Lingatong, Maricel G.
BSIT-III
Chapter 4
1. Your friend is considering using
an online service to identify people with compatible personalities and
attractive physical features who would be interesting to date. Your friend must
first submit some basic personal information then complete a five-page
personality survey, and finally provide several recent photos. Would you advise
your friend to do this? Why or why not?
Answer:
I choose to say yes, because in the first place it would be a fair to the both
of us. In order also to knowing each other, and they know my background and
also I wanted to know about him/her.
2. You are a
recent college graduate with only a year of experience with your employer. You
were recently promoted to manager of email services. You are quite surprised to
receive a phone call at home on a Saturday from the Chief Financial Officer of
the firm asking that you immediately delete all email from all email servers,
including the archive and back-up servers that is older than six months. He
states that the reason for this request is that there have been an increasing
number of complaints about the slowness of email services. In addition, he says
he is concerned about the cost of storing so much email. This does not sound
right to you because you have taken several measures that have actually speeded
up email services. You recall a brief paragraph in the paper last week that
stated several suppliers were upset about what they called “prince fixing”
among the companies in your industry. What do you say to the Chief Financial
Officer?
Answer:
Deleting all files to the email servers is not the reason of slowness of the
email services. Maybe because they have other reason on why they do that. There
are many way on why it was being about the slowness of the email services.
First we go to the expertise because first & foremost we don’t want to delete
it immediately as we can. In my side I insist due to my personal data there,
some projects doing also.
3. You have 15
years of experience in sales and marketing with three different organizations.
You currently hold a middle management position and have been approach by a
head hunter to make a move to a company seeking a chief privacy officer. The
head hunter claims the position would represent a good move for you in your
career path and lead to an eventual vice president of marketing position. You
are not sure about the exact responsibilities of the CPO position or what
authority the person in this position would have at this particular company.
How would you go about evaluating this opportunity to determine if it actually
is a good career move or a dead end?
Answer:
For me I would say move, it would be the great opportunity for me of being in
that position. In this time, there’s so many way on how to be a good leader or
being a responsible leader to the member either you don’t know how to handle,
but in the same time you’ve learned a lot. In the first position, people don’t
want to choose to be as good leader if you are not deserving to be.
4. As the information
systems manager for a small manufacturing plant, you are responsible for
anything relating to the use of information technology. A new inventory control
system is being implemented to track the quantity and movement of all finished
products stored in a local warehouse. Each time a forklift operator moves a
case of product, he or she must first scan the product identifier code on the
case. The product information is captured, as is the day, time and forklift
operator identification number. This data is transmitted over a local area
network (LAN) to the inventory control computer, which then displays
information about the case and where it should be placed in the warehouse.
The warehouse
manager is excited about using case movement data to monitor worker
productivity. He will be able to tell how many cases per shift each operator
moves and he plans to use this data to provide performance feedback that could
result in pay increases or termination. He has asked you if there are any
potential problems with using the data in this manner and, if so, what should
be done to avoid them. How would you respond?
Answer:
In this situation, it will be depend about the potential problems encounter to
the company because in the first place the company are relating to use the
information system. So, as one of being in the company, we know what &
where the problems going to be.
5. You have been
asked to help developed a company policy
on what should be done in the event of a data breach, such as unauthorized
access to your firm’s customer database, which contains some 1.5 million
records. What sort of process would you use to develop such a policy? What
resources would you call on?
Answer:
I’d rather call it the database of customer’s firms but it will authorized to the
company.
Chapter 5
1.
Your friend is two-time winner
of the Ironman Arizona Triathlon (2.4-mile swim, 112-mile bike, and 26.2-mile
run). He is also a popular and well-known marathon runner throughout the
Southwest. He asked you design a Web page to promote the sale of a wide variety
of health products, vitamins, food supplements, and clothing targeted at the
athletes training to participate in the triathlon. The products will carry his
personal trademark. However, much of the information in the Web page will
include discussion of his personal success in various triathlons and marathons
in which he has competed. Many of these events has corporate sponsors and carry
their own trademark. He has asked you if there are any potentials trademark
issues with his marketing plans. What would you do?
Answer: It depend on what he says that I must design to his web
page. Maybe I would settle all his needed. I must create it and any idea that I
have is I would tell him or any problems that I have.
2.
Because of the amount of the
expense, your company’s CFO had to approve a $500,000 purchase order for
hardware and software needed to upgrade the service used to store data for the
Product Development Department. Everyone in the department had expected an
automatic approval, and they were disappointed when the purchase order request
was turned down. Management said that the business benefits of the expenditure
were not clear. Realizing that she needs to develop a more solid business case
for the order, the vice president of Product Development has come to you for
help. Can you help her identify arguments related to protecting intellectual
property that might strengthen the business case for this expenditure?
Answer: For me,
I could help her/him. He/she needs help in order to clear the expenditures of
the company and to purchase the order request. Any problems that encounter to
the company we must know how to handle so that in the end no it would success.
3.
You are interviewing for the
role of human resources manager for a large software developer. Over the last
year, the firm has lost a number of high-level executives who left the firm to
go to work for competitors. During the course of your interview, you are asked
what measures you would put in place to reduce the potential loss of trade
secret from executives leaving the firm. How would you respond?
Answer: I would hardly say that I will do my very best in order not
to reduce the potential loss of trade secret from executives leaving the firm.
I could not assure that I would work in 24 hours but as long as I could.
Chapter 6
1.
A former high school classmate
of yours who has returned to china emails you that he has been offered a
part-time job monitoring a Chinese website and posting comments favourable to
the government. How would you respond?
Answer: It will also depend on my situation here in the Philippines
whether I have a good job here that I wanted to leave and also my family. If I
had a stable job here and I think this would be enough for us with my family, I
would say no from him/her. Although it was a good opportunity but to think
clearly, it would be enough from here.
2.
Your 15 year old nephew
exclaims “Oh wow!” and proceeds to tell you about a very revealing photo
attachment he just received in a text message from his 14 year old girlfriend
of three months. He can’t wait to forward the message to others in his school.
What would you say to your nephew? Are further steps needed besides a
discussion on sexting?
Answer: I could actually discuss him a good steps needed. He was too
young for being that, he needs a formal discussion with his parents or
relatives.
3.
A college friend of yours
approaches you about an idea to start a PR firm that would specialize in
monitoring the internet for “Bad PR” about a company and “fixing” it. One
tactic the firm would use is to threaten negative posters with a libel lawsuit
unless they remove their posting. Should
that fail, the Pr firm will generate dozens of positive postings to outweigh
the negative posting. What would you say
tp your friend about her idea?
Answer: I don’t want to angry for being that. I must discuss of
him/her about what he/she did.
4.
You are the computer technical
resource for country’s public library system. The library is making plans to
install internet Filtering Software so that it will conform to the children’s
Internet Protection Act and be eligible for federal funding. What sort of
objections can you expect regarding implementation of internet filters? How
might you deal with such objections?
Answer: It would be able to know well the children’s, So that the
children’s are eligible know how to internet. Fast research that they must
know.
5.
Imagine that you received a
hate email at your school or job. What would you do? Does your school or
workplace have a policy that cover such issues?
Answer: In my side, I must aside my patience. I must warning him/her
before to know the school or job. Whether it would be the best, but there are
some that you are going to the issue. So I must know my limits.
Chapter 7
1. Apple
Guidelines for App Approval
Apple’s App
Store has been a huge success ever since it was launched in 2008. As of the end
of 2010, the app store offered more than 250, 000 applications available for
sale to owners of apple, iPhone, iPad and iPod devices, with more than 6.5
Billion downloads since it opened.
Before software
applications can be solved throught the App Store, they must go through a
review process. Apple has been accused by some of using clandestine and
capricious rules to reject some programs and thus blocking them from reaching
the very large and growing market of iPhone, iPad, and iPod touch users. One
application developer complained: “ if you submit an app, you have no idea
whats going to happen. You have no idea it’s going to be approved or if it’s
going to be disapproved.” The developers of an app called “South Park”
complained that their app was rejected because the content was deemed
“potentially offensive ,” even though episodes of the award-winning animated
sitcom are available at the Apple iTunes
Store. In September 2010, after more than two years of complains, apple
finally provided applications developers the guidelines it uses to review
software.
Most guidelines
seem to be aimed at ensuring that Apple users can only access high quality and
non-controversials Apps from its Apps Store. Some of the Apple guidelines are
clear and their rationale is easy to understand, such as “ apps that rapidly
drain the device’s battery or generate excessive eat will be rejected.”
However, other guidelines are unclear and highly subjective, such as “ we will
reject apps for any content or behavior that we believe is over the line.” What
line, you ask? Well, as a Supreme Court Justice once said ,“ I’ll know it when
i see it. ‘ and we think that you will also know it when you cross it. (“ I
know it when I see it” was the phrase used by U.S Supreme Court Justice Potter
Stewart to describe his ability to recognize rather than to provide a precise
definition of hard core pornography and his opinion in the cae Jacobellis v.
Ohio in 1964.)
The electronic
frontier foundation believes that while the guidelines are helpful, in some
cases apple is defining the content of third-party software and placing limits
on what is available to customers of Apple’s App Store.
By way of
comparison, Google places few restrictions and developers of software for its
competing Android Marketplace. However, there have been many low-quality
applications offered to Android Marketplace customers, including some that
include unwanted malware. Indeed by early 2011, goggle had pulled 21 Android
applications from its Android Marketplace because, once downloaded, the
applications not only stole users’ information and device data but also created
a back door for even more harmful attacks. Apple’s decision to finally share
applications guidelines may have been an attempt to combat the rapidly increasing
popularity the android. It may also have been a response to a U.S Federal Trade
Commission’s investigations of a complaint for Adobe concerning Apples banning
of the flash software from devices that run using Apple’s iOS operating system
(Adobe Flash player is a browser-based applications that runs in many computer
hardware/ operating system combination and support the viewing of called “rich,
expressive applications,” content, the videos across screens and browsers.)
Discussion Questions:
1.
Should Apple conduct extensive
screening of Apps before they are allowed to be sold on the App Store? Why or
why not?
Answer: It must be yes. In order they got too much expensive
application whether in cell phone or any class of gadget. Because in App store,
surely it will needed some exact money before you install the application.
2.
Do research to determine the
current status of the FCC investigation of Apple for banning use of the Adobe
Flash software and devices that use the iOS operating system.3. What do you think
of Apple’s guidelines that say it will reject an App for any content or
behaviour that they believe is over the line? Could such statement be construed
as a violation of the developer’s freedom of speech? Why or why not?
Answer:
I think so. I could say yes. It will say that base on that statement, the
violation is freedom of speech. Rejection is not a reason of being the
violation, sometime it could be the statement.