Preview

Nt1310 Unit 3 Assignment 1

Satisfactory Essays
Open Document
Open Document
529 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Assignment 1
Question 1:

I choose the site Webinvestigator.org. This sites advertises that you can have access to the marriage, divorce, birth, and death records of someone. Also you can see their felony records. They can perform background checks, business searches, and phone searches. And they also do neighborhood checks, so you can see if any sex offenders live near the area. And they claim to have information on 90% of US residents.

Question 2:

I think that this information should not be available for the public. I believe there are privacy issues involved because our privacy rights are violated when sites like this ones rummage around and expose our private information to the public for just $4.95 dollars. On the page it says, “Search requests on public officials, juveniles, and/or celebrities are strictly prohibited.” And I found interesting that if those persons are prohibited from being searched, why not everyone, why only protect the privacy of such persons? I am not concerned with good people having that type of information regarding me, but there a lot of bad people in the
…show more content…
Businesses are swiping customers’ licenses to get the information saved on the bar codes or magnetic strips. Common information found on the driver licenses and additional information like marital status, phone number, housing value, income range and profession. Their main purpose is to detect underage drinkers and fake IDs, however a lot of businesses are also using their information for marketing purposes in order to understand their customers better and know how to efficiently advertise to each customer segment. The major problem with this is that most of the cases customers are not aware of what is happening when businesses are swiping their cards. And unknowingly, customers are sharing their personal information to businesses. It also is a problem because that information is not regulated and could end in the hands of wrong

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The problematic scenario is when the physical sequence has a loop. In this scenario, a switch which is attached to the middlebox literally cannot identify the middlebox segment based on the combination of the input interface and packet header fields. To address this scenario, SIMPLE introduce a ProcState tag that encodes the packet’s processing state inside the packet header fields using either VLAN tags, unused fields in the IP headers i.e., IP ToS fields or MPLS labels depending on the fields supported in the SDN-enabled switches. Therefore, SDN controller installs tag addition forwarding rules at the first switch of each middlebox segment, which is based on packet header fields and input ports of the switch. In addition, downstream switches consider these tags for the matching purpose and perform respective forwarding action. This process continues until the middlebox segment is finished.…

    • 241 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    A good example of refraction of light and reflection of light is a rainbow. Sunlight enters the rain droplet at a specific angle and the rain droplet separates the white light into many different colors. This angle is a fixed measurement between your eye and the sun. What color is refracted depends upon the critical angle, which is the angle the sunlight strikes the back of the rain droplet. Red light bends the least while violet light bends the most all the other colors bend at an angle that is between the two. Each rain droplet reflects all colors at a given point and time, but only one color comes back to your eye, requiring millions of rain droplets to create a rainbow. As the rain droplets fall…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CODE FOR THE ABOVE FRAGMENT addi $t6, $zero, 101 # the loop termination value add $t0, $zero, $zero # i = 0 addi $t2, $a0, 0 # ptr to current A[i] addi $t3, $a1, 0 # ptr to current B[i] loop: lw $t4, 0($t3) # load B[i] add $t4, $t4, $s0 # B[i] + c sw $t4, 0($t2) # store in A[i] addi $t0, $t0, 1 # i++ addi $t2, $t2, 4 # ptr to next A[i] addi $t3, $t3, 4 # ptr to next B[i] bne $t0, $t6, loop # if i < 101, goto loop IF ANY QUERIES REGARDING CODE…

    • 107 Words
    • 1 Page
    Powerful Essays
  • Good Essays

    An extra layer of authentication for the security of resources by two-step verification. The combination of any two or more veri-fication methods (password, biometrics, trusted device).…

    • 553 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Understand the task. If your teacher, teacher, or president gives you your guidance about your report, be sure to read it (and re-read it). What task does it ask you to do? Are you supposed to tell your audience about a topic? In general, if you are writing a report for a primary, intermediate or secondary class, you will be asked to submit a topic without including your opinion. Other tasks may ask you to convince your audience in a certain way to understand your subject or analyze a topic. Ask your teacher for any questions you may have as soon as possible. [1]…

    • 131 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    With the development of digital technology, our data is not only being monitored, but it is being gathered and stored in such a way that makes it searchable. Daniel J. Solove had it right when he wrote, “Until recently, public records were difficult to access—finding information about a person often involved a scavenger hunt through local offices to dig up records. But with the Internet, public records are increasingly being posted online, where anybody anywhere can easily obtain and search them.”[1] Is there a form of protection against this invasion of privacy? Are we to trust these data controllers, the person or persons who control the functions and methods of the processing of our personal data? Are the government regulations decreasing our right to privacy? What is considered private these days?…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    To begin with, I think when you choose to go online, you are going to lose any amount of privacy you think you have. The internet is a wide open forum that people from all over the world have access to, and the line between the public and the private has become increasingly indistinct. Americans have rushed to take advantage of the explosion of the Internet, but few have stopped to consider the relatively murky legal protections afforded to online activity. Privacy protections against government searches are provided by state and federal laws, and by the Constitution’s Fourth Amendment, which provides that “The right of the people to be secure in their persons, houses, papers and effects, against unreasonable searches and seizures, shall not be violated.” Courts have slowly developed different frameworks as they grapple with how to apply the original intentions of the Fourth Amendment to new social circumstances. Federal courts, due to the slow pace of the U.S. legal system, within recent years have begun to hold that e-mail content is protected by the same standards as telephone calls.…

    • 604 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Is all of this stuff really secure? More than one researcher is sounding the alarm over these tools, noting that while this data may have been private a decade ago, in an era of personal blogs, online resumes, and rampant social networking services, "personal" information drawn from your past is now widely available for public consumption. According to a researcher at PARC, you can even buy black market directories of personal information "like dog's names," for about $15 per batch. It's certainly a lot easier than guessing passwords like AHFplug41*.…

    • 666 Words
    • 3 Pages
    Good Essays
  • Good Essays

    These organizations have so much information that they are even able to recreate a person’s day with what they know about the person and based on his payments, calls and e-mails. They can figure out who you were with and who you talked to just by checking similarities in someone else’s data. They basically know everything about…

    • 637 Words
    • 3 Pages
    Good Essays
  • Good Essays

    One can access information of an individual private data without any effort. One of the popular technologies that allow an individual to research citizens’ private data is intelius.com. This site is very popular among Americans to get information of a person living in United States of America. They sells back ground check information which includes, address…

    • 519 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Most people live in America recorded at list in more than 50 commercial databases according to Electronic Frontier Foundation. Those databases are at risk for being stolen or misused, citizens have valid concerns about their privacy, the validity of recorded data, and the security of their identities.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Should people give up their privacy in exchange for convenience or free services? I don’t recommend it; free services have several potential risks and concerns. They can cause customers to be uncomfortable, technical difficulties, and…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Digital Privacy

    • 1125 Words
    • 5 Pages

    In this paper we will discuss three technologies that allow an individual to research citizen’s private data, and the advantages and disadvantages of public access to this information. We will look at what it means for both the researchers and the individual who are being investigated. What steps citizen’s can take from having their private information from being disclosed? We will also discuss what federal law that grants the federal government the legal right to make private information on U.S. citizen’s available to the public. Finally we will determine whether there are electronic privacy laws that can prevent others from having access to private information.…

    • 1125 Words
    • 5 Pages
    Better Essays
  • Good Essays

    As of today internet online searching has become every person's habit and necessity of life. But we tend to forget that we left our tracks of identity over the internet. How safe would this be for every individual who use internet searches. Almost every person now uses online searching taking from daily grocery to buying a house or a car. Online searches bring them everything from around the globe to their doorstep. As the article "Will you let them store your dreams?" published in Newsweek by Steven Levy states "Web encourages us to quest away-whether we're researching a car purchase, puzzling out some medical symptoms, wondering what happened to an old friend or (gasp) groping for erotica". This statement shows how important the internet searching has become in our daily lives. But, what we don't know is we left our marks over the internet into the hands of the search companies. And companies who make these searches possible are making tremendous progress and achieving great success.…

    • 692 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Body Mass Index

    • 382 Words
    • 2 Pages

    Scott McNealy has it right; we do not have any privacy now days. It is absolutely incredible how much of our personal information can be found with a simple search. I say this because just this last Sunday my husband and I began searching for our names on Google, and we were both surprised how many sites have our information. Some of it dates back to the 2000’s, so yeah, some is very outdated. But the fact that our personal information can be retrieved that easily is a concern to us, but what can we do?…

    • 382 Words
    • 2 Pages
    Good Essays