert to stop his betting,he would also have to reveal the source of his information. What does Tony do in this situation?a) Name some six human acts from the excerpt b) Giving three scenarios from the excerpt, evaluate the morality of acts…arrow_forwardCreate a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the text. Remember to work from right to left, with the pattern 1 > 3, 2 > 6, 3 > 8, 4 > 1, 5 > 4, 6 > 7, 7 > 5, 8 > 2 where 1 is the rightmost of the eight cells. Input the text ABCDEFGH as single characters into the first row of cells. What is displayed?arrow_forward
- Explain why a stream cipher fails to protect message integrity?arrow_forwardAssume that you want to make the message available to the users who are authorized to read the respective message. Each message contains some confidential data; therefore, instead of sending the plain text to each user, you decided to encrypt each message using secret key encryption and make the encrypted messages available for read. You need to distribute the encryption keys with the encryption methods to the authorized users. The communication channel between the users and the website is insecure; however, the pubic keys of the users are encrypted through double encryption methods for 2-layer of authentication mechanism and convert into cipher text as follows. The following cipher message was produced using the Rail Fence algorithm with 3 rails: “WECRLTEERDSOEEFEAOCAIVDEN” What is the corresponding plain text?What’s wrong with the shift cipher? Provide any three reasons.arrow_forwardCreate an activity diagram based on the following narrative: “Microsoft Bing (formerly known as Bing) is a web search engine owned and operated by Microsoft. Bing uses single sign on based on security assertion markup language (SAML) protocol to interrelate with other companies. Bing is like a service provider that provides different services such as yahoo mail of start pages. Partner companies act as identity providers and control user names, passwords, and other information used to identify, authenticate and authorize users for web applications that Bing hosts. Each partner provides Bing with the uniform resource locator (URL) of its single sign on service as well as the public key that Bing will use to verify SAML responses. When a user attempts to use some hosted Bing application, such as Yahoo, Bing generates a SAML authentication request and sends redirect request back to the user's browser. Redirect points to the specific identity provider. SAMLauthentication request contains…arrow_forward
- Hashing algorithms have been around a long time. For example, MD5 has been used for authentication of numerous websites. In recent years however, between the increase in CPU performance and weak keys, MD5 no longer provides adequate protection. Research newer Hashing algorithms that can replace MD5. Select 3 and do a pro-con comparison of them. Which would you recommend? Why? How would you deploy this new algorithm in your organization’s website?arrow_forwardInfer the choice of data structure in case you are running a clinic which looks after patients of all sorts. Is it a good strategy to serve patients on first come first serve basis? Justify your answer with logical reasoning. i. ii. Imagine you have a web-site which serves files to hundred thousand users. You cannot service all requests; you can only handle say thousand at once. A fair policy would be first-come-first serve: i.e. serve 1000 at a time in order of arrival. This implies you will have to store incoming requests. Infer the choice of the most appropriate ADT.arrow_forwardSheela is working in a Cyber. Her current task is to create Username and Password for the users and make the list of all the users visiting her Cyber and sort (ascending order) them according to their usernames. And display the list after sorting. If any user exits the cyber then she had to delete that user details by searching them by their usernames. Sheela finds it very difficult to manage the users as many people visit her Cyber. Let's help Sheela by writing code as required to make her work easier. Write a Python code to take the contact details from the user and add the users to the list display it, and sort according to the user name, then display the same. Then Delete the user by searching them through their username. If, no user found with a given name, print “No user found with name ‘username’”. Create a class User in ‘User.py’ with the following attributes, Attribute Data Typename strmobile_number intusername strpassword str Use _init_() constructor to initialize the…arrow_forward
- Please write a new overview for this question that is not the same as the one already available for reveiw. Perform a Web search for “Announcing the Advanced Encryption Standard (AES).” Read this document, which is a FIPS 197 standard. Write a short overview of the development and implementation of this cryptosystem.arrow_forwardWhat Punishment for Webcam Spying is Appropriate? Microphones, digital cameras, and webcams have many practical and harmless uses. These technologies also can leave you open to spying. For example, one school district used software, which was supposed to track the school-distributed laptops in case of theft, to take photos and scree captures of students. In another instance, a person noticed that when she gave a customer service rep access to her computer, he turned on her webcam without asking for her permission. Cybercriminals can use spy tools take photos, or record video or audio, without turning on a light or other notification that indicates your camera or microphone is in use. The Flame virus is one way for spy tools to infect your computer. Security experts recommend using a sticker to cover your webcam and inserting a dummy plug in the microphone port when you are not using it. These technologies also allow people to take photos or videos in a public setting and share them…arrow_forwardInvoice-No Client-No Client-Name Product-No John Product-Name Product-Price RA 000 RS 000 Quant 1234 4321 12344 Screen 2 12345 Case 4532 2345 Carl 13678 USB RA00 10 9876 8765 Remy 67800 R20 24 2.1 In which Normal Form is the above table? Explain how you arrived at your answer. 22 Explain the steps required to convert from an unnormalized table to 3" Normal Form. 2.3 Convert the given table into 1" Normal Form. Write your answer as a relation. Eg table name(att1, att2) 2.4 Write out all the dependencies of 2.3. 2.5 Convert the relation in 2.3 into 2 Normal Form. Write your answer as a relation. 2.6 Convert the relation in 2.5 into 34 Normal Form. Write your answer as a relation. 2.7 What is Normalization? 2.8 Explain Boyce-Codd Normal Form.arrow_forward
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning