Detail potential results or outcomes for you IT professional

Assignment Help Basic Computer Science
Reference no: EM132380179

Please write a position paper (with the following format: Arial, 11 point size, 1.5 line spacing, and 500 - 600 words minimum) to analyze ONE of the following scenarios. In your paper, take a position on how you would correctly handle the scenario you chose, specifically, please address the following:

Identify and explain in detail what the ethical issue is presented in the scenario you selected.

Explain in detail the potential results or outcomes for you the IT professional and for the person in question if the ethical issues are not addressed?

What are the correct options or solutions that you should address or provide to properly rectify the scenario?

Please submit the assignment on or before the due date.

Case 1: You are an intern at a major corporation. Your primary job is to maintain high ranking administrators' computers including cleaning and removing viruses, cleaning up files using company provided tools, and defragmenting disks. During your maintenance you have noticed that the Chief Operating Officer's (COO) computer contains some pornographic images and movies. You also know that the Chief Operating Officer is a close friend of your immediate supervisor who also reports to the COO. What is your course of action in this scenario?

Case 2: You work as a part-time network administrator to create and maintain user accounts. One of your colleagues constantly asks you to cover his shift so he can leave early by not only offering you the additional hours you're covering for him, but a couple extra hours for being a team player. What is your course of action in this scenario?

Case 3: You work as a full-time programmer in a small software development company. Your friends at a nearby corporation always invite you for lunches or happy hours with them. You want to maintain friendship with them so they may give you information on job openings at their firm. Your company offers a half-hour lunch time and most happy hours begin at 4:00 pm while your working hours end at 5:00 pm. What is your course of action in this scenario?

Case 4: You are a full-time information security analyst. The Anonymous group contacted you and is offering you $1,000 in bit coins every week to send daily security log files to them that have information embedded in the logs that you don't think is important to anybody. What is your course of action in this scenario?

Case 5: You work in a data center as a backup and restore specialist. The company you work for is under investigation and certain backup files and logs are needed to facilitate this investigation. You are requested by a manager two levels above you, who is under investigation, to say those files were corrupt and unavailable and they have indicated they would make it worth your while to do so. What is your course of action in this scenario?

Case 6: You work as a technician at a major record company. Your friends ask you to occasionally download songs that you have access to via the record company onto a USB thumb drive and send them to them when you get home. What is your course of action in this scenario?

Case 7: You work in a school as a computer technician. You are also enrolled in the same school as a student. You get a new job in the IT department for a different company and you quit your current job at your school. When you are in class you noticed that your previous supervisor at the school didn't change the administrator password and the computer class' desktop computers are missing an application that should have been installed. What is your course of action in this scenario?

Case 8: You work at a company as a computer technician. You notice that some of the computer hardware inventory including monitors, RAM, storage drives, projectors, etc., are missing or contain unexpected items. In particular, you notice that instead of having eight 8GB memory modules in your inventory, you have eight 4GB memory modules. You also notice that instead of two Intel Xeon processors, you have three AMD processors. You suspect that your immediate supervisor has modified the inventory and descriptions of some of the items in the database. What is your course of action in this scenario?

Reference no: EM132380179

Questions Cloud

Briefly describe your healthcare organization : Briefly describe your healthcare organization, including its culture and readiness for change. (You may opt to keep various elements of this anonymous).
Draw the IPO model and explain its purpose : Draw the IPO model and explain its purpose. What are necessary and relaxed assumptions? What is complexity and how can we reduce it
By what date must he make his ira contribution to qualify : On April 15, Year 2, Mr. Thomas filed Form 4868, Application for Automatic Extension of Time to File, extending the due date for filing his Year 1 income tax.
Which type of dissemination strategy you might use : As your EBP skills grow, you may be called upon to share your expertise with others. While EBP practice is often conducted with unique outcomes in mind.
Detail potential results or outcomes for you IT professional : Explain in detail the potential results or outcomes for you the IT professional and for the person in question if the ethical issues are not addressed?
The payment of interest and related amortization : Sandhill Company issued $444,000 of 10%, 20-year bonds on January 1, 2020, at 102. Interest is payable semiannually on July 1 and January 1.
What are the six measures of success according to Nelson : What are the six measures of success according to Nelson? What are the two competing views of SDLC? (Disciplined versus Agile) Explain Incremental
Make the may transactions and jornalise them : Billed a customer, Deer Fern Inc., $1,250 for golf fees earned. Deer Fern Inc. paid $200 and agreed to pay the remaining amount owing in 10 days.
Parepare a simplified balance sheet and income statement : Parepare a simplified balance sheet, income statement and statement of cash ?ows from the Transaction Table. Create a Transaction Table for the given events.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd