How would you describe the term digital footprint

Assignment Help Basic Computer Science
Reference no: EM131106499

Have you been surprised or wondered how Web sites that you visit show ads that might be of special interest to you, or know what you might be interested in learning more about? Do you think that your friends, when visiting the same site, are shown the same ads or information? Have you ever had the feeling that the Web site knows your location when you did not provide that detail?

Your first task is to view the short video found here to learn about the digital footprint. When you start to watch this video about the "mind reader," ask yourself whether you believe this person has a special gift or if there is something else behind their remarks. Also ask yourself about the type information that this mind reader could learn about you.

Once you have completed this first task, prepare a short PowerPoint presentation of 5-6 slides. Answer the following questions in your presentation.

• How would you describe the term digital footprint?
• What obligations do you believe an organization has toward the digital footprint?
• What should an individual do to protect their own digital footprint and guard against improper use?
• Explain whether you believe this video represents computer crime. Explain your views one way or the other.

Reference no: EM131106499

Questions Cloud

Wilco corporation has the following account balances : Wilco Corporation has the following account balances at December 31, 2010. Prepare Wilco's December 31, 2010, stockholders' equitysection.
Office supply store demand an average : Customers at Joe's Office Supply Store demand an average of 6000 desks per year. Each time an order is placed, an ordering cost of $300 is incurred.
Is long-term strategic planning worth it : Is long-term strategic planning worth it? Why or why not? If it is, what is an appropriate planning window (months, years, etc.)? How do you plan for contingencies? Explain.
Why you think emails are so often misunderstood : Why you think emails are so often misunderstood. Give examples or experiences to enhance your posting. What are the strengths and weakness of email in a business setting?
How would you describe the term digital footprint : How would you describe the term digital footprint? What obligations do you believe an organization has toward the digital footprint? What should an individual do to protect their own digital footprint and guard against improper use?
How much more quickly can digital images be retrieved : At least how much more quickly can digital images be retrieved? Use the data above to answer at the 95% confidence level; justify, if possible, any assumptions you make
What amount should connor present the note : At what amount should Connor present the note on the December 31, 2011 balance sheet?
Orders two kinds of software from telehard software : Software EG, a retail company, orders two kinds of software from TeleHard Software. Annually, Software EG sells 800 units of product 1 and 400 units of product 2.
What is the firm''s sustainable growth rate : If the profit margin remains at 5% and the dividend payout ratio remains at 60%, at what growth rate in sales will the additional financing requirements be exactly zero? In other words, what is the firm's sustainable growth rate?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Demonstrates your thought process and steps used to analyze

Analysis- Demonstrates your thought process and steps used to analyze the problem. Be sure to include the required input and output and how you will obtain the required output from the given input?

  Highlights the ongoing dilemma of ineffective legislative

Rahul Sagar highlights the ongoing dilemma of ineffective legislative oversight and judicial review in the employment of state secrets on pages 46 to 50 in Chapter 1 of his book, Secrets and Leaks:

  What patterns would hash to the same location

The hash table is 10,000 entries long (HASH_TABLE_SIZE is 10000). The search keys are integers in the range 0 through 9999. The hash function is given by the following C++ function:

  Specify that queries are for ns records

You may also need to specify that queries are for NS records rather than the usual A records.

  Show how rsa can be used for two-way authentication

Show how RSA can be used for two-way authentication.

  What features forest or the domain and what about 2008 r2

What are some of the unique features that become available when either the forest or the domain is changed to the 2008 functional level? What about 2008 R2?

  Sort the array in the descending order using pointers

Create functions for the following tasks and make sure to pass a pointer to the table (array) as an argument to each of them.

  Findthree definitions object-oriented programming andcompare

The machine language treats a message as bits while object-oriented programming language treats every message as an object

  Find the redundancy percent in each case

We want to transmit 1000 characters with each character encoded as 8 bits.

  Disadvantages of virtualization technology

paper that provides a detailed technical analysis comparing the advantages and disadvantages of virtualization technology

  Determine a fourier series expansion of the rectified wave

Passing a sinusoidal voltage A sin ωt through a half-wave rectifier produces the clipped sine wave shown in Figure 7.13. Determine a Fourier series expansion of the rectified wave.

  What is the nature of the seasonality

What's the average order price per order?(HINT: Look at the extended price for each order and then use the Excel AVERAGE function to get the average order price)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd