1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frosja888 [35]
3 years ago
5

In 100 words or less, discuss why ethics is especially important for computer professionals, as it pertains to addressing profes

sional challenges, formulating decisions and policies used to guide actions and as a means to fill the gap between newly created technologies and general legal standards.
Computers and Technology
1 answer:
natali 33 [55]3 years ago
4 0

Explanation:

In every profession, codes of ethics are usually on ground which are designed to guide professionals in carrying out their responsibilities with honesty and integrity.

Ethical codes are very necessary and important for technical managers.

It motivates professionals to carry out their duties well and also provide an education for new employees on how to carry out their professional duties.

A code of ethics tells professionals their responsibilities at the workplace and certain punishments are set in the presence of violations.

This code forbids professionals from having any involvements in deceptive practices. Computer professionals have to make sure that they know their moral responsibilities and they also have to know those to whom they are responsible.

Those Professionals that are involved in the process of data handling and data processing are mostly responsible for their employers and also the public.

For this, there should be guidelines that these professionals must follow. The job of Data handling is a very sensitive one, computer professionals must first be responsible citizens.

The Code of ethics sets limits to the activities of computer professionals. For example, when we talk about data processing, we know how much privacy is needed here. Privacy is a very great concern because there are hackers who are on the lookout to steal your data.

The Code of ethics stops professionals from engaging in discussions about their job outside the workplace. It makes professionals more sincere and also more dedicated to their job. It also helps them take important decisions as well as policy formulations to guide actions. Code of Ethics created an awareness of the legal standards of the company to the professional who works in that company.

You might be interested in
Explain external interface bus
DaniilM [7]

External buses are data buses used by computers to communicate with peripheral devices to their processors, similarly to internal buses used to link computers to peripherals. Despite the fact that it is capable of establishing connections, transporting information, and providing commands to the computer.

<em>Hope this helps :)</em>

4 0
2 years ago
What is the advantage of utilizing trees as a data structure? Describe a scenario where you may use either a linear data structu
puteri [66]

Answer:

The tree data structure provides more flexibility and practicality.

Explanation:

The tree data structure is more advantageous because of it's practicality in terms of forming relationships within the data.

A tree data structure would be preferable for an e-commerce website or database because it provides the ability to be able to links different products and group them under sub categories etc. Basically it makes a more reliable database in this situation.

I hope this answer helps.

5 0
3 years ago
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in
Nataliya [291]

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
6 0
3 years ago
HELP!!! What would var d=?
sergiy2304 [10]

Answer:

51015

Explanation:

Var b is a string, and it'll treat addition like <em>string concatenation </em>(aka just adding a message.) Since it's concatenation, it'll then turn the numbers/integers into strings.

This kind of behavior might be different depending on the language, though. Some languages might not allow this. (For example, C and C++)

7 0
3 years ago
What are some of the challenges that could arise from setting up a file management system on a computer?
son4ous [18]
It could glitch out or be hacked or deleted.
8 0
3 years ago
Other questions:
  • When reading data across the network (i.e. from a URL) in Python 3, what string method must be used to convert it to the interna
    9·1 answer
  • Which of the following is a valid SQL statement? a. c.customer#, order#, orderdate, shipdate FROM customers c NATURAL JOIN order
    13·1 answer
  • Word Online works exact same as the downloaded Office 2016 version.<br>True<br>False​
    7·1 answer
  • For a class project, Jerome builds a simple circuit with a battery and three light bulbs. On his way to school, Jerome drops his
    9·1 answer
  • Given the following code, what are the dimensions, in pixels, of the shape created? import tkinter class myShape: def __init__(s
    6·1 answer
  • In this problem, you will fill in the code for a function count_digits(val) that takes a positive integer, val, and returns a li
    12·1 answer
  • What happens in the process represented by the flowchart ?
    14·1 answer
  • Accessing disk is much slower than accessing memory. As a result, many file systems have been designed with various optimization
    7·1 answer
  • Bitmap images are ________ into different software applications.
    9·1 answer
  • Javier is asked to explain to IT management as to why he is suggesting replacing the existing company firewall. Javier states th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!