Being an ethical student of networking technology

Assignment Help Computer Network Security
Reference no: EM131519286

Assessment - Essay and Power Point on Ethical issues

The purpose of this assignment is to develop skills in research, critical analysis and academic writing of high standard. In this assignment students will:

- Identify potential ethical and social issues related to IT administration ethics.
- Discuss ethical and social issues pertaining to ITsystems'-`administration.
- Interpret professional codes of ethics developed by various industry bodies.
- Discuss ethical behaviour in accordance with professional codes.
- Explain ethical solutions toensure that the society benefits.

Students must be able to generate ideas at abstract levels and support their arguments with strong reasoning. Students must strengthen critical thinking skills by answering the assignment.

Assignment Description

A) Write an essay on one of the following topics. 800 - 1500 words

B) Prepare a PowerPoint presentation based on the above essay. 4 - 6 Slides

C) A five-minute presentation of the above in your Laboratory Class in Week 12.

For referencing, use APA or IEEE guidelines, but consistently.

Your topic is the one listed below based on the last digit of your student ID at MIT.

Topic

0) Being an ethical IT Professional

1) Being an ethical student of Networking Technology

2) The importance of Professional Ethics

3) How to conduct Ethical Research

4) Ethical issues related to the content available over the Internet

Reference no: EM131519286

Questions Cloud

Do you feel that trumps growth proposals are realistic : What do you like and dislike about Trump's spending and tax plan. Do you feel that Trump’s growth proposals are realistic?
Calculate stockholders equity at the end of the period : Eagle Corp. operates Magnetic Resonance Imaging (MRI) clinics throughout the Northeast. At the end of the current period, the company reports the following.
Porter value chain and five forces models : Read the Starbucks' case study. This case study uses Porter's Value Chain and Five Forces models and a SWOT (strengths-weaknesses-opportunities).
Calculate net loss : Cougar's Accounting Services provides low-cost tax advice and preparation to those with financial need. At the end of the current period, the company reports.
Being an ethical student of networking technology : Prepare a PowerPoint presentation based on the above essay - Being an ethical student of Networking Technology
How do gay men and lesbians perform as parents : How do gay men and lesbians perform as parents compared to heterosexual couples (i.e., do they have comparable parenting skills
Discuss the account balances for cowboy law firm : Below are the account balances for Cowboy Law Firm at the end of December.
Prepare statement of stockholders equity at end of year : At the beginning of the year (January 1), Buffalo Drilling has $10,000 of common stock outstanding and retained earnings of $7,200.
Exclusively online are often able to sell products : Large companies that sell exclusively online are often able to sell products for less money than their competitors who have brick.

Reviews

len1519286

6/6/2017 2:51:03 AM

Grade Mark HD 80-100% DI 70-79% Excellent Very Good Introduction All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Identification Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstrated excellent ability to think critically but did not source reference material appropriately Analyse Logic is clear and easy to follow with strong arguments Consistency logical and convincing Evaluate/justification Excellent use of creditable sources. Accurate referencing. Obvious that outstanding effort made Extremely good effort Conclusion Logic is clear and easy to follow with strong arguments Consistency logical and convincing Reference style Clear styles with excellent source of references. Clear referencing style

len1519286

6/6/2017 2:50:54 AM

Aspects Essay PowerPoint Presentation Comments Introduction /2 /2 /1 Identification /4 /4 /2 Analyse /4 /4 /2 Evaluate/justification /4 /4 /2 Conclusion /4 /4 /2 Reference style /2 /2 /1 Total /20 /20 /10

len1519286

6/6/2017 2:50:46 AM

Aspects to be included in each answer Description of the section % Introduction Introduce the ethical issues 10 Identification Identify the most important ethical issues 20 Analyse Analyse above identified issues 20 Evaluate/justification Evaluate the issues and write justification of your evaluation 20 Conclusion Write clear conclusion 20 Reference style Follow APA or IEEE reference style 10 Total 100

len1519286

6/6/2017 2:50:39 AM

• All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Topic Last Digit of your MIT ID 0) Being an ethical IT Professional 0 or 5 1) Being an ethical student of Networking Technology 1 or 6 2) The importance of Professional Ethics 2 or 7 3) How to conduct Ethical Research 3 or 8 4) Ethical issues related to the content available over the Internet 4 or 9

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd