This document provides answers to various IT questions, including digital identity, digital footprint, internet privacy, DMCA, OER, AI, AR, VR, MR, LinkedIn, electronic etiquette, employee monitoring software, copyright, intellectual property, and ethical use of software and intellectual property.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: IT Question Answers. IT Question Answers Name of the Student: Name of the university: Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1Information Technology Part I Digital Identity: a)Digital identity stands to represent an online cyberspace which is claimed by an individual device or any organization. A digital identity is created by the action and activities by the organization, device or an individual online, which links the actions with a specific address which has been randomly generated or to the IP address (Beck 2015). Followed by the above aspects there are several steps which needs to be completed in order to create a digital identity. Those steps are mentioned below: Capture- This is the first step towards creating a digital identity. In this step the information of the subscriber’s is being captured for further process. Verify- In this step the gathered information are verified in order check the validity of the user data. The verification includes the document verification as well as the biometric verification. Followed by the completion of this step it proceed further. Generates Digital Identity- In this process the information of an individual, device or organization is linked with a randomly generated ID. This step provides specific identity to each of the device, individual or organization. b)Digital Footprint: Digital footprint stands to represent a string which has been created by a user while using the social media as well as internet, which includes the email services and websites as well as other online platforms. Studies has mentioned that there are basically two types of Digital FootPrint present which includes the Active FootPrints and Passive FootPrints. Active
2Information Technology FootPrint stands for those which has been provided in online intentionally and the Passive FootPrint stands for those data which has been leaved in online unintentionally. The personal IP address which can track the location of the user is one of the significant example of Passive Digital FootPrint. Internet privacy: a)Internet privacy stands to represent the protection methods by which the personal data as well as the sensitive data are protected which is present online. Those data includes the private conversations, social media activities as well as the location of an individual or any organization. b)In order to protect the user data present in the internet United States has introduced several Privacy which are listed below: Electronic Communication Privacy- In this law the government of US has intended to protect the communication via the digital platform which include the emails as well as social media conversation. System Fraud- In this act the government of US has intended to protect the computer devices in order to protect the customer data. Cyber Intelligence and Protection Act- the fundamental purpose of this act to restrict the cyber cyber-crime in order to protect the user information. DMCA: DMCA stands for Digital Millennium Copyrights Act. The fundamental objective of this act is to alert the organizations, service providers, internet search engines as well as the individuals about the incorporation of the copyrights act into their service structure.
3Information Technology DMCAprotectsthecreativeactswhichhasbeencreatedbyanyindividual, organization or service provider (Carpou 2015). OER: In is stands for Open Educational Resources which provides free access to the resourceswhicharerelevantfortheeducationalpurpose.Inordertoprovidebetter experience to the user OER offers free accessibility to the educational resources which can be utilized without any restrictions (Butcher 2015). One of the most utilized and useful OER in the educational field is i) CourseEra, ii) Open2Study. There are several benefits present behind the utilization of Debit cards however studies has mentioned that there are various risk present related to the utilization ofdebit card online. Those risk includes the threat to the data loss due to the attacks of cyber hackers. Thus, in order to get protection from those data it is essential to be aware of the websites and application before opting for online purchase. EDI EDI stands for Electronic Data Interchange. DI process stands to represent the exchange the data by posting request to the targeted resources and get the responses by receiving the required information from the respective resources. First define what the following initials stand for: AI – AI stands for Artificial Intelligence.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4Information Technology AR AR stands for Augmented Reality. VR VR stands for Virtual Reality. MR MR stands for Mixed Reality. Then give a brief explanation of the difference between AR, VR and MR? AR- This process in initiated by the imposing the human point of view with the content which has been generated by a computer. VR- This process stands to represent the trick which has been operated on the stimulation of the presence of user as well as the user sense. MR- This process stands to represent the interaction between the human and machines. LinkedIn: The mentioned application is utilized in the business platforms in order to post jobs as well as to hire new employs based on their required criteria. There are several advantage present in the utilization of LinkedIn as this application offers to create a professional profile by which it will provide you the knowledge about the new posted job. Along with the above benefits the organizations also gets benefits by posting their job requirements.
5Information Technology In order to create a professional profile it needs to provide the valid id’s related which will be verified then it will allow the user to utilize the LinkedIn services according to their preferences. Electronic etiquette: This protocol provides a basic guidelines to an organization or individuals in order to utilize the electronic devices for the betterment of the organization or individuals. Email etiquette offers the organization to follow the basic guidelines to use the email for any organizational purpose. Employee Monitoring Software: The employeemonitoring is a typicaltype of software which is used by the organizationadministrationsformonitoringandsupervisingalltheemployeesofthe organization. Within business this is actually deployed over whole business network for centralised log view using a central PC. One example of this employee monitoring software is the Teramind. The main important facilities that are provided by the Teramind are the instant message monitoring, website monitoring, email monitoring, file transfer monitoring and application monitoring. Part II: Copyright: The Copyright is actually a legal right that is present in most of the countries which helps the creators to protect their original work from any type of unauthorised usage and piracy. In a broader way Copyright actually provides original content creator an exclusive rights so that they can determine whether the created content by them can be used by
6Information Technology someone else or not and if it this content can be used by someone else then under what conditions this content can be used by other peoples. Intellectual Property: The intellectual property is considered as a specific type of property category which mainly consists intangible creations regarding the human intellect. The intellectual property provides two types of rights one is copyright and the other one is the industrial property rights. Within this industrial property rights some important aspects are the models, industrial designs, patents, trademarks and designations of origin. The intellectual properties actually consists law which inspires the creators to create a large range of intellectual goods. This is achieved as the law of intellectual property provides businesses and people property rights to the intellectual goods and information they create but for a certain period of time. Copyrights for Protecting Intellectual Property: The laws of intellectual property is used for protecting creators and the original content of them from any type of piracy where copyright is also utilised for protecting this original content of the users. Thus copyright is considered as a form of intellectual property. Here the intellectual properties are protected through copyright as the copyright prevents other peoples to copy the work, stops distribution copies of it without proper permission or fees and lending of copies of the original work. The copyright also prevents the peoples to put the original work on the internet and prevents adaptation of the original content. Ethical use of Software and Intellectual Property: Many of the users tries to use the intellectual properties and software without paying for it. From personal perspective this is quite unethical to use these intellectual properties and software without paying for it. An intellectual property consist hard work of the peoples who developed this property and this is also same for the software where the developers works
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7Information Technology hard for creating the software. Thus they must be paid off for their hard work and the users who are using these software or the intellectual property must pay for it. This will also motivate the creators to create further contents.
8Information Technology Reference: Beck, E.N., 2015. The invisible digital identity: Assemblages in digital networks.Computers and Composition,35, pp.125-140. Butcher, N., 2015.A basic guide to open educational resources (OER). Commonwealth of Learning (COL);. Carpou, Z., 2015. Robots, Pirates, and the Rise of the Automated Takedown Regime: Using the DMCA to Fight Piracy and Protect End-Users.Colum. JL & Arts,39, p.551. Bibliography: Giorcelli,M.andMoser,P.,2016.Copyrightsandcreativity:Evidencefromitalian operas.Available at SSRN 2505776. Horner, S.N., 2013. DMCA: Professional Sports Leagues' Answer to Protecting Their Broadcasting Rights Against Illegal Streaming.Marq. Sports L. Rev.,24, p.435. Jahan, M., Liu, Z. and Loh, K.P., 2013. A Graphene oxide and copper‐centered metal organic framework composite as a tri‐functional catalyst for HER, OER, and ORR.Advanced Functional Materials,23(43), pp.5363-5372. Mellmer, J.A., Young, R.T., Perkins, A.D., Robertson, J.M., Sabin, J.N., Mcdonald, M.C., Phillips, D., Sheridan, R.M., Nazeer, N.A., Higley, D.B. and Carter, S.R., 2014.Managing digital identity information. U.S. Patent 8,631,038. Rao, N., Venkat, T., Shayideep, S. and Jahagirdar, J., 2016. Internet of Things: Security ChallengesandIssues.InternationalJournalofComputerScienceEngineering& Technology,6(12).
9Information Technology Spoo, R., 2016.Without Copyrights: Piracy, Publishing, and the Public Domain. Oxford University Press.