1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liberstina [14]
3 years ago
12

Is there such a thing as an ethical reason for unauthorized access to a computer system?

Computers and Technology
1 answer:
OLga [1]3 years ago
6 0

Meaning of key word here is "unauthorized": We don't have access to use the system. But you are try to accessing an Unauthorized system which is illegal, can be ethical. I think, although not legal in point of where you have to decide of right and wrong. Like if you want to getting information from criminals personal file to catch him then i would be right.

Yes if an administrator want to fix a problem something going on in his/her network wrong,then he/she can access the systems which is attached to network. Like if somebody is trying to access your's network or wifi getting password then you can stop to them use ethically,stop her/him system access to attaching your's network.

You might be interested in
If you want to open an application that does not have a tile pinned to the start menu
guapka [62]
Search for it in the start menu. Once you find it, right click and press "Pin to taskbar."
6 0
3 years ago
associate true with the variable has_dups if the list list1 has any duplicate elements (that is if any element appears more than
nordsb [41]

True. If the list contains any elements that appear more than once, then it has duplicate elements and the variable has_dups is True.

What is variable?
Throughout computer programming, a variable is indeed a named container for a specific set of bits or type of data. A variable is indeed an abstract storage location with an associated symbolic name that holds some unidentified quantity of information made reference to as a value. Eventually, a memory address may be used to link or identify a variable. In addition to using the variable name or the variable itself, depending on circumstances, the stored value is typically referenced by the variable name. The name can be used independently of the precise information it represents thanks to the separation of name as well as content. During run time, a value can be bound to an identification number in computer source code.

To learn more about variable
brainly.com/question/29360094
#SPJ1

7 0
1 year ago
Harry is undertaking a digital photography course as the college and wants to
Ludmilka [50]

C. Unconventionally yes it will break down the system potentially causing a virus

4 0
3 years ago
What is “GoF” and how does it relate to design patterns?
tatuchka [14]

Answer:

GOF refers to the gang of four pattern that are generally consider the basic for all the other patterns. Design pattern are basically provide the solution to the software design to resolve all problems that are associated with the development of real world applications.

GOF Design pattern implemented the parts of the re-usable object oriented software applications. The main aim of design pattern is to pass all the structural design pattern. Design pattern is the most powerful and helpful tool for the software developer and architecture.  

3 0
3 years ago
You develop an app, and you don’t want anyone to resell it or modify it. This is an example of: A
Maru [420]

Answer:

C, proprietary software

Explanation:

Proprietary software, also known as non-free software, is computer software for which the software's publisher or another person reserves some rights from licensees to use, modify, share modifications, or share the software. It sometimes includes patent rights.

7 0
3 years ago
Other questions:
  • A geologist is part of what career feild
    6·1 answer
  • Ryan is looking at investment opportunities as a cloud service provider. He wants to invest in a deployment-based cloud model th
    11·2 answers
  • What will happen with communication methods in five years?
    8·1 answer
  • What is process equipment?
    12·1 answer
  • what type of authentication does the dod require to accesss sensitive data on mobile devices and /or email
    7·2 answers
  • Please help it would mean to world to me❤️ (WORD)
    13·1 answer
  • 1. When the Cisco 2950 switch is first turned on, it behaves like a hub. Why is this so, and what must happen before the switch
    5·1 answer
  • Discuss at least 1 Microsoft Windows security features that could protect data?
    5·1 answer
  • Select the correct answer from each drop-down menu. A company is recruiting for a web designer. What kind of candidate should th
    14·2 answers
  • 30 POINTS FOR THE ANSWER
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!