Preview

Nt1310 Unit 3 Assignment 1

Satisfactory Essays
Open Document
Open Document
529 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Assignment 1
Question 1:

I choose the site Webinvestigator.org. This sites advertises that you can have access to the marriage, divorce, birth, and death records of someone. Also you can see their felony records. They can perform background checks, business searches, and phone searches. And they also do neighborhood checks, so you can see if any sex offenders live near the area. And they claim to have information on 90% of US residents.

Question 2:

I think that this information should not be available for the public. I believe there are privacy issues involved because our privacy rights are violated when sites like this ones rummage around and expose our private information to the public for just $4.95 dollars. On the page it says, “Search requests on public officials, juveniles, and/or celebrities are strictly prohibited.” And I found interesting that if those persons are prohibited from being searched, why not everyone, why only protect the privacy of such persons? I am not concerned with good people having that type of information regarding me, but there a lot of bad people in the
…show more content…
Businesses are swiping customers’ licenses to get the information saved on the bar codes or magnetic strips. Common information found on the driver licenses and additional information like marital status, phone number, housing value, income range and profession. Their main purpose is to detect underage drinkers and fake IDs, however a lot of businesses are also using their information for marketing purposes in order to understand their customers better and know how to efficiently advertise to each customer segment. The major problem with this is that most of the cases customers are not aware of what is happening when businesses are swiping their cards. And unknowingly, customers are sharing their personal information to businesses. It also is a problem because that information is not regulated and could end in the hands of wrong

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 8 Assignment 1

    • 1415 Words
    • 6 Pages

    This project used an Atmega644 microcontroller clocked at 20MHz in each of the two functional modules for processing. Memory storage is provided by a standard Secure Digital (SD) card. Xbee modules provide bidirectional wireless communication and we use the TLV5616 DAC chip for generating analog audio. The LM358 dual op amp provides active filtering to the output of the DAC. Music files can be added to the SD card using any computer with a multimedia card reader. Once the base station detects an SD card inserted into the holder, it awaits data requests from the portable module. The portable module requests data when required and feeds these values into the DAC. The DAC output is low-pass filtered by the op amp, which also buffers the DAC output before it reaches the audio output…

    • 1415 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    A good example of refraction of light and reflection of light is a rainbow. Sunlight enters the rain droplet at a specific angle and the rain droplet separates the white light into many different colors. This angle is a fixed measurement between your eye and the sun. What color is refracted depends upon the critical angle, which is the angle the sunlight strikes the back of the rain droplet. Red light bends the least while violet light bends the most all the other colors bend at an angle that is between the two. Each rain droplet reflects all colors at a given point and time, but only one color comes back to your eye, requiring millions of rain droplets to create a rainbow. As the rain droplets fall…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Now, select a virtual switch depending on how you have configured the host. Proceed to the configuration of port properties. Give the port a specific name. I have given the label as ‘VMK’. Enter VLAN ID if there is any or else chose ‘None’. Put a check next to the ‘Virtual SAN traffic’ box and then click ‘Next’. Now start with configuring IPv4 settings for this port. After completing that, click ‘Next’. Click on the finish button to end the configuration for port group creation. Make sure that the group is created. Again a new window will pop up showing the devices created and their respective IP addresses. After confirming that the host is created, repeat this procedure two more times, since we require at least three hosts for configuring VSAN.…

    • 229 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    a. The time in hours, minutes, and seconds is to be passed to a function named totsec().…

    • 720 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    An extra layer of authentication for the security of resources by two-step verification. The combination of any two or more veri-fication methods (password, biometrics, trusted device).…

    • 553 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    With the development of digital technology, our data is not only being monitored, but it is being gathered and stored in such a way that makes it searchable. Daniel J. Solove had it right when he wrote, “Until recently, public records were difficult to access—finding information about a person often involved a scavenger hunt through local offices to dig up records. But with the Internet, public records are increasingly being posted online, where anybody anywhere can easily obtain and search them.”[1] Is there a form of protection against this invasion of privacy? Are we to trust these data controllers, the person or persons who control the functions and methods of the processing of our personal data? Are the government regulations decreasing our right to privacy? What is considered private these days?…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    To begin with, I think when you choose to go online, you are going to lose any amount of privacy you think you have. The internet is a wide open forum that people from all over the world have access to, and the line between the public and the private has become increasingly indistinct. Americans have rushed to take advantage of the explosion of the Internet, but few have stopped to consider the relatively murky legal protections afforded to online activity. Privacy protections against government searches are provided by state and federal laws, and by the Constitution’s Fourth Amendment, which provides that “The right of the people to be secure in their persons, houses, papers and effects, against unreasonable searches and seizures, shall not be violated.” Courts have slowly developed different frameworks as they grapple with how to apply the original intentions of the Fourth Amendment to new social circumstances. Federal courts, due to the slow pace of the U.S. legal system, within recent years have begun to hold that e-mail content is protected by the same standards as telephone calls.…

    • 604 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    These organizations have so much information that they are even able to recreate a person’s day with what they know about the person and based on his payments, calls and e-mails. They can figure out who you were with and who you talked to just by checking similarities in someone else’s data. They basically know everything about…

    • 637 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Most people live in America recorded at list in more than 50 commercial databases according to Electronic Frontier Foundation. Those databases are at risk for being stolen or misused, citizens have valid concerns about their privacy, the validity of recorded data, and the security of their identities.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is all of this stuff really secure? More than one researcher is sounding the alarm over these tools, noting that while this data may have been private a decade ago, in an era of personal blogs, online resumes, and rampant social networking services, "personal" information drawn from your past is now widely available for public consumption. According to a researcher at PARC, you can even buy black market directories of personal information "like dog's names," for about $15 per batch. It's certainly a lot easier than guessing passwords like AHFplug41*.…

    • 666 Words
    • 3 Pages
    Good Essays
  • Good Essays

    One can access information of an individual private data without any effort. One of the popular technologies that allow an individual to research citizens’ private data is intelius.com. This site is very popular among Americans to get information of a person living in United States of America. They sells back ground check information which includes, address…

    • 519 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Should people give up their privacy in exchange for convenience or free services? I don’t recommend it; free services have several potential risks and concerns. They can cause customers to be uncomfortable, technical difficulties, and…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Digital Privacy

    • 1125 Words
    • 5 Pages

    In this paper we will discuss three technologies that allow an individual to research citizen’s private data, and the advantages and disadvantages of public access to this information. We will look at what it means for both the researchers and the individual who are being investigated. What steps citizen’s can take from having their private information from being disclosed? We will also discuss what federal law that grants the federal government the legal right to make private information on U.S. citizen’s available to the public. Finally we will determine whether there are electronic privacy laws that can prevent others from having access to private information.…

    • 1125 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Body Mass Index

    • 382 Words
    • 2 Pages

    Scott McNealy has it right; we do not have any privacy now days. It is absolutely incredible how much of our personal information can be found with a simple search. I say this because just this last Sunday my husband and I began searching for our names on Google, and we were both surprised how many sites have our information. Some of it dates back to the 2000’s, so yeah, some is very outdated. But the fact that our personal information can be retrieved that easily is a concern to us, but what can we do?…

    • 382 Words
    • 2 Pages
    Good Essays
  • Good Essays

    As of today internet online searching has become every person's habit and necessity of life. But we tend to forget that we left our tracks of identity over the internet. How safe would this be for every individual who use internet searches. Almost every person now uses online searching taking from daily grocery to buying a house or a car. Online searches bring them everything from around the globe to their doorstep. As the article "Will you let them store your dreams?" published in Newsweek by Steven Levy states "Web encourages us to quest away-whether we're researching a car purchase, puzzling out some medical symptoms, wondering what happened to an old friend or (gasp) groping for erotica". This statement shows how important the internet searching has become in our daily lives. But, what we don't know is we left our marks over the internet into the hands of the search companies. And companies who make these searches possible are making tremendous progress and achieving great success.…

    • 692 Words
    • 3 Pages
    Good Essays