1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alinara [238K]
4 years ago
11

identify at least three additional ethical responsibilities expected from a computer professional. In brief, explain each respon

sibility that you identify.
Computers and Technology
1 answer:
kompoz [17]4 years ago
8 0

The ethical responsibilities for computer professionals are:

Respect Confidentiality.

Maintain professional competence.

Respects and protection of personal privacy.

Explanation:

  • Computer professionals are expected to conduct themselves in an ethical manner.
  • Codes of ethics exist in this field to help these professionals make good decisions about the manner of their professional work.
  • A computer professional must strive to provide the highest quality of work possible by acquiring and maintaining professional competence. He should be knowledgeable in the laws pertaining to his profession and not violate them.
  1. Respect Confidentiality : Confidentiality refers to protecting information from being accessed by unauthorized parties. Only the people who are authorized to do so can gain access to sensitive data. All the security incidents reported in the media today involve major losses of confidentiality.
  2. Maintain professional competence : The capability to perform the duties of one's profession generally, or to perform a particular professional task, with skill of an acceptable quality. Maintaining professional competence allows individuals to learn throughout their career, to develop technical skills, and to keep pace with accountancy changes.
  3. Respects and protection of personal privacy : Privacy computing includes all computing operations by information owners, collectors, publishers, and users during the entire life-cycle of private information, from data generation, sensing, publishing, and dissemination, to data storage, processing, usage, and destruction.

You might be interested in
What is a web browser​
motikmotik

Answer:

web browser

Explanation:

.........;)

4 0
3 years ago
1) List at least five smaller behaviors you could break the complex behavior "brushing my teeth" into.
zhuklara [117]
Q1:
1. Go into the bathroom
2. Put toothpaste on the toothbrush
3. Place head of toothbrush on your teeth
4. Revolve in small circles
5. Repeat 4 for all of your teeth
6. Use water to wash away the toothpaste in you mouth
5 0
3 years ago
Read 2 more answers
Understanding the context of information allows you to apply it to everyday situations as opposed to just___facts like names,dat
posledela
Dates best choice I would pick it
5 0
3 years ago
A7DF is the hexadecimal representation for what bit pattern?
kipiarov [429]

Answer:

1010 0111 1101 1111

Explanation:

A = 10 in decimal = 1010 in binary

7 = 7 in decimal = 0111 in binary

D = 13 in decimal = 1101 in binary

F = 15 in decimal = 1111 in binary

Therefore 0xA7DF = 1010 0111 1101 1111 in binary

6 0
3 years ago
In which career field, would the computing technology industry Associates CompTIAA+ certification be useful?
laila [671]

Answer:

It technical support specialist

3 0
3 years ago
Other questions:
  • The wires that transfer data across the motherboard are known as the
    9·1 answer
  • As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly training her new hires. There are over 40 di
    15·1 answer
  • In the context of web and network privacy, an acceptable use policy is _____.
    15·1 answer
  • Adele’s mother owns a Daycare and she wants to learn all about this business, to help her mom and own it one day. Which CTSO sho
    9·1 answer
  • You are managing a global news website which has a very high traffic. To improve the performance, you redesigned the application
    10·1 answer
  • Need some personal advice here.
    12·2 answers
  • 9. Differentiate between bolding and highlighting<br>text.<br>(2 marks)​
    15·2 answers
  • Imagine that you are preparing a multimedia presentation. What are the four things you need to consider when getting started?
    14·2 answers
  • 3. When code tracing, why is it important to iteratively test parts of the program?
    8·1 answer
  • What dose a hard drive do
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!