Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Review Questions 4-8 (pg 81) - 5 points Making Business Decisions Question 2 (pg 82) - 10 points Questions down below 6 Chrome File Edit

image text in transcribedimage text in transcribed
  • Review Questions 4-8 (pg 81) - 5 points
  • "Making Business Decisions" Question 2 (pg 82) - 10 points
  • Questions down below
image text in transcribedimage text in transcribed
6 Chrome File Edit View History Bookmarks Profiles Tab Window Help 1 11,. '5? Q 2 A MonFeb 27 1:50 PM 0 W y! a _= v! E BusinessD X 6 -) C' i platformivirdocs.com/r/s/0/doc/597033/sp/'l80199007/mi/573932330?cfi=%2F4%2F4 [I] 1'} a. I] g 3 networks, either for profit or simply for the challenge. A vrrus is software written wrth malicious 2023-0.,.r17.09 PM ' Q +cause annoyance or damage 1 7' + REVIEW QUESTIONS 55mm 2023-02...1,17 PM Screen Shot What are ethics and why are they importantto a company? What is the correlation between privacy and condentiality? What is the difference between pirated software and counterfeit software? What are the reasons a company experiences downtime? What are the costs associated with downtime? What is the relationship between adware and spyware? G) What are the positive and negative effects associated with monitoring employees? What is the relationship between hackers and viruses? MAKING BUSINESS DECISIONS 1. The Internet of Things Is wide Openfor Everyone! l \"Hf-\"999.\"? DCI DEI (> oT is transforming our world into a living information system as we control our intelligent lighting from our smartphone to a daily health check from our smarttoilet, Of course, with all great bocx technological advances come unexpected risks. and you have to be prepared to encounter various '30 Ch 5 D 1mm security issues with loT. Just imagine if your devices are hacked by someone who now can shutoff our water, take control of your car, or unlock the doors ofyour home from thousands of miles away. {lie arejust beginning to understand the security issues associated with loT and M2M, and you can ne sure that sensitive data leaka-e from our loT device is somethin ou will most likel encounter new-arm 'Im'i n (my god ll I\"? cx Chrome File Edit View History Bookmarks Profiles Tab Window Help GG Q 8 Mon Feb 27 1:51 PM Bb Upload Assi X y! how does p X Course Her X = Mid Term P: X y! madonna s| x Madonna U X Business Dr X + -> C platform.virdocs.com/r/s/0/doc/597033/sp/180199008/mi/573932200?cfi=%2F4%2F4 In a group, identify a few lol devices you are using today. These can include fitness trackers that Screen Shot Q 82 report to your iphone, sports equipment that provides immediate feedback to al + - ooo 2023-0....17.09 PM vacuum cleaners. If you are not using any loT devices today, brainstorm a few you might purchase in the future. How could a criminal or hacker use your lot to steal your sensitive data? What poten- tial problems or issues could you experience from these types of illegal data thefts? What might be some of the signs that someone had accessed your loT data illegally? What could you do to protect Screen Shot 2023-02...1.17 PM the data in your device? 2. Information Issues in the Information Age We live in the information age, when the collection, storage, and use of data are hot topics. One Logs example of inappropriate data handling occurred at a college where the monitoring of restrooms occurred every 15 seconds to observe the use of toilets, mirrors, and sinks. Students, faculty, and staff began complaining that the data collection was an invasion of their privacy and a violation of their rights. Another example of inappropriate data handling occurred when a professor of accounting at Screen Shot a college lost a flash drive containing information for more than 1,800 students, including Social 2023-0...50.37 PM Security numbers, grades, and names. Social Security numbers were included because the data went back to before 1993, when the college used Social Security numbers to identify students. What types of student data does your college collect? What could happen if your professor lost a thumb drive with all of your personal information? What types of issues could you encounter if someone stole your personal data? What can your college do to ensure this type of data storage violation does not occur? 88 C 3. WikiBlunders-Thin Ice Reports According to PC World these false facts all appeared on Wikipedia: DOCX David Beckham was a Chinese goalkeeper in the 18th century. 260 Ch 5 D 1.docx CX Paul Reiser's dead. (Reiser is an actor.) Sinbad's dead. (Sinbad is an actor.) Sergey Brin's sexy, dating Jimmy Wales, and both are dead. (Brin founded Google and Wales founded Wiking DOCX FEB 27 W *tv

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Restaurant From Concept To Operation

Authors: John R Walker

7th Edition

1118629620, 9781118629628

More Books

Students also viewed these General Management questions

Question

What is the difference between e-commerce and m-commerce?

Answered: 1 week ago

Question

What are the three formats of wills?

Answered: 1 week ago

Question

2. What we can learn from the past

Answered: 1 week ago

Question

2. Develop a good and lasting relationship

Answered: 1 week ago