Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Briefly describe one computer application in medical care that has improved care and/or saved lives. 2. Explain the terms invisible information gathering and secondary

1. Briefly describe one computer application in medical care that has improved care and/or saved lives.

2. Explain the terms "invisible information gathering" and "secondary use," as they relate to personal information. Give an example of each.

3. Describe two devices or technologies that made copyright infringement much easier than it was before they existed. Tell what kinds of material could be copied more easily with each of them. (Include at least one device or technology that does not involve computers.)

4. Give one argument in favor of and one argument against mandatory licensing of computer programmers.

5. In the fall 0f 2008 Countrywide Morgage Corporation announced that the private information for thousands of their customers, including social security numbers and loan numbers, had been compromised. Countrywide offered these customers a free 2 year subscription to a credit protection service. Sould this action shield Countrywide from customer lawsuits? Could Countrywide do more? Should they? Given that it was a Countrywide employee who sold the data, does this change Countrywide's responsibilities toward the affected customers? Explain why or why not.

6. Discuss at least four factors that cause bugs and failures of computer systems. Include at least one that can be blamed on people and at least one that is inherent in the technology. For each of your four factors, tell which type of factor it is (blamed on humans or inherent in the technology). Include at least one example of each.

7. Describe some advantages of using computer technology (e.g., smart cards, databases, etc.) for identification cards and identification systems, as compared to the current Social Security card and number system. Describe some serious potential risks or problems of using computerized ID cards/systems. Consider both private and governmental uses.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Graph Databases New Opportunities For Connected Data

Authors: Ian Robinson, Jim Webber, Emil Eifrem

2nd Edition

1491930896, 978-1491930892

More Books

Students also viewed these Databases questions

Question

What does stickiest refer to in regard to social media

Answered: 1 week ago