Complete an essay discussing ethical theories and their

Assignment Help Basic Computer Science
Reference no: EM13956567 , Length: 1850 Words

Complete an essay discussing ethical theories and their relevance to the ICT industry. In the essay, consider 'rights' vs 'virtue', 'relativist' vs 'objectivist' and 'consequentialist' vs 'deontology' and how they relate to professional codes of ethics and practice (eg. ACS, ACM, or IEEE Computing). You should make sure to discuss how they would assist with resolving an ethical question.

Make sure to:

1. Describe each theory. 
2. Compare and contrast theories. 
3. Clearly state a professional code of ethics. 
4. Comment on the connection between the code and the theories.

You must use the Harvard technique to cite your references within the essay.

You are to present a 5 minute discussion of your paper to the class.

Your essay must include:

Introduction: (Introduction to the topic, a statement of the purpose of the paper and a brief description of the paper's structure.)

Body: (Discuss, compare and/or contrast different perspectives, present arguments supporting the purpose of the paper)

Conclusion: (A summary of the points you have made in the body of the paper. These should match your stated purpose.)

The paper will need to be 2000 words to cover the topic. A minimum of 1600 words is needed to pass.

Reference no: EM13956567

Questions Cloud

How may this affect the marital deduction : By will, D left Blackacre to A for life, remainder to B. D's residuary estate was left to S, D's spouse. Both A and B effectively, under Section 2518 disclaimed their interests in Blackacre. How may this affect the marital deduction for D's estate? U..
Would not appear in the statement for those flows : Would not appear in the statement For those flows you identified as operating, indicate whether the amount would have been added to or subtracted from net income in the operating portion of the statement of cash flows knowing it was prepared using th..
What is the probability that the cafeteria serves meat leaf : Suppose that the chance of rain tomorrow is 60%. What is the probability that John will practice his piano lesson?
Differences between the bond coupon rate : A loan officer states, "Thousands of dollars can be saved by switching to a 15-year mortgage from a 30-year mortgage." Calculate the difference in payments on a 30-year mortgage at 9% interest versus a 15-year mortgage with 8.5% interest. Both mor..
Complete an essay discussing ethical theories and their : Complete an essay discussing ethical theories and their relevance to the ICT industry. In the essay, consider 'rights' vs 'virtue', 'relativist' vs 'objectivist' and 'consequentialist' vs 'deontology' and how they relate to professional codes of ethi..
What should be the radius of the circular bottom hole : A 12 hour water clock is to be designed with the dimensions shaped like the surface obtained by revolving the curve y = f(x) around the y-axis. What should be this curve, and what should be the radius of the circular bottom hole, in order that the..
When interpreting parties rights-obligations under contract : When interpreting the parties' rights and obligations under a contract, courts look to the terms of the contact are must follow the plain meaning of the words used in the contract. Discuss how past "course of dealing" between the parties as well as "..
Networking project for computer with all network components : Can I get a sample networking project for 20 computer with all network components?
Potential legal ramifications of granting : On what grounds did the corporation base its arguments? Why did the court conclude that a corporation was a "person" for purposes of the law? How was such a conclusion reached? What are the potential legal ramifications of granting the status of "..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Design process

You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists to check customers in quickly. They would like for the system to allow customers to self-check-in ..

  Determine the highest bit rate possible for a circuit

1. Determine the number of conditions possible for a binary code

  Different types of computer systems

Finally, review different types of computer systems. Make recommendations on the types (you do not need to include brands or specifications) of computers that will help the employees and suppliers better use the system

  Design analog circuit using transistor

Construct the circuit shown in Figure 1 below with the parameters shown in the circuit.

  Purpose and functions of software module

You are creating a family budget for the year, using a spreadsheet application. Which is the best category of software to apply here? Select Yes or No for each option.

  Find the largest storage capacity design

Find the tallest water tower design, h . Find the largest storage capacity design. Find four other Pareto solutions that are significantly different from any other design you have obtained. How do you compare your designs to decide the extent to whic..

  Concise statement of the nature of the project

A brief description (a paragraph of 100-200 words) providing the project background/context. e.g. is it based on a business need? a technical need? does it arise from the interests of a particular person/company?

  Explain effects of compaction on normal processing

What about if you upgrade to memory that can be read or written to in 1nsec? Comment briefly on the effects of compaction on normal processing.

  Common types of policies for web services

What are the most common types of policies for Web services? 12.2 What are the main components of WS-Policy Framework?

  Pseudocode

Allow the user to enter a series of temperatures in degrees Celsius (C) terminated by the input of - 999. For each one, find the corresponding temperature in degrees Fahrenheit (F). The conversion formula is:

  Consider a variant of cbc-mode encryption

Consider a variant of CBC-mode encryption where the sender simply increments the IV by 1 each time a message is encrypted (rather than choosing IV at random each time). Show that the resulting scheme is not CPA-secure.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd