Software engineering is not only concerned with issues like system heterogeneity, business and social change, trust, and security, but also with ethical issues affecting the domain. Give some examples of ethical issues that have an impact on this domain

Answers

Answer 1

Answer:

follows are the solution to this question:

Explanation:

Confidentiality:

It always agrees with all of this, even though there is no security arrangement, and the theoretically facilitates the free exchange of information between both the client as well as the worker or understands that perhaps the personal life of a client and then all the concerns and problems we have belongs to them.

Competence:

It didn't distort the skill level in such a specific field or topic, it is the talent or capacity, and being able to be doing something well or be sane enough just to face charges in court.

Intellectual property rights:

It will be mindful of regional intellectual property laws in which the individuals over its mind's constructs are given over a certain amount of time, which typically gives the maker the exclusive right to use his / her development.

Answer 2

The examples of the ethical issued that have an impact on the domain is as follows:

Confidentiality:  When there is no security arrangement, and the theoretically facilitates the free exchange of information between both the client as well as the worker .Competence:  It didn't distort the skill level in such a specific field or topic, it is the talent or capacity. Intellectual property rights: It will be mindful of regional intellectual property laws in which the individuals over its mind's constructs are given over a certain amount of time.

Learn more: brainly.com/question/17429689


Related Questions

Which visual aid would be best for showing changes inacts population size over time?
a line graph
a map
a pile grain
a table

Answers

Answer:

a line graph

Explanation:

I think so . hope this helps

if we model the lifetime of a hard drive as an exponential random variable x where e[x] = 100 years, then approximately 1 in hundred drives will fail within a year.
True or False

Answers

True.

To answer this question, let's first understand the given terms:

1. Exponential random variable: A random variable that models the time between events occurring in a Poisson process, in this case, the lifetime of a hard drive.
2. E[X] = 100 years: This is the expected value (average lifetime) of the hard drives, which is 100 years.

Now, let's solve the problem:

The probability density function (pdf) of an exponential random variable X with mean λ is given by:

f(x) = (1/λ) * e^(-x/λ)


In this case, λ = E[X] = 100 years. We want to find the probability of a hard drive failing within one year, which means we need to find P(X ≤ 1).

To find P(X ≤ 1), we can integrate the pdf from 0 to 1:

P(X ≤ 1) = ∫(1/100) * e^(-x/100) dx, with limits from 0 to 1.

P(X ≤ 1) = [-e^(-x/100)] (from 0 to 1)

P(X ≤ 1) = [-e^(-1/100) + e^(0)] = 1 - e^(-1/100) ≈ 0.01

So, the probability of a hard drive failing within one year is approximately 0.01, or 1 in 100.

Therefore, the statement is True.

To know more about Exponential random variable:

https://brainly.com/question/30588365

#SPJ11

Payton bought a couple new dog toys for her puppy. The bone she bought cost $5.25 and the frisbee cost $6.75. About how much did the toys cost?

Answers

All together the toys cost 12 dollars

Answer:

$12

Explanation:

                          1 00

                          5.25

                       + 6.75

                          -------

                          12.00

How can we work together to fix our website

Answers

Answer:

you can upade the code  

make a off topic page

Explanation:

I thnk this will help with the spamers

When you touch a warm picnic table , your hand becomes warmer. Explain how energy conservation applies to this situation

Answers

When you contact a warm picnic table, this transfer occurs because your hand has a lower surface temperature than the table, which allows the heat to pass from the table to your hand. You can see how this procedure conserves energy.

Why should we conserve energy?

Energy conservation is essential for limiting climate change. It helps to replace non-renewable resources with renewable energy. When there are energy shortages, energy saving is frequently more cost-effective and environmentally friendly than increasing energy output.

What kind of energy is that?

There are numerous shapes that energy can take. Examples of these energies include gravitational energy, mechanical energy, electrical energy, sound energy, chemical energy, nuclear or atomic energy, light energy, heat energy, and so on.

To know more about conserves energy visit:-

https://brainly.com/question/13949051

#SPJ1

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

Technique can a black-hat attacker use to find any modem connection on your network with security weaknesses

Answers

Answer:

war dialing

Explanation:

The technique that black-hat hackers use to do this is known as war dialing. This is basically when they dial a large number of telephone lines in order to gather data on the connected modems. This data is then analyzed in order to find weaknesses in the network and create a bypass in order to gain access to that network. Doing so grants them access to all of the personal data that the individuals connected to that network use on a daily basis. This is an illegal technique that is punishable with jail time.

if the wide area network (wan) is supporting converged applications like voice over internet protocol (voip), which of the following becomes even more essential to the assurance of the network? a. boundary routing b. classless inter-domain routing (cidr) c. internet protocol (ip) routing lookups d. deterministic routing

Answers

if the wide area network (wan) is supporting converged applications like voice over internet protocol (voip) internet protocol (ip) routing lookups will be even more essential to the assurance of the network.

Understanding WAN

WAN stands for Wide Area Network is a network that is used as a network that connects between local networks.  Local computer networks are not only physically adjacent to each other, but share the same group of IP addresses.  

The local network can be one room, one office or even one city.  While the WAN itself is a network that connects these local networks within a city, province or even between countries.  The difference between WAN and LAN networks is in the type of media used.  Generally local networks or LANs use similar network media.

While the WAN is connected to devices with different transmission media and protocols.  The WAN coverage area is also very wide, but unites the network as if it were in one room.  WAN networks have lower data transfer rates than local networks or LANs. WAN network technology relies on companies providing long-distance telecommunications services.  WAN networks use many kinds of network technologies with a mix of analog and digital signals for data transmission.  Of course this is different from a local network or LAN which uses a connection between computers that are physically connected to each other with the same protocol and transmission media.  The components in the WAN and their functions will be discussed later.

Learn more about WAN at https://brainly.com/question/14793460.

#SPJ4.

In this unit, you learned that test generators can be very helpful when trying to determine if a code runs properly or fails in some situations. For example, let’s say that you were writing a program where the user would input their test grades and the program would tell them their average. What kinds of data would a test generator want to test for that program to be sure that it would work in all situations?

Answers

Answer:

Using boundary value analysis and assuming the valid range of test scores is [0 - 100],

min value, min value + 1-1 and 0A Nominal value between (0, 100)100 and 101max value - 1, max value

In Boundary value analysis, we test the transition points where the program's behavior is expected to change. These transition points are the boundaries of valid and invalid partitions.

Min and max value are the smallest and largest possible values that you can store in your data type being used. This varies depending on the data type, so without knowing which you are using (and which language), I can't be more specific.

PLEASE HELP ME IF YOU KNOW THE PROBLEM
Brainly Keep saying “something went wrong” try again when I take a picture but it’s perfectly clear somebody help pls?”!!!

Answers

bro sameeeeee!!!!!!?

State one criteria that makes a piece of malware a virus.

Answers

Answer: Self replication

Explanation: Malware is a catch-all term for any type of malicious software, regardless of how it works, its intent, or how it's distributed. A virus is a specific type of malware that self-replicates by inserting its code into other programs.

what is one of the things that has set siri apart from other digital assistants?

Answers

The numerous Easter eggs the program's designers have incorporated are one of the features that have distinguished Siri.

What is a good illustration of a digital assistant?A sophisticated computer programme that simulates a dialogue with its users, generally online, is referred to as a digital assistant, sometimes known as a predictive chatbot.The digital voice assistants from Apple and Amazon, Alexa and Siri, are more than simply practical tools; they are also very real applications of artificial intelligence, which is permeating more and more of our daily lives. Abstract. Voice assistants are computer programmes that can comprehend human speech and give voice-like responses. Alexa from Amazon, Cortana from Microsoft, and Assistant are the voice assistants that are most commonly used today. They can be used as discrete home speakers or as voice assistants included into smartphones.

To learn more about digital assistants, refer to:

https://brainly.com/question/29647392

computer scientists are great at reading data and crunching numbers to draw conclusions. we live in a data-rich world that offers more information than has ever been present before. companies often do not hire computer scientists on their own and will often group the computer science experts with team members from other fields. which of the following is the best reason for a computer scientist to work with someone outside their field? elimination tool select one answer a create optimal algorithms. b explain the meanings of headers on data. c write documentation. d collaborate to draft the main goals of a project.

Answers

Given that computer scientists are great at reading data and crunching numbers to draw conclusions the best reason for a computer scientist to work with someone outside their field is: " collaborate to draft the main goals of a project." (Option D)

Why are the goals of a project essential to a computer scientist?

Before the inception of any project, it is important to establish the goal. This is not different with IT-related projects. This is the reason why computer scientists must collaborate with professionals that are outside of their field.

Setting goals is an important aspect of planning for personal transformation and achieving project objectives. Well-written objectives motivate, concentrate attention, and provide as a foundation for controlling performance and assessing improvement.

The first are project result objectives. These are the task statements that must be fulfilled in order for the project to be regarded "complete." The second type of project management performance objective is high-level project management performance goals that relate to the overall performance of the team and project manager.

Learn more bout computer scientists:
https://brainly.com/question/27127548
#SPJ1

The stop-and-wait protocol is highly inefficient:______.
a. when there is a short distance between source and destination and the transmission rate is low
b. when there is a large distance between source and destination and the transmission rate is high
c. when there is a large distance between source and destination and the transmission rate is low
d. when there is a short distance between source and destination and the transmission rate is large

Answers

The answer should be c

Which cellular network type was the first kind of network to use encryption?

Answers

The first network to adopt encryption was the 2G cellular network type. Mobile data is internet content delivered via a wireless cellular connection to mobile devices such as smartphones and tablets.

In information technology, a network is described as a physical or virtual connection between two or more computers. Two computers coupled together by a cable from the simplest network. Peer-to-peer networks are the name given to this kind of network. In this network, there is no hierarchy; each participant has the same privileges. Each computer can access the other machine's information and share resources like disc space, software, or peripherals (printers, etc.).

Today's networks are frequently a little more complicated and don't only have two computers in them. In most cases, client-server networks are used in systems with more than ten participants. A central computer (server) in these networks distributes resources to the other network users.

Learn more about network here:

https://brainly.com/question/14276789

#SPJ4

(Interest Calculator) The simple interest on a loan is calculated by the formula interest = principal * rate * days / 365;
The preceding formula assumes that rate is the annual interest rate, and therefore includes the division by 365 (days). Develop a program that will input principal, rate and days for several loans, and will calculate and display the simple interest for each loan, using the preceding formula. Here is a sample input/output dialog:
Enter loan principal (-1 to end): 1000.00 Enter interest rate: .1
Enter term of the loan in days: 365
The interest charge is $100.00
Enter loan principal (-1 to end): 1000.00 Enter interest rate: .08375
Enter term of the loan in days: 224
The interest charge is $51.40
Enter loan principal (-1 to end): -1

Answers

The program calculates and displays the simple interest in Python for several loans by taking input of principal, rate, and days, and using the formula interest = principal * rate * days / 365.

What is Python?

Python is a high-level, interpreted programming language that is widely used for various purposes such as web development, data analysis, machine learning, and artificial intelligence.


Here's the Python code to implement the interest calculator:

while True:

   principal = float(input("Enter loan principal (-1 to end): "))

   if principal == -1:

       break

   rate = float(input("Enter interest rate: "))

   days = int(input("Enter term of the loan in days: "))

   interest = principal * rate * days / 365

   print("The interest charge is ${:.2f}".format(interest))



1) The program uses a while loop to repeatedly prompt the user for input until they enter -1 to end the program.

2) Inside the loop, the program uses input() to get the principal, interest rate, and loan term in days from the user, and stores them in variables.

3) The program then calculates the simple interest using the formula given in the problem statement: interest = principal * rate * days / 365.

4) Finally, the program uses print() to display the calculated interest to the user.

Sample output:
Enter loan principal (-1 to end): 1000.00

Enter interest rate: .1

Enter term of the loan in days: 365

The interest charge is $100.00

Enter loan principal (-1 to end): 1000.00

Enter interest rate: .08375

Enter term of the loan in days: 224

The interest charge is $51.40

Enter loan principal (-1 to end): -1


To know more about loans visit:
https://brainly.com/question/9471571
#SPJ1

When you insert a Quick table, you cannot format it true or false

Answers

Answer:

True

Explanation:

Format the table the way you want — e.g. borders, shading, row height, alignment, emphasis, font size, etc. for the heading row and the table rows. You can use manual formatting, or one of the built-in table designs

Please need help!!!!!

Which one of these statements regarding the phases of development is true?

A.
The pre-production phase starts after the prototype phase.
B.
The beta phase starts after the alpha phase.
C.
The alpha phase starts after the gold phase.
D.
The concept phase starts after the pre-production phase.
E.
The production phase starts after the beta phase.

Answers

Answer:

Try the answe D because before you start you will need a concept.

It should be noted that the statements regarding the phases of development is true is D; The concept phase starts after the pre-production phase.

According to the given question, we are to discuss the phases of development that are involved.

As a result of this ,we can see that, concept phase starts after the pre-production phase, during thus process, there should be a pre-production that helps to have an idea of the whole process.

Therefore, The concept phase starts after the pre-production phase of development in programing process.

Learn more about phases of development at;

https://brainly.com/question/16397886

artefacto o servicio producido de manera artesanal o Industrial que puede satisfacer plenamente una necesidad o interés de la localidad la región en que viven​

Answers

Answer:

sorry, don't speak this language :)))

Explanation:

Supplies/material used in iron​

Answers

The raw materials used to produce pig iron in a blast furnace are iron ore, coke, sinter, and limestone. Iron ores are mainly iron oxides and include magnetite, hematite, limonite, and many other rocks. The iron content of these ores ranges from 70% down to 20% or less.

A laptop gets recycled by an e-waste recycling company once it can't be used anymore. Which stage of the hardware lifecycle does this scenario belong to

Answers

Answer:

Retirement.

Explanation:

When a laptop gets recycled by an e-waste recycling company once it can't be used anymore. This belongs to the retirement stage of the hardware lifecycle.

Hardware lifecycle can be defined as the management of the total or overall useful life of an equipment or device, so as to maximize or enhance the benefits to be derived from its use.

The retirement stage of a hardware represents the stage where the hardware has reached the end of its life-cycle and as such can not be used to perform the task for which it was designed. It is at the retirement stage, that hardwares are written off as scraps and are to be replaced by another because they can't be used anymore, as well as disposal for recycling purposes.

you want to set up a collector-initiated environment for event subscriptions. which commands would you run? (select two.)

Answers

You would choose a default machine account and a specific user service account.

Start the Windows Remote Management service on the source computer by entering the command winrm qc -q. 2. Type in the FQDN of the collector computer and use Group Policy or a local security policy to set up the Event Forwarding policy on the source computer. Even while a "cold site" recovery center has electricity, it lacks servers and high-speed data links. A cold site does not give the majority of enterprises a sufficient path to recovery. A hot site is a complete live mirror of the main website.

Learn more about command here-

https://brainly.com/question/18955190

#SPJ4

idea citizen activation

Answers

Answer:Idea citizen activation badge is a part of the idea silver award and is in the citizen category,helping you learn digital awareness,safety and ethics.

Answer: The Citizen Activation badge is part of the iDEA Silver Award and is in the Citizen category, helping you learn digital awareness, safety and ethics.

Want to know more about iDEA?

iDEA helps people develop digital, enterprise & employability skills for free. Log in or sign up to start a badge and begin to earn points on iDEA.

True or False
We can represent the pdf of a discrete random variable X with a
histogram.

Answers

False. We cannot represent the pdf of a discrete random variable X with a histogram.

The probability density function or pdf refers to the mathematical function that is used to describe the likelihood of possible values of a continuous random variable. A probability density function is represented as the derivative of a probability distribution function, and it is used to represent the area under the curve that represents the probability distribution of a continuous random variable. The probability density function (pdf) is used to estimate the probability of the random variable X by observing the probability distribution function (pdf) of X. The probability distribution function (pdf) of X is defined as P(X = x) = the probability of X taking on the value x. The probability density function is used to estimate the probability of the random variable X by observing the probability distribution function (pdf) of X. The probability distribution function (pdf) of X is defined as P(X = x) = the probability of X taking on the value x. The conclusion is that False, we cannot represent the pdf of a discrete random variable X with a histogram.

To learn more about histogram, visit:

https://brainly.com/question/16819077

#SPJ11

If you spend time on social media, you probably see many infographics. How can you determine whether the information contained in them is trustworthy? When you create infographics, what can you do to make it more likely that the viewer will trust you?

Answers

Answer:

Provide sources.

Explanation:

Providing sources for your infographic would be the best I can think of.

Either a direct quote, a source for a graph, etc.

In which situations would a text-to-speech tool be useful? Check all that apply. A reader needs to hear a word pronounced. O A student is reading difficult material. A student needs to take notes about a text. A reader needs to know the definition of a word. O A student is reading a new language.​

Answers

Answer:

a,b,e

Explanation:

edge 2020

Answer:

a b and e

Explanation:

I took the assignment

Write a program that reads integers user_num and div_num as input, and outputs user_num divided by div_num three times using floor divisions.

Answers

#Function definition

def read(user_num, div_num):

   

   #Loop

   for i in range(3):

       user_num //= div_num

   return user_num

#Main Function.

if __name__ == "__main__":

   #Test code.

   u, d = [int(x) for x in input().split()]

   print(read(u,d))

Write a program that reads integers user_num and div_num as input, and outputs user_num divided by div_num

. In this project, how many times will the [Drive] block be repeated?
a
It will be repeated forever
It will repeat 100 times.
It will repeat 90 times.
It will repeat once.
c

Answers

Answer: wait is a multiple answers to it or

Because I think it’ll be forever

Explanation:

Tristen is teaching her history course. She printed off her presentation so the students could take notes. Wyatt is
teaching a science course. He wants to make sure students who do not have PowerPoint can still view the
presentation. Reed is teaching a math course online. He finds the students are very visual and wants to control the
timing per slide
Which best describes how each teacher handled their presentations?
O Tristen created handouts, Wyatt saved as a PDF, and Reed saved as a video
O Tristen created a video, Wyatt saved as a PDF, and Reed broadcasted.
O Tristen created handouts, Wyatt saved as a video, and Reed saved as a PDF.
O Tristen created a video, Wyatt broadcasted, and Reed saved as a video

Answers

Since Tristen want her students to take notes on her presentations, she should have some sort of handout.

Because Wyatt, wants to ensure that students who do not have PowerPoint can still view his presentations, converting it into a pdf is best.

Since Reed's students are very visual, converting his slides into a video will make it better for students who want to spend some time assessing some of the graphs or equations.

Thus, A is the best choice.

___ design uses the same webpage content, but applies styling depending on the viewport size of the device

Answers

coding design used snake
Other Questions
In pg 32-47, in chapter 2, what is the main idea to identify symbols and their significance of Lord of the Flies? An engineer has a 50:1 scale drawing of a bridge. The dimensions of the scaled bridge deck are 24 inches by four and one fifth inches. What is the area of the actual bridge deck in square feet? 120 square feet 875 square feet 1,750 square feet 3,500 square feet Question 7 of 10 these tables represent a quadratic function with a vertex at (0, -1). what is the average rate of change for the interval from x = 7 to x =8 a. -65 b-2 c. - 5 d. -50 What precedents did george washington establish during his presidential terms?. PLZ HELP DUE TODAY. I have to find the value of x Problem 7.6 Using Eg = -79.0 eV for the ground-state energy of helium, cal- culate the ionization energy (the energy required to remove just one electron). Hint: First calculate the ground-state energ Discuss each of their positioning strategies and identify how each positioning strategy differs from the others Select the algebraic expression(s) that represents this situation: Tamiya went to the store and bought 4 shirts that cost (n) dollars each. Which of the following was not a Buddhist sect during the Tang? A) Pure Land B) Du Fu C) Maitreya D) Zen. B) Du Fu Periodic time functions are averaged by integrating over one time period and dividing the result by the time duration of one period. (a) find the time average of p (z, t) given in (1. 61). (b) repeat for p-(z,t) given by (1. 62) List THREE Security Features that can be found in the NSS of the GSM network and explain the function of each. Major Topic Blooms Designation Score Mobile Architecture (GSM) AP 6 b. In an effort to extend AiT TV coverage in Ghana and West Africa without the help of any television platform in the country or anywhere in the world; AIT put into the orbit a satellite. Assuming the distance between the orbit where the satellite is located and the earth at sea level is 100 KM; prove that, the speed, the acceleration and the period of the satellite can be determined with the help of the following constants. Mearth = 5.98 x 1024 kg, Rearth = 6.37 x 10 m) G=6.673 7 10-11 Nm/Kg? Major Topic Blooms Designation Score Satellite Design 8 c. Commercial satellite communication services are grouped into three general categories, explain briefly the difference between these classifications. Major Topic Blooms Designation Score Orbital Aspects EV 6 A random sample has 49 values. The sample mean is 8.5 and the sample standard deviation is 1.5. Use a level of significance of 0.01 to conduct a left-tailed test of the claim that the population mean is 9.2. Compute the sample test statistic t. 0.005 0.0005 -2.267 -3.267 the nurse has provided nutrition education to a client. which client statement requires further teaching by the nurse pls help me 100 points What is the volume of the prism?Enter your answer in the box as a mixed number in simplest form. which process involves carbon moving directly from the biosphere into the geosphere?(1 point) responses the decomposition of plants on the forest floor the , decomposition of plants on the forest floor the eruption of a volcano the eruption of a volcano the photosynthesis of a plant the photosynthesis of a plant the weathering of rocks by a river "Thus, the world began to invest in color prejudice" what does "invest" in this sentence. suppose that consumer assets and wealth decrease in real value. how will this affect the aggregate demand curve? What are the regulatory mechanisms, specifically transcriptional attenuation and the role of the trp repressor, that control the expression of the tryptophan operon? Daria plans to retire in 20 years and wants to know how much she will need to have in her account when she retires. She wants to be able to withdraw $5,000 per month for 25 years of retirement, and she expects her account to earn a nominal rate of 9 percent per year. Round to the nearest cent. Do not include any unit (If your answer is $111.11, then type 111.11 without $ sign.) What is the translation for the Indigenous American name for Death Valley?