University Business Computing Report: CX555001, Issues and Solutions
VerifiedAdded on 2022/11/03
|8
|1368
|70
Report
AI Summary
This report examines various aspects of business computing, including ethical and legal compliance, security risks, and health issues associated with computer usage. It discusses the importance of adhering to copyright laws, the dangers of software piracy, and the threats posed by cyber security risks such as viruses, malware, and cyberbullying. The report also explores tools like firewalls and data backup for data protection and addresses health problems like carpal tunnel syndrome and computer vision syndrome, which result from prolonged computer use. The conclusion emphasizes the importance of data protection and the need for users to be aware of the potential health impacts of computer use. The report also references several research papers to support its findings.

Running head: CX555001: BUSINESS COMPUTING
CX555001: BUSINESS COMPUTING
Name of the Student
Name of the University
Authors note
CX555001: BUSINESS COMPUTING
Name of the Student
Name of the University
Authors note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1CX555001: BUSINESS COMPUTING
Table of Contents
Introduction................................................................................................................................2
Ethical and legal compliance requirements for computer usage................................................2
Security......................................................................................................................................3
Risks...........................................................................................................................3
Tools...........................................................................................................................4
Health issues...............................................................................................................................5
Conclusion..................................................................................................................................6
References..................................................................................................................................7
Table of Contents
Introduction................................................................................................................................2
Ethical and legal compliance requirements for computer usage................................................2
Security......................................................................................................................................3
Risks...........................................................................................................................3
Tools...........................................................................................................................4
Health issues...............................................................................................................................5
Conclusion..................................................................................................................................6
References..................................................................................................................................7

2CX555001: BUSINESS COMPUTING
Introduction
In the present digital age most of the people stores their personal data in computers
which are spread all over the digital world. Data which are thought to be secure behind the
firewalls and other security mechanisms, authentication process such as private accounts or
email can be accessed by unintended users and can be exposed publically. In the
organizations employers vigorously tracks their employee’s computer usage.
Ethical and legal compliance requirements for computer usage
While using the computers and different applications and resources that have
copyrights by their owners, the users have to comply with the different regulations.
Therefore the users of the computers should not distribute copies of the work in public
exposure or sale, transfer without the consent of the owner in any from lease, rental and free
lending platform. This right ownership also applicable to individual images or any kind of
audio visual work. For software applications, there are exceptions in this rule that permits
evasion. In this case development of technological under such circumvention means that any
user who has lawfully obtained some copy of an application with the main purpose of
identifying and analyzing elements of the program (Bernstein, 2015). This analysis can be
necessary in order to find out the interoperability with other relevant applications and
integration with those applications. For this extent these acts are permitted under copyright
law of the Digital Milennium Copyright Act.
Another issues is with the software piracy or the Industrial copyright protection.
Software applications can be defined as numerous set of instructions which instructs the
computer to generate and produce the desired result from a specific set of instructions.
Presently the common methods that is used for software piracy can be listed as the
Introduction
In the present digital age most of the people stores their personal data in computers
which are spread all over the digital world. Data which are thought to be secure behind the
firewalls and other security mechanisms, authentication process such as private accounts or
email can be accessed by unintended users and can be exposed publically. In the
organizations employers vigorously tracks their employee’s computer usage.
Ethical and legal compliance requirements for computer usage
While using the computers and different applications and resources that have
copyrights by their owners, the users have to comply with the different regulations.
Therefore the users of the computers should not distribute copies of the work in public
exposure or sale, transfer without the consent of the owner in any from lease, rental and free
lending platform. This right ownership also applicable to individual images or any kind of
audio visual work. For software applications, there are exceptions in this rule that permits
evasion. In this case development of technological under such circumvention means that any
user who has lawfully obtained some copy of an application with the main purpose of
identifying and analyzing elements of the program (Bernstein, 2015). This analysis can be
necessary in order to find out the interoperability with other relevant applications and
integration with those applications. For this extent these acts are permitted under copyright
law of the Digital Milennium Copyright Act.
Another issues is with the software piracy or the Industrial copyright protection.
Software applications can be defined as numerous set of instructions which instructs the
computer to generate and produce the desired result from a specific set of instructions.
Presently the common methods that is used for software piracy can be listed as the
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3CX555001: BUSINESS COMPUTING
unauthorized renting, soft-lifting, hard disk loading without proper license. Furthermore it
needs to be understood that ease of duplication of the software’s and high quality of pirated
applications poses great threat to the concerned industry. Therefore, it is important that the
software copyright protection is to be implemented as the intellectual property rights for
their owners so that it can be ensured that creator or the developers of the
programs/applications are adequately benefitted. This is important for encouraging the
developers towards their creativity as well as inventiveness.
Security
Risks
Presently there are almost three billion users who are actively using Internet daily and
are constantly online connected with the internet through the use of the cell phones or mobile
devices. Due to this constant exposure to Internet leads to the elevated risk of cyber security
such as adverse effects of the viruses, malware and warms that can result data breach to
cyberbullying.
Cyber bullying is one of the worst problem that may lead significant mental trauma
for the victim user which may resulted in suicide or permanent health injuries. Even though it
is not possible to always restrict or stop cyberbullying completely but it is possible to take
mitigation strategies for this problem.
It is suggested that targeted people of cyber bullying should firstly avoid responding
to the cyber bullies except rather than communicating with them to cease and desist. It is also
suggested to block these bullies from viewing their contents or any kind of communication.
In order to take it further it also wise to preserve the evidence, forward to the administrators
of the sites so that actions against the offenders can be initiated.
unauthorized renting, soft-lifting, hard disk loading without proper license. Furthermore it
needs to be understood that ease of duplication of the software’s and high quality of pirated
applications poses great threat to the concerned industry. Therefore, it is important that the
software copyright protection is to be implemented as the intellectual property rights for
their owners so that it can be ensured that creator or the developers of the
programs/applications are adequately benefitted. This is important for encouraging the
developers towards their creativity as well as inventiveness.
Security
Risks
Presently there are almost three billion users who are actively using Internet daily and
are constantly online connected with the internet through the use of the cell phones or mobile
devices. Due to this constant exposure to Internet leads to the elevated risk of cyber security
such as adverse effects of the viruses, malware and warms that can result data breach to
cyberbullying.
Cyber bullying is one of the worst problem that may lead significant mental trauma
for the victim user which may resulted in suicide or permanent health injuries. Even though it
is not possible to always restrict or stop cyberbullying completely but it is possible to take
mitigation strategies for this problem.
It is suggested that targeted people of cyber bullying should firstly avoid responding
to the cyber bullies except rather than communicating with them to cease and desist. It is also
suggested to block these bullies from viewing their contents or any kind of communication.
In order to take it further it also wise to preserve the evidence, forward to the administrators
of the sites so that actions against the offenders can be initiated.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4CX555001: BUSINESS COMPUTING
Tools
Tools that can help in the protecting the data from different attacks, viruses and other
kind of attacks can be firewall, security policies as well as physical backup of the data. As
the Computers and internet networks have become inseparable in the present age thus it is
found that numerous confidential transactions are happening every second. In the present
scenario computing devises are used not only used for the computation but also transmitting
data to different other computers inside and outside the network. Therefore, it needed to
include corrective actions in order to protect from the viruses, prevent hacking of data and
other data. The firewall is often placed at the edge of network to secure the internal
computers and data stored in them. Firewall enforces policies on the data traffic in order to
filter the data that needs to be allowed and the data needs to be blocked. Whenever internet
traffic passes through placed firewall, the data is evaluated against set of predefined rules
depending upon the IP address, port, etc. In addition to that, the periodical data backup from
the servers can also help in preventing the impact of a data breach attack.
Figure 1: Firewall to protect data
Tools
Tools that can help in the protecting the data from different attacks, viruses and other
kind of attacks can be firewall, security policies as well as physical backup of the data. As
the Computers and internet networks have become inseparable in the present age thus it is
found that numerous confidential transactions are happening every second. In the present
scenario computing devises are used not only used for the computation but also transmitting
data to different other computers inside and outside the network. Therefore, it needed to
include corrective actions in order to protect from the viruses, prevent hacking of data and
other data. The firewall is often placed at the edge of network to secure the internal
computers and data stored in them. Firewall enforces policies on the data traffic in order to
filter the data that needs to be allowed and the data needs to be blocked. Whenever internet
traffic passes through placed firewall, the data is evaluated against set of predefined rules
depending upon the IP address, port, etc. In addition to that, the periodical data backup from
the servers can also help in preventing the impact of a data breach attack.
Figure 1: Firewall to protect data

5CX555001: BUSINESS COMPUTING
Health issues
Carpal Tunnel syndrome condition is results from squeezing of the median nerve as
this nerve crosses wrist while entering to the palm area of the hand. The nerve is responsible
for supplying muscles of the forearm that gives support to the arm. In addition to that, it is
also responsible for supplying muscles that helps in the movement of the middle and Thumb
fingers.
Figure 2: Carpal tunnel syndrome
In different researches it is has found that the repetitive movement of the wrist area
this health issue occurs due to the prolonged use of a computer keyboard. In addition to that it
can also lead to inflammation in the carpal tunnel leading to the syndrome (Mediouni et al.,
2015). Another issues is computer vision syndrome that leads to complex eye and vision
problems. The symptoms of this health issue includes headache, eye strain fatigue, dry eyes,
altered colour perception, blurred vision, backache etc.
Health issues
Carpal Tunnel syndrome condition is results from squeezing of the median nerve as
this nerve crosses wrist while entering to the palm area of the hand. The nerve is responsible
for supplying muscles of the forearm that gives support to the arm. In addition to that, it is
also responsible for supplying muscles that helps in the movement of the middle and Thumb
fingers.
Figure 2: Carpal tunnel syndrome
In different researches it is has found that the repetitive movement of the wrist area
this health issue occurs due to the prolonged use of a computer keyboard. In addition to that it
can also lead to inflammation in the carpal tunnel leading to the syndrome (Mediouni et al.,
2015). Another issues is computer vision syndrome that leads to complex eye and vision
problems. The symptoms of this health issue includes headache, eye strain fatigue, dry eyes,
altered colour perception, blurred vision, backache etc.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6CX555001: BUSINESS COMPUTING
Conclusion
In computer usage one of the increasingly important issues is data protection that
requires properly security of the computer from the viruses, malware and hacking attacks.
Day by day Internet is becoming a vulnerable with the introduction of new types of viruses,
worms, and ransom ware Trojans. In addition to that, there are health issues of the users who
use the prolonged time that are harming them in a bad way for long period of time.
Conclusion
In computer usage one of the increasingly important issues is data protection that
requires properly security of the computer from the viruses, malware and hacking attacks.
Day by day Internet is becoming a vulnerable with the introduction of new types of viruses,
worms, and ransom ware Trojans. In addition to that, there are health issues of the users who
use the prolonged time that are harming them in a bad way for long period of time.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CX555001: BUSINESS COMPUTING
References
Bernstein, M. (2015). Searching for More Efficient Piracy Protection. AIPLA QJ, 43, 625.
Doty, J., Gower, A., Sieving, R., Plowman, S., & McMorris, B. (2018). Cyberbullying
Victimization and Perpetration, Connectedness, and Monitoring of Online Activities:
Protection from Parental Figures. Social Sciences, 7(12), 265.
Goldfarb, C. A. (2016). The clinical practice guideline on carpal tunnel syndrome and
workers’ compensation. The Journal of hand surgery, 41(6), 723-725.
Mediouni, Z., Bodin, J., Dale, A. M., Herquelot, E., Carton, M., Leclerc, A., ... & Descatha,
A. (2015). Carpal tunnel syndrome and computer exposure at work in two large
complementary cohorts. BMJ open, 5(9), e008156.
Nagasundaram, S., & Aissi, S. (2017). U.S. Patent No. 9,665,722. Washington, DC: U.S.
Patent and Trademark Office.
Shiri, R., & Falah-Hassani, K. (2015). Computer use and carpal tunnel syndrome: a meta-
analysis. Journal of the neurological sciences, 349(1-2), 15-19.
References
Bernstein, M. (2015). Searching for More Efficient Piracy Protection. AIPLA QJ, 43, 625.
Doty, J., Gower, A., Sieving, R., Plowman, S., & McMorris, B. (2018). Cyberbullying
Victimization and Perpetration, Connectedness, and Monitoring of Online Activities:
Protection from Parental Figures. Social Sciences, 7(12), 265.
Goldfarb, C. A. (2016). The clinical practice guideline on carpal tunnel syndrome and
workers’ compensation. The Journal of hand surgery, 41(6), 723-725.
Mediouni, Z., Bodin, J., Dale, A. M., Herquelot, E., Carton, M., Leclerc, A., ... & Descatha,
A. (2015). Carpal tunnel syndrome and computer exposure at work in two large
complementary cohorts. BMJ open, 5(9), e008156.
Nagasundaram, S., & Aissi, S. (2017). U.S. Patent No. 9,665,722. Washington, DC: U.S.
Patent and Trademark Office.
Shiri, R., & Falah-Hassani, K. (2015). Computer use and carpal tunnel syndrome: a meta-
analysis. Journal of the neurological sciences, 349(1-2), 15-19.
1 out of 8
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.