1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frosja888 [35]
3 years ago
5

In 100 words or less, discuss why ethics is especially important for computer professionals, as it pertains to addressing profes

sional challenges, formulating decisions and policies used to guide actions and as a means to fill the gap between newly created technologies and general legal standards.
Computers and Technology
1 answer:
natali 33 [55]3 years ago
4 0

Explanation:

In every profession, codes of ethics are usually on ground which are designed to guide professionals in carrying out their responsibilities with honesty and integrity.

Ethical codes are very necessary and important for technical managers.

It motivates professionals to carry out their duties well and also provide an education for new employees on how to carry out their professional duties.

A code of ethics tells professionals their responsibilities at the workplace and certain punishments are set in the presence of violations.

This code forbids professionals from having any involvements in deceptive practices. Computer professionals have to make sure that they know their moral responsibilities and they also have to know those to whom they are responsible.

Those Professionals that are involved in the process of data handling and data processing are mostly responsible for their employers and also the public.

For this, there should be guidelines that these professionals must follow. The job of Data handling is a very sensitive one, computer professionals must first be responsible citizens.

The Code of ethics sets limits to the activities of computer professionals. For example, when we talk about data processing, we know how much privacy is needed here. Privacy is a very great concern because there are hackers who are on the lookout to steal your data.

The Code of ethics stops professionals from engaging in discussions about their job outside the workplace. It makes professionals more sincere and also more dedicated to their job. It also helps them take important decisions as well as policy formulations to guide actions. Code of Ethics created an awareness of the legal standards of the company to the professional who works in that company.

You might be interested in
What is the difference between = and == in terms of java..?
sukhopar [10]

= is for assignment, == is for comparison.

So x=2 means: assign the value 2 to the variable x.

and

x==2 means: is variable x equal to 2, yes or no?

3 0
3 years ago
Read 2 more answers
Please give me correct answer<br><br>please give me very short answer​
Anna35 [415]

Answer:

1.A table is a range of data that is defined and named in a particular way.

2.Table tools and layout

3.In insert tab Select the table and select the number of rows and colums

4.Split cell is use to split the data of a cell.Merge cell is used to combine a row or column of cells.

5.Select the cell and click down arrow next to the border button.

5 0
2 years ago
Options to open,save,and print a document are found on which of the following tabs? A.File B.Home C. Design D. Layout
maria [59]

Those options are usually under the "File" tab.

3 0
3 years ago
Read 2 more answers
What development first helped people shape their communities through<br> informed decisions?
uranmaximum [27]

Answer:

The development of a simplified alphabet.

Explanation:

3 0
3 years ago
When you take a multiple-choice test, you are relying on ________, a means of retrieving information out of your long-term memor
miv72 [106K]

Answer:

recognition

Explanation:

<h2><u>Fill in the blanks</u></h2>

When you take a multiple-choice test, you are relying on <u>recognition</u> , a means of retrieving information out of your long-term memory storage system that helps you choose the correct answer.

4 0
3 years ago
Other questions:
  • What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more
    10·1 answer
  • A web client is sending a request for a webpage to a web server. from the perspective of the client, what is the correct order o
    14·1 answer
  • In regard to protective actions for explosive devices, the area where the blast originates is referred to as ___________ perimet
    8·1 answer
  • What is the name of the process that weighs the alternatives, gathers all necessary information, and can ultimately lead you to
    9·2 answers
  • PLEASE HURRY 30 POINTS
    15·2 answers
  • NEED HELP QUICK!!!
    12·1 answer
  • 1 point
    13·1 answer
  • Will economists be replaced by artificial intelligence?
    12·1 answer
  • ______________ are used to store information that will be referenced and manipulated in a computer program. They label data with
    6·1 answer
  • with a ____ the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segreg
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!