Was applegate obligated to blow the whistle

Assignment Help Basic Computer Science
Reference no: EM131215164

According to Kenneth Kipnis, a professor of philosophy, Dan Applegate and his colleagues share the blame for the death of the passengers in the DC-10 crash. Kipnis contends that the engineers; overriding obligation was to obey the following principle: "Engineers shall not participate in projects that degrade ambient levels of public safety unless information concerning those degradations is made generally available."" Do you agree or disagree with Kipnis, and why? Was Applegate obligated to blow the whistle?

Reference no: EM131215164

Questions Cloud

Piece of evidence that the defendant : Provide an example of a piece of evidence that the defendant could have provided to indicate the unreasonableness of the scope of the covenant in this case.
Successful implementation of strategy : The chapter describes the role of culture in the successful implementation of strategy. Consider an employment experience of your own or of someone you have observed closely (e.g., a family member).
Was his subsequent firing justified : Was his behavior improper? Was his subsequent firing justified?
Speak about the active exporting strategies : Explain how international logistics has evolved into international supply chain management. Speak about the active exporting strategies outlined in the textbook
Was applegate obligated to blow the whistle : "Engineers shall not participate in projects that degrade ambient levels of public safety unless information concerning those degradations is made generally available."" Do you agree or disagree with Kipnis, and why? Was Applegate obligated to blo..
Find the chernoff bound for the tail probability : Suppose X is a Poisson random variable with PMF,-  k = 0,1,2.... - Find the Chernoff bound for the tail probability.
Influence the level of his or her personal : A broader economy and an individual's own business skills influence the level of his or her personal financial success.
Property rights come with our home : All of us live somewhere. What property rights come with our home? Are there any restrictions on what you can do with your property and home (homeowner's or condominium association)? Under what circumstances can the government seize your home for ..
What are some ways the christian gospel is perceived : What are some ways the Christian gospel is perceived in our culture? What are some specific moral reasons people may reject the Christian gospel? What are some specific emotional reasons people may reject the Christian gospel?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Types of systems that benefit from dhcp

Consider the types of systems that benefit from DHCP reservations and/or from having manually-configured (static) IP addresses, including servers, networked printers, and other networked devices (e.g., network-connected HVAC controllers, IP camera..

  Elements of a data center besides

Research other elements of a data center besides the core elements discussed in this chapter, including environmental control parameters such as HVAC (heat, ventilation, and air-condition), power supplies, and security.

  What could you do to violate individuals privacy rights

Privacy policies are found all over the Web. Pick three web sites with privacy policies and compare and contrast them. What do they include and what is missing?

  Calculate interest earned in one year

Calculate the interest earned in 1 year given starting account balance B and annual interest rate I and supposing simple interst, that is no compounding.

  What is the definition of a priority queue

Give one way how implementing a heap differs from implementing a binary search tree.

  Program should display a menu

The program should display a menu allowing the user to enter pointer values by selecting option 1, then perform shallow or deep copy by selecting options 2 or 3. After whcich, your program needs to display the new results after the copy is performed.

  Find out how smtp hosts deal with unknown commands

Find out how SMTP hosts deal with unknown commands from the other side, and how in particular this mechanism allows for the evolution of the protocol (e.g., to “extended SMTP”). You can either read the RFC or contact an SMTP server as in Exercise 14 ..

  What are the seven message types in snmp

What are the seven message types in SNMP?

  What is a minimal set of functional dependencies

What is a minimal set of functional dependencies?

  Likelihood of a threat associated with the vulnerability

Because it is not your office you tell the resident of the office to contact the maintenance person and have it fixed. After leaving, you fail to follow up on whether the windows was actually repaired. What affect will this have on the likelihood ..

  Frequently accessed program instructions

Memory that the processor can use to store frequently accessed program instructions and data in order toimprove the overall speed of the computer?

  Find the transmission rate in bits per second

Suppose all headers (including RTP, UDP and IP) have a total length of h and an IP datagram is emitted every 40 msecs.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd