Computer Science: An Overview (13th Edition) (What's New in Computer Science)
Computer Science: An Overview (13th Edition) (What's New in Computer Science)
13th Edition
ISBN: 9780134875460
Author: Glenn Brookshear, Dennis Brylow
Publisher: PEARSON
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 0, Problem 5SI

Explanation of Solution

Government Regulation of computer technology:

  • There are dangers to private security, exploitation of interests of the one group, misuse of information, threat to personal information and domination by the vested interests. Therefore, the government needs to regulate the computer technology.
  • In order to ensure fair access to the banking services and economy, government should regulate and make laws so that the interest of all the groups is protected.
  • Government should regulate the amount of charge levied on the service charges and should ensure fair competition among various services providers so that the customer is able to choose between various banks.
  • Moreover, there has to be more than one choice, so that either one can choose checks, payroll card or direct deposit or other methods.

There are federal laws on direct deposit, but states can also make regulations. The Electronic Fund Transfer Act (EFTA) protects employers and employees who use features like direct deposit. Federal law says that employers can make direct deposit mandatory. However, one of the following conditions must be met:

  • The employee must be able to choose the bank for direct deposit.
  • If the employer chooses the bank, it must offer another form of payment for the employee, such as a paper check

The rights of the children and family with respect to privacy need to be protected.

  • Government should regulate regulations so that privacy is not compromised, intruded and disclosed to strangers and hackers.
  • The prior permission needs to be obtained regarding what is being shared and what information is available to the companies associated with interactive TV.
  • Personal and Private data need to be highly protected with high end security and anti-virus and anti-theft programs, so that it is shared only with the concerned person. It is highly unethical to pose threat to children to obtain information about the children.

Conclusion:

  • Therefore, the government should regulate regulations to the extent so that economic growth is not hampered and the advancement of technology is not stagnant.
  • It is the duty of the elected government to protect human right with regards to privacy, free access to economic services and decide the amount of charges that is borne by consumers in banking services, sidewise allowing the open access to market for better infrastructure and technology.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
A Personal Address Book application program allows the user to add, delete, search, save, and load contact information. The program separates the user interface (command-line) and the internal processing subsystem. The internal processing system consists of the following classes: • • Contact Manager (responsible for add and delete operations) Contact Finder (responsible for the search operation) pataManager (responsible for save and load operations) a. What design pattern can be used to implement the user interface? Explain your answer using a class diagram for the entire system. b. Draw a UML sequence diagram to show the behavioral view of the Personal Address Book program, demonstrating what happens when a user enters new contact information.
A system comprises three components: A, B, and C. Calling A requires calling B, and calling B requires calling A. Component C is responsible for dissimilar tasks T#1, #2, and T#3. a. Comment on the modifiability of this system. What problems do you see in this system, and how would you solve them? b. Suppose that T#1 is performed by both component A and C. What does this indicate about A and C? How would you solve this problem?
Please answer questions from number 1 to 3 if these questions in the image provided below(NOTE: THESE QUESTIONS ARE NOT GRADED!)
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning