Different ethical arguments

Assignment Help Basic Computer Science
Reference no: EM131386757

As your lecture points out, there are many different ethical arguments, but two large groups of thought are deontological (largely associated with the work of Immanuel Kant) and telelogical ethics (largely associated with John Stuart Mill). The first believes that we should judge our ethics based on the idea of universal understandings. For example, it is logical that all persons do not wish to be harmed, so ethically we can establish a principle based on this. So, under this line of thought, if it is ethically wrong to harm a person, then the death penalty must be ethically wrong, because it violates this principle. If you follow this ethical approach, all ethical questions must be evaluated in accordance to these universal principles. In contrast, telelogical ethics, which utilizes utilitarian thought, looks to the outcome of the action and weighs if it is good based on its impact on the majority. For example, in considering the idea of the death penalty again, one must weigh whether utilizing the death penalty benefits the majority of the population. If the majority is helped, then the action is viewed as ethically sound; if the majority is hurt, it is not. In understanding these thoughts and approaches, what do you think about cloning? Is there a universal thought it may violate? Or can it be considered as good for a majority? What are your thoughts, and what are the different questions that can be raised behind them?

Reference no: EM131386757

Questions Cloud

Linux servers versus windows servers : What advantages are offered by Linux servers versus Windows servers? Do a little research and discuss the types of Linux servers found in networks. What do you consider the most important role of Linux servers in a network?
Define and understand sip : We had to clearly define and understand SIP before we could get into SIP trunk. SIP Trunk provides the same service you get from a traditional analog phone line.
Implement the banker algorithm for deadlock avoidance : Implement the Banker's algorithm for deadlock avoidance, that works on a given set of N processes and M resource types (N
Set of odd integers : Let O = {x ∈ Z | x is odd} be the set of odd integers and E = {x ∈ Z | x is even} be the set of even integers. (a) Explain whether {O, E} is a partition of Z. (b) Explain whether {O × O, E × E} is a partition of Z × Z. If the answer is no for eith..
Different ethical arguments : As your lecture points out, there are many different ethical arguments, but two large groups of thought are deontological (largely associated with the work of Immanuel Kant) and telelogical ethics (largely associated with John Stuart Mill).
How each of the steps applies to your specific organization : Ascertain how each of the steps applies to your specific organization.Develop a strategy that illustrates how you would address each of the eight (8) stages of change:Establishing a sense of urgency,Creating coalition,Developing vision and strategy,C..
Critique a journal article : MGT 524 Research Methods in Business - Individual Assignment. Read the article you are to critique once to get an overview. Then read it again, critically. At this point you may want to make some notes to yourself on your copy. The following are so..
Consider the future growth and success of the company : Given the wide variety of employees in the company (ranging from senior executive staff to senior management, middle management, supervisors, laborers, and truck drivers), evaluate the compensation models and benefit packages that would be appropr..
Detect failures in distributed systems : Give an example of a traditional mechanism used to detect failures in distributed systems. Give an example of a traditional mechanism used to improve availability in distributed systems.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a program that accepts a temperature

Write a program that accepts a temperature in Fahrenheit from a user and converts it to Celsius by subtracting 32 from the Fahrenheit value and multiplying the result by 5/9. Display both values. Save the class as FahrenheitToCelsius.java.

  Implement a subclass square that extends the rectangle class

Also supply a method get Area that computes and returns the area of the square. Write a sample program that asks for the center and side length, then prints out the square (using the to String method that you inherit from Rectangle) and the area o..

  Describe three olap uses of this data warehouse

Design a multidimensional database using a star schema for a data warehouse for the Super Baseball League business environment described in Minicase 2.2.

  Emerging trends technologies and applications

Explain the fundamental strengths and weaknesses--or the advantages and disadvantages--of the concept that you have chosen. Justify your response.

  National parks database

You have been hired by a local travel agency to set up tours for the coming season to the National Parks in the United States. The travel agency wants to be able to access a database that will let them know about several features of each park so..

  Different departments in a company

Using what you have learned about the different departments in a company and why they must work together to achieve success, explain in a one page summary, how Apple achieved business success through the use of information, information technology ..

  Usefulness of office suites

Assume that you did not have access to Microsoft Office or other compatible application suites. Describe at least three (3) tasks that you would not be able to perform without Microsoft Office 2013.

  Typical computing lab

List the hardware assets found in a typical computing lab and then list the attributes of those assets. We're talking about a generic company computing lab. Provide as many facts about each asset as possible.

  Analysis of how current and future technology trends

Analyze previous submissions and make changes as necessary to the final paper. Continue development of the project or research with a 3-5 page detailed analysis of how current and future technology trends might impact the project or research performe..

  Describes the difference between an intranet and internet

Which of the following BEST describes the difference between an intranet and internet? Beginning in the upper left corner of a spread sheet, where would you look to find cell C6

  Display the sum and the average of the 3 values

Write a java program to accept 3 integer values from keyboard, display the sum and the average of the 3 values.

  Identifying and explaining how the breach occurred

Based on the Target Data Breach answer the following questions and use only information from authoritative or scholarly sources and list references. identifying the type of breach identifying and explaining how the breach occurred (or suspicions by a..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd