Question

In: Computer Science

Give me 4 important ethics for students in computer science field should be followe?

Give me 4 important ethics for students in computer science field should be followe?

Solutions

Expert Solution

1. Avoid Plagiarism -  Plagiarism  is an act of copying and publishing another person’s work without proper citation. It’s like stealing someone else’s work and releasing it as your own work.

2. Avoid cracking and Hacking - Hacking  is unlawful intrusion into a computer or a network. A hacker can intrude through the security levels of a computer system or network and can acquire unauthorised access to other computers. Cracking  is a way of breaking into a system by getting past the security features of the system. It’s a way of skipping the registration and authentication steps when installing a software.

3. Avoid using pirated software-  Copyright is a form of intellectual property that gives proprietary publication, distribution and usage rights for the author. This means that whatever idea the author created cannot be employed or disseminated by anyone else without the permission of the author.

4. Take care of Environmental impact and Social impact of using computers -  Environmental Impact – Environment has been affected by computers and the internet since so much time spent using computers increases energy usage which in turn increases the emission of greenhouse gases. There are ways where we can save energy like limiting computer time and turning off the computer or putting on sleep mode when not in use. Buying energy efficient computers with Energy Star label can also help save the environment.

Social Impact – Computers and the internet help people stay in touch with family and friends. Social media has been very popular nowadays. Use social media and computers judiciously for the benefit and well-being of mankind.


Related Solutions

Describe what are sorting and searching, and why are they essential in a computer science field....
Describe what are sorting and searching, and why are they essential in a computer science field. Give two examples when sorting and searching are necessary in designing software applications. Describe three different types of existing sorting algorithms and two types of searching algorithms. Justify, compare and contrast your choice of sorting and searching algorithms. Include one example of sorting or searching program. You may use a program you discover on the Internet as an example. Please make sure to give...
If computer and information science are foundational to nursing informatics, should computer and information literacy be...
If computer and information science are foundational to nursing informatics, should computer and information literacy be a requirement in all nursing programs at all levels? Why or why not?
For Networks in Computer Science, please tell me about: a.)   The responsibilities of the data link...
For Networks in Computer Science, please tell me about: a.)   The responsibilities of the data link layer? b.)   What is a frame? c.)   How does the byte count method for framing work? d.)   What is byte stuffing? e.)   How do the FLAG and ESC bytes work?
I'm in a computer science course and I have an assignment that asks me to implement...
I'm in a computer science course and I have an assignment that asks me to implement a CPU scheduler in Java. Here are some details for the task: The program should ask for the number of processes. Then the program will ask for burst and arrival times for each process. Using that information, the program should schedule the processes using the following scheduling algorithms: First Come First Serve (FCFS) Shortest Jobs First (SJF) Shortest Remaining Time First (SRTF) The output...
You are one of the top students in your university’s computer science program of 200 students....
You are one of the top students in your university’s computer science program of 200 students. You are surprised when you are met after class by two representatives from a federal intelligence agency. Over dinner, they talk to you about the increasing threat of cyberterrorist attacks launched on the United States by foreign countries and the need to counter those attacks. They offer you a position on the agency’s supersecret cyber terrorism unit, at a starting salary 50 percent higher...
i want to write research paper in the field of computer science but cant decide the...
i want to write research paper in the field of computer science but cant decide the topic for that plz help me.
What is an algorithm? Why is it important in the field of computer programming?
What is an algorithm? Why is it important in the field of computer programming?
Ethics question for a Computer Science person or Engineer The Health Insurance Portability and Accountability Act...
Ethics question for a Computer Science person or Engineer The Health Insurance Portability and Accountability Act (list all that applies) A. ensures that a consumer can sue doctors and hospitals for medical malpractice. B. attempts to limit the exchange of information among health care providers to that information necessary to care for the patient. C. ensures that a consumer can keep the same health care provider even when he or she changes employers. d. ensures that doctors and hospitals can...
The head of a computer science department is interested in estimating the proportion of students entering...
The head of a computer science department is interested in estimating the proportion of students entering the department who will choose the new computer engineering option. A preliminary sample indicates that the proportion will be around 0.208. What size sample should the department head take if she wants to be 95% confident that the estimate is within 0.02 of the true proportion?   
who can give me the example like this:(also give me the answer,Tell me what formula should...
who can give me the example like this:(also give me the answer,Tell me what formula should use to calculate and how to use those formulas.)thank you Known: risk profolio. expect return and variance of stock A. expect return and variance of stock B. The yield correlation coefficient of two stocks. Risk combination characteristics Question: expect return. variance. Build a complete portfolio according to the investor's requirements. How many should investors invest in risk portfolios and security assets(T-bill). Calculating the sharp...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT