1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liberstina [14]
3 years ago
12

Is there such a thing as an ethical reason for unauthorized access to a computer system?

Computers and Technology
1 answer:
OLga [1]3 years ago
6 0

Meaning of key word here is "unauthorized": We don't have access to use the system. But you are try to accessing an Unauthorized system which is illegal, can be ethical. I think, although not legal in point of where you have to decide of right and wrong. Like if you want to getting information from criminals personal file to catch him then i would be right.

Yes if an administrator want to fix a problem something going on in his/her network wrong,then he/she can access the systems which is attached to network. Like if somebody is trying to access your's network or wifi getting password then you can stop to them use ethically,stop her/him system access to attaching your's network.

You might be interested in
What is the approximate time and death in Sherlock Holmes
kati45 [8]

Answer: 8:58.5204 o'clock a.m

:)

3 0
2 years ago
Read 2 more answers
What was the first computer programming language?
diamong [38]

Answer:

The answer is B.COBOL

Explanation:

I took AP EX quiz.

5 0
2 years ago
What is meant by astigmation​
andrey2020 [161]

Answer:

It is a condition where the eye isn't completely round

Explanation:

5 0
3 years ago
Read 2 more answers
A timestamp is three numbers: a number of hours, minutes and seconds. Given two timestamps, calculate how many seconds is betwee
Sonja [21]

hhd fyi ou dfi gd sdi bvb s ujj gr TX cfg y CD vi if dnainfo unlocks Toronto Yazidi

7 0
2 years ago
The Program Manager just received approval of his proposed acquisition strategy with one exception: he has been directed to make
Llana [10]

Answer: The options related to your question is missing below are the missing options

-Use metrics to manage

-Use system based software design

-Assess reuse risks and cost

-Inspect requirements and design

answer:

Assess reuse risks and cost ( option 3 )

Explanation:

The best software acquisition practice that is most applicable to his situation is : Assess reuse risks and cost

The reuse of technology, code and infrastructures will help reduce the risks or wastage of available resource. and  also saving cost for the firm as well.

3 0
2 years ago
Other questions:
  • The _____ function calculates the average of values in a range that match criteria you specify.
    14·1 answer
  • URGENT!!!
    13·2 answers
  • C - Language Write three statements to print the first three elements of array runTimes. Follow each statement with a newline. E
    12·1 answer
  • If you press the Tab key when you're in in the last cell of a table,
    10·2 answers
  • 2. Which of the following statements accurately describes enzymes? A. Enzymes increase the activation energy of reactions. B. Te
    5·1 answer
  • A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in
    12·1 answer
  • Free wifi is typically offered on an <br> a) unencrypted<br> b) encrypted<br> c) open<br> d) private
    14·2 answers
  • SOLVE IN C:
    10·1 answer
  • Select the correct answer.
    10·1 answer
  • True or False? Using your traffic analytics report, you can see the source of traffic to your website
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!