Explain your answers in terms of one or more factors that affect trust.
Here are several items of information:
Zip code
Credit card number
Phone number
a. Which will users be most willing to divulge?
b. Which will users be least willing to divulge?
a. Zip code
b. Credit Card number.
This relates to context. When the potential for loss goes up, the tendency to trust goes down. Knowing a credit card number can enable a stranger to make unauthorized purchases. Even if the owner’s liability is only $50, the loss of time involved in correcting the false charges would be substantial. Knowledge of a phone number can result in more telemarketing calls, which also poses the potential for a loss of time. A Zip code, in isolation, does not carry with it the same potential for loss
You might also like to view...
Terminal operations are ________; they perform the requested operation when they are called.
a. immediate b. idle c. lazy d. eager
Which of the following is a way to write protect an I/O path when there is no hardware device available for the task?
a. Use the copy command with the no write-back trigger. b. Use the system BIOS to disable writing to that particular port. c. In Device Manager, click the read only option in device settings. d. Under Services, disable the Removable Media service.
The ____ command gives you an active view of a running system and can display system summary information, such as CPU use, swap space use, and load averages.
A. vmstat B. du C. top D. df
The token ring transport method uses a physical ____ topology along with the logic of a ring topology.
A. bus B. star C. mesh D. grid