Chief executive officer of a silicon valley software company

Assignment Help Basic Computer Science
Reference no: EM131219847

As the chief executive officer of a Silicon Valley software company, you become aware that your chief competitor is working on a new computer program that will revolutionize interactive voice-based applications. You know that if you can find out about several key functions relating to your competitor's program, your own programmers can duplicate the function of the program without actually copying its code.

  • Is it ethical for you to hire away from your competitor a secretary who may have overheard something will be useful to you?  (Why or why not?  Explain.)
  • Is it ethical for you to send an attractive employee to a bar where your competitor's programmers hang out in the hope of getting information you want?  Why or why not?
  • Is it ethical for your to have someone hunt up and read everything published by your competitor's programmers in case they may have let slip something that will help you?

Reference no: EM131219847

Questions Cloud

Purchasing and materials management : To a great extent, purchasing and materials management is becoming a strategic business function. Explain why this is true. (150-200 words)
Discussion on editing and revising : Discussion : Editing and Revising-  Describe your revision process. - What strategies do you use when you edit and revise?
Difference between leadership and management : Write a 1,050- to 1,400-word paper in which you articulate the difference between leadership and management using the following criteria:
What coping skills may help the client remain sober : What new activities could the client participate in to help replace old behaviors such as going out with his friends, for a drink, etc. after work? How many? How often? How would Jed's family be involved in his relapse prevention plan?
Chief executive officer of a silicon valley software company : As the chief executive officer of a Silicon Valley software company, you become aware that your chief competitor is working on a new computer program that will revolutionize interactive voice-based applications.
The problem is on the treatment of special need children : The problem is on the treatment of special need children. many societies and communities in our country and even internationally do not recognize or even appreciate the presence of needy children.
Improvement of products and service delivery : How does recorded data contribute to the problem-solving process and to continuous improvement of products and service delivery?
Calculate cardinal corporation total assets : Cardinal Corporation reported the following information at December 31, 2012: Accounts payable $400,000 Dividends paid $100,000 Cash $100,000 Expenses $600,000 Inventories $700,000 Revenue $750,000. Calculate Cardinal Corporation's total assets. Calc..
Find the trigonometric fourier series coefficient : Give an expression for the signal in the interval 0

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  What are influences of politics and culture on dss design

What are the influences of politics and culture on DSS design?

  Commands performs:a) dim raccoon(17) as string

1) Briefly describe what each of the following commands performs:a) Dim Raccoon(17) As String  b) Dim RxData() as Double

  High levels of disposable income

Today the teen market is a very desirable market segment since teenagers set trends and have high levels of disposable income.

  Process for information systems management for organization

Describe the process for Information Systems Management for any organization using clear example.

  What is structured query language

What is structured Query Language? Write the SQL command for deleting tuple(row) from the database?

  What are some typical uses for complex event processing

What are some typical uses for complex event processing applications? Give examples and elaborate on the possibilities. Find the date of the BTC stock when closing price is greater than 0.1 and less than 20.

  Calculate the day of the week for that date

If the user enters garbage or the wrong number of digits, we expect the output to be garbage - The calendar has changed over the centuries

  Beat the hacker-audits and assessments

Provide a least two examples of security knowledge that would assist you in preparing for or preventing a threat. Explain the time-sensitive nature of the knowledge.

  Can we characterize the shapes of these regions

Can we characterize the shapes of these regions?

  Write an application that prints the following diamond shape

Write an application that prints the following diamond shape. Don't print any unneeded characters. (That is, don't make any character string longer than it has to be.)

  Electronic evidence admissible

Identify and discuss the steps necessary to make electronic evidence admissible in court.

  Security policy framework

You will create an organizational security plan policy using your assigned readings (pay close attention to Chapter 3 in the Building an Effective Information Security Policy) as well as the Cybersecurity Framework  as a resource, creating a two ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd