
Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
1st Edition
ISBN: 9781305657458
Author: Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 12, Problem 2IR
Program Plan Intro
Given Information:
- Few policies are created for an employee to follow during social media participation.
- Intel policy is given that an employee requires to disclose his/her identity and company’s confidential information.
- Apple policy states that an employee requires to disclose from discussing company about their own websites and posting messages to the social media related to the company.
Corporate policies of “FORD” in participating social media:
- The first social media policy of ford is “Use your common sense”; the employees can add value in social conversation and they must keep it cool.
- Second policy is “Beware of privacy issues”, the employees should know how to use social media without any privacy problems.
- Third policy is “play nice and be honest”, the employee can perform any general operation like uploading and sharing only legal information and keep those information in private.
Corporate policies of “IBM”:
- The first policy says that the employees can be given clear guidelines about what cannot be shared and how the employees can communicate through social media.
- The second policy encourages the employees to express themselves to shine on social media by allowing them to share their new ideas and skills on social media.
- The third policy implies that the employees are allowed to share their concept via blogging and social media.
Explanation of Solution
Justification for the nature of policies:
- Consider the first policy of IBM, it indicates that the employee should share only the information which should not lead to any security issues.
- This can be considered as lenient policy as it allow the employees to share the information with others through social media in order to achieve company’s growth.
- Similarly, the same policy may be considered as too strict when the employee shares the confidential information as it could leads to a serious problem...
Explanation of Solution
Actions that are taken for an employee when they violate the policies:
- An employee can be notified by a formal written notification that an employee has violated from the rules and policies...
Explanation of Solution
The ways that policies differ among healthcare and education:
Policies in Health Care | Policies in Education |
The healthcare policy is defined as planning, decisions and actions that are processed to achieve healthcare goals within a society. | Policies in education are defined as collections of rules and principles for governing education systems. |
An employee working in a healthcare field is subjected to security issues in case of breaching patient’s information to other patients except doctors... |
Expert Solution & Answer

Want to see the full answer?
Check out a sample textbook solution
Students have asked these similar questions
6. What is Race condition? How to prevent it? [2 marks]
7. How many synchronization methods do you know and compare the differences. [2 marks]
8. Explain what are the “mutual exclusion”, “deadlock”, “livelock”, and “eventual entry”, with
the traffic intersection as an example like dinning philosophy. [2 marks]
9. For memory allocation, what are the difference between internal fragmentation and external
fragmentation. Explain with an example. [2 marks]
10. How can the virtual memory map to the physical memory. Explain with an example. [2
marks]
Your answers normally have 50 words. Less than 50 words will not get marks.
1. What is context switch between multiple processes? [2 marks]
2. Draw the memory layout for a C program. [2 marks]
3. How many states does a process has? [2 marks]
4. Compare the non-preemptitve scheduling and preemptive scheduling. [2 marks]
5. Given 4 process and their arrival times and next CPU burst times, what are the average times
and average Turnaround time, for different scheduling algorithms including:
a. First Come, First-Served (FCFS) Scheduling [2 marks]
b. Shortest-Job-First (SJF) Scheduling [2 marks]
c. Shortest-remaining-time-first [2 marks]
d. Priority Scheduling [2 marks]
e. Round Robin (RR) [2 marks]
Process
Arrival Time
Burst Time
P1
0
8
P2
1
9
P3
3
2
P4
5
4
a database with multiple tables from attributes as shown above that are in 3NF,
showing PK, non-key attributes, and FK for each table? Assume the tables are already in
1NF. [Hint: 3 tables will result after deducing 1NF -> 2NF -> 3NF]
Chapter 12 Solutions
Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
Ch. 12 - Prob. 1SGCh. 12 - Prob. 2SGCh. 12 - Prob. 3SGCh. 12 - Prob. 4SGCh. 12 - Prob. 5SGCh. 12 - Prob. 6SGCh. 12 - Prob. 7SGCh. 12 - Prob. 8SGCh. 12 - Prob. 9SGCh. 12 - Prob. 10SG
Ch. 12 - Prob. 11SGCh. 12 - Prob. 12SGCh. 12 - Prob. 13SGCh. 12 - Prob. 14SGCh. 12 - Prob. 15SGCh. 12 - Prob. 16SGCh. 12 - Prob. 17SGCh. 12 - Prob. 18SGCh. 12 - Prob. 19SGCh. 12 - Prob. 20SGCh. 12 - Prob. 21SGCh. 12 - Prob. 22SGCh. 12 - Prob. 23SGCh. 12 - Prob. 24SGCh. 12 - Prob. 25SGCh. 12 - Prob. 26SGCh. 12 - Prob. 27SGCh. 12 - Prob. 28SGCh. 12 - Prob. 29SGCh. 12 - Prob. 30SGCh. 12 - Prob. 31SGCh. 12 - Prob. 32SGCh. 12 - Prob. 33SGCh. 12 - Prob. 34SGCh. 12 - Prob. 35SGCh. 12 - Prob. 36SGCh. 12 - Prob. 37SGCh. 12 - Prob. 38SGCh. 12 - Prob. 39SGCh. 12 - Prob. 40SGCh. 12 - Prob. 41SGCh. 12 - Prob. 42SGCh. 12 - Prob. 43SGCh. 12 - Prob. 44SGCh. 12 - Prob. 45SGCh. 12 - Prob. 1TFCh. 12 - Prob. 2TFCh. 12 - Prob. 3TFCh. 12 - Prob. 4TFCh. 12 - Prob. 5TFCh. 12 - Prob. 6TFCh. 12 - Prob. 7TFCh. 12 - Prob. 8TFCh. 12 - Prob. 9TFCh. 12 - Prob. 10TFCh. 12 - Prob. 11TFCh. 12 - Prob. 12TFCh. 12 - Prob. 1MCCh. 12 - Prob. 2MCCh. 12 - Prob. 3MCCh. 12 - A(n) _____ report consolidates data usually with...Ch. 12 - Prob. 5MCCh. 12 - Prob. 6MCCh. 12 - Prob. 7MCCh. 12 - Prob. 8MCCh. 12 - Prob. 1MCh. 12 - Prob. 2MCh. 12 - Prob. 3MCh. 12 - Prob. 4MCh. 12 - Prob. 5MCh. 12 - Prob. 6MCh. 12 - Prob. 7MCh. 12 - Prob. 8MCh. 12 - Prob. 9MCh. 12 - Prob. 10MCh. 12 - Prob. 2CTCh. 12 - Prob. 3CTCh. 12 - Prob. 4CTCh. 12 - Prob. 5CTCh. 12 - Prob. 6CTCh. 12 - Prob. 7CTCh. 12 - Prob. 8CTCh. 12 - Prob. 9CTCh. 12 - Prob. 10CTCh. 12 - Prob. 11CTCh. 12 - Prob. 12CTCh. 12 - Prob. 13CTCh. 12 - Prob. 14CTCh. 12 - Prob. 15CTCh. 12 - Prob. 16CTCh. 12 - Prob. 17CTCh. 12 - Prob. 18CTCh. 12 - Prob. 19CTCh. 12 - Prob. 20CTCh. 12 - Prob. 21CTCh. 12 - Prob. 22CTCh. 12 - Prob. 23CTCh. 12 - Prob. 24CTCh. 12 - Prob. 25CTCh. 12 - Prob. 26CTCh. 12 - Prob. 27CTCh. 12 - Prob. 28CTCh. 12 - Prob. 29CTCh. 12 - Prob. 1PSCh. 12 - Prob. 2PSCh. 12 - Prob. 3PSCh. 12 - Prob. 4PSCh. 12 - Prob. 5PSCh. 12 - Prob. 6PSCh. 12 - Prob. 7PSCh. 12 - Prob. 8PSCh. 12 - Prob. 9PSCh. 12 - Prob. 10PSCh. 12 - Prob. 11PSCh. 12 - Prob. 1.1ECh. 12 - Prob. 1.2ECh. 12 - Prob. 1.3ECh. 12 - Prob. 2.1ECh. 12 - Prob. 2.2ECh. 12 - Prob. 3.1ECh. 12 - Prob. 3.2ECh. 12 - Prob. 1IRCh. 12 - Prob. 2IRCh. 12 - Prob. 4IRCh. 12 - Prob. 5IRCh. 12 - Prob. 1CTQCh. 12 - Prob. 3CTQCh. 12 - Prob. 4CTQ
Knowledge Booster
Similar questions
- a database with multiple tables from attributes as shown above that are in 3NF, showing PK, non-key attributes, and FK for each table? Assume the tables are already in 1NF. [Hint: 3 tables will result after deducing 1NF -> 2NF -> 3NF]arrow_forwardIf a new entity Order_Details is introduced, will it be a strong entity or weak entity? If it is a weak entity, then mention its type (ID or Non-ID, also Justify why)?arrow_forwardWhich one of the 4 Entities mention in the diagram can have a recursive relationship? Order, Product, store, customer.arrow_forward
- Inheritance & Polymorphism (Ch11) There are 6 classes including Person, Student, Employee, Faculty, and Staff. 4. Problem Description: • • Design a class named Person and its two subclasses named student and Employee. • Make Faculty and Staff subclasses of Employee. • A person has a name, address, phone number, and e-mail address. • • • A person has a class status (freshman, sophomore, junior and senior). Define the status as a constant. An employee has an office, salary, and date hired. A faculty member has office hours and a rank. A staff member has a title. Override the toString() method in each class to display the class name and the person's name. 4-1. Explain on how you would code this program. (1 point) 4-2. Implement the program. (2 point) 4-3. Explain your code. (2 point)arrow_forwardSuppose you buy an electronic device that you operate continuously. The device costs you $300 and carries a one-year warranty. The warranty states that if the device fails during its first year of use, you get a new device for no cost, and this new device carries exactly the same warranty. However, if it fails after the first year of use, the warranty is of no value. You plan to use this device for the next six years. Therefore, any time the device fails outside its warranty period, you will pay $300 for another device of the same kind. (We assume the price does not increase during the six-year period.) The time until failure for a device is gamma distributed with parameters α = 2 and β = 0.5. (This implies a mean of one year.) Use @RISK to simulate the six-year period. Include as outputs (1) your total cost, (2) the number of failures during the warranty period, and (3) the number of devices you own during the six-year period. Your expected total cost to the nearest $100 is _________,…arrow_forwardWhich one of the 4 Entities mention in the diagram can have a recursive relationship? If a new entity Order_Details is introduced, will it be a strong entity or weak entity? If it is a weak entity, then mention its type (ID or Non-ID, also Justify why)?arrow_forward
- Please answer the JAVA OOP Programming Assignment scenario below: Patriot Ships is a new cruise line company which has a fleet of 10 cruise ships, each with a capacity of 300 passengers. To manage its operations efficiently, the company is looking for a program that can help track its fleet, manage bookings, and calculate revenue for each cruise. Each cruise is tracked by a Cruise Identifier (must be 5 characters long), cruise route (e.g. Miami to Nassau), and ticket price. The program should also track how many tickets have been sold for each cruise. Create an object-oriented solution with a menu that allows a user to select one of the following options: 1. Create Cruise – This option allows a user to create a new cruise by entering all necessary details (Cruise ID, route, ticket price). If the maximum number of cruises has already been created, display an error message. 2. Search Cruise – This option allows to search a cruise by the user provided cruise ID. 3. Remove Cruise – This op…arrow_forwardI need to know about the use and configuration of files and folders, and their attributes in Windows Server 2019.arrow_forwardSouthern Airline has 15 daily flights from Miami to New York. Each flight requires two pilots. Flights that do not have two pilots are canceled (passengers are transferred to other airlines). The average profit per flight is $6000. Because pilots get sick from time to time, the airline is considering a policy of keeping four *reserve pilots on standby to replace sick pilots. Such pilots would introduce an additional cost of $1800 per reserve pilot (whether they fly or not). The pilots on each flight are distinct and the likelihood of any pilot getting sick is independent of the likelihood of any other pilot getting sick. Southern believes that the probability of any given pilot getting sick is 0.15. A) Run a simulation of this situation with at least 1000 iterations and report the following for the present policy (no reserve pilots) and the proposed policy (four reserve pilots): The average daily utilization of the aircraft (percentage of total flights that fly) The…arrow_forward
- Why is JAVA OOP is really difficult to study?arrow_forwardMy daughter is a Girl Scout and it is time for our cookie sales. There are 15 neighbors nearby and she plans to visit every neighbor this evening. There is a 40% likelihood that someone will be home. If someone is home, there is an 85% likelihood that person will make a purchase. If a purchase is made, the revenue generated from the sale follows the Normal distribution with mean $18 and standard deviation $5. Using @RISK, simulate our door-to-door sales using at least 1000 iterations and report the expected revenue, the maximum revenue, and the average number of purchasers. What is the probability that the revenue will be greater than $120?arrow_forwardQ4 For the network of Fig. 1.41: a- Determine re b- Find Aymid =VolVi =Vo/Vi c- Calculate Zi. d- Find Ay smid e-Determine fL, JLC, and fLE f-Determine the low cutoff frequency. g- Sketch the asymptotes of the Bode plot defined by the cutoff frequencies of part (e). h-Sketch the low-frequency response for the amplifier using the results of part (f). Ans: 28.48 2, -72.91, 2.455 KS2, -54.68, 103.4 Hz. 38.05 Hz. 235.79 Hz. 235.79 Hz. 14V 15.6ΚΩ 68kQ 0.47µF Vo 0.82 ΚΩ V₁ B-120 3.3kQ 0.47µF 10kQ 1.2k0 =20µF Z₁ Fig. 1.41 Circuit forarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning

Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning