1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alinara [238K]
3 years ago
11

identify at least three additional ethical responsibilities expected from a computer professional. In brief, explain each respon

sibility that you identify.
Computers and Technology
1 answer:
kompoz [17]3 years ago
8 0

The ethical responsibilities for computer professionals are:

Respect Confidentiality.

Maintain professional competence.

Respects and protection of personal privacy.

Explanation:

  • Computer professionals are expected to conduct themselves in an ethical manner.
  • Codes of ethics exist in this field to help these professionals make good decisions about the manner of their professional work.
  • A computer professional must strive to provide the highest quality of work possible by acquiring and maintaining professional competence. He should be knowledgeable in the laws pertaining to his profession and not violate them.
  1. Respect Confidentiality : Confidentiality refers to protecting information from being accessed by unauthorized parties. Only the people who are authorized to do so can gain access to sensitive data. All the security incidents reported in the media today involve major losses of confidentiality.
  2. Maintain professional competence : The capability to perform the duties of one's profession generally, or to perform a particular professional task, with skill of an acceptable quality. Maintaining professional competence allows individuals to learn throughout their career, to develop technical skills, and to keep pace with accountancy changes.
  3. Respects and protection of personal privacy : Privacy computing includes all computing operations by information owners, collectors, publishers, and users during the entire life-cycle of private information, from data generation, sensing, publishing, and dissemination, to data storage, processing, usage, and destruction.

You might be interested in
Raul in Colombia can enter data into a spreadsheet. Olivia in England can access the spreadsheet a few minutes later and use Rau
Mila [183]

True, as long as the application is a cloud-based spreadsheet (like Google Docs or MS Office 365), which allows multiple users in any location to view or edit the data with proper access permissions.

7 0
3 years ago
How to get out of the verify your identity page on a dell laptop because it won’t let me
motikmotik

lol restart te computer and turn it on again

8 0
3 years ago
You can select slide objects in order to delete them simultaneously by pressing the _____ key as you click each object. select o
HACTEHA [7]
D tab that is the key you would need to use in order to do that
6 0
3 years ago
Read 2 more answers
What new england industry quickly collapsed with the discovery of oil in pennsylvania
Elena-2011 [213]

It was the whaling industry.  Whaling use to be the main source of oil that was used for fuel and lighting in America which was based in the coastal communities of New England.  It went into decline when oil was discovered in 1859.  Eventually it replaced whale oil as a source of fuel and life.

6 0
3 years ago
Read 2 more answers
Which of the following costs should be considered when providing your own Web server instead of using a cloud service provider o
jenyasd209 [6]

Answer:

A hardware and software support technician

Explanation:

If you provide your own web server, you also need <em>hardware and software support technicians</em> who will configure, manage, maintain and handle failures.

<em>A Web development team</em> is needed either you own your server or you are on cloud.

<em>The flexible subscription fee that varies upon the resources used </em>is an option in cloud.

<em>The market</em> does not response directly to the decision of server hosting

8 0
3 years ago
Other questions:
  • What is a technology that exists inside another device called
    11·1 answer
  • Generally speaking, mobile sites are good for acquiring new customers and inspiring new relationships while mobile apps are good
    6·1 answer
  • What are the benefits of organizing your thoughts before you begin your speech
    14·1 answer
  • A collection of information stored in an electronic format that can be searched by a computer.
    14·1 answer
  • Discuss trends in cellular data transmission speeds
    15·2 answers
  • The merge sort algorithm____________.A. Can be used only on vectors of even length.B. Works by reducing vectors down to the base
    9·1 answer
  • 5. Compare the telephone network and the internet. What are the similarities? What are the differences?
    12·1 answer
  • All the network nodes are connected to each other
    8·1 answer
  • Discuss five processes for analyzing a qualitative study
    11·2 answers
  • How do we find the time complexity for this algorithm?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!