1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
meriva
3 years ago
9

Cite another example of information technology companies pushing the boundaries of privacy issues; apologizing, and then pushing

again once scandal dies down. As long as the controversy fades, is there anything unethical about such a strategy?
Engineering
1 answer:
Alexxx [7]3 years ago
7 0

Answer:

Explanation:

Tech Social Media giant FB is one of those companies. Not long ago the ceo was brought to court to accusations that his company was selling user data. Turns out this is true and they are selling their users private data to companies all over the word. Once the news turned to something else, people focused on something new but the company still continues to sell it's users data the same as before. This is completely unethical as the information belongs to the user and they are not getting anything while the corporation is profiting.

You might be interested in
How many broadcast or vlan is in this switchs and router ? and why? ​
Mnenie [13.5K]

Answer:The move from hubs (shared networks) to switched networks was a big improvement. Control over collisions, increased throughput, and the additional features offered by switches all provide ample incentive to upgrade infrastructure. But Layer 2 switched topologies are not without their difficulties. Extensive flat topologies can create congested broadcast domains and can involve compromises with security, redundancy, and load balancing. These issues can be mitigated through the use of virtual local area networks, or VLANs. This chapter provides the structure and operation of VLANs as standardized in IEEE 802.1Q. This discussion will include trunking methods used for interconnecting devices on VLANs.

Problem: Big Broadcast Domains

With any single shared media LAN segment, transmissions propagate through the entire segment. As traffic activity increases, more collisions occur and transmitting nodes must back off and wait before attempting the transmission again. While the collision is cleared, other nodes must also wait, further increasing congestion on the LAN segment.

The left side of Figure 4-1 depicts a small network in which PC 2 and PC 4 attempt transmissions at the same time. The frames propagate away from the computers, eventually colliding with each other somewhere in between the two nodes as shown on the right. The increased voltage and power then propagate away from the scene of the collision. Note that the collision does not continue past the switches on either end. These are the boundaries of the collision domain. This is one of the primary reasons for switches replacing hubs. Hubs (and access points) simply do not scale well as network traffic increases.

7 0
3 years ago
A solid circular cylinder of mass m, radius r, and length l is pivoted about a transverse axis
SashulF [63]
To be honest i have no idea
8 0
3 years ago
g a heat engine is located between thermal reservoirs at 400k and 1600k. the heat engine operates with an efficiency that is 70%
Bond [772]

Answer:

<em>Heat rejected to cold body = 3.81 kJ</em>

Explanation:

Temperature of hot thermal reservoir Th = 1600 K

Temperature of cold thermal reservoir Tc = 400 K

<em>efficiency of the Carnot's engine = 1 - </em>\frac{Tc}{Th}<em> </em>

eff. of the Carnot's engine = 1 - \frac{400}{600}

eff = 1 - 0.25 = 0.75

<em>efficiency of the heat engine = 70% of 0.75 = 0.525</em>

work done by heat engine = 2 kJ

<em>eff. of heat engine is gotten as = W/Q</em>

where W = work done by heat engine

Q = heat rejected by heat engine to lower temperature reservoir

from the equation, we can derive that

heat rejected Q = W/eff = 2/0.525 = <em>3.81 kJ</em>

6 0
3 years ago
What is the difference between speech recognition and speech synthesis?
andrew-mc [135]

Answer:

peech synthesis is being used in programs where oral communication is the only means by which information can be received, while speech recognition is facilitating commu- nication between humans and computers, whereby the acoustic voice signals changes in the sequence of words making up a written text.

Explanation:

4 0
3 years ago
Read 2 more answers
We have a credit charge that is trying to process but we do not remember signing up and email login is not working? Is there a w
Dmitry_Shevchenko [17]

Answer:

<u>Yes</u>

Explanation:

In such a case, one way to check the <em>credit charge</em> is to <u>contact your bank, </u>doing so would allow the bank to check your account properly to determine where the transaction was originated from.

Another way you could check is to contact the online merchant where such a transaction was initiated.

6 0
2 years ago
Other questions:
  • A circuit has a source voltage of 15V and two resistors in series with a total resistance of 4000Ω .If RI has a potential drop o
    7·1 answer
  • Depending on the environmental demands, there are different types of organizational structures, including __________.
    10·1 answer
  • A cylinder with a frictionless piston contains 0.05 m3 of air at 60kPa. The linear spring holding the piston is in tension. The
    11·1 answer
  • Who is the mystical body of Christ
    6·2 answers
  • (SI units) Molten metal is poured into the pouring cup of a sand mold at a steady rate of 400 cm3/s. The molten metal overflows
    9·1 answer
  • Document the XSS stored exploit script: Use the View Source feature of the web page and create a screenshot of the few lines cod
    15·1 answer
  • No question but thx<br> reeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
    7·2 answers
  • Mark each one as either Potential or Kinetic Energy?
    11·1 answer
  • Define extensive and intensive properties of thermodynamic system.
    5·2 answers
  • A liquid jet vj of diameter dj strikes a fixed cone and deflects back as a conical sheet at the same velocity. find the cone ang
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!