1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
3 years ago
5

Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario,

Jared’s actions are considered _____. a. legal and ethical b. unethical, but legal c. ethical, but illegal d. illegal and unethical
Computers and Technology
1 answer:
sladkih [1.3K]3 years ago
5 0

Answer: d) Illegal and unethical

Explanation:  Illegal term is used for the something that is incorrect according to regulation.The legal factor is not present in this type of activity and thus it is judged by the regulations as unauthorized act and can be concluded as act of crime .

Unethical term defines that something is incorrect in a moral way and the person doing the unethical activity lacks the principles in his/her nature.

Jared is also performing illegal act by selling the piracy  antivirus package of software .The act is unethical as well because Jared is lacking the basic morals e.g.-stealing is offensive and incorrect act.Thus the correct option is option(d).

Other options are incorrect because the  act done by Jared is against the conduct which is not legal and ethics are moral features which is not present in Jared's act.

You might be interested in
Consider a pipelined than can issue up to one instruction per cycle, but fewer may be issued because of pipeline hazards, multi-
a_sh-v [17]

Answer:

Achieved Instruction per cycle rate is 4.11\times 10^{15}

Solution:

As per the question:

Execution time, t = 1.4 s

No. of instructions being executed, n = 1.8 billion =

Clock speed of CPU, f = 3.2 GHz = 3.2\times 10^{9} Hz

Now, to calculate the actual issue rate achieved:

CPI (Cycle per Instruction) = \frac{t}{n\times f}

CPI = \frac{1.4}{1.8\times 10^{6}\times 3.2\times 10^{9}}

Instruction per cycle is given as the reciprocal of CPI:

Instruction per cycle = \frac{1.8\times 10^{6}\times 3.2\times 10^{9}}{1.4} = 4.11\times 10^{15}

6 0
3 years ago
Consider a three sequentially stepped process named as Process A, Process B and Process C. Input comes into Process A. Output fo
Novay_Z [31]

Answer: The process B is at the maximum steady state. A process is said to be at steady state if the variables that define the behavior of the system are unchanging

Explanation: From the Above

Process A takes 2 minutes per unit and hence can process (60/2) = 30 units per hour. Process B can process only (60/3) = 20 units per hour. Process C can handle (60/1) = 60 units per hour. the steady state output from this system is the smallest of the three, that is process B 20 units per hour

4 0
4 years ago
Please join https://www.blooket.com/play?id=386361<br> blooket
netineya [11]
What is blooket used for..........
7 0
3 years ago
Where do endnotes appear in a document? at the bottom of the page at the top of the page at the end of the document at the end o
vlabodo [156]
It appears<span> at the end the paper.</span>
8 0
3 years ago
TV stations in the U.S. normally broadcast horizontally-polarized signals. Is this TV antenna mounted correctly, or should it be
Marrrta [24]

Answer:basic computer skills

Explanation:

How to passed my test

3 0
3 years ago
Other questions:
  • How to tell if screen or screen protector is cracked?
    5·2 answers
  • Declaring a variable in the method’s body with the same name as a parameter variable in the method header is ___________.
    8·1 answer
  • What is secondary exchange ? - Apex
    14·1 answer
  • What is that black thing on my wall?
    9·1 answer
  • What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
    9·1 answer
  • In creating a professional action plan it's important to
    12·1 answer
  • Complete each sentence
    10·1 answer
  • 4.3 Code Practice: Question 1
    12·2 answers
  • Why do designers of smartphones hide computer processing details from
    14·2 answers
  • Moving images of real event​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!