1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eva8 [605]
3 years ago
9

how to determine if the behavior of a person using technology is a ethical or unethical? Give some examples. ​

Computers and Technology
1 answer:
Natali [406]3 years ago
6 0

Answer:

What is ethical behavior? A person who demonstrates ethical behavior has evidence of a strong moral code and a consistent set of values. Ethics can be rooted in belief or the pursuit of making the world better. Those who exemplify ethical behavior do the right thing regardless of whether they get credit for it.

limit the principles to five so that you can best incorporate them into your daily lives.

Make Things Better. ...

Treat Others Fairly. ...

Consider the Consequences of Your Actions. ...

Respect the Rights of Others. ...

Act with Integrity.

Determining What Is Ethical

Morality is based on duty. When you do the right thing, it is not the outcome of the act that is the measure of its morality, but rather your intent.

An act is moral if it could become a universal rule of society.

On deciding the morality of an act, you must consider the perspective of the doer and the recipient.

Explanation:

Sorry if it's wrong

Source of the information : a book

You might be interested in
Question # 1 Multiple Select Which of the following shows the assignment of a string to a variable? Select 3 options. answer = "
bazaltina [42]

Answer:

answer = input("How old are you?")

Explanation:

Answer is a variable The Input function takes a string

6 0
3 years ago
Read 2 more answers
Some computer engineering students decided to revise the LC-3 for their senior project. In designing the LC-4, they decided to c
Bezzdna [24]

Some computer engineering students decided to revise the LC-3 for their senior project.  KBSR and the DSR into one status register: the IOSR (the input/output status register). IOSR[15] is the keyboard device Ready bit and IOSR[14] is the display device Ready bit can be done in LC-3.

LC-4 is a poor design.

Explanation:

LC-3, is a type of computer educational programming language, an assembly language, which is a type of low-level programming language.

It features a relatively simple instruction set, but can be used to write moderately complex assembly programs, and is a theoretically viable target for a C compiler. The language is less complex than x86 assembly but has many features similar to those in more complex languages. These features make it useful for beginning instruction, so it is most often used to teach fundamentals of programming and computer architecture to computer science and computer engineering students.

The LC-3 specifies a word size of 16 bits for its registers and uses a 16-bit addressable memory with a 216-location address space. The register file contains eight registers, referred to by number as R0 through R7. All of the registers are general-purpose in that they may be freely used by any of the instructions that can write to the register file, but in some contexts (such as translating from C code to LC-3 assembly) some of the registers are used for special purposes.

When a character is typed:

  • Its ASCII code is placed in bits [7:0] of KBDR  (bits [15:8] are always zero)
  • The “ready bit” (KBSR[15]) is set to one
  • Keyboard is disabled -- any typed characters will be ignored

When KBDR is read:

  • KBSR[15] is set to zero
  • Keyboard is enabled
  • Alternative implementation: buffering keyboard input
8 0
3 years ago
To save the changes to the layout of a table, click the Save button on the _____.
kari74 [83]
Quick access toolbar :)))))))))
7 0
3 years ago
Write 4 types of viruses , explain them briefly.
wariber [46]

I can help with two.

Web Scripting Virus, A sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website.

FILE INFECTOR, targeting executable files (.exe), file infector viruses slow down programs and damage system files when a user runs them.

8 0
2 years ago
पुजवय<br>शब्दस्य<br>विरूदायक​
statuscvo [17]

Answer:

के?

Explanation:

5 0
3 years ago
Other questions:
  • Which loan type requires you to make loan payments while you’re attending school?
    9·1 answer
  • Describe how to manage the workspace by putting each feature under the action it helps carry out
    8·1 answer
  • How is a computer component, such as a network card, commonly marked for identification?
    12·1 answer
  • What are the names of the two main characters in pirates of silicon valley
    5·1 answer
  • Which of the following is not something that consumers need to pay attention to order to make rational choices
    6·2 answers
  • Consider a binary-search method in an array that reports whether an object is in the array. The documentation indicates that the
    11·1 answer
  • Which of the following statements is NOT true about url extension?
    10·2 answers
  • I need some help with this assignment. I'm having difficulty trying come up ideas to use here. Can I get any help?
    5·1 answer
  • Organizations following Waterfall methodology usually begin with requirements gathering, in which the development team attempts
    14·1 answer
  • A. In I/O interation between OS and devices, describe how hybrid mechanism works?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!