Determine what restrictions should be imposed.

Assignment Help Computer Networking
Reference no: EM13945905

1. Write 4 sentences as to how you feel: I feel that some regulations must be enforced and required to protect family values. Furthermore, I believe that government and ISP companies should collaborate to determine what restrictions should be imposed.

The USA Government has enacted two Federal laws intended to censor offensive online content. Neither of these laws are in force as at March 2002. The first law (the CDA) was struck down by the USA Supreme Court on First Amendment grounds. The second law (the COPA), which is more narrowly focussed and covers only communications that are made for commercial purposes on the World Wide Web, is the subject of a Court injunction (also on First Amendment grounds) preventing its enforcement pending a decision of the Supreme Court. The Court decision is expected to be handed down in the latter part of 2002.

Since 1996, four U.S. states, New York, New Mexico, Michigan and Virginia have passed Internet censorship legislation restricting/banning online distribution of material deemed "harmful to minors". These laws have been struck down on Constitutional grounds.

2. Do you agree or how you feel, 4 sentences: I am not favorable for all the content on the internet. However, I do not believe that censorship for the entire internet is not feasible. First, as the internet is worldwide, who be responsible for patrolling it? Two, what party/parties is fit to deem what is appropriate or inappropriate for society as a whole? Regardless if there was such a party, any attempt to categorize something as inappropriate, would only result in heated and extremely lengthy court battles.

While researching this issue, I came across CIPA (Children's Internet Protection Act). To quickly summarize this act, Libraries and Schools are required to have certain filters in place on the computers that will be used by minors, in order to receive special Federal funding/rates.

I believe censorship for minors is a necessity. Adults however, need to take responsibility for their own actions. Though, I believe censorship should also be required for sexual offenders. How that would be possible, I don't know, but I still think it should be done.

Reference no: EM13945905

Questions Cloud

How traditional institutions and beliefs socialized africans : Describe in a 700-word essay how traditional institutions and beliefs socialized Africans into their communities
What would you offer as a network suggestion : they want the routing information of all four networks to be available at each site, so that any employee can go to any site, and work from them, and they are worried about passing traffic over the Internet. What would you offer as a network sugge..
Design a basic network suggesting how many routers and hubs : Design a basic network suggesting how many routers and hubs etc for each floor. As well, determine what to use to connect i.e. Cat5 wire,etc.
Between family systems and healthy development : You will write an essay of at least 600 words, drawing information from this course, outside readings, and presentations for that module/week. The essay must be strongly supported with proper citations of 2-3 current, scholarly sources in current ..
Determine what restrictions should be imposed. : While researching this issue, I came across CIPA (Children's Internet Protection Act). To quickly summarize this act, Libraries and Schools are required to have certain filters in place on the computers that will be used by minors, in order to rec..
Why organization should invest in it security technologies : Research 3 or more points of analysis that can be used in a critical analysis for each of the Case Study attached. Choose your points of analysis from the following list: Why an organization should invest in IT security technologies
Determine the vorticity : Given the planar velocity field vr = -A sin(?t) sin θ r 2 vθ = A sin(?t) cos θ r 2 , where A and ? are known constants, 1. Determine the vorticity.
Compute the mean and median of the rates of return : Compute the rate of return for each year - compute the mean and median of the rates of return and explain why the best statistic to use to describe what happened to the price of the stock over the 6-year period is the geometric mean.
Protocol and network switching device use for the wireless : Explain which protocol and network switching device(s) you would use for the five computers on the LAN and for the wireless access?

Reviews

Write a Review

Computer Networking Questions & Answers

  Identify the various uses for http and https

Identify the various uses for HTTP and HTTPS, and justify the use of one over the other. Include two examples to demonstrate the use of each protocol

  Define networks and hardware in personal computers

From the e-Activity, determine whether you prefer a laptop or desktop. Elaborate on the features that you would want your desktop or laptop to offer, and provide an explanation of why you would want such features.

  Router information protocol

Question 1: What is the purpose of a routing protocol? Question 2: What is a distance-vector routing protocol?Question 3: What are the advantages and disadvantages of distance-vector protocols?

  Define the network topology in each office lan

Define the network topology in each office LAN, and define and describe the structure of the WAN to interconnect the offices

  What are the security challenges faced by wireless networks

What is outsourcing? Describe the advantages and disadvantages to outsourcing software development. What are the security challenges faced by wireless networks

  Explain why asynchronous io activity is a problem with many

explain why asynchronous io activity is a problem with many memory protection schemes including basebounds and paging.

  Discuss frequency sets that are used for wi-fi networks

What other devices in a business or home might cause interference with these frequencies. How does 802.11ac utilize these frequencies

  Systems analyst can help with project management tasks

Explain how systems analyst can help with project management tasks. Also, explain how new employee can contribute to tasks.

  Create network for multimedia development firm

You have been contracted to make a network for a multimedia development firm which currently uses 10-Mbps Ethernet network. Company needs a high-bandwidth network for multimedia team.

  Outline a new network security design

Utilize the following information to outline a new network security design. Employee breakdown; 2 partners, 28 accountants, 5 administrative assistants, 2 technology specialists, 1 human resources manager.

  Evolution of the telecommunications industry

The World Wide Web the best know example of a WAN that's why once a WAN is in place, WAN security must be implemented. Some methods for securing WANs include firewalls, routers with access control lists, and intrusion detection systems

  Question 1aregister the owasp top 10 web application

question 1aregister the owasp top 10 web application security risks for 2010.bwhy does software have to be intensively

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd