1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Varvara68 [4.7K]
3 years ago
8

Provide one example of how information technology has created an ethical dilemma that would not have existed before the advent o

f I.T.
Computers and Technology
1 answer:
kolezko [41]3 years ago
4 0

Answer:

One of the  top ethical dilemma is privacy issue.

Explanation:

With advent of I.T., personal data are kept in a digital platform which can be vulnerable to security breach. Hacker or other unauthorized parties can find their way to breach the computer system and steal the private information of the user.

Besides, the users' activities of computer machine can also be tracked. This is often happen in a corporate world where some employers tend to monitor their staffs' work performance through the computer. This can be an offence to the privacy of an individual.

You might be interested in
The word ____ at the end of several of the member functions in the accompanying class definition specifies that these functions
aalyn [17]

Answer:

Const.

Explanation:

In C++ programming language, if you wish to have your compiler deny or prevent access to a member function in modifying (changing) a calling object's private member variables in a line of code, you should declare the member as a const function. Therefore, the member function is simply declared as a constant by the compiler.

The word const at the end of several of the member functions in the accompanying class definition specifies that these functions cannot modify the member variables of a clockType object.

4 0
3 years ago
manufacturers are making an effort to build energy-efficient computers and use recyclable cases and packaging true or false
Fittoniya [83]
True would be ur answer

Hope I helped:P
7 0
4 years ago
All of the following are true of using the database approach to managing data except Group of answer choices Decentralized manag
kolezko [41]

Answer:

Decentralized management of data

Explanation:

  • The database management approach is one approach based on the improved standard file solution with the use of DBMS and allows for the stimulus access of data with a large number of users.
8 0
3 years ago
Cindy tried to delete a customer but the customer still had open invoices so the system would not allow her to delete the custom
Verdich [7]

Answer:

The answer is "Referential integrity".

Explanation:

This relates to one aspect of data integrity. Data across multiple tables are linked via relationships. In view of the distinct customer & invoice tables, each invoice table should have the primary key specified throughout the Customer table, for instance. Whenever the invoice table contains a customer ID reference. This ID including its customer will be only a table of the customer.

8 0
3 years ago
A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network v
finlep [7]

Answer:

Network Printer

Explanation:

A network printer is a type of printer that is accessible by network connections, making it available for use by other computers connected to that network. The network can either come from the printer or from a local computer provided to create network for the printer. Most of them contains a network interface card that allow them connect directly to a local network from which computers can then access them. This is different from a local printer that is directly connect to the computer via USB cable.

Network printer is very advantageous in that multiple network computers can access the printer at thesame time.

7 0
3 years ago
Other questions:
  • What precaution can you take while using a social networking site to prevent a data breach?
    15·1 answer
  • This is the main work area of your computer.
    7·1 answer
  • Technician A says that front and rear U-joints on a RWD axle should operate at different angles to prevent vibration. Technician
    10·1 answer
  • Assembly (Procedure and Conditional Processing). For the following program, what are outputs for register EAX, EBX, ECX, and EDX
    11·1 answer
  • Give one example of where augmented reality is used​
    11·2 answers
  • QUESTION 4
    13·1 answer
  • I will give brainliest to the best answer. what is a good screen recorder
    11·1 answer
  • A wireless ________ extender is a network device that enhances transmission of your wireless signal.
    11·1 answer
  • Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authe
    7·1 answer
  • Write a 2 paragraph on an African American who has become successful in IT. Need help asap can’t think of anything
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!