Describe your thoughts about what professionalism would mean

Assignment Help Computer Engineering
Reference no: EM131264426

Assignment

A career in IT requires an understanding of the various technologies that compose a computing environment. Managing computer hardware and software is the first step. Whether you are an IT project manager, administrator (computer system, database or network), systems analyst, network specialist, software developer, digital investigator or security analyst, there may be a time when you need to administer your system, or help others administer theirs.

Please refer to the following for information about accessing and using LabSim:

• Getting Started with LabSim- https://www.testout.com/home/student-resources/how-to-tutorials
• LabSim Navigation

Click on the followiung link for the instructions for the Unit 5 Lab tasks.
https://resources.careered.com/LCMSFileSharePreview/Resources/AdobePDF/ITCO101-unit5-lab-2016.pdf

Prepare a Word document that contains 1-2 pages of information summarizing your thoughts about the following bullets.

• Explain the relationship between "code of ethics" and "professionalism" in an IT environment.

• Describe your thoughts about what "professionalism" would mean to someone who is in the role of network administrator. How would that compare to someone who was a systems analyst or a programmer?

• There are often reports of unprofessional acts by someone in IT that have significant implications for organizations. Research reports of unprofessional behavior by someone in IT and discuss whether their behavior was unethical, illegal, or socially responsible. One such example would be data theft by an employee. One example of this type of unprofessional behavior could be found here. You can find other examples at this website.

• Discuss an example situation of someone in an IT role that lacked professionalism or violated a "code of ethics". Identify whether your example was socially, ethically or legally irresponsible.

Prepare your work in a Word document using Times New Roman 12 point font, APA style (title page, abstract, citations, and references) with valid scholarly resources.

Reference no: EM131264426

Questions Cloud

Differentiate between security policies and standards : Describe and differentiate between security policies, standards, and guidelines. Discuss how these security policies, standards, and guidelines will be used in your semester project.
Discuss history of the internet and the impact it has had : Discuss the history of the Internet and the impact it has had on professional development. What social, ethical, and legal issues emerged due to the Internet as it evolved over the years?
Expected to return to the team to begin play for the fall : Facts: Your client, a German named Werner visited his brother Klaus, who immigrated to the United States eight years ago and has been living in Washington, DC. At the time, Werner was under contract to a German soccer team and was expected to return ..
Determine the magnitude of the horizontal component : The uniform bar ABC is bent into a semicircular arc of radius R. The arc is supported by pins at A and C. Determine the magnitude of the horizontal component of the reaction at A when the vertical load P is applied at B. Consider only bending defo..
Describe your thoughts about what professionalism would mean : Describe your thoughts about what "professionalism" would mean to someone who is in the role of network administrator. How would that compare to someone who was a systems analyst or a programmer?
Discuss why cash is inherently high-risk item : Discuss why cash is inherently a high-risk item on the balance sheet but not as high a risk to the actual audit program itself. Consider these questions: When is cash a high risk, and when is it a low risk? What are possible outcomes of re-performing..
Electricity used to run assembly line : With respect to a product cost object, where the plant makes only one product. Electricity used to run assembly line ? Depreciation of the factory building Direct or Indirect Variable or fixed?
Reflect and summarize your entire msitm experience : The overall purpose of this Capstone Case Series is to allow you to reflect on and summarize your entire MSITM experience. In this light, the case in each module asks you to respond to unique questions highlighted by the assignment's directions.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the difference between serial and parallel transfer

What is the difference between a serial and parallel transfer? Explain how to convert serial data to parallel and parallel data to serial. What type of register is needed?

  Discuss how the topology can be used

Discuss how the topology can be used

  Below are six questions select any five to answerwrite as

below are six questions select any five to answer.write as much as you need to answer the question a good answer is

  Write a function that creates a cell and structure array

Write a function that creates a cell and structure array.

  Prepare a set of nonfunctional requirements

Prepare a set of nonfunctional requirements, including operational requirements, performance requirements, security requirements, and cultural and political requirements. Much information is incomplete, but do your best.

  How to convert 2d array to 1d array

how to convert 2d array to 1d array for instance

  Deducing security policy to mitigate the threat.

Information like sales data, client data, and the network configuration. Recognize the threats these significant items are subject to and deduce the security policy in order to mitigate that threat.

  Define what would adversary observe

(HW1) List some of the attacks on the Diffie-Hellman key exchange protocol we discussed in the lecture. Present your solution for avoiding such attacks.

  Questionexplain contents of an initially empty avl tree at

questionexplain contents of an initially empty avl tree at the end of each of following sequences of operations-i.

  Can you show what the eight-hex-digit address is

Suppose that you have a 32-bit PC with 512 MB of RAM. What is the eight-hex-digit address of the "last" byte of installed memory?

  List four different html tags which define the structure of

question 1 list 4 different html tags that define the structure of a document and briefly define the function of

  Revealing and exploring system topology

Code and a 1000 word report on revealing and exploring system topology - what it reveals about the system topology and why this is a useful thing to know

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd