Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

100 Chapter 2 Connecting and Communicating Online The Problem Solving exercises

ID: 3917308 • Letter: 1

Question

100 Chapter 2 Connecting and Communicating Online The Problem Solving exercises extend your knowledge of chapter concepts by seeking solutions to practical problems with technology that you may encounter at home, school wod or with nonprofit organizations. The Collaboration exercise should be completed with a tem roblem Solvin Instructions: You often can solve problems with technology in multiple ways Determine a solution to the problems in these exercises by using one or more resources available to you (such as a computer or mobile device, articles on the web or in print, blogs, podcasts, videos, television, uet guides, other individuals, electronics or computer stores, etc.), Describe your solution, along with the resourcets) used, in the format requested by your instructor (brief report, presentation, discussion, blog post, video, or other means) Personal Professional 1. Cyberbullying Message While reviewing the email 6. Suspicious Website Visits The director of your company's information technology department sent you an email message stating that you have been spending an excessive amount of time viewing websites not related to your job. You periodically visit websites not related to work, but only on breaks, which messages in your email account, you notice one that you interpret as cyberbullying. You do not recognize the sender of the email message, but still take it seriously What are your next steps? 2. Unsolicited Friend Requests Yo u recently signed up the company all browsing habits? How will you respond to this claim? ows. How does he know your web for an account on the Facebook online social network. When you log in periodically, you find that people you do not know are requesting to be your friend. How 7. Automatic Response When you return from vacation, ond

Explanation / Answer

Question 1.

|)How does he know your web browsing habits?

There is always an automatic warning to inform the employees that they are being monitored by the company.

This is very helpful for the the employers to know what their employees are doing and to keep track on their activities.

There are many types of employee monitering

a)Computer monitoring : computer software can check employee performance accuracy and keystroke speed, particularly for those involved in word processing and data entry jobs

b)Call monitoring: Recording employees' and clients interactions helps director to know if theirs employess are working per company rules.

c)Email monitoring :many big companies track on their employees’ emails to make sure workers don't waste company's time and also they are not revealing their strategy to others.

d)Time-clocking :Time-clocking allows employers to make sure their employees are not late for work and don't leave early.

e)GPS tracking: Companies use GPS to track employees who are truck drivers, taxi drivers.

and many more technologies are their that employers knows what you are doing apart from your work.

||) How will you respond to this claim?

While employees generally view monitoring as a violation of privacy and a source of unneeded job stress.

To respond to this claim their is an act called "The Privacy for Consumers and Workers Act".

according to it

• Employers would not be allowed to monitor workers with five or more years of experience on the job.

• Employees who have worked between 60 days and five years could be monitored only if chosen at random and notified in writing at least 24 hours in advance of the date and time of the monitoring, which would be limited to two hours a week.

• Workers employed for less than 60 days would not be covered by the legislation.

• Data collected could not be used as the "sole basis" for evaluating employees or setting production goals.

• Employers who violate the act would be fined $10,000 for each violation.

This bill, however, has never been passed. If monitering is coincides while you are on your break schedule, then manager or director of your company should not monitor their employess by the company rule, so that you can visit any websites when you are on your break.

Question 6.)

What are your next steps?

Cyberbullying is a different and very special type of unwanted email that needs to be dealt .

You may think of cyberbullying as happening to kids that also can affect adults.

According toStopBullying.gov cyberbullying is:

"Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation."

there are following steps for cyberbulling :

a)Save the evidence. You should save the email in your inbox so that legal aithoroties can take actions about it.

b)Report the message. if you felt that bulling is someone inside of your own company you can report to your HR department if not you can call police and can report to legal authorities

c)Block the sender.Block the sender from whom you got the mail so that he can not message you in future.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Chat Now And Get Quote