Get premium membership and access questions with answers, video lessons as well as revision papers.
How does computer technology threaten the privacy of our data? It is done through:
a. Cookies
o are used to identify users by web casting, e-commerce and other web applications.
o contain user information and are saved in the computer hard disk.
o are used by some websites to store passwords and track how regularly we visit a website, thats how we become potential targets for web advertisers.
o enable web sites to collect information about your online activities and store them for future use, then the collected details will be sold to any company that requests for it.
b. Electronic profile
o electronic profile is the combining of data in a database that can be sold to the Internet by the company to the interested parties.
o this database is in a form such as magazine subscription or product warranty cards that had been filled by online subscribers.
o the information in electronic profile includes personal details such as your age, address and marital status.
c. Spyware
o refers to a program that collects user information without users knowledge.
o can enter computers, sneaking in like a virus.
o is a result of installing new programs.
o Communicates information it collects to some outside source while we are online.
2. Computer technology threatens our privacy through electronic profiling. For example, when we fill out a form such as a magazine subscription, purchasing products or contest entry form on the Internet, this data is kept in the database. It will include age, address, marital status and other personal details.
3. Every time you click on an advertisement or register a software product online, your information is entered into a database.
4. Computer technology can also threaten privacy through spam. Spam is unsolicited e-mail messages, advertisements or newsgroup postings sent to many recipients at once.
Moraa orina answered the question on April 28, 2018 at 17:45
- Define privacy(Solved)
Define privacy
Date posted: April 28, 2018. Answers (1)
-
State the types of Intellectual Property Protection. (Solved)
State the types of Intellectual Property Protection.
Date posted: April 28, 2018. Answers (1)
- Define law(Solved)
Define law
Date posted: April 26, 2018. Answers (1)
- Define Ethics (Solved)
Define Ethics
Date posted: April 26, 2018. Answers (1)
- State the examples of unethical computer code of conducts
(Solved)
State the examples of unethical computer code of conducts
Date posted: April 26, 2018. Answers (1)
- Explain the impact of ICT on the society(Solved)
Explain the impact of ICT on the society.
Date posted: April 26, 2018. Answers (1)
- Explain the Usage of ICT in Daily Life(Solved)
Explain the Usage of ICT in Daily Life.
Date posted: April 26, 2018. Answers (1)
- Describe the evolution of computer(Solved)
Describe the evolution of computer
Date posted: April 26, 2018. Answers (1)
- There are two styles commonly used in LATEX to write bibliography. Name them and giving a valid reason explain which one is more flexible.(Solved)
There are two styles commonly used in LATEX to write bibliography. Name them and giving a valid reason explain which one is more flexible.
Date posted: April 24, 2018. Answers (1)
- State six risks to the information(Solved)
State six risks to the information.
Date posted: April 24, 2018. Answers (1)
- Define windows firewall and explain its functions(Solved)
Define windows firewall and explain its functions
Date posted: April 24, 2018. Answers (1)
- State the tools included with Windows 7, which protect the computer
(Solved)
State the tools included with Windows 7, which protect the computer
Date posted: April 24, 2018. Answers (1)
- 1.(i) Define WIMP
(ii) Explain the elements of WIMP (windows, icons, menus, pointer)(Solved)
1.(i) Define WIMP
(ii) Explain the elements of WIMP (windows, icons, menus, pointer)
Date posted: April 24, 2018. Answers (1)
- Define (i)operating system (ii)windowing(Solved)
Define
i)operating system
ii)windowing
Date posted: April 24, 2018. Answers (1)
- State the Golden Rule Interface of Design
(Solved)
State the Golden Rule Interface of Design
Date posted: April 24, 2018. Answers (1)
- Differentiate between physical design and conceptual design(Solved)
Differentiate between physical design and conceptual design
Date posted: April 24, 2018. Answers (1)
- State the advantages and disadvantages menu Selection Interaction Style(Solved)
State the advantages and disadvantages menu Selection Interaction Style
Date posted: April 24, 2018. Answers (1)
- State the financial benefits of improved user interface to an organization(Solved)
State the financial benefits of improved user interface to an organization.
Date posted: April 24, 2018. Answers (1)
- State the disadvantages of GOMS(Goals, Operators, Methods, and Selection rules)(Solved)
State the disadvantages of GOMS(Goals, Operators, Methods, and Selection rules)
Date posted: April 24, 2018. Answers (1)
- State the advantages of GOMS(Goals, Operators, Methods, and Selection rules)
(Solved)
State the advantages of GOMS(Goals, Operators, Methods, and Selection rules)
Date posted: April 24, 2018. Answers (1)