What are the three most important ethical issues professionals in the computer industry regular face

Answers

Answer 1

The three most critical ethical issues professionals in the computer industry regularly face ae hacking, Intellectual property, and Privacy.

What are ethical issues in the computer industry?

Ethical issues in the computer industry are those issues that affect ethics and society. These issues are judged as right or wrong by society.

The major issues facing the computer industry are:

Hacking - this is the situation where unauthorized access to an individual's or organization's data is gained by individuals or organizations.

Intellectual property - has to do with using another's ideas or concepts to develop yours.

Privacy - this has to the with the level of access to personal data by computer users.

Learn more about the computer industry at: https://brainly.com/question/29558679

#SPJ4


Related Questions

How do you comment out in html?

Answers

Answer:

<!--This is a comment. Comments are not displayed in the browser-->

Explanation:

The <!-- and its closing tag --> are used to add content that is in the source, but not rendered in the browser.

what is data Communications​

Answers

Transmission of digital data between 2 or more computers and a computer network or data network

Answer:

Data transmission and data reception is the transfer and reception of data over a point-to-point or point-to-multipoint communication channel. Examples of such channels are copper wires, optical fibers, wireless communication channels, storage media and computer buses.

why is it important to use safe hand tool?​

Answers

Safe tool use contributes to a safer, more efficient work environment.
Using one is safer, hence the name, and can prevent serious injuries you could get without using it

Objectives: Use arrays/vectors, files, searching arrays, manipulating array contents, characters, and strings. You are asked to implement a car ordering system for Bobcats Auto Dealership. This dealership is brand new and only sells one brand of cars with three different models. However, a buyer can add options if they choose.

Answers

To implement the car ordering system for Bobcats Auto Dealership, we can use arrays/vectors to store the car models and their respective options. We can also use strings to store the buyer's name and other details.


The system can have a file that contains the available car models and their options, which can be read and stored in arrays/vectors. When a buyer places an order, their details can be stored in a separate file. To search for available car models and options, we can use the searching arrays feature. We can also manipulate the array contents to remove or add options based on the buyer's preferences. To handle characters and strings, we can use string functions to validate input from the user and ensure that it is in the correct format.


Overall, the implementation of arrays/vectors, files, searching arrays, manipulating array contents, characters, and strings can help in creating an efficient and user-friendly car ordering system for Bobcats Auto Dealership.

To know more about Arrays/Vectors, click here:

https://brainly.com/question/13014068

#SPJ11

1
TIME REMAINING
01:51:06
Zubair needs to change some of the data in a table that he has created. How should he go about selecting a row in
the table?
Moun the mourn nointor in a noint hefore the text in a cell​

Answers

the answer is zubair needs to change something

A _________ conversion involves running the old and new systems simultaneously for a time, which is is rarely used, since it impractical for customer-facing e-commerce systems.

Answers

Small conversions require running the old and new systems simultaneously for a period of time, but they are rarely used because they are impractical for customer-facing e-commerce systems.

Conversion Tactics:

Both conversion tactics aim to make it easier for users to adapt to the new system. The old system is "unplugged" and the new system is turned on when converting directly. The new system must be used by users; there is no other option.

The old system is briefly used in the parallel conversion plan while the new system is turned on. Since there is no backup in the event that significant system flaws are found, the direct approach is riskier.

In the event that a critical flaw in the new system is found, the parallel conversion will continue to operate the old system. However, it is crucial to take into account the expense and additional work associated with using both systems at once.

To know more about conversions, visit: brainly.com/question/29025070

#SPJ4

Which of the following is an example of a NoSQL database? Select one: A. Oracle. B. DB2 C. SimpleDB D. Crystal Reports E. Microsoft Access

Answers

Out of the options provided, the example of a NoSQL database is:
C. SimpleDB

SimpleDB is an example of a NoSQL database. NoSQL (Not Only SQL) databases are designed to handle large volumes of unstructured or semi-structured data and provide flexible and scalable data storage solutions. They differ from traditional relational databases (such as Oracle, DB2, or Microsoft Access) in their data model and storage architecture.

SimpleDB, offered by Amazon Web Services (AWS), is a managed NoSQL database service. It provides a schema-less data model and is designed for high scalability, allowing developers to store and retrieve large amounts of data with low latency. SimpleDB is suitable for applications that require fast and scalable access to structured data and need the flexibility to adapt to changing data requirements.

It is important to note that the other options mentioned, Oracle, DB2, Crystal Reports, and Microsoft Access, are not examples of NoSQL databases. They are either traditional relational databases or reporting tools used for working with structured data in a different manner.

Thus, the correct option is : (C) SimpleDB

To learn more about NoSQL database visit : https://brainly.com/question/29891022

#SPJ11

how do you add text in Photoshop CC?​

Answers

Explanation:

First select the Type Tool from the Toolbar

Click in the document to view the live preview.

Choose a new font.

Choose a type size.

Add your text.

Which would be a responsible use of technology used by victims of cyberbullying?
finding ways to strike back at bullies online.
O buying software that allows them to track down bullies.
O changing passwords and screen names regularly.
O pretending to be someone else to hide their identity.

Answers

Answer:

Changing password and screen names regularly.

Explanation:

The cyber attacks have been common in this age. The technological advancements have eased our lives but also create hundreds of risks. These risks can include cyber bullying. The best way to keep your self away from being victim of such threat is by changing passwords regularly. This reduces the chance of hacking passwords and cyber bullying.

Answer:

C

Explanation:

I took the quiz :)

cual es el procedimientos para asistir en el transporte publico a personas discapacitadas

Answers

Answer:

Una discapacidad física o motora en una o más partes del cuerpo obstaculiza las acciones y / o movimientos de la persona con discapacidad. La discapacidad puede surgir porque las partes del cuerpo no han crecido completamente o están dañadas (anomalías físicas) o porque las funciones físicas están alteradas (anomalías funcionales).

En la mayoría de los casos, se proporciona una ayuda a las personas con discapacidades físicas graves para que puedan desenvolverse más fácilmente en la sociedad. Alguien con una discapacidad motora severa en las piernas a menudo usa una silla de ruedas. Las personas con una discapacidad motora de las manos (pérdida de la motricidad fina) o de los brazos pueden compensar esto con un manipulador o ayudas especializadas en tareas, como un dispositivo para comer o un dispositivo para girar las hojas.

Así, todos estos elementos deben ser posibles de ser insertados en los medios de transporte público como forma de ayudar a estas personas a trasladarse por estos medios, es decir, los autobuses, trenes, etc., deben estar adaptados para poder recibir allí a pasajeros en sillas de ruedas o con necesidades motoras especiales.

Which of the following lists contains the five essential elements of a computer? Group of answer choices: 1. inputs, returns, programs, processes, and storage 2. language, software, hardware, code, and development 3. inputs, outputs, programs, processes, and storage 4.binary, code, inputs, processes, and storage

Answers

I think it’s 3 sorry if I’m wrong

Answer:

The answer is "C"

Explanation:

inputs, outputs, programs, processes, and storage

Two machines are being considered to do a certain task. Machine A cost $24,000 new and $2,600 to operate and maintain each year. Machine B cost $32,000 new and $1,200 to operate and maintain each year. Assume that both will be worthless after eight years and the interest rate is 5.0%. Determine by the equivalent uniform annual cost method which alternative is the better buy.

9.4- Assume you needed $10,000 on April 1, 2016, and two options were available:

a) Your banker would lend you the money at an annual interest rate of &.0 percent, compounded monthly, to be repaid on September 1, 2016.

b) You could cash in a certificate of deposit (CD) that was purchased earlier. The cost of the CD purchased on September 1, 2015, was $10,000. If you left in the savings and loan company until September 1, 2016, the CD's annual interest is 3.8% compounded monthly. If the CD is cashed before September 1, 2016, you lose all interest for the first three months and the interest rate is reduced to 1.9 percent, compounded monthly, after the first three months.

Answers

The machine with the lower EAC is the better buy.  The option with the higher total amount is the better choice.

1) To determine the better buy using the equivalent uniform annual cost method, we need to calculate the equivalent annual cost for each machine. The formula for calculating the equivalent annual cost is:

EAC = (Cost of machine) + (Annual operating and maintenance cost) * (Present worth factor)

For Machine A:

EAC(A) = $24,000 + $2,600 * (Present worth factor at 5% for 8 years)

For Machine B:

EAC(B) = $32,000 + $1,200 * (Present worth factor at 5% for 8 years)

Compare the EAC values for Machine A and Machine B. The machine with the lower EAC is the better buy.

2) To determine the better option, we need to compare the total amount received in each scenario.

Option a:

Amount received on April 1, 2016 = $10,000

Interest earned from April 1 to September 1, 2016 = $10,000 * (0.05/12) * 5 months

Total amount received on September 1, 2016 = $10,000 + Interest earned

Option b:

Interest earned on the CD from September 1, 2015, to September 1, 2016 = $10,000 * (0.038/12) * 12 months

Amount received on September 1, 2016 = $10,000 + Interest earned

Compare the total amount received in each option. The option with the higher total amount is the better choice.

learn more about machine here:

https://brainly.com/question/33340367

#SPJ11

What do computer programs generally try to solve and how? A) Computer programs generally try to solve a well-defined problem using a well-defined algorithm B) Computer programs try to solve poorly-defined problems using well-defined algorithms C) Computer programs try to solve well-defined problems using poorly-defined algorithms D) Computer programs try to solve math problems using only plain English

Answers

Explanation:

A) computer programs generally try to solve hard problems in a few seconds and makes us easy to learn

A school is creating class schedules for its students. The students submit their requested courses and then a program will be designed to find the optimal schedule for all students. The school has determined that finding the absolute best schedule cannot be solved in a reasonable time. Instead they have decided to use a simpler algorithm that produces a good but non-optimal schedule in a more reasonable amount of time. Which principle does this decision best demonstrate

Answers

Answer:

Heuristics

Explanation:

The principle that this kind of decision demonstrate is Heuristics , this is because Heuristics can be used to solve problems when there is no known algorithm to resolve the problem.

Heuristics is a simple algorithm that can provide a good but not optimal solution in the shortest possible time i.e. a shortcut to solutions

Answer:

a

Explanation:

 

Help me get this
Also use these commands

Help me get this Also use these commands

Answers

sry for this but you shouldn’t post thsi again and put it closer cause no one can see the pic

why do most operating systems let users make changes

Answers

By these changes you most likely are thinking of the term 'Over Clocking'
Over Clocking is used on most Operating Systems to bring the item your over clocking to the max.
Over Clocking; is mostly used for Crypto mining and gaming.

what are reserved words in C programming?

Answers

Answer:

A word that cannot be used as an identifier, such as the name of a variable, function, or label. A reserved word may have no meaning. A reserved word is also known as a reserved identifier.

Explanation:

quick google search

Which tab on the ribbon houses the sort functions?
O Insert
O Data
O View
Home

Answers

Data, You can find the Sort & Filter button very readily under the Editing group under the Home tab.

In Excel, where is the Home tab on the ribbon?

In the document's upper right corner, click the Ribbon Display Options icon. The Minimize icon is to the left of it. To display the Ribbon with all tabs and all commands, select Show Tabs and Commands from the menu that appears. The default view is this selection.

What does Excel's Home tab represent?

1. A tab or button that takes you back to the home part of a website or application is known as the "home tab." 2. In Microsoft Office, Word, Excel, PowerPoint, and other Office programs all open with the Home tab selected by default.

to know more about sort functions here:

brainly.com/question/19052158

#SPJ1

Answer:B.Data

Explanation: Because i said so

the media playback was aborted due to a corruption problem or because the media used features your browser did not support.

Answers

Media playback has stopped playing because corruption issues or media feature being used is not supported by the browser." Reasons for this may be: Browser problem. Poor internet connection. Website plugins not supported by browsers cached data.

How do I enable media playback?

Type chrome://flags in the address bar. Now, type Global Media Playback Control in the search bar. Once the option appears, click on the box placed right in front of it and choose Enable option.

How can I fix media playback errors?

Try another media player.

Check and get the codec pack you need. Check and update your system's display driver.

Run a troubleshooting scan.

Change the power plan settings in Control Panel.

Repair the video with VLC Media Player.

Repair video with professional software

To learn more about playback visit:

https://brainly.com/question/28200239

#SPJ4

inspect tools and equipment regularly to identify defective ones for repair, replacement or condemnation. true or false?​

Answers

Answer:

True.

Explanation:

A maintenance department refers to a section of an organization that comprises of employees who are saddled with the responsibility of providing timely and professional assistance in repair and servicing of equipments or machineries used by the core departments such as the production department.

This ultimately implies that, the maintenance department provides assistance such as repairs, error-preventive services, etc.

As a rule, end users or technicians should inspect tools and equipment regularly to identify defective ones for repair, replacement or condemnation. This would help to preserve the tools and equipment and by extension, increasing their life span.

How can you tell if a website is credible?
a. Anything on the web is automatically credible
b. You must review aspects of the site such as the author’s credibility
c. If it has a top-level domain of .com, it is credible
d. All of the above

Answers

Answer:

b

Explanation:

you must review everything, creditability , certificates, domains, etc

You can tell a website is credible by reviewing its aspects overall, the answer is b.

All of the following are ways to avoid injuries when working on computers except Select one: O A. taking breaks O B. ensuring proper lighting O so you are looking up at it OD. purchasing an adjustable chair ? Ҷх – 2 O

Answers

The option that is not a way to avoid injuries when working on computers is ensuring proper lighting so you are looking up at it, option C is correct.

Proper lighting is important for computer work to reduce eye strain and prevent visual discomfort, but the specific condition where you are looking up at the lighting, is not a recommended practice.

In fact, it is generally advised to have the lighting positioned in a way that avoids glare on the screen and provides even illumination without causing strain on the neck or eyes.

Regular breaks help reduce eye fatigue, muscle tension, and the risk of repetitive strain injuries (RSIs).

Adequate lighting conditions in the workspace help prevent eye strain and discomfort.

An adjustable chair allows you to maintain proper posture, support your back, and adjust the height and position of your workstation to minimize strain on the body.

To learn more on Computers click:

https://brainly.com/question/32297640

#SPJ4

You wrote a program to find the factorial of a number using recursion. 4! =

Answers

Answer:

24

Explanation:

Anything "factorial" is the result of multiplying the number by itself and all numbers below it, so:

4! = 4 × 3 × 2 × 1 = 24

There's no other info for this question so I assume you just wanted the answer, but as an example of a program here's a function that would work it out for you by using recursion in javascript, to use this you would call factorial(4) like at the bottom:

function factorial(num) {

 if (num < 0)  

       return -1;

 else if (num == 0)  

     return 1;

 else {

     return (num * factorial(num - 1));

 }

}

factorial(4);

It is best to think about this assignment as you trying to identify test cases that cause crashes, not bugs that result in incorrect output. Therefore, don't worry about asserting, just call the function-under-test (credit_card_validator).

Answers

If your goal is to identify test cases that can potentially cause crashes in the credit_card_validator function, you can focus on inputs that are likely to trigger errors or unexpected behavior. Instead of using assertions, you simply need to call the function with different test cases and observe if any crashes occur. Here's an example approach you can take:

1. Start by identifying the different types of inputs that the credit_card_validator function expects. For credit card validation, common inputs include:

Valid credit card numbers (e.g., Visa, Mastercard, American Express)Invalid credit card numbers (e.g., incorrect length, invalid checksum)Empty or null inputsNon-numeric inputs

2. Prepare a set of test cases that cover these different input types. For example:

Valid credit card numbers: Provide a few valid credit card numbers for different card types, ensuring they pass the validation.Invalid credit card numbers: Generate invalid credit card numbers by modifying valid ones (e.g., changing a digit) or using known invalid card numbers.Empty or null inputs: Pass an empty string or a null value to the function.Non-numeric inputs: Provide inputs that contain non-numeric characters (e.g., "1234-5678-9012-3456").

3. Call the credit_card_validator function with each test case and observe if any crashes occur. Crashes can manifest as unhandled exceptions, program termination, or unexpected behavior like infinite loops or excessive resource consumption.

4. Document the test cases that caused crashes and provide details about the crash, such as error messages or stack traces. This information will be helpful for debugging and fixing the issues later on.

Remember, the goal here is to identify potential crashes, not bugs that result in incorrect output. By exploring various input scenarios, you can uncover potential issues in the credit_card_validator function that could lead to crashes or unexpected behavior.

Learn  more about credit card here:

brainly.com/question/26857829

#SPJ11

When a web browser (client) needs to get a web page to display, it connects to the server:A) only briefly, then displays the page after the transaction is completeB) when the page is visited, and stays connected until another page is visitedC) when the first page located on that server is visited, and stays connected until a page from some different server is visitedD) when the first page located at that server is visited, and stays connected until the browser is closed

Answers

D) when the first page located at that server is visited, and stays connected until the browser is closed.

When a web browser needs to display a web page, it connects to the server hosting that page and remains connected until the browser is closed. This allows the browser to retrieve additional resources (such as images or scripts) from the same server without establishing a new connection for each request. This persistent connection improves efficiency and reduces latency since subsequent requests can be sent over the existing connection without the overhead of establishing a new one. The connection is terminated only when the browser is closed or if there is a timeout or error in the connection.

Learn more about web browser here:

https://brainly.com/question/31200188

#SPJ11

What data type would I use for a variable that can hold the value 'M'? string float or double int char

Answers

The data type you would use for a variable that can hold the value 'M' is char.

In computer programming, a variable is a named storage location that holds a value. It acts as a container for storing and manipulating data during program execution. Variables have a specific data type, such as integers, strings, or booleans, which determines the kind of values they can hold. They can be assigned values and modified throughout the program, allowing for dynamic and flexible data handling. Variables enable programmers to store and retrieve information, perform calculations, and control program flow, enhancing the functionality and adaptability of software applications.

Some common types of variables in computer programming include integer, float, string, boolean, character, array, and object variables.

Learn morea about variable here:

https://brainly.com/question/30116056

#SPJ11

____ is a technology that exists inside another device

Answers

Answer:

Embedded technology is a technology that exists inside another device.

Answer:

Embedded

Explanation:

An embedded system is a combination of computer hardware and software designed for a specific function.

what does bLINK mean?​

Answers

Answer:

people who stan blackpink are known as blinks.

another meaning is blinking your eyes.

Explain the uses of computers in education and communication​

Answers

Answer:

improvement in the quality of teaching-learning process and communication between students & teachers

Explanation:

Interviewing, counseling, and communication in relationships are all considered which type of communication?

Answers

Interviewing, counseling, and communication in relationships are all considered structured communication.

Structured communication can be described as a method that improves interactions between people to allow a better exchange of information.

Structured communication is also favorable for conversations involving more than two individuals. Therefore, this type of conversation can be used by complex organizations and healthcare systems as it organizes ideas more effectively.

Interviewing can be described as verbal question-answer sessions between two or more people. Usually, this interaction is not predetermined and is in a free form.

Counseling can be described as a type of remedy in which a person communicates with the counselor to discuss his difficulties in life.

To learn more about counseling, click here:

https://brainly.com/question/28275050

#SPJ4

Other Questions
which sentence uses correct capitalization? question 1 options: a) please call dad when you get a chance. b) it was our sister who was chosen as the outstanding graduate. c) we are meeting karen's mother at 3 p.m. today. Exercise 2 Draw one line under each simple subject and two lines under each compound predicate in the following sentences.Broadway producers seek new plays and acquire rights to the best ones. - May 1: Prepaid rent for three months, \$2,100 - May 5: Recelved and paid electricity bill, $190 - May 9: Received cash for meals served to customers, $1,090 - May 14: Paid cash for kitchen equipment, \$2,110 - May 23: Served a banquet on account, \$2,420 - May 31: Made the adjusting entry for rent (from May 1). - May 31: Accrued salary expense, $1,090 - May 31: Recorded depreciation for May on kitchen equipment, $230 If Sweet Catering had recorded transactions using the Cash method, how much net income (loss) would they have recorded for the month of May? If there is a loss, enter it with parentheses or a negative sign. If Sweet caturhig had recorded transactions using the Accrual method, how muci niet income (loss) would they thove recorded for the month of May? if there is a loss, enter it with parentheses or a negative wough : Can someone help me with solving this program using coding? Which of the following was NOT a result of the intense division in Kansas?Question 1 options:created the Fugitive Slave Acttwo opposing governments formedviolence broke out in KansasSenator Preston Brooks beat Senator Charles Sumner with his caneQuestion 2 (1 point) How did the Missouri Compromise affect the issue of slavery?Question 2 options:it divided the Louisiana purchase into free and slave regionsit outlawed slavery in Louisianait abolished slaveryit stated California would enter the Union as a free stateQuestion 3 (1 point) Why did many northerners slide the Fugitive Slave Act?Question 3 options:too soft on the Northineffectiveunfairtoo hard on the South Help please thanksssssssssss What is the average miles per gallon (mpg) for all new hybrid small cars? How did Great Britain and France come into control of large parts of North Africa and the Middle East The postage for a first class letter weighing 1 ounce or less is $.47 each additional ounce is $.21 the maximum weight of a first class letter is 3 1/2 ounces write a function to represent the situation In Taxland, the first $20,000 of income is exempt from tax. There is a 12% tax rate on income between $20,000 and $50,000, and a 16% tax rate on all income over $50,000.Mr. Taxi earns $90,000. His average tax rate is and his marginal tax rate is .Write your answer as a percent with one decimal point: for example 2.6% importance of educationessay Fill in the blank according to the story. En la mesa hay varios trozos de __________. lapicero madera mesa bolsa What is the slope of the line? (a) Oxplam Ltd. is considering an investment of $7.5 million with expected after-tax cash inflows of $5.55 million per year for 7 years and an additional after-tax salvage value of $50,000 in year 7. The required rate of return is 15 percent. What is the NPV and Profitability Index (PI) of the project? If the rate of return reduced to 10 percent will NPV and Pl increase or decrease? Show working in detail. (3 marks) (b) Qxplam Ltd. has estimated another project's NPV. The company is advised that the fixed capital outlay will be revised upward by $8000. The fixed capital outlay is depreciated straight-line over a 3-year life. The tax rate is 30 percent. What is the depreciation after tax saving? (2 marks) Which of the following is the name of an out-of-control pattern? O a and b causal O assignable shift or jump If g(x) = 6x - 36, which statement is true? A.The y-intercept of g(x) is less than the y-intercept of (x). B.The x-intercept of g(x) is less than the x-intercept of f(x). C. The y-intercept of g(x) is greater than the y-intercept of f(x). D. The x-intercept of g(x) is greater than the x-intercept of Ax). Nicole is the Executive Director of a local food bank and is assessing the financial situation of her not-for-profit organization. Nicole uses a(n) ________ to determine whether revenues from contributions and other sources will cover operating costs. El ____ esta abajo. A. sotano. B.dormitorio. C. Comedor. D. bano The author is thinking of adding one of these sentences to the end of the passage. Which sentence contains a fallacy In a survey, 24 people were asked how much they spent on their child's last birthday gift. The results were roughly bell-shaped with a mean of $33 and standard deviation of $3. Find the margin of erro