Stuck with your technology & it assignment?

Get answers from academic experts to any study-related questions.

a. What would be your primary concerns regarding cyberbullying if you managed MySpace? b. What steps would you take based on these concerns?

a. I would ensure that considerable action is taken against those indicted for cyberbullying offenses and bar them from holding future accounts and accessing services from the company. I would ensure that personal information is given before an individual is allowed to access the company’s social services. This information should...

Describe what you think are the social issues facing MySpace.

Information conversed through MySpace can inflict emotional distress to the users who are victimized by the bullies. Some MySpace users create fake accounts to intimate and bully others; this is inappropriate and is mentally disturbing. MySpace has been used to spread unsocial behaviors rather than the social purpose it was...

Describe what you think are the ethical issues facing MySpace.

MySpace is faced with a cyberbullying issue. Cyberbullying is whereby bullies use the internet to bully or threaten their peers; individuals use social networking sites, such as MySpace, to intimate their victims. The case of Lori Drew. MySpace users are violating its rules that forbid the creation of fake accounts...

Does the Tucson data mining project inappropriately violate the privacy of Internet users? Or is it an acceptable tradeoff to more intelligently combat terrorism? Please explain why you think so.

I think the Tucson data mining project inappropriately violates the privacy of internet users. The new technology cannot combat terrorism effectively due to the everyday evolution of technology, and many people communicate through pseudonyms or anonymous names, and it can be difficult to find the exact accurate information of an...

a. What ethical issues are present in the field of IT? b. What social issues are present? c. What political issues are present? d. What security issues are present?

a. It is ethically wrong to intrude into people’s private life and morally wrong to tap people’s personal messages. b. The new anti-terrorism technology intrudes into an individual’s private life on the internet and in other places. Innocent people may have their private conversations exposed. Mistakes in interpreting the results...

Review an article regarding technology transfer to a developing nation. Discuss barriers to the technology transfer presented in the article.

Technology transfer is an important condition for sustained growth. The article reviewed in the scope of this paper is titled “Challenges in Technology Transfer from Developed to Developing Countries.” In it, the authors discuss several barriers in implementation of new technological solutions for waste management in Middle Europe. Waste management...

In what ways is a good contract with the software vendor important to a system implementation?

For a system implementation, a good contract of a healthcare organization with a software vendor is significantly important. The documentation concerning the real clinical environment and talking to the organization’s clinicians about their work’s conditions cannot be ignored by vendors. The received information will help them to develop the implementation...

List five events that would cause the registry to automatically change.

The concept of a registry is an essential part of an operating system due to the fact that it stores and references small pieces of information, which are critical for the proper functioning of the OS. The system registry, or the Windows registry, is a database for storing the operating...

Apply Porter’s Five Forces analytical framework to the Internet. Your answer should include critical elements supported with evidence/ justification.

When applying Porter’s five forces to analyse the Internet, one can understand the potential of this technology and the many benefits it provides to its users, including businesses that use it to improve their information management. The competitive rivalry element in regards to the Internet is not applicable since this...

Explore the Web for the latest World Internet Users Population Stats for 2019 comparing at least 4 regions (for example: Africa, Asia, Europe, Middle East) in terms of Internet users distribution % and penetration rate (% population).

Globally, the number of individuals who have access and actively use the Internet differs, depending on the specific area. The % of the population using the Internet within different regions differs significantly, which is partially a result of technical difficulties associated with the ability to provide Internet connection in some...

How does the Internet benefit the development of a global information system? Should all global systems be based on the Internet?

The Internet benefits the establishment of a global information system because this technology, unlike other means of communication, provides instant access to information in the forms of text, audio, images, video, and even software. Hence, the business communication and management of processes becomes easier, and coordination of work between different...

What are the four specific types of business challenges to global business systems? Which one do you think will be easiest to solve? Why?

There are technical and non-technical issues that can obstruct businesses from establishing global information technology systems, including the different standards, technologic-related skills of people, reliability of the connection to the Internet and its speed. The difference in standards that exists on the global level makes the compatibility of technology a...

What steps should you take to develop an international information systems architecture?

In order to develop an international information system architecture, one must consider the specifics of the business operations, the global strategy, and the applicability of the technology in different countries where this business will operate. Firstly, it is necessary to assess the countries where a company operates and their access...

What are the benefits of the sociotechnical design approach to information systems?

As the name suggests, the sociotechnical design implies the application of social principles when planning and developing software applications. Designing information systems that incorporate both the social and technical elements is vital because it enables easy integration of these information systems into the operations of an organisation. As technology becomes...

Organizations should implement certain e-policies to protect themselves. Discuss.

Information ethics is a complex issue since, on the one hand, technology allows companies to use data in order to improve their operations and customer experiences, while on the other, collecting and using information arises privacy concerns. The most recent case that highlights the importance of ethical discussions regarding information...

Explain the importance of data mining tools and the types of information they produce. In what type of circumstance would you advise a company to use data mining?

The emergence of the Internet allowed organisations to receive large quantities of data about their consumers, which can be used to enhance the efficiency of operations. However, in order to successfully interpret and use this information, it has to be collected and sorted correctly, which is the main task of...

Why is performing a technology assessment or gap analysis before deploying a HIS application important, and how can this mitigate future system problems or crashes?

A technology assessment or gap analysis is a common practice before the deployment of the HIS application, and it is important as it check the accuracy and acceptability of all technology areas to support the HIS indoctrination. Effectively implemented HIS programs on the base of appropriate areas are characterized by...

Discuss the pros and cons of using application integration versus application interfaces.

The use of application integration instead of application interfaces is highly beneficial as there is no need to create applications discretely and maintain interfaces. All essential information from integrated applications is saved in “the same shared data repository.” The potential disadvantage of application integration is its extremely fast update and...

Name three key features of Windows 7 that were new to that version of Windows. For each feature, explain what it does and explain why a user might want/need this feature.

Windows 7’s primary feature is its improved graphics, which made the given OS better looking. Another key feature is the fact that Windows 7 provided a much smoother experience to its users compared to previous versions, such as Windows Vista or Windows XP. In addition, Windows Defender in Windows 7...

Is the cell phone a disruptive technology? If so, to what?

Phone technology is, to a large extent, a disruptive technology. Increasingly, phone technology has changed the people use a phone and provided a new channel through which marketers approach the market. Different phone applications have been developed in the recent past that enables the use of the phone as a...

Potential employers of engineers and others are now using social websites and posting (like Facebook, Twitter, YouTube, etc.) to check on the character and other non-technical aspects of potential employees, in your opinion is this practice ethical? Should that information be deemed private or public as it relates to potential employment? Be sure to support your argument with published examples of your point of view.

Social websites enable people to express their opinions regarding various social, political and economic issues. They offer platforms for people to interact with friends, family members and strangers. The information available on a personal website can tell others about the personality of the owner. Therefore, employers should use these websites...

Is there an ethical obligation to ensure that the information you post on your personal website(s) is accurate and true? Or is it up to the Web user to be discriminating and to realize that some material might not be accurate?

Social websites like Facebook and Twitter allow users to post, read and share information regarding politics, economy, religion, sports, nature, and celebrities. However, sometimes the information individuals post on their personal websites may not be accurate. People should take responsibility for what happens on their personal websites to ensure they...

Discuss what you consider to be the 3 most negative impacts of computers and related software on society and the human condition. Make sure you also indicate what you think is the most effective way to counteract these negative effects. Also indicate why your proposed solution to counteract these negative effects has not been implemented.

Computers have led to the introduction of the internet, and this has enabled people to communicate efficiently. However, social sites have limited the physical interaction of people because they do not see the need to visit others, yet they can communicate through the internet. Human relations like family ties have...

Based on the discussion about technological optimism and pessimism discuss a fictional example of a technology that clearly has both technological optimism and pessimism attributes. Please be sure to describe the technology, the benefits and concerns. Also please note whether you believe you are a technological optimist or pessimist.

Technology has revolutionized the production of goods and services to ensure people live happily. The need to use modern technology has enabled people to save time, energy and get quality products and services. This discussion explores the future and impacts of cloning on modern societies. This is the production of...

What is a groupware application? Have you ever used groupware in your work place?

A groupware application, also known as collaborative software, can be defined as the application software, which is supposed to be used as a key tool for pursuing a particular goal as a team. According to the existing studies, “software projects are inherently co-operative.” Therefore, collaborative software facilitates efficient cooperation between...

Distinguish between the human mind and computers as tools for thinking. What does the human mind do better and why? What does the computer do better and why? Weigh in on the debate over artificial intelligence and support your claims.

The human mind is a subject of many philosophical debates and a topic of interest for psychologists and cognitive scientists. Different faculties comprise the mind, including thinking, perception, imagination, and consciousness. Therefore, it can be used as a tool for achieving different goals. By thinking, we may generate new ideas...

Augmented reality applications may reach the level of sophistication where we observe almost everything through the screen of our smartphones to receive an “enhanced” experience. Do you view this as a positive development or a problem?

Augmented reality (AR) or hyperreality is a positive development in the modern technological age. It is a product that benefits both consumers and advertisers. Marketers can collect data and understand consumers, directly gaining their attention on mobile devices. Meanwhile, consumers can view products in the AR to have a better...

Outsourcing has become the standard operating procedure for many U.S. government projects. However, the failure rate of these projects is high. For example, the Secure Border Initiative (SBinet), Affordable Health Care Act Exchange websites, and other projects have suffered failures leading to the complete termination of the project or a need to bring in another contractor to finish the work. These options increase costs for work that would have been done correctly if the project had been well managed in the first place. Using examples, identify and explain the problems that emerge from a project when the government allows the contractor to determine scope, manage all contractor relations, and decide how to share project status information with oversight bodies.

With the need to provide high-quality care to customers and decrease the costs of this provision, outsourcing has become one of the key solutions to these issues. However, due to the lack of control and additional disruptions, projects tend to have a greater likelihood of failing. Information Technology outsourcing is...

What are the requirements for an invention to be patented? What are some limitations that apply to patents? Can your invention for your project be patented? Why or why not?

One of the primary requirements for licensed intellectual property products is uniqueness. In this regard, if a person is willing to register a certain invention or brand officially, he or she should make sure that there are no analogs of such a product. Otherwise, a number of restrictions arise. As...

What is intellectual property, and how can you leverage it? What specifically is NSWC Crane doing to leverage their IP with their technology transfer program?

Intellectual property is collecting personal non-property and exclusive property rights to certain information that can be represented on a material medium distributed in an unlimited number of copies. Schox argues that it “is an umbrella term for the legal rights that attach to inventions, confidential information, artistic expressions, and brands.”...

What three significant questions need to be answered regarding globalization?

The key questions globalization raises are the following: Which social groups, organizations, governments, or corporations want to develop and promote certain kinds of science and technology? Who has the main influence on the directions of science and technology development? Who will benefit from the results of scientific research and technological...

What presentational media can you use to enhance an oral presentation, other than Microsoft® PowerPoint®? What would stop you from using other types of media for presentations?

Other than PowerPoint, there are media that may be used to enhance an oral presentation. This may include dramatization, the use of videos, use of charts, and other pictorials. Video provokes emotional reactions and reduces boredom. Media choice is majorly influenced by the prior skills in the usage of a...

Why are Microsoft® PowerPoint® and other computer-aided media becoming dominant in oral presentations? Does this make for a better presentation? Why or why not?

Microsoft PowerPoint and other computer-aided media are becoming dominant due to their efficiency and portability. They offer an opportunity to present information or idea both orally and visually simultaneously. They are highly portable since volumes of presentations may easily be carried in an external storage device. They can be easily...

Describe the characteristics of a digital firm.

Chatterjee described a digital firm as an enterprise that managed business relationships with clients, suppliers, and staff digitally. Characteristics of these firms included participation in the value webs with the aim of delivering their services and goods, digitalized relationships with their staff, clients, and suppliers, the digital performance of business...

How has networked communication affected the way texts are produced, understood, interacted with and circulated? How are we involved in the construction of texts and their contexts, and how has this been affected by digital formats and social networking sites such as YouTube, Facebook, Tumblr etc?

What is the interactive audience? One may ask. It is not completely independent but still eminent in major media houses. Instead of it being a mere spectator, new media technologies should work tirelessly to enhance interaction between the media consumers and the production. This participatory culture should be advanced to...

Describe what is meant by the term “IP convergence.”

Data that can be found over the Internet are controlled by certain protocols. The set of protocols is called the Internet Protocol (IP). These protocols are essential for the Internet to work as they provide computers with a possibility to communicate in the network. IP convergence is the ability of...

What are the problems associated with software obsolescence?

The fact that technologies develop rapidly consequently leads to software obsolescence. The major problems associated with this issue are the following ones, namely, slow working process, outdated interface, failure to work with modern technologies and programs.

How does computer networking works?

There are some components that a computer network requires to function; among them are the following “a server, or client workstation, an operating system (like Windows NT), some sort of cabling and a network interface card.” Computers can share information and resources through the network.

For which purposes are data stored in organizations?

Data are the significant source of information that shows whether the organization is profitable and successful. Data are essential to be stored as based on the previous experience, the work can be improved and advanced.

Describe the key functions of system software.

There are three key functions of system software. First and foremost, the software manages the operations on the computer. Furthermore, it provides better and easy operation. In addition, it helps to copy, delete, and store the information.

Describe the evolution of the information systems (IS) function within organizations.

The early history of IS is associated with significant backlogs in the projects which the personnel would not complete in time, and that would be complicated in usage. With the emergence of personal computers, companies were able to build their own systems. As IS managers have become more technologically-oriented, the...

List and define five types of information systems used in organizations.

Types of IS used in organizations include management IS, executive IS, decision support system, data mining system, and electronic commerce system. An electronic commerce system enables customers to buy goods from a company’s website, while data mining is targeted at analyzing data warehouses. Management and executive information and decision support...

List and define three technical knowledge and/or skills core competencies.

In the area of technical competency, the primary skills are related to security, networking, hardware, and software. The skill in hardware is connected to the development of hardware platforms and peripherals, while the software skill refers to the creation and management of operating systems, drivers, and software. The networking skill...

What is a CIO, and why has the CIO grown in importance?

CIO or chief information officer is an individual that is in charge of a company’s strategy on Information Technology and computer systems that play an integral role in achieving goals set by the company. The importance of the CIO’s role has grown with the emergence of new technologies. They facilitate...

Describe three or four types of jobs and career opportunities in information systems and in related fields.

System analysts, operators, programmers, and administrators are professions that all relate to information system management and maintenance. Experts that work in information system consultancy are also parts of a major bulk of professionals. Lastly, university professors can also be included in the category of IS professionals as they develop research...

Define and contrast technology, information technology, and information system.

The notion of technology refers to electrical and mechanical ways for extending, replacing, or substituting manual devices used by people. Information technology (IT) goes beyond the concept of technology and relates to machine technology that uses information. The concept of information systems is similar to IT but different because it...

What language(s) must be used to display a bare-minimum web page?

Hyper Text Markup Language (HTML). Explanation: Computers “communicate” with users and the Internet through programming languages, which can be described as sets of rules or commands for instructing a computing device to complete particular tasks. The examples of programming languages include HTML, JavaScript, Python, and PHP. HTML is the standard...