Chapter 3 Assignment 1

In: Computers and Technology

Submitted By pdewes
Words 272
Pages 2
1.) Ethics is the basic question of what is right and wrong that is generally accepted by everyone. Laws are basically ethics that have been adopted by a governing body of some sort (government, company, etc).

2.) Civil law is a set of laws that are created by a governing body for its own regulation. They are used in order to keep its citizens safe.

3.) Constitutional law, criminal law, and administrative law.

4.) The National Information Infrastructure Act of 1996 was the law that amended the Computer Fraud and Abuse Act of 1986. It changed multiple sections of the Computer Fraud and Abuse Act of 1986, mostly by increasing the penalties and fines of some of the cyber crimes.

6.) Privacy is being free from other people viewing or altering your personal data.

9.) The primary purpose of the USA PATRIOT Act was to change some of the laws in order to give law enforcement officials more tools to combat terrorism. Many of the laws changed have to do with electronics.

15.) Policy is a list of expectations that can outline actions that are considered acceptable and actions that are considered unacceptable to an employer. A law is much more harsh when broken than a policy is.

16.) The three general categories of unethical and illegal behavior are: Illicit use, Misuse of Corporate Resources, and Software License Infringement.

18.) The Association of Computing Machinery is the organization that has been established for the longest amount of time. It was established in 1947.

19.) The organization that is focused on auditing and control is The Information Systems Audit and Control…...

Similar Documents

Chapter 3 Assignment

...1. Describe five major dimensions of culture. 5 major dimensions of culture are 1. Context describes the stimuli, environment, and ambience surrounding an event. 2. Individualism refers to the degree to which independence and freedom from control are valued. 3. Formality describes the emphasis placed on tradition ceremony, and social rules. 4. Communication style refers to the manner in which people communicate. High-context cultures rely less on words and more on context than do low-context cultures. 5.Time orientation describes the emphasis placed on time. Is it precious and not to be wasted, or is it an unlimited and never-ending resource? 2. Briefly, contrast high- and low-context cultures. People in low-context cultures tend to prefer direct verbal interaction, understand meaning at one level only, are less proficient in reading nonverbal communication, value individualism, emphasize linear logic, use :logic” to express ideas, say no directly, communicate in highly structured messages with many words, and stress the literal meaning of words. Those in high-context cultures, tend to prefer indirect verbal interaction, understand meanings embedded at many socio-cultural levels, are more proficient in reading nonverbal communication, value group membership, emphasize spiral logic, use more “feeling” to express ideas, talk around the point, avoid saying no, communicate in simple but ambiguous messages, and use fewer words but understand the context of a situation. ...

Words: 761 - Pages: 4

Portfolios of the Poor Chapters 1-3

...Chapter 1- About 2.5 billion people live on less than two dollars a day. Two dollars a day does not mean literally mean “two dollars a day.” It is an average over time. Those who live on so little seek to manage their money. They save as much as they can and borrow when they need to. “Money management, for the poor [is] a fundamental and well-understood part of everyday life” (3). -The authors conducted studies that they called financial diaries to discover how the poor managed their money. -Negative net worth was rare in the study; in fact only 3 percent were in that position. -The poor not only save, borrow, and repay in money but also in kind. Wives swap rice or other food items. Another example would be repaying a debt with labor instead of money. -Most changes over the year in the study was financial rather than physical. “financial management is the stepping-stone to understanding how households build net worth” (11). -Every household in the study had savings and debt of some sort. The hardest things for the households are that their income is irregular. Some days they have work and get paid and some days they don’t. -Long-term money management has two concerns in poor households: One: how to cope with risk Two: the need to build or borrow large sums of money. -The three needs that drive the activity in the house hold are 
 1. Managing basics ex. Food 2. Coping with risk 3. Raising Lump sums Borrowing = starting or expanding a business or......

Words: 695 - Pages: 3

Module 1 Assignment 3

...MODULE 1, ASSIGNMENT 3 September 12, 2013 Topics: Performance Management, Financial Management and Financial Reporting Overview In this assignment, candidates get a chance to apply all the steps except for steps 6 and 9 in the Steps for Approaching Business and Corporate Strategy to a small business case. As mentioned previously, these steps provide candidates with a systematic approach for addressing a case involving business-level strategic issues. Applying this approach effectively is one of the important competencies that candidates will learn in the CMA Canada Professional Programs. The starting point for solving a business problem is to analyze the current situation and identify the problems that need to be addressed. A major component of the situational analysis is to take a close look at the environments within which an organization finds itself. One of the methods commonly used in such an environmental analysis is “SWOT” (an acronym for Strengths, Weaknesses, Opportunities and Threats), which considers the strengths and weaknesses in the internal environment as well as the opportunities and threats in the external environment. Candidates can refer to the required reading Situational Analysis Tools mentioned below for more information on how to go about doing a SWOT analysis. The next major step is to identify the issues and analyze various alternatives for addressing the major issues. In this case, a shortage of available cash is a major issue and needs to be......

Words: 3918 - Pages: 16

Unit 3 Assignment 1

...Jennifer Schneider – NT 1230 – Client-Server Networking – Unit 3; Assignment 1 IPv6 Addressing 1.) Research the following organizations and explain their involvement with the Internet Public IP Addresses a. American Registry for Internet Numbers: Allocates, transfers and records maintenance of IP addresses as well as reverse DSN. b. Internet Assigned Numbers Authority: Allocates IP addresses from the pools of unallocated addresses to the RIRs according to their needs as described by global policy and to document protocol c. Asia-Pacific Network Information Center: Distributes and maintains IPv6 addresses 2.) Approximately how many IPv4 addresses are possible? There are approximately 4.3 billion IPv4 addresses available. 3.) Approximately how many IPv6 addresses are possible? There are 340,282,366,920,938,463,463,374,607,431,768,211,456 Ipv6 addresses available 4.) Why do you think the world is running out of IPv4 addresses? The internet really started in the 70s as a DARPA research project. At the time, there were 60 or so institutions expected to connect. As the interested research community grew, the addressing scheme was expanded from 8 bits (256 addresses in the predecessor to Internet Protocol (IP) known as Network Control Protocol (NCP)) to 32 bits (the IPv4 addresses we have today). At the time, it was still expected that the internet would serve largely defense, research, and educational institutions. It was essentially a laboratory experiment on a really......

Words: 411 - Pages: 2

Unit 3 Assignment 1

...Unit 3 Assignment 1: Compare Windows 8 and Windows RT Course Objectives and Learning Outcomes Identify the characteristics of popular mobile operating systems. Compare mobile operating systems to their related desktop operating systems. Identify the characteristics of Windows Phone. Identify differences and similarities between Windows 8 and Windows Phone 8. Assignment Requirements Research Windows 8 and Windows RT on the Microsoft website and write a paper that discusses the implications of an integrated platform. Required Resources Web browser Windows RT website http://windows.microsoft.com/en-us/windows/rt Submission Requirements Submit a one-page paper that compares Windows 8 and Windows RT. The paper should identify five similarities and five differences between the platforms. You should also discuss how an integrated platform affects users and developers. Which operating system is required for mobile application development? Why? Evaluation Criteria Category | # | Criteria | CONTENT, 90% | 1.1 | The paper should identify 5 similarities between Windows 8 and Windows RT. Up to 20 points for this element | | 1.2 | The paper should identify 5 differences between Windows 8 and Windows RT. Up to 20 points for this element | | 1.3 | The paper should discuss how an integrated platform impacts users. Up to 20 points for this element | | 1.4 | The paper should discuss how an integrated platform impacts developers. Up to 20 points for this......

Words: 283 - Pages: 2

Unit 3 Assignment 1

...Unit 3 Assignment 1: Networking Models Review 1. Which of the following is true about a TCP/IP network? 2. Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.) A.D. 3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.) B.C. 4. Contrast an international standard as compared to a de facto standard. (Choose two answers.) A.D. 5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.) A.C. 6. The TCP/IP model refers to standards other than those the IETF defines in RFCs. Which of these standards groups is typically the source of external LAN standards? (Choose two answers.) B.D. 7. Which of the following is not a typical reason for a group of ten companies to start a vendor group, for the purpose of pushing a new networking technology? C. 8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI terms. Which of the following is a correctly phrased statement for how to use OSI terminology? B. 9. Historically, which of the following models were the earliest models used in corporate networks? A. 10. Which of the......

Words: 592 - Pages: 3

Lp3 Assignment Chapter 3 Review

...1. What is the difference between law and ethics? In general, people elect to trade some aspects of personal freedom for social order. As Jean- Jacques Rousseau explains in The Social Contract, or Principles of Political Right, the rules the members of a society create to balance the individual rights to self-determination against the needs of the society as a whole are called laws. Laws are rules that mandate or prohibit certain behavior; they are drawn from ethics, which define socially acceptable behaviors. The key difference between laws and ethics is that laws carry the authority of a governing body, and ethics do not. Ethics in turn are based on cultural mores: the fixed moral attitudes or customs of a particular group. Some ethical standards are universal. For example, murder, theft, assault, and arson are actions that deviate from ethical and legal codes throughout the world. Whitman, Michael E., and Herbert J. Mattford. "The Need For Security." Principals Of Information Security, 4th Edition. CourseSmart/Cengage Learning, 2014. Web. 22 Mar. 2015. Chapter 3 Pages 90-91 2. What is civil law, and what does it accomplish? Civil: Governs nation or state; manages relationships/conflicts between organizational entities and people. Whitman, Michael E., and Herbert J. Mattford. "The Need For Security." Principals Of Information Security, 4th Edition. CourseSmart/Cengage Learning, 2014. Web. 22 Mar. 2015. Chapter 3 Pages 90-91 3. What are the primary examples of public...

Words: 2320 - Pages: 10

Unit 3 Assignment 1

...Roxbury Unit 3 Assignment 1 Erica Lanier Video Summary 1 In video 1.07 the lesson is on ports and connectors. There are three different types of ports, those are serial port, parallel port and game port. The serial port is usually male and have 9 or 25 pins. The parallel port is usually female and has 25 pins. The game ports are female and have 15 pins. All of those ports have been replaced by USB ports. The video also discusses how the modem connects to a phone line and converts digital to analog. It explains there are two types of SCSI narrow and wide SCSI, the narrow SCSI has 50 pins and the wide has 68 pins. Video 1.09 teaches that there are two types of monitors, you have CRT and LCD. CRT stands for cathode ray tube and LCD stands for liquid crystal display. The CRT is similar to an old television and the LCD uses thin film transistors and the back lighting is through polarized panels. Your specifications of a monitor include screen size, contrast ratio, refresh rate, response time, interfacing, dot pitchand pixel pitch. Video 1.11 focuses on types of printers and the types of problems that come with each. There is the Dot Matrix, Ink Jet and the laser printers. Overall the videos covered your computer basics and the parts that make it productive. I could comprehend the objective of the videos but they all covered a plethora of information in a matter of minutes, so I feel there was a lot that I missed. Fortunately what I did not catch in the video chapter......

Words: 322 - Pages: 2

Religion Chapter 1-3

...Psychological of Religion, Study Guides Study Guide-Intro chapters 1. List and define the dimensions of religious commitment. Religious belief (the Ideological Dimension)-the belief dimension refers to what is believed as part of religion, how strongly the belief is held, the bases for the intellectual assent, and how salient that the belief is in the person’s life. Religious Practice (the Ritualistic Dimension) the religious practice dimension refers to the set of behaviors that are expected of a person who declares belief in a certain religion. The emphasis is not on the effect the religion may have on the “nonreligious” aspects of the person’s daily life, but on the specific acts that are part of the religion itself. The religious feeling (the experiential dimension) –the religious feeling dimension is concerned with the inner mental and emotional world of the individual. In addition to experiential events that people may label “religious experiences” the feeling dimension includes such things as the desire to believe in some religion, the fear of not being religious, the sense of physical, psychological, and spiritual well-being that derives from belief and like. Religious knowledge (the intellectual dimension) the religious knowledge dimension refers to the information one has about one’s faith, as compared to belief in the faith. Religious effects (the consequential dimension)-the effects dimension refers to behavior, but not behavior that is formal part of......

Words: 1525 - Pages: 7

Week 1 Chapter 1 Assignment

...Name: Kelsey Dionne Chapter 1 Instructions Practice Problem 12, 15, 21, & 22 Due Week 1 Day 6 (Sunday) Follow the instructions below to submit your answers for Chapter 1 Practice Problem 12, 15, 21, & 22. 1. Save Chapter 1 Instructions to your computer. 2. Type your answers into the shaded boxes below. The boxes will expand as you type your answers. 3. Each shaded box is worth 1 point unless otherwise noted; thus, 28 points total for Chapter 1. 4. Resave this form to your computer with your answers filled-in. 5. Upload the saved form to the Assignment Files tab. Read each question in your text book and then type your answers for Chapter 1 Practice Problem 12, 15, 21, & 22 in the corresponding spaces below. 12a. equal-interval – a variable in which the numbers stand for approximately equal amounts of what is being measured. No matter if stress is being measured or if anger is being measured, numbers 1 and 2 are equal to 4 and 5. 12b. rank-order – A numeric variable in which the values are ranks, for example: class or place finished in a race. 1st, 2nd, or 3rd. 12c. nominal – A variable with values that are categories, also called the categorical varible. An example of a nominal variable would be variables like gender, or race. 12d. ratio scale – An equal-interval variable is measured on a ratio scale if it has an absolute zero point. Some scales start at the lowest number, other scales start at zero. 12e. ...

Words: 611 - Pages: 3

Econ Chapter 1 -3

...Chapter 1 answers Rational Interest 1a) According to my self beneficial factor i believe i would like to attend school full time because this would allow me to complete school faster and earn a degree for a high paying job and a life changing career but at the same time when there seems to be some time on my hands i would also decide not to be a full time student. For instance, on the summer i would be able to work, comprehend and experience the factors for working for ones self etc. I say this because it is not a logical idea to always be a full time student and not have any experience of work and at the same time it would be shoddy for me to work full time because i would have not time for school. 1b)I would rather buy a used book because it allows me to save more money for emergencies. Buying a new book would cost me a lot and selling it would not benefit me what so ever because i would have to sell it at a quarter of the price because it has be used. Buying it used and selling it at the same pre-owned amount is the best decision for me to make. Resources 2a)a taxi cab- physical capital 2b)computer software- physical capital 2c)one hour of legal counsel- labour s)a parking lot - physical capital Macro or Micro issue 3a) microeconomic issue 3b)macroeconomic issue 3c)microeconomic issue 3d)microeconomic issue Chapter 2 answers Opportunity cost 4)if i decide to go to florida i will lose $1000 700 for the cost of florida + the 400......

Words: 645 - Pages: 3

Bibl 350 Chapter Assignment 3

...jdunn62@liberty.edu Due Date: Monday @ 11:59 PM (EST) -- midnight James Dunn Name: LU Email Address: BIBL 350 – Inductive Bible Study Assignments for Week #6 Assignment 10-1: Explain the Difference Between Reader Response and Authorial Intent (p.202). (20 Points) Note, this assignment is worth 20 points and should reflect considerable thought and effort in your response. Make sure you include in your explanation definitions of the terms involved. What role do presuppositions play in interpreting the Bible? Who controls the meaning of a biblical text? What is the source of reader-response view? What are the two main interpretive questions involved in these two views of who determines meaning? Reader Response: Reader response is the result of when the reader overlooks or neglects to discover what the author is intending to communicate in a biblical verse or passage. This method is dangerous as the reader attempts to bend the Word to their particular situation or circumstance. The question for this method by the reader is, “What does this verse and or passage mean to me?” rather than asking, “What is it that God is trying to communicate to me?” Or, “What does God want to teach me from this?” Reader response must be avoided at all cost as it has the potential to lead someone astray and down the wrong path. Scripture in the practice of this method is quoted out of context and is not taught or quoted as the author intended. Authorial Intent: Authorial intent......

Words: 1317 - Pages: 6

Chapter 3 Assignment 1

...Annette Durie NT1210 Unit 3 Assignment 1 Key Terms: TCP/IP Network – A computer network that uses the standards defined and referenced by the TCP/IP model. Networking Standard – A document that details information aabout some technology or protocol related to networking, and that document has been passed through a review and approval process that certifies the document as a standard. TCP/IP model – An open collection of standards related to all parts of networking, grouped together purposefully, so that if a company builds a network using these standards and using products that use these standards, the different network components will work together correctly. Open Networking Model – A networking model whose standards can be read and used to create products without payment to any one company. Open Systems Interconnection (OSI) Model – An open networking model developed by ISO over the same time frame as TCP/IP. Encoding – The process of varying the energy signal on a link so that after the signal is decoded on the receiving device, bits have been communicated over the link. Header – Bytes of data, defined by some standard or protocol, and added in front of the user data that needs to be sent. Protocols use headers to store information that the protocol needs to communicate with other devices. Trailer – Bytes of data, defined by some standard or protocol, and added after the user data that needs to be sent. Used almost exclusively by data link layer......

Words: 1301 - Pages: 6

Chapter 1 Graded Assignment

...1. Based on your experience as a coffee consumer, does Starbucks’ strategy as described in Concept & Connections 1.2 seem to set the company apart from rivals? Does the strategy seem to be keyed to a cost-based advantage, differentiating features, serving the unique needs of a niche, or some combination of these? What is there about Starbucks’ strategy that can lead to sustainable competitive advantage? Answer: I have to be honest I like my coffee but I don’t get why people are so fascinated with paying so much for coffee. That being said I will say that Starbuck definitely has set itself apart from its competitors. I know people whose day is just ruined if they don’t have their Starbucks coffee in the morning. I guess the reason they enjoy and like Starbucks is because Starbucks has quality products, with guidelines so detailed that they outline how much time it should take for their coffee to be prepared. I believe Starbucks uses a broad differentiation strategy because it focuses on a broader segment of the total coffee market. Starbucks strategy of continuing to grow their brand globally by increasing store locations in other countries and in the U.S coupled with offering non coffee products should allow them to sustain a substantial competitive advantage over its competition. 3. Elements of eBay’s strategy have evolved in meaningful ways since the company’s founding in 1995. After reviewing all of the links at the company’s investor relations site, which can......

Words: 478 - Pages: 2

Chapter 1 Assignment

...CGS1060: Intro to Information Tech Presented to: Professor Masline Date Due: March 14, 2016 Digital Literacy: Introducing a World of Technology Digital Literacy: Introducing a World of Technology Part 1 How to Your Turn: Connect to a Wireless Network Figure 1 [ 1 ]http://media.idownloadblog.com/wp-content/uploads/2015/09/iPhone-6-Wi-Fi-settings.png Figure 1 1http://media.idownloadblog.com/wp-content/uploads/2015/09/iPhone-6-Wi-Fi-settings.png Connecting a device to a wireless network is surely stress-free. I will be using my iPhone 6 to connect to a wireless network. Primarily, I made sure that my phone was on. Subsequently, I went to Settings and located the Wi-Fi tab. Continuously, I ensured that the Wi-Fi switch was switched to on, as shown in Figure 1. Following, I obtained the network name. The network name did not show up, meaning that the network was a hidden network. Nevertheless, I had to tap on Other… to manually type in the network name, CFT_Wireless. Since the network I provided is protected, I will then click on the Security tab to select the type of security the network uses. In this case, it uses the WEP, also known as Wired Enterprise Privacy, security type. To finish, you will enter the password that was setup by either the ISP or the administrator – cft#1. To substantiate that I am connected to the Wi-Fi, I can either launch a web browser or open an application that requires network communication. Before you rush to connect your device to a......

Words: 1424 - Pages: 6