Blown To Bits Chapter 4 Pdf
Chapter 2 of blown to bits mainly focuses on the tracking devises such as the GPS tracking systems and others. These tracking systems sometimes help people find their ways, but these systems are also used mainly to track people also. These tracking systems can sometimes help us find the most valuable discoveries and it can sometimes lead to a mysery because even criminals can use these systems to track people, which van be very dangerous. This chapter then talks about how people can find information about the government and other jobs using these. Also, this chapter talk about how dangerous it can be to share private information in the computer. After reading this interesting chapter I learned the most important things that we need to be careful about when using computers.
For example, we sent many word documents or PDF file to our friends or others, and we think they can only read what we wrote and that we are not sharing much information, but is that true? When you send word document or PDF to others we are sending more information that we think.

This chapter says how this can be a huge threat to our security and privacy. So next time when you send something, just be careful with what you erase because the things that you erased can easily be brought back. Chapter 4 of blown to bits talks about searching on the web. With the web, most people think they can do anything they want, You can type what you want to know about on google, and everything that you need to know about that subject is there in front of you within seconds. It makes us feel as if the world is in our finger tips, but before you search anything you should know that When ever you search something, on google or bing, somewhere there is a record stored on what you searched for.
CHAPTER 1 Digital Explosion Why Is It Happening, and. 4 BLOWN TO BITS 599_ch01.qxd 4/16/08 1:19 PM Page 4. We offer seven truths about bits.
So be careful on what you search for because they may coem back to you.
As a final exam, you will submit an essay on a topic of your choice related to one of the chapters in the book Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion by Hal Abelson, Ken Ledeen, and Harry Lewis. This book is available online as a pdf for free at and the related website with additional material is. In particular, you may find interesting and relevant to your work. To help you navigate the book, the following table summarizes which lecture topics loosely correspond to which chapters. You are of course free to select any chapter (or related sections from multiple chapters), regardless what was covered in class.
Blown To Bits Chapter 4 Summary
CS 190 Topic Blown to Bits The Internet Appendix: The Internet as System and Spirit Social Networking Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned Security Chapter 5: Secret Bits: How Codes Became Unbreakable Ethics Chapter 7: You Can’t Say That on the Internet: Guarding the Frontiers of Digital Expression Intellectual Property Chapter 6: Balance Toppled: Who Owns the Bits? Digital Divide Gaming History & Computation Chapter 1: Digital Explosion: Why Is It Happening, and What Is at Stake? Other Topics Digital Documents Chapter 3: Ghosts in the Machine: Secrets and Surprises of Electronic Documents Search Engines Chapter 4: Needles in the Haystack: Google and Other Brokers in the Bits Bazaar Censorship/Regulation Chapter 8: Bits in the Air: Old Metaphors, New Technologies, and Free Speech Specific instructions and guidelines:.