You are on page 1of 16

ASSIGNMENT #5

CC 113
Name: Wilson B. Navarro Date: January 31, 2023
Course and Section: BSCS – 1A – M Subject: ITC

1. Some employers today are using a variety of soft benefits (such as free or low-
cost on-site childcare, gyms, massages, and restaurants) to recruit and keep
talented employees. For instance, Google employees get free lunch and dinner,
among other benefits. What are the advantages and disadvantages to both
employers and employees of these types of employee benefits? Would these soft
benefits make you more inclined to work at that company? Why or why not? What
about gamification—the use of awarded points, rewards, and other game-type
incentives?
Soft benefits are non-monetary advantages or incentives provided to employees
by their employers in addition to their wage and other financial compensation. Flexible
work hours, free or subsidized meals, on-site childcare, gym memberships, wellness
initiatives, and other perks are aimed to improve the entire employee experience. Soft
benefits are intended to foster a nice work environment, boost employee morale, and
attract and retain top talent. Soft benefits, as opposed to hard benefits, which are
financial in nature and quantifiable, are subjective and can vary widely in their perceived
worth from one employee to the next. These kinds of benefits have disadvantages and
advantages to the both employees and employers.
Advantages for Employees:
 Improved work-life balance: soft benefits such as on-site childcare, gym facilities,
and flexible work hours can help employees manage their personal and
professional responsibilities more easily.
 Increased job satisfaction: The availability of services like free meals, massages,
or other perks can make employees feel valued and appreciated, leading to
higher job satisfaction.
 Improved health and well-being: Access to health and wellness services, such as
gyms and healthy food options, can help employees maintain a healthy lifestyle.
Disadvantages for Employees:
 Decreased privacy: Some soft benefits may require employees to share personal
information or habits, leading to a loss of privacy.
 Unwanted obligation: Some employees may feel obligated to work longer hours
or be more productive in order to take advantage of the benefits offered.
 Benefits may not align with individual needs: Not all employees will find the same
soft benefits appealing or useful, leading to decreased motivation and job
satisfaction.
Advantages for Employers:
 Improved employee morale and job satisfaction: Providing soft benefits can
increase employee engagement and satisfaction, leading to lower turnover rates
and improved productivity.
 Better recruitment and retention: Companies offering appealing soft benefits may
be more attractive to potential employees, making it easier to attract and retain
top talent.
 Positive reputation and branding: Providing soft benefits can help companies
build a positive reputation and enhance their branding, attracting new employees
and customers.
Disadvantages for Employers:
 High costs: Implementing and maintaining soft benefits can be expensive,
especially for more elaborate perks like on-site childcare or gyms.
 Difficulty in measuring effectiveness: It can be challenging to quantify the impact
of soft benefits on employee morale, productivity, and engagement, making it
difficult to justify the costs.
 The need to constantly update and improve benefits: Employee preferences and
needs may change over time, requiring employers to continually update and
improve their soft benefits offerings.
To address the question if soft benefits will make an individual more inclined to work
at the company, the answer is yes. Soft perks or benefits can increase an employee's
desire to work for a company. The provision of these benefits can make a work
environment more desirable, boost employee morale and job satisfaction, and give
employees a sense of being valued and appreciated. Flexible work hours or on-site
childcare, for example, can help employees better manage their personal and
professional duties, while access to gyms or wellness programs can improve their
overall health and well-being. Furthermore, these benefits can distinguish a company
from its competitors, making it a more appealing alternative for job seekers. It should be
noted, however, that not all employees will find the same soft benefits desirable. Some
employees may place a higher value on things such as compensation, employment
security, or location than on soft benefits, whilst others may not find the benefits
supplied to be relevant to their needs. Finally, the importance of soft benefits as a
motivator for employees to choose a certain organization will be determined by the
individual's objectives and demands.
Gamification is the use of game design elements like awarding points, rewards, and
challenges to engage and drive people to achieve their goals. Gamification can be used
in the workplace to incentivize employees and enhance productivity by making jobs and
activities more enjoyable and engaging. An employer, for example, could use
gamification to encourage employees to adopt healthier habits by awarding points for
actions such as exercise or healthy eating, which can then be redeemed for prizes.
Advantages of gamification in the workplace include:
 Increased engagement and motivation: Gamification can make work tasks and
activities more enjoyable, which can improve employee engagement and
motivation.
 Improved performance and productivity: By using game-like incentives and
rewards, gamification can encourage employees to work harder and be more
productive.
 Better employee wellness: Gamification can be used to promote healthy habits
and behaviors, such as exercise and healthy eating, leading to improved
employee wellness.
Disadvantages of gamification in the workplace include:
 Decreased intrinsic motivation: By relying on external rewards and incentives,
gamification may reduce an employee's intrinsic motivation to perform well.
 Unintended consequences: Gamification may result in unintended
consequences, such as increased competition among employees or decreased
job satisfaction.
 Implementation challenges: Implementing and maintaining a gamification
program can be complex and require significant resources.
In conclusion, the effectiveness of gamification as a motivator for employees will
depend on a variety of factors, such as the nature of the task or activity being gamified,
the incentives and rewards offered, and the individual employee's preferences and
motivations.

2. Many everyday objects (such as amusement park rides, cars, elevators, and
ovens) that you might not normally associate with a computer or information
system, in fact, are today. There are obvious benefits but there are risks as well?
For instance, would you feel more or less comfortable riding on a roller coaster
that was computer controlled? Do the benefits of computerizing an increasing
number of everyday objects outweigh the potential risks? Why or why not?
The increasing computerization of everyday objects has been a major trend in
recent years, with an increasing number of devices being equipped with sensors,
processors, and other technologies that allow them to collect and process data. Objects
like amusement park rides, cars, elevators, and ovens have all become more
sophisticated, more efficient, and more convenient as a result. However, this trend has
not come without risks.
One of the key benefits of computerizing everyday objects is increased safety.
For example, computer-controlled amusement park rides are equipped with sensors
that can detect potential safety issues, such as a passenger not being properly seated,
and take appropriate action to prevent accidents. Similarly, computer-controlled
elevators are equipped with sophisticated sensors and algorithms that allow them to
operate more efficiently and safely, reducing the risk of malfunctions and accidents.
Another benefit of computerizing everyday objects is increased efficiency. For
instance, computer-controlled ovens can automatically adjust their temperature and
cooking time to achieve optimal results, reducing the risk of undercooked or overcooked
food. Computer-controlled cars can also help reduce fuel consumption and emissions
by optimizing their performance based on driving conditions, traffic patterns, and other
data.
However, there are also potential risks associated with the increasing
computerization of everyday objects. One of the main concerns is cybersecurity. As
these objects become more connected and dependent on technology, they become
more vulnerable to hacking, malware, and other forms of cyber-attack. This can result in
serious consequences, such as the theft of personal information or the disruption of
critical systems, such as those used in medical devices or transportation systems.
Another risk is the potential for increased automation, which can result in job
losses and other social and economic impacts. For example, the widespread adoption
of computer-controlled cars could lead to a reduction in the number of drivers, which
could have significant economic and social implications.
In conclusion, the benefits of computerizing everyday objects are clear, including
increased safety, efficiency, and convenience. However, these benefits must be
balanced against the potential risks, such as cybersecurity concerns and the potential
for increased automation. Ultimately, the decision of whether or not to computerize a
given object will depend on a careful consideration of the risks and benefits involved, as
well as the impact it will have on society as a whole.
Overall, while the trend towards computerizing everyday objects has many
potential benefits, it is important to be aware of the potential risks and to take steps to
minimize these risks. This will help to ensure that the benefits of these technologies are
realized, while minimizing the potential negative impacts. By doing so, we can help to
create a more connected, efficient, and safer world for everyone.

3. Robots can be used today for a variety of activities in businesses and the
military, as well as in the home. Select one type of robotic device on the market
today—for instance, a robotic toy, vacuum cleaner, or lawn mower; a security or
manufacturing robot; a robot used by the military or NASA; a robot used by law
enforcement agencies; or a robotic personal assistant—and research it. Find out
what the product does, what it costs, how it is powered and controlled, and if it
can be reprogrammed. What are the advantages of the robotics part of the
product? Do you think this is a worthwhile or beneficial product? At the
conclusion of your answer, prepare a one summary of your findings and
opinions.
One example of a robot used by the military and NASA is the Mars Rover. The
Mars Rover is a robotic vehicle that was designed to explore the surface of Mars and
gather data about the planet's geology, atmosphere, and potential for life. The Mars
Rover is powered by a radioisotope thermoelectric generator and is controlled remotely
by mission control on Earth.
The Mars Rover is equipped with a range of scientific instruments, including
cameras, spectrometers, drills, and soil sample analysis tools. These instruments allow
the rover to gather data and take detailed images of the Martian surface, helping
scientists to better understand the planet's history and potential for supporting life. It is
powered by a radioisotope thermoelectric generator, which converts the heat generated
by the decay of radioactive isotopes into electrical power. The Mars Rover is controlled
remotely by mission control on Earth and can be reprogrammed to perform new tasks
as needed.
The cost of the Mars Rover program has been estimated to be in the billions of
dollars, although the exact amount is not publicly available. Despite the high cost, the
Mars Rover has been a worthwhile investment for NASA, as it has provided valuable
information about the Red Planet and expanded our understanding of the potential for
life on other planets.
The advantages of the robotics part of the Mars Rover include its ability to
operate in a harsh, remote environment where human exploration is not possible, its
mobility, which allows it to cover large distances and access a wide range of locations
on the planet, and its ability to gather a vast amount of scientific data that would be
difficult or impossible to obtain otherwise. In addition, based on the data and information
available, the Mars Rover has been widely regarded as a worthwhile and beneficial
product. It has provided valuable scientific data and expanded our understanding of
Mars and the potential for life on other planets. The Mars Rover's advanced technology
and versatility have made it an excellent investment for space exploration and scientific
research, and the information gathered by the robot will likely lead to new discoveries in
the future. Overall, the Mars Rover has been a successful and valuable investment for
NASA and the scientific community.
In conclusion, the Mars Rover is a valuable and beneficial robot that has
significantly advanced our understanding of Mars. Its advanced technology and
versatility make it an excellent investment for space exploration and scientific research.
The information gathered by the Mars Rover will continue to be analyzed for years to
come, and will likely lead to new discoveries about the planet and our solar system.

4. When human beings and computers are both involved in accomplishing a task
and something goes wrong, we tend to blame the computer. There is little
question about the existence of software bugs, but can all real-world problems
involving computers (such as erroneous bank transactions, military training
incidents, or privacy breaches) be attributed to errors in the software program?
Today, do you think it is more likely that a computer or a human being would be
responsible for a serious system problem? Why?
Computers and people are both involved in many critical jobs in today's world,
and it is not uncommon for difficulties to occur in these systems. While software defects
can exist and can lead to difficulties, it is typically the case that human mistake is the
root cause of these situations.
For example, when it comes to erroneous financial transactions, human error is
frequently at blame. This can range from basic errors like entering the wrong account
number to more serious concerns like staff processing transactions incorrectly. In these
circumstances, the software may be free of bugs and problems, but the user makes a
mistake that causes a problem.
Likewise, human error is frequently at blame in military training events. This can
involve errors made by trainers or soldiers, such as miscommunication or poor
procedure execution. While the software utilized in these situations is intended to help
reduce errors and boost productivity, the human operator is ultimately responsible for
assuring the safe and effective execution of the training.
Furthermore, privacy violations can be attributable to human mistake.
Employees, for example, may inadvertently expose sensitive information or purposely
communicate personal material with unauthorized persons. The software used to store
and manage the data may be secure in these circumstances, but it is the acts of the
human that cause the privacy violation.
When it comes to pinpointing the root cause of major system failures, it is
frequently a combination of both computer and human error. A software defect, for
example, may produce a problem in the system, but the human user may have ignored
warning signs or failed to take adequate safeguards, allowing the problem to arise.
In summary, while software flaws can exist and can contribute to difficulties in
computer systems, human error is often a key contributor to the cause of real-world
computer problems. Humans must accept responsibility for their actions and endeavor
to reduce the risks associated with computer systems, whether it be a mistake made by
an individual user or a lack of communication or process within an organization.
Ultimately, it is important to recognize that computers and humans are both
important components of many systems, and both must work together to ensure that
these systems are functioning effectively and safely. By understanding the interplay
between human and computer error, we can work to minimize the risks associated with
computer systems and ensure that they are working in the best interest of society.

5. There is a trend in programming to make coding easier and more automatic.


Some welcome this trend, but others are concerned about future programmers
not learning necessary programming fundamentals if programming is no longer
required. For instance, without understanding how looping and variable
initializations work, how easily would an individual be able to find a logic error in
a looping process? Do you think programmers of the future should still learn
programming fundamentals, even if coding is no longer required? Why or why
not?
The debate of whether future programmers should still learn programming
fundamentals despite the trend of making coding easier and more automatic has been
ongoing for a while. On one hand, proponents of learning programming fundamentals
argue that these fundamentals are critical to understanding how computers work and
how software systems are built. They also believe that having a deep understanding of
programming fundamentals helps programmers to quickly identify and fix errors in code,
resulting in more reliable and robust software systems.
On the other hand, opponents of learning programming fundamentals argue that
the trend of making coding easier and more automatic will make it easier for individuals
to develop software without having to learn the fundamentals. This, they believe, will
make it possible for individuals who lack a deep understanding of programming to still
create high-quality software, making the need for learning programming fundamentals
redundant.
In my opinion, I believe that future programmers should still learn programming
fundamentals, even if coding is no longer required. The reason for this is that
programming fundamentals provide a solid foundation for understanding how computers
and software systems work. This understanding is critical when it comes to
troubleshooting errors in code and debugging complex software systems. Without this
understanding, future programmers will not be able to identify and fix errors in their
code, which could lead to serious system problems and security breaches.
Furthermore, learning programming fundamentals helps individuals to think
logically and systematically, which is essential when it comes to developing complex
software systems. A deep understanding of programming fundamentals allows
individuals to break down complex problems into smaller, more manageable parts and
to think through the logic of a solution before implementing it. This helps to ensure that
the final product is both reliable and efficient.
In conclusion, I believe that the trend of making coding easier and more
automatic is a positive development for the software development industry. However, it
should not lead to a reduction in the importance of learning programming fundamentals.
Instead, it should be viewed as a way to make it easier for individuals to learn the
fundamentals and develop software. In the long run, this will lead to a more
knowledgeable and capable software development industry, which is essential for the
continued growth and success of the field.

6. New programming languages are developed regularly, such as to meet new


needs or to make programming easier for beginners. Your task is to identify and
research one new or emerging programming language (such as Dart or Scratch).
Determine why the program was developed, who it is geared for, the cost to use it
(if any), and what applications it is designed for. Check online to see if there is a
demonstration or a free version available; if so, view the demo or try out the
programming language, if possible. Does the program require a separate
complier or interpreter? Can it be used for stand-alone programs and for Web
applications? Do you think this new program fulfills a need? Why or why not?
The Rust programming language was developed by Mozilla Research to provide
a safe, concurrent, and fast alternative to other systems programming languages like C
and C++. It's geared towards systems programmers, application developers, and game
developers. The language is open-source and free to use. Rust is a multi-paradigm
system programming language designed for performance and safety. It was created by
Graydon Hoare and was first released in 2010. Rust is known for its strong memory
safety guarantees, making it suitable for developing low-level systems, as well as high-
performance, concurrent, and safe applications. It also provides a modern and
expressive syntax and efficient memory allocation, which makes it a good choice for
developing web applications, game engines, and other demanding applications.
Rust does require a compiler to build and run Rust code, but there is no need for
a separate interpreter. Rust can be used for both stand-alone programs and web
applications. Rust programs require a compiler, not an interpreter. Rust provides a built-
in compiler, called "rustc," which is used to compile the source code into an executable
binary.
Rust can be used for both standalone programs and web applications. For
standalone programs, rust can be used to create high-performance and safe systems
programs such as command-line tools, system daemons, and other applications. For
web applications, rust can be used in combination with WebAssembly (Wasm) to create
high-performance and safe client-side or server-side applications.
Yes, Rust fulfills a need because it provides a combination of low-level control
over system resources and strong memory safety guarantees that make it suitable for
developing demanding applications. Rust also offers modern features such as efficient
memory allocation, expressive syntax, and a large and growing ecosystem of libraries
and tools, making it a popular choice for many developers.
Rust fulfills a need in the programming community for a language that provides
the performance and low-level control of C and C++, while also offering memory safety
guarantees and reducing the likelihood of crashes, data corruption, and security
vulnerabilities. Overall, Rust has received positive feedback and has seen growing
adoption for its combination of performance, safety, and ease of use.

7. It is becoming increasingly common for biometric devices to be used to grant


or deny access to facilities, as well as to identify consumers for financial
transactions. In order to facilitate this, some data about each participant’s
biometric features must be stored in a database. How do you feel about your
biometric characteristics being stored in a database? Does it depend on whether
the system belongs to your bank, employer, school, or the government? Because
biometric features cannot be reset, are you at risk using a biometric ID system?
Why or why not?
The use of biometric features for identification purposes raises various privacy
and security concerns. The fact that biometric features cannot be reset, unlike
passwords, makes them a valuable target for malicious actors who can steal and
misuse this information. This raises the question of who is responsible for securing the
biometric data and how it is being used.
If the system belongs to your bank, it is likely that the bank is required by law to
implement strong security measures to protect your biometric data. The same applies to
employers and schools, who have a responsibility to protect the personal information of
their customers or students. In these cases, biometric data is stored in secure
databases and encrypted, and access to the data is restricted to authorized personnel.
However, if the system belongs to the government, the situation is different.
Governments have access to a vast amount of personal information, including biometric
data, and may use this information for a variety of purposes, including law enforcement
and national security. In these cases, there is a greater risk that biometric data may be
misused or accessed by unauthorized parties, and individuals may have limited control
over how their data is being used.
In conclusion, the use of biometric features for identification purposes raises
various privacy and security concerns, and it depends on the context in which the
biometric data is being collected and stored. The fact that biometric features cannot be
reset makes it important for organizations and governments to implement strong
security measures to protect this information and to be transparent about how it is being
used. Individuals should also be aware of the risks associated with the use of biometric
data and take steps to protect their privacy.
8. There are numerous databases that contain personal, but public, information
about individuals. Today much of this data is available online. How do you feel
about your personal information being contained in databases that other
individuals can access or that might be breached via the Internet? Do you mind
that anyone with an Internet connection might be able to find out how much you
paid for your house, if you are married, where you live, and other personal
information?
First of all, I will answer this item in general. Individuals may hold differing views
on the preservation and access of their personal information in databases that are
available to others or that can be hacked over the internet. Some people may be
concerned about the possibility of their personal information being misused, and they
may be uncomfortable with the thought of their personal information being readily
accessible. For example, if their financial information is exposed, such as the price they
spent for their homes, they may be subject to fraud or identity theft.
Individuals may also be concerned about the privacy of their personal
information, such as their marital status or home address, and do not want this
information to be easily available by anybody with an internet connection. Many people
are concerned about their personal information being used for unwanted marketing or
even malevolent purposes.
Individuals' level of anxiety about their personal information being saved in
databases will ultimately rely on various aspects, including the sort of information being
held, the purpose for which it is being used, and the security mechanisms in place to
secure it. Individuals should be educated about the dangers and benefits of having their
personal information stored in databases and should be allowed to make an informed
decision about whether or not this arrangement is acceptable to them.
To summarize, storing personal information in databases that are accessible to
other people or that can be compromised over the internet is a complex subject that
involves a number of privacy and security concerns. Individuals may hold differing views
on this issue, and it is critical that they are informed about the risks and benefits of
having their personal information maintained in databases, so that they can make an
informed decision about whether or not they are okay with this arrangement.
9. While designing a database system for a large enterprise is a highly complex
task, designing a small relational database can be a fairly straightforward
process. For this item, your task is to design a relational database to contain data
about the students, instructors, and class offerings at your school. The database
should consist of three tables (one each for students, classes, and instructors),
and each table should have at least four fields. Select an appropriate primary key
for each table and determine which of the tables will be related. Design one input
screen, one query screen, and one report that might be used with this system;
annotate each design with the table and field names for each piece of information
to be included. Did any of your three designs utilize data from more than one
table? If so, make sure that it is possible to do that, based on your table design
and stated relationships. Be sure to include at least one sample record for each
table in your design documentation.
TABLE 1: STUDENTS

TABLE 2: INSTRUCTORS

TABLE 3: CLASSES
TABLE 4: SUBJECTS

QUERIES:
REPORTS:
DATABASE RELATIONSHIP:
Yes, the query screen and report both utilize data from more than one table. In
the query screen, information from the Students table (Student ID, First Name, Last
Name) is combined with information from the Classes table (Class ID, Class Name,
Class Description, Instructor ID) to display the class information for a particular student.
Similarly, in the report, information from the Classes table (Class ID, Class Name, Class
Description) is combined with information from the Students table (Student ID, First
Name, Last Name, Email Address) to display the student information for a particular
class.
The ability to combine data from multiple tables is made possible by the
relationships established between the tables through the use of primary and foreign
keys. In this design, the Classes table has a foreign key (Instructor ID) that references
the primary key (Instructor ID) of the Instructors table, and the Students table has a
primary key (Student ID) that is referenced as a foreign key in the Classes table. These
relationships allow us to use a join operation to combine information from multiple tables
based on common fields.
10. There are a number of databases—such as the FBI’s Next Generation
Identification (NGI) database, the military’s Biometrics Automated Toolset (BAT)
database, and the Homeland Security Department’s Automated Biometric
Identification System (IDENT) database—in use today for national security
purposes. Other national databases include those used by the Internal Revenue
Service and the Social Security Administration and a new national network that
utilizes databases is the one associated with the new state Health Insurance
Marketplaces. Select one national database (either one of the ones listed in the
previous paragraph or an alternate database). Determine the purpose of the
database, who has access to it, and if it has proven to be useful. Have there been
any recent security breaches or other privacy concerns with your selected
database? Has there been any movement toward a national database for citizen
identification or other new national database containing information about
citizens? At the conclusion of your answer for this question item, prepare a one-
page summary of your findings and opinions.
In this item I chose military’s Biometrics Automated Toolset (BAT). The military's
Biometrics Automated Toolset (BAT) is a biometric identification system used by the
U.S. Department of Defense (DOD) to identify and track individuals in conflict zones.
The system is used to gather and store biometric data, such as fingerprints, iris scans,
and facial recognition, in order to verify the identities of individuals and help distinguish
between friendly forces and potential adversaries.
Access to the BAT system is limited to authorized military personnel, and the
DOD has implemented strict security protocols to protect the sensitive information
stored in the system. The BAT system has been deployed in a number of conflict zones,
including Iraq and Afghanistan, and has been used to help prevent the reentry of
previously detained individuals into conflict zones. However, like any biometric
identification system, there have been concerns about the accuracy of the information
stored in the BAT system, as well as privacy and security concerns about the storage
and use of sensitive biometric information. The DOD has taken steps to address these
concerns, such as regularly auditing the system and implementing strict access controls
to limit who can access and use the information.
There has been no movement toward a national database for citizen
identification or other new national database containing information about citizens. The
use of biometric identification systems, such as the BAT system, is a complex issue that
raises important questions about privacy, security, and the accuracy of the information
stored in the systems.
The purpose of the military's Biometrics Automated Toolset (BAT) is to gather
and store biometric data, such as fingerprints, iris scans, and facial recognition, for the
purpose of identifying and tracking individuals in conflict zones. The system is used by
the U.S. Department of Defense (DOD) to verify the identities of individuals and
distinguish between friendly forces and potential adversaries. The BAT helps the
military maintain security and prevent the reentry of previously detained individuals into
conflict zones.
The military's Biometrics Automated Toolset (BAT) has both benefits and
drawbacks. On one hand, the ability to accurately identify individuals in conflict zones
can help to maintain security and prevent the reentry of previously detained individuals.
This can be especially important in volatile and high-risk situations where quick and
accurate identification is critical. On the other hand, the collection and storage of
biometric data raises privacy and security concerns. The sensitive information stored in
the BAT database is vulnerable to potential breaches, which could have serious
consequences for individuals and national security. Additionally, the use of biometric
identification systems raises important ethical questions about the right to privacy and
the use of personal information by government agencies.
It is important for the military and the DOD to carefully consider the privacy and
security implications of the BAT system and to continually evaluate and improve the
measures in place to protect sensitive information. In addition, it is essential that the
military and the DOD work to address any inaccuracies in the information stored in the
system to ensure that the information used is reliable and accurate.
In conclusion, the military's BAT system is a valuable tool for the DOD in
identifying and tracking individuals in conflict zones, but it also raises important privacy
and security concerns. The DOD should continue to review and improve the security
measures in place to ensure the protection of sensitive information and to ensure that
individual privacy rights are not infringed upon.

You might also like