
How does computer technology threaten the privacy of our data? It is done through:
a. Cookies
o are used to identify users by web casting, e-commerce and other web applications.
o contain user information and are saved in the computer hard disk.
o are used by some websites to store passwords and track how regularly we visit a website, thats how we become potential targets for web advertisers.
o enable web sites to collect information about your online activities and store them for future use, then the collected details will be sold to any company that requests for it.
b. Electronic profile
o electronic profile is the combining of data in a database that can be sold to the Internet by the company to the interested parties.
o this database is in a form such as magazine subscription or product warranty cards that had been filled by online subscribers.
o the information in electronic profile includes personal details such as your age, address and marital status.
c. Spyware
o refers to a program that collects user information without users knowledge.
o can enter computers, sneaking in like a virus.
o is a result of installing new programs.
o Communicates information it collects to some outside source while we are online.
2. Computer technology threatens our privacy through electronic profiling. For example, when we fill out a form such as a magazine subscription, purchasing products or contest entry form on the Internet, this data is kept in the database. It will include age, address, marital status and other personal details.
3. Every time you click on an advertisement or register a software product online, your information is entered into a database.
4. Computer technology can also threaten privacy through spam. Spam is unsolicited e-mail messages, advertisements or newsgroup postings sent to many recipients at once.
Moraa orina answered the question on April 28, 2018 at 17:45
-
1.(i) Define WIMP
(ii) Explain the elements of WIMP (windows, icons, menus, pointer)
(Solved)
1.(i) Define WIMP
(ii) Explain the elements of WIMP (windows, icons, menus, pointer)
Date posted:
April 24, 2018
.
Answers (1)
-
Explain the meaning of information and communication technology (ICT)
(Solved)
Explain the meaning of information and communication technology (ICT).
Date posted:
April 19, 2018
.
Answers (1)
-
Differentiate between a macro and a module as used in computer applications.
(Solved)
Differentiate between a macro and a module as used in computer applications.
Date posted:
April 3, 2018
.
Answers (1)
-
Explain the disadvantages of digitizers in transferring of spatial data to GIS.
(Solved)
Explain the disadvantages of digitizers in transferring of spatial data to GIS.
Date posted:
March 29, 2018
.
Answers (1)
-
(a) Explain the following categories of systems in connection with management decision making, clearly distinguishing between the categories: (i.) Transaction processing systems; ...
(Solved)
(a) Explain the following categories of systems in connection with management decision making, clearly distinguishing between the categories:
(i.) Transaction processing systems;
(ii.) Management Information Systems;
(iii.) Decision Support Systems;
(iv.) Executive Support Systems;
(b) Identify and briefly explain the three fundamental components of an expert system. Explain how an expert system may be used in a business application.
Date posted:
March 28, 2018
.
Answers (1)
-
In data communication, the communication channel is the route along which data is transmitted. The transmission of data can be described by the following four...
(Solved)
In data communication, the communication channel is the route along which data is transmitted. The transmission of data can be described by the following four characteristics:
A. Direction of flow of data.
B. Communication lines.
C. Speed of data transmission.
D. Mode of data transmission.
Required: For each of the following data communication concepts/devices, indicate under which ONE of the above listed characteristics A-D they would best fall: ii. Protocol; iii. Half duplex; iv. Fibre optics; v. Simplex; vi. Analog signal; vii. Micro wave; viii. Band width; ix. Start/stop bit; x. Voice bad.
Explain the term internetworking within the context of data communication. How does a call-back unit and data-encryption equipment enhance security in a computer network?
Date posted:
March 28, 2018
.
Answers (1)
-
Distinguish between adaptive and probabilistic systems
(Solved)
Distinguish between adaptive and probabilistic systems.
Date posted:
March 24, 2018
.
Answers (1)
-
Which is the first web browser invented in 1990?
(Solved)
Which is the first web browser invented in 1990?
Date posted:
February 26, 2018
.
Answers (1)
-
Write a C language program to create file “odd” to store all odd numbers between 1 and n.
(Solved)
Write a C language program to create file “odd” to store all odd numbers between 1 and n.
Date posted:
February 24, 2018
.
Answers (1)
-
Explain the concept of files, records and fields
(Solved)
Explain the concept of files, records and fields.
Date posted:
February 24, 2018
.
Answers (1)
-
A system analyst in the development of computerized information systems is defined as an agent of change.Required: (a) Define the term 'agent of change‘ and describe...
(Solved)
A system analyst in the development of computerized information systems is defined as an 'agent of change'.
Required:
a) Define the term =agent of change‘ and describe four roles of a system analyst in the
development of computerized information systems.
b) Outline five advantages of an external system analyst in the development of
computerized information systems.
Date posted:
February 15, 2018
.
Answers (1)
-
State rules of naming variables in C++. How do they differ from ANSI C rules?
(Solved)
State rules of naming variables in C++. How do they differ from ANSI C rules?
Date posted:
February 9, 2018
.
Answers (1)
-
Describe the limitations of using getchar and scanf functions for reading strings.
(Solved)
Describe the limitations of using getchar and scanf functions for reading strings.
Date posted:
February 8, 2018
.
Answers (1)
-
What is a dynamic memory allocation? How does it help in building complex programs?
(Solved)
What is a dynamic memory allocation? How does it help in building complex programs?
Date posted:
February 8, 2018
.
Answers (1)
-
Outline the characteristics of a system
(Solved)
Outline the characteristics of a system
Date posted:
January 24, 2018
.
Answers (1)
-
Differentiate between the following layout managers
i. GridLayout
ii. BorderLayout
iii. FlowLayout
(Solved)
Differentiate between the following layout managers
i. GridLayout
ii. BorderLayout
iii. FlowLayout
Date posted:
January 24, 2018
.
Answers (1)
-
Identify and discuss five aspects of human intelligence that could be used to characterize intelligent knowledge based systems.
(Solved)
Identify and discuss five aspects of human intelligence that could be used to characterize intelligent knowledge based systems.
Date posted:
January 9, 2018
.
Answers (1)
-
What are the major limitations of manual systems?
(Solved)
What are the major limitations of manual systems?
Date posted:
December 17, 2017
.
Answers (1)
-
Write down the factors to consider when choosing a software of a computer system.
(Solved)
Write down the factors to consider when choosing a software of a computer system.
Date posted:
December 14, 2017
.
Answers (1)
-
Define a system and mention any four types of systems that exist today
(Solved)
Define a system and mention any four types of systems that exist today.
Date posted:
December 5, 2017
.
Answers (1)