1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
3 years ago
5

Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario,

Jared’s actions are considered _____. a. legal and ethical b. unethical, but legal c. ethical, but illegal d. illegal and unethical
Computers and Technology
1 answer:
sladkih [1.3K]3 years ago
5 0

Answer: d) Illegal and unethical

Explanation:  Illegal term is used for the something that is incorrect according to regulation.The legal factor is not present in this type of activity and thus it is judged by the regulations as unauthorized act and can be concluded as act of crime .

Unethical term defines that something is incorrect in a moral way and the person doing the unethical activity lacks the principles in his/her nature.

Jared is also performing illegal act by selling the piracy  antivirus package of software .The act is unethical as well because Jared is lacking the basic morals e.g.-stealing is offensive and incorrect act.Thus the correct option is option(d).

Other options are incorrect because the  act done by Jared is against the conduct which is not legal and ethics are moral features which is not present in Jared's act.

You might be interested in
We want to implement a data link control protocol on a channel that has limited bandwidth and high error rate. On the other hand
Korolek [52]

Answer:

Selective Repeat protocols

Explanation:

It is better to make use of the selective repeat protocol here. From what we have here, there is a high error rate on this channel.

If we had implemented Go back N protocol, the whole N packets would be retransmitted. Much bandwidth would be needed here.

But we are told that bandwidth is limited. So if packet get lost when we implement selective protocol, we would only need less bandwidth since we would retransmit only this packet.

6 0
3 years ago
Emma is creating a database to track sales. She wants to be able to sort by price and sales associate. And she would like to loo
alexira [117]

Barcode number, description, price, and sales associate.

5 0
3 years ago
Read 2 more answers
How do you know a resource is credible
Alisiya [41]

Answer:

There are several main criteria for determining whether a source is reliable or not.

1) Accuracy. Verify the information you already know against the information found in the source

2) Authority. Make sure the source is written by a trustworthy author and/or institution

3) Currency

4) Coverage

Explanation:

5 0
3 years ago
⡯⡯⡾⠝⠘⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢊⠘⡮⣣⠪⠢⡑⡌
KiRa [710]

Answer:

nice................

7 0
3 years ago
Read 2 more answers
How I can learn writing code?
slavikrds [6]

A good website to learn coding is called Lynda.com. It costs money but its well worth it!

3 0
3 years ago
Read 2 more answers
Other questions:
  • "Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequen
    5·1 answer
  • This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while
    8·1 answer
  • Where is your network strongest? Where is it weakest? How have you developed your network thus far? How has that influenced who
    5·1 answer
  • Write a for loop that sets each array element in bonusScores to the sum of itself and the next element, except for the last elem
    11·2 answers
  • Can Anyone put my name in binary code using these images? Bentley is my name
    8·1 answer
  • When Tim Berners-Lee developed the first specifications, protocols, and tools for the World Wide Web in 1993, his employers at C
    12·1 answer
  • Help please thanks...........
    13·1 answer
  • What type of media is a hard disk​
    9·1 answer
  • Write a recursive function is_pow2(n) that returns True if the positive integer n is an integer power of 2, and False otherwise.
    9·1 answer
  • Keli is unable to find a shape that meets her needs. Which feature in Power Point should she use to create shapes that are compl
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!