1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marin [14]
3 years ago
11

Describe some of the moral, ethical, and legal issues surrounding responsible use of technology (and the information obtained th

rough the technology) in the workplace.
Computers and Technology
1 answer:
rosijanka [135]3 years ago
3 0

Answer:

Technology must be used in the right manner, and for the right purposes. When the latest in image processing is used to find a new planet through machine learning, we are right. However, when we kill somebody with a gun, we are not right. The bullet can be directed to legs rather than heart, and with continuous love and affection, any heart can be won. Sometimes this is allowed legally, Also it can be ethically correct as some institutions might allow it ethically, and it can be for some morally right as well. However, still, this is not right for some, and that is the almighty. And it's hard to match him morally or ethically. And for him nothing wrong is legal. Coming back to the use of technology in the workplace, you will find that you must follow the ethics of that institution, and your moral value must always be subsidiary to their ethics. And in the 21st century, and particularly in developed domains you will never be asked to sacrifice your moral value, and by the end of next quarter, this might be true for the whole world. Hence, ethics and moral values by then can in all cases be used interchangeably, However, when it comes to being legal, your institution will let you know all the laws, and you need to follow them, and these are applicable to all the institutions, and hence you need not require to sacrifice anything for being legal. Always remember that in the 21st century, you might see some very lethal technologies, and your job in the workplace is to study those technologies with your fullest potential. Issues will arise if you do not work with your fullest potential. And if you will, your moral value will be respected, and you will be easily able to obey their ethics, as no company ever think about even a little bad for their employees. And legally even the director is required to be correct just like you. And what is legal is being decided by the court and not any company. Hence, always try to work with your fullest potential, and never think to harm anybody, or your company. If you do this, you will be the hero of your company very soon.

Explanation:

And remember, the information that you get to know in your company is confidential, and you should not leak it to anybody, and even your relatives. Always keep them hidden inside you, and never ever try to leak them.

You might be interested in
Any1??<br> Write the names of atleast 22 high-level programming languages
Brums [2.3K]

Answer:

1 Array languages

2 Assembly languages

3 Authoring languages

4 Constraint programming languages

5 Command line interface languages

6 Compiled languages

7 Concurrent languages

8 Curly-bracket languages

9 Dataflow languages

10 Data-oriented languages

11 Decision table languages

12 Declarative languages

13 Embeddable languages

13.1 In source code

13.1.1 Server side

13.1.2 Client side

13.2 In object code

14 Educational languages

15 Esoteric languages

16 Extension languages

17 Fourth-generation languages

18 Functional languages

18.1 Pure

18.2 Impure

19 Hardware description languages

19.1 HDLs for analog circuit design

19.2 HDLs for digital circuit design

20 Imperative languages

21 Interactive mode languages

22 Interpreted languages

23 Iterative languages

Explanation:

8 0
2 years ago
The ____________ command / function is used in Python graphics and text-based programming code.
sleet_krkn [62]

A. write()

2.4. Graphics

Graphics make programming more fun for many people. To fully introduce

graphics would involve many ideas that would be a distraction now. This section

4 0
2 years ago
To provide both encryption and integrity protection, wpa2 uses aes encryption with:
lara [203]

WPA 2 stands for Wi-Fi Protected Access, version 2. It is the latest protocol that effectively protects 802.11 wireless traffic across a LAN. It belongs to the 802.11 protocol.

To provide both encryption and integrity protection, wpa2 uses aes encryption with Counter and CBC MAC (CCM) Mode.

3 0
2 years ago
What were the first printed media items that graphic designers created?
laila [671]

Answer:

books

Explanation:

4 0
3 years ago
Briefly explain the following terms.
Gelneren [198K]

Answer:

  • High Level Programming Language

A high-level language is a programming language designed to simplify computer programming. High-level source code contains easy-to-read syntax that is later converted into a low-level language, which can be recognized and run by a specific CPU.

  • Pointers

A pointer is a variable that stores the address of another variable. Unlike other variables that hold values of a certain type, pointer holds the address of a variable. For example, an integer variable holds (or you can say stores) an integer value, however an integer pointer holds the address of a integer variable.

  • Functions

a function relates inputs to outputs. a function takes elements from a set (the domain) and relates them to elements in a set

  • Compilers

Compiler, Computer software that translates (compiles) source code written in a high-level language (e.g., C++) into a set of machine-language instructions that can be understood by a digital computer's CPU.

  • Logic errors

A logic error (or logical error) is a mistake in a program's source code that results in incorrect or unexpected behavior.

  • loop

In computer programming, a loop is a sequence of instruction s that is continually repeated until a certain condition is reached.

5 0
3 years ago
Other questions:
  • Where can you access email accounts on your windows 7 computer in order to modify current accounts or create new ones?
    5·1 answer
  • What is the name of the domain controller database that windows server 2016 uses to store data about user access and resources o
    10·1 answer
  • Insurance can help you:
    12·1 answer
  • Persuasion is when Someone speaks to crowd about love <br>○True<br>○False​
    10·1 answer
  • Whay is processing?Explain with an example.​
    9·2 answers
  • Hi I need help with an assignment. We're learning about encryption and decryption in code.org. i need help with three of the tex
    14·1 answer
  • c) If you are at foreign country visit, which banking card would you prefer to keep with you during visit (Debit Card or Credit
    10·1 answer
  • Of the following field which would be the most appropriate for the primary key in a customer information table?
    5·1 answer
  • Why does brainly want me to PAY or watch ads<br> i hate doing that
    9·1 answer
  • python. create a program that asks the user to input their first name and their favorite number. Then the program should output
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!