Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1- Describe a scenario in which biased or incorrect information a child nd son t

ID: 3810883 • Letter: 1

Question

1- Describe a scenario in which biased or incorrect information a child nd son the Web might harm him or her. What, if anything, might have prevented the child from nding similar information before the Web existed? Suggest and evaluate one mechanism for preventing such harm (from the Web).

2- Describe an example (actual or hypothetical) of digital manipulation of an image or video for each of the following categories. Elaborate on the third one; give some arguments for each side.

       a. There is no ethical problem; it is clearly ethical.

       b. No complex argument is needed; it is clearly unethical.

       c. Deciding whether it is ethical or not is not simple. There are reasonable arguments on both sides, or the context               might be important.

Explanation / Answer

Question 1)

Mechanism that might can prevent Web from harm before Web exists is: Cryptography

It is not one of the latest and just recognized technique. We follow this approach from so many years ago, dated 1000 years back, when the emperors used to rule, and the secure method they used to adopt for safe transferring of information from one place to another is Cryptography.

There were so many methods to hide the original information, either by replacing text, using candle wax,or so many techniques to go. Cryptography is the art of hiding original information by different ways and sending that information to authorized user and again obtaining original form of Information. for example: the kings used to hide their information with the help of invisible ink, that hides original data and original data is reverted back by placing the paper on low flame , which can show all the information it consists of.

Some terminologies are defined below, to clearly understand the concept of Cryptography:

1.Encrypt: Changing original information to some other form.

2. Decrypt: Changing altered form of text again back to original data.

3. Plain Text: Text which is not crypted in nature

4.Cipher Text: Text which is crypted in nature.

We bring out with the concept of Cryptography ,when a single program is enable to provide security, and in case when we want extra ,we bring out with the case of Cryptography program as a useful tool.

Discussing few techniques adopted under the Cryptography techniques as below:

1. Symmetric key cryptography

2.Asymmetric key cryptography

The main objective of data security is data confidentiality, storage, non-repudiation, integration and authentication. Security concerns from child's perspective might be prevented by using Encryption techniques, with him being an AUTHORIZED USER, which makes his access to Internet more safe and secure in nature, as AUTHORIZED USER generally won't face biased or incorrect information.