Who should be held responsible for defective software

Assignment Help Basic Computer Science
Reference no: EM13721704

The "Ethics in IT" piece in this chapter (p. 432) discusses the question of responsibility and liability when software does not perform as expected. It can be hard to assess where the ultimate blame for malfunctioning software lies. Who should be held responsible for defective software?

Can you think of steps that the software industry could take to make sure their work contributes to our society? Include references to chapter 10 and find an article on this topic in your post. Include a link to your article in your post.

 

Reference no: EM13721704

Questions Cloud

What are some of the typical problems a project team : Question: What are some of the typical problems a project team may encounter during a project's life cycle? Answer 250 words perfectly.
Calculated intrinsic value differed substantially : If your calculated intrinsic value differed substantially from the current market price, and if your views are consistent with those of most investors (the marginal investor), what would happen in the marketplace? What would happen if your views were..
Research its management style from its inception until : Microsoft just announced they are laying off 80,000 employees; Youtube was purchased by Google in 2006 and didn't turn a profit until 2010; and JC Penney changed CEOs and marketing strategies twice in a short span in the late 2000s. You need to..
Considering adopting the income tax : Suppose the state of California approved the use of local option income taxes (personal and corporate). You work in the finance department of a county government and the country is considering adopting the income tax.
Who should be held responsible for defective software : The "Ethics in IT" piece in this chapter (p. 432) discusses the question of responsibility and liability when software does not perform as expected. It can be hard to assess where the ultimate blame for malfunctioning software lies. Who should..
Explain what information was accessed : Find a major data breach that has occurred recently. Explain what information was accessed and how this information could be misused, such as identity theft, spear phishing, and so on. Remember to include references to chapter 11 or 12 and an ..
A product requires an extensive initial investment : Communications infrastructure as a product requires an extensive initial investment. In the case of the Iridium mobile telephone system, this led to failure for the company. In the case of AT&T long distance, this led to a powerful monopoly. Di..
Design a good device interface standard : Discuss why it is so difficult to design a good device interface standard. Provide a detailed example to support your findings. Include a question that responding students can reply to within your initial post
Makeany dfa in jflap software and run for several inputs : Makeany DFA in JFLAP software and run for several inputs. Take a screen shot andinclude in your assignment. Keep in mind that this assignment is meant to makeyou all get familiar with this software.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Explaining difficulties in managing information resources

Considering difficulties in managing information resources, explain in scholarly detail why risk management must involve in the following elements to include threats,

  How many outcomes have at least one 1

In this version, there are C(6+3-1,3) = 56 different outcomes in Chuck-a-Luck. Order doesn't matter, just the number's that come up. Out of those 56, how many outcomes have at least one 1?

  Database life cycle

Database Life Cycle

  Write an instruction sequence to swap the upper

Write an instruction sequence to swap the upper four bits and the lower four bits of accumulator A [swap bit 7 with bit 3, bit 6 with bit 2, and so on]

  What is break -even point for upgrades

You have also learned that you can upgrade your CPU to make it 1.4 times as fast for $5,000. Which would you choose to yield the best performance improvemen tfor the least amount of money?

  Determine the two smallest positive real roots

Determine the two smallest positive real roots for the following equation: x + cos(x) = 1 + sin(x)

  What is the standard deviation for the true error rate

Consider a learned hypothesis, h, for some boolean concept. What is the standard deviation and the 95% confidence interval for the true error rate for Errorv(h)?

  How is the principle of inclusion and exclusion related

How is the principle of inclusion and exclusion related to the rules for manipulation and simplification of logic predicates you learned in Ch. 2

  Identifying the risks associated with the current position

Be sure to add a conclusion with a rationale detailing how risks can be mitigated. Reference your research so that Sean may add or refine this report before submission to senior management.

  What are the benefits of using tangible interfaces

What are the benefits of using tangible interfaces compared with other interfaces like GUI, pen-based or gesture?

  Determine minute at which first customer arrives

Choose a random integer between 1 and 4 to determine the minute at which the first customer arrives. What happens if the arrival is changed from 1 to 4 minutes to 1 to 3 minutes?

  Design application to accept reader data

Design an application that accepts reader data and produces a count of readers by age groups as follows: under 20, 20-29, 30-39, 40-49, and 50+.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd