
Concept explainers
The effect of large

Explanation of Solution
To know the effect of large data on privacy, we have to know what does privacy and large data stand for. Large data is often referred to as big data. Most of the devices nowadays are connected to the internet, for example, smart phone and digital watch. Through these devices, any activity we do can be recorded with or without our knowledge. These collected data can be used for predicting one's activity. For example, our buying habits, our preferred restaurant, the numbers in our mobile contact list, etc.
Now privacy is a state in which one is free from public attention or is not disturbed by any one. Thus, with so much information being collected on one's activity, it will affect one's privacy.
Technology has enabled to collect data of all kinds including information about people. For example, the calls we make through phone are compiled and stored. Additionally, even the locations from where the call has been made can be known through global positioning system in our smart phone. The big corporate constantly store information about us, these are mostly done through actions that we perform through a computer or smart phone. Some of these events are like sending or receiving an email, buying a product or service, the websites we browse etc. This amount of data that is collected is often referred to as big data. The big companies manipulate these data to sell their products. With fitness bands our daily activities like when we sleep, what we eat, etc. can be tracked or recorded.
Information resellers or information brokers can sell this personal data. These data may be available on public database or nonpublic data base. Thus, with the big data, the privacy of an individual is affected. Also, there can be identity theft and misuse of our information. The recent scandal of such malicious practice is the "Facebook − Cambridge Analytica Data Scandal".
Want to see more full solutions like this?
Chapter 9 Solutions
Computing Essentials 2017
- What does the value of the top variable indicate in this ArrayStack implementation? What will happen if we call pop on this stack? What value will be returned, and what changes will occur in the array and the top variable? 3. If we push the value "echo" onto the stack, where will it be stored in the array, and what will be the new value of top? 4. Explain why index 0 contains the string "alpha" even though top is currently 3. 5. What would the state of the stack look like (values in the array and value of top) after two consecutive pop 0 operations?arrow_forwardPlease solve and show all work. Suppose there are four routers between a source and a destination hosts. Ignoring fragmentation, an IP datagram sent from source to destination will travel over how many interfaces? How many forwarding tables will be indexed to move the datagram from the source to the destination?arrow_forwardPlease solve and show all work. When a large datagram is fragmented into multiple smaller datagrams, where are these smaller datagrams reassembled into a single large datagram?arrow_forward
- Please solve and show all steps. True or false? Consider congestion control in TCP. When the timer expires at the sender, the value of ssthresh is set to one-half of the last congestion window.arrow_forwardPlease solve and show all work. What are the purposes of the SNMP GetRequest and SetRequest messages?arrow_forwardPlease solve and show all steps. Three types of switching fabrics are discussed in our course. List and briefly describe each type. Which, if any, can send multiple packets across the fabric in parallel?arrow_forward
- Please solve and show steps. List the four broad classes of services that a transport protocol can provide. For each of the service classes, indicate if either UDP or TCP (or both) provides such a service.arrow_forwardPlease solve and show all work. What is the advantage of web caches, and how does it work?arrow_forwardPlease solve and show steps. Consider a DASH system for which there are N video versions (at N different rates and qualities) and N audio versions (at N different rates and qualities). Suppose we want to allow the player to choose at any time any of the N video versions and any of the N audio versions. If we create files so that the audio is mixed in with its matched-rate video and the server sends only one media stream at a given time, how many files will the server need to store (each with a different URL)? If the server instead sends the audio and video streams separately and has the client synchronize the streams, how many files will the server need to store?arrow_forward
- Please solve and show all work. Recall that TCP can be enhanced with SSL to provide process-to-process security services, including encryption. Does SSL operate at the transport layer or the application layer?arrow_forwardPlease solve and show all work. Compute the checksum of the words 1011 1001, 1001 1110, and 0111 1011. Show all work.arrow_forwardPlease solve and show all work. Suppose you can access the caches in the local DNS servers of your department. Can you propose a way to roughly determine the Web servers (outside your department) that are most popular among the users in your department? Explainarrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education





