Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Week 04 Homework #3 a)(Protected View)-Microsoft Word References Mailings ReviewView nternet location and might be unsafe. Click for more details. Enable Editing Week 04 Homework#3

image text in transcribed
image text in transcribed
image text in transcribed
Week 04 Homework #3 a)(Protected View)-Microsoft Word References Mailings ReviewView nternet location and might be unsafe. Click for more details. Enable Editing Week 04 Homework#3 There are 2 papers each worth 50% Turn to page 514 in the Discover Computers Bookand read and answerthe Ethics & Issues 11-3. Be sure to format your paper using APA style 1. Double Space 2. Times New Roman 3. Page Number upper right hand corner 4. Indent after every paragraph 5. Citation Page Use a separate word document and save the document as>> Week 04 Homework#3 Student Last Name Paper1 Turn to page 550 in the Discover Computers Book and read and answer the Critical Thinking questions1- 3. Be sure to format your paper using APA style: 1. Double Space 2. Times New Roman 3. Page Numberupperright hand corner 4. Indent after every paragraph 5. Citation Page use a separate word document and save the document as >> week 04 Homework #3-Student Last Name Paper2 Address 514 chapter 11 Building Solutions ETHICS & ISSUES 11-3 feel that protecting data privacy partially In another case, a student accessed personal data for school employees from is the responsibility of the person who the schools network. In this instance What Should the Consequences Be If a User Accidentally Accesses Confidential Data? A student discovered private student data the student allegedly attempted to profit is the responsibuity of the institution or on a publidy accessible area of a university from the data. Administrators charged computer Instead of notifying authorities, he the high school student with criminal took the information to the student news trespassing. Other exampies include paper. The newspaper advisor authorized the students attempting to alter grades, access publication of an artidle about the situation. test questions, or disrupt or trace a school's Consider This: Is an institution responsible Although the article did not include any student names or personal information, the Institutions often attempt to sesolve administration fired the newspaper's adviser security breaches quietly. Some fear that sible? Why? Even if a person is not trying for violating the university's computer poli publicity may cause financial loss and may to profit from a data breach, is he or she uncovers the breach. Others feel that it organization to secure its servers and educate employees about protection of confidential data. network activity for unauthorized access of its personal data or is the person who accessed it respon- cies and nearly expelled the student. Was the encourage hackers to target the institution. still responsable for the discovery? Why or student obligated to report the vulnerability In some cases, an institution may file to the administration? Was the school right to lawsuits against those who make security breaches, even if they do not publish the fire the advisor for not reporting the breach? breaches public, including reporters. Some why not? Are journalists wrong to expose accessed data? Why or why not? SECURE IT 11- Recovering from Identity Theft In the past 10 years, more than 640 million Americans fell victim to identity theft, according to the identity Theft Resource Center Data breaches in businesses, banks faud alert, you are entitled to receive aReview financial accounts. Look for medical centers, and schools have affected nearly 39 percent of Americans. This crimefrom the theft to obtain the report, how s the complaint most often reported to the ever, because creditors may report activity ederal Trade Commission (FTC) account owners if a new request for credit is submitted. This fraud alert must be renewed every 90 days Order credit reports. Once you filea Keep records of your actions. Create a journal that records the names of people you called, phone numbers, dates, and sent. unusual activity, and check to see if any accounts were opened recently Continue reviewing the accounts even if you do not free credit report. Wait at least 30 days On average victims of identity theft pend 25 hours setting the resulting issues. on a monthly basis, and your most current see any questionable transactions report may not include current information.Enroll in a credit monitoring service Request that only the last four digits of Each of the three national credit reporting 550 Chapter 11 Building Solutions Critical Thinking The Critical Thinking exercises challenge your assessment and decision making slls by presenting real-world situations associated with chapter concepts. The Collaboration exercise should be completed with a team Instructions voluate the situlitions belbw, using personal eeriences and one or more rescurces available to you tsuch as articles on the web arint blogs, podasts videos, televsion, user guildes other individuals, electrons or computer stores enc.), Perform the tasks requessed in each enescise and shure your deierables in the formar requested by your suesot, pesentuation, dsonsion, blog past. widea or other meursd 1. Online Movie Reviews more data and more quickly searching for data, as well Information about movie titles and television shows is available from the web datahase IMDb (Internet Movie Database). Visitors can search IMDb using by itle, cast member, year produced, characters, genre, awards, or other criteria. Each movie or show s listing offers a brief description and rating and includes links the to such items as summary, trivia, reviews, quotes, and even streaming video options. s generating reports. Do This: Prepare information aimed toward individuals who prefer spreadsheets to databases, Include reasons why it is not adhisable to store large amounts of data in spreadsheets, as well as the reporting and query- ng capabilitics of data- bases. Explain benefits Do This: Visit imdb.com and search for both recently for uing a datause for released and classic movies. Explain the steps you uned to query the movie datahase. Assess how complete the information provided was. Who would henefit most from using the movie database? Why? Answer the following questions about your experiences. Did the information provided differ when viewing recently released titles versus classic movies? What did you collaborating and shar- ing information among departments in a business 3. Case Study learn from your queries? Can yoa identify a few ficlds that are included in the records for each movie? What interactive features can you identify? Can you find any HTMLS features that have been incorporated Amateur Sports League You are the new manager for a nonprofit amateur soccer league. The league uses a database to store information about its players, teams, schedules, and statistics. The league's websie uses information stored in the database to display team rosters, league standings, and events. The board of directors has asked you to investigate how the league should secure its database 2. Spreadsheets versus Databases Some individuals and small organizations prefer using spreadsheets instead of databases. People who use spreadsheets might argue that similar to databases, information about spreadsheets have columns and rows, and you can keep exist for databases? Who should determine the secu- track of different sets of data in individual worksheets. This is similar to how you woulkd use tables in a datahase to store different data sets. In addition, some find it easier to install, use, and maintain spreadsheet software than database software. After reading this chapter, you are convinced that databases have additional advantages, such as the capability of storing not Compile your findings. Do This: Using information learned in the chapter as well as performing additional research, prepare securing a database. What risks rity measures to take? What should you include in the database security policy? Inclode recommendations for maintenance, and assign- ing different access levels to employees, coaches, and players. Is the league responsible for security breaches that put players' personal data at risk Why or why Collaboration 4. System Development Life Cycle A major retail company has hired your team to create and implement the steps in the system development life cycle (SDLC) to create custom inventory Do This: Assign SDL.C steps to different teammates and compile a plan for each step. Share your finings. Doe software. t teammates and compile a plan for each step. Share your findings. Does the plan contain gaps? Do any steps or tasks overlap? What guidelines should you follow during system development? What roles are needed? How might you use project manag to share with the retail company: Would you use a compiler or an interpreter? Why? Would you use an object-orient ement software? As a team, answer the following questions of information catering technioues would be most effec Week 04 Homework #3 a)(Protected View)-Microsoft Word References Mailings ReviewView nternet location and might be unsafe. Click for more details. Enable Editing Week 04 Homework#3 There are 2 papers each worth 50% Turn to page 514 in the Discover Computers Bookand read and answerthe Ethics & Issues 11-3. Be sure to format your paper using APA style 1. Double Space 2. Times New Roman 3. Page Number upper right hand corner 4. Indent after every paragraph 5. Citation Page Use a separate word document and save the document as>> Week 04 Homework#3 Student Last Name Paper1 Turn to page 550 in the Discover Computers Book and read and answer the Critical Thinking questions1- 3. Be sure to format your paper using APA style: 1. Double Space 2. Times New Roman 3. Page Numberupperright hand corner 4. Indent after every paragraph 5. Citation Page use a separate word document and save the document as >> week 04 Homework #3-Student Last Name Paper2 Address 514 chapter 11 Building Solutions ETHICS & ISSUES 11-3 feel that protecting data privacy partially In another case, a student accessed personal data for school employees from is the responsibility of the person who the schools network. In this instance What Should the Consequences Be If a User Accidentally Accesses Confidential Data? A student discovered private student data the student allegedly attempted to profit is the responsibuity of the institution or on a publidy accessible area of a university from the data. Administrators charged computer Instead of notifying authorities, he the high school student with criminal took the information to the student news trespassing. Other exampies include paper. The newspaper advisor authorized the students attempting to alter grades, access publication of an artidle about the situation. test questions, or disrupt or trace a school's Consider This: Is an institution responsible Although the article did not include any student names or personal information, the Institutions often attempt to sesolve administration fired the newspaper's adviser security breaches quietly. Some fear that sible? Why? Even if a person is not trying for violating the university's computer poli publicity may cause financial loss and may to profit from a data breach, is he or she uncovers the breach. Others feel that it organization to secure its servers and educate employees about protection of confidential data. network activity for unauthorized access of its personal data or is the person who accessed it respon- cies and nearly expelled the student. Was the encourage hackers to target the institution. still responsable for the discovery? Why or student obligated to report the vulnerability In some cases, an institution may file to the administration? Was the school right to lawsuits against those who make security breaches, even if they do not publish the fire the advisor for not reporting the breach? breaches public, including reporters. Some why not? Are journalists wrong to expose accessed data? Why or why not? SECURE IT 11- Recovering from Identity Theft In the past 10 years, more than 640 million Americans fell victim to identity theft, according to the identity Theft Resource Center Data breaches in businesses, banks faud alert, you are entitled to receive aReview financial accounts. Look for medical centers, and schools have affected nearly 39 percent of Americans. This crimefrom the theft to obtain the report, how s the complaint most often reported to the ever, because creditors may report activity ederal Trade Commission (FTC) account owners if a new request for credit is submitted. This fraud alert must be renewed every 90 days Order credit reports. Once you filea Keep records of your actions. Create a journal that records the names of people you called, phone numbers, dates, and sent. unusual activity, and check to see if any accounts were opened recently Continue reviewing the accounts even if you do not free credit report. Wait at least 30 days On average victims of identity theft pend 25 hours setting the resulting issues. on a monthly basis, and your most current see any questionable transactions report may not include current information.Enroll in a credit monitoring service Request that only the last four digits of Each of the three national credit reporting 550 Chapter 11 Building Solutions Critical Thinking The Critical Thinking exercises challenge your assessment and decision making slls by presenting real-world situations associated with chapter concepts. The Collaboration exercise should be completed with a team Instructions voluate the situlitions belbw, using personal eeriences and one or more rescurces available to you tsuch as articles on the web arint blogs, podasts videos, televsion, user guildes other individuals, electrons or computer stores enc.), Perform the tasks requessed in each enescise and shure your deierables in the formar requested by your suesot, pesentuation, dsonsion, blog past. widea or other meursd 1. Online Movie Reviews more data and more quickly searching for data, as well Information about movie titles and television shows is available from the web datahase IMDb (Internet Movie Database). Visitors can search IMDb using by itle, cast member, year produced, characters, genre, awards, or other criteria. Each movie or show s listing offers a brief description and rating and includes links the to such items as summary, trivia, reviews, quotes, and even streaming video options. s generating reports. Do This: Prepare information aimed toward individuals who prefer spreadsheets to databases, Include reasons why it is not adhisable to store large amounts of data in spreadsheets, as well as the reporting and query- ng capabilitics of data- bases. Explain benefits Do This: Visit imdb.com and search for both recently for uing a datause for released and classic movies. Explain the steps you uned to query the movie datahase. Assess how complete the information provided was. Who would henefit most from using the movie database? Why? Answer the following questions about your experiences. Did the information provided differ when viewing recently released titles versus classic movies? What did you collaborating and shar- ing information among departments in a business 3. Case Study learn from your queries? Can yoa identify a few ficlds that are included in the records for each movie? What interactive features can you identify? Can you find any HTMLS features that have been incorporated Amateur Sports League You are the new manager for a nonprofit amateur soccer league. The league uses a database to store information about its players, teams, schedules, and statistics. The league's websie uses information stored in the database to display team rosters, league standings, and events. The board of directors has asked you to investigate how the league should secure its database 2. Spreadsheets versus Databases Some individuals and small organizations prefer using spreadsheets instead of databases. People who use spreadsheets might argue that similar to databases, information about spreadsheets have columns and rows, and you can keep exist for databases? Who should determine the secu- track of different sets of data in individual worksheets. This is similar to how you woulkd use tables in a datahase to store different data sets. In addition, some find it easier to install, use, and maintain spreadsheet software than database software. After reading this chapter, you are convinced that databases have additional advantages, such as the capability of storing not Compile your findings. Do This: Using information learned in the chapter as well as performing additional research, prepare securing a database. What risks rity measures to take? What should you include in the database security policy? Inclode recommendations for maintenance, and assign- ing different access levels to employees, coaches, and players. Is the league responsible for security breaches that put players' personal data at risk Why or why Collaboration 4. System Development Life Cycle A major retail company has hired your team to create and implement the steps in the system development life cycle (SDLC) to create custom inventory Do This: Assign SDL.C steps to different teammates and compile a plan for each step. Share your finings. Doe software. t teammates and compile a plan for each step. Share your findings. Does the plan contain gaps? Do any steps or tasks overlap? What guidelines should you follow during system development? What roles are needed? How might you use project manag to share with the retail company: Would you use a compiler or an interpreter? Why? Would you use an object-orient ement software? As a team, answer the following questions of information catering technioues would be most effec

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Understanding Databases Concepts And Practice

Authors: Suzanne W Dietrich

1st Edition

1119827949, 9781119827948

More Books

Students also viewed these Databases questions

Question

Is there any formal training for teaching?

Answered: 1 week ago